id
large_string | submitter
large_string | authors
large_string | title
large_string | comments
large_string | journal-ref
large_string | doi
large_string | report-no
large_string | categories
large_string | license
large_string | abstract
large_string | versions
large list | update_date
timestamp[ms] | authors_parsed
large list | prompt
large_string |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1412.1127 | Ahmad Lashgar | Ahmad Lashgar and Alireza Majidi and Amirali Baniasadi | IPMACC: Open Source OpenACC to CUDA/OpenCL Translator | 14 pages, 2 figures | null | null | null | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce IPMACC, a framework for translating OpenACC
applications to CUDA or OpenCL. IPMACC is composed of set of translators
translating OpenACC for C applications to CUDA or OpenCL. The framework uses
the system compiler (e.g. nvcc) for generating final accelerator's binary. The
framework can be used for extending the OpenACC API, executing OpenACC
applications, or obtaining CUDA or OpenCL code which is equivalent to OpenACC
code. We verify correctness of our framework under several benchmarks included
from Rodinia Benchmark Suit and CUDA SDK. We also compare the performance of
CUDA version of the benchmarks to OpenACC version which is compiled by our
framework. By comparing CUDA and OpenACC versions, we discuss the limitations
of OpenACC in achieving a performance near to highly-optimized CUDA version.
| [
{
"version": "v1",
"created": "Tue, 2 Dec 2014 22:49:14 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Lashgar",
"Ahmad",
""
],
[
"Majidi",
"Alireza",
""
],
[
"Baniasadi",
"Amirali",
""
]
] | TITLE: IPMACC: Open Source OpenACC to CUDA/OpenCL Translator
ABSTRACT: In this paper we introduce IPMACC, a framework for translating OpenACC
applications to CUDA or OpenCL. IPMACC is composed of set of translators
translating OpenACC for C applications to CUDA or OpenCL. The framework uses
the system compiler (e.g. nvcc) for generating final accelerator's binary. The
framework can be used for extending the OpenACC API, executing OpenACC
applications, or obtaining CUDA or OpenCL code which is equivalent to OpenACC
code. We verify correctness of our framework under several benchmarks included
from Rodinia Benchmark Suit and CUDA SDK. We also compare the performance of
CUDA version of the benchmarks to OpenACC version which is compiled by our
framework. By comparing CUDA and OpenACC versions, we discuss the limitations
of OpenACC in achieving a performance near to highly-optimized CUDA version.
|
1412.1138 | Ben Fulcher | B. D. Fulcher, A. E. Georgieva, C. W. G. Redman, Nick S. Jones | Highly comparative fetal heart rate analysis | 7 pages, 4 figures | Fulcher, B. D., Georgieva, A., Redman, C. W., & Jones, N. S.
(2012). Highly comparative fetal heart rate analysis (pp. 3135-3138).
Presented at the 34th Annual International Conference of the IEEE EMBS, San
Diego, CA, USA | 10.1109/EMBC.2012.6346629 | null | cs.LG cs.AI q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A database of fetal heart rate (FHR) time series measured from 7221 patients
during labor is analyzed with the aim of learning the types of features of
these recordings that are informative of low cord pH. Our 'highly comparative'
analysis involves extracting over 9000 time-series analysis features from each
FHR time series, including measures of autocorrelation, entropy, distribution,
and various model fits. This diverse collection of features was developed in
previous work, and is publicly available. We describe five features that most
accurately classify a balanced training set of 59 'low pH' and 59 'normal pH'
FHR recordings. We then describe five of the features with the strongest linear
correlation to cord pH across the full dataset of FHR time series. The features
identified in this work may be used as part of a system for guiding
intervention during labor in future. This work successfully demonstrates the
utility of comparing across a large, interdisciplinary literature on
time-series analysis to automatically contribute new scientific results for
specific biomedical signal processing challenges.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 00:00:42 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Fulcher",
"B. D.",
""
],
[
"Georgieva",
"A. E.",
""
],
[
"Redman",
"C. W. G.",
""
],
[
"Jones",
"Nick S.",
""
]
] | TITLE: Highly comparative fetal heart rate analysis
ABSTRACT: A database of fetal heart rate (FHR) time series measured from 7221 patients
during labor is analyzed with the aim of learning the types of features of
these recordings that are informative of low cord pH. Our 'highly comparative'
analysis involves extracting over 9000 time-series analysis features from each
FHR time series, including measures of autocorrelation, entropy, distribution,
and various model fits. This diverse collection of features was developed in
previous work, and is publicly available. We describe five features that most
accurately classify a balanced training set of 59 'low pH' and 59 'normal pH'
FHR recordings. We then describe five of the features with the strongest linear
correlation to cord pH across the full dataset of FHR time series. The features
identified in this work may be used as part of a system for guiding
intervention during labor in future. This work successfully demonstrates the
utility of comparing across a large, interdisciplinary literature on
time-series analysis to automatically contribute new scientific results for
specific biomedical signal processing challenges.
|
1412.1194 | Feng Shi | Feng Shi, Robert Laganiere, Emil Petriu | Gradient Boundary Histograms for Action Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a high efficient local spatiotemporal descriptor,
called gradient boundary histograms (GBH). The proposed GBH descriptor is built
on simple spatio-temporal gradients, which are fast to compute. We demonstrate
that it can better represent local structure and motion than other
gradient-based descriptors, and significantly outperforms them on large
realistic datasets. A comprehensive evaluation shows that the recognition
accuracy is preserved while the spatial resolution is greatly reduced, which
yields both high efficiency and low memory usage.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 05:23:03 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Shi",
"Feng",
""
],
[
"Laganiere",
"Robert",
""
],
[
"Petriu",
"Emil",
""
]
] | TITLE: Gradient Boundary Histograms for Action Recognition
ABSTRACT: This paper introduces a high efficient local spatiotemporal descriptor,
called gradient boundary histograms (GBH). The proposed GBH descriptor is built
on simple spatio-temporal gradients, which are fast to compute. We demonstrate
that it can better represent local structure and motion than other
gradient-based descriptors, and significantly outperforms them on large
realistic datasets. A comprehensive evaluation shows that the recognition
accuracy is preserved while the spatial resolution is greatly reduced, which
yields both high efficiency and low memory usage.
|
1412.1265 | Yi Sun | Yi Sun, Xiaogang Wang, Xiaoou Tang | Deeply learned face representations are sparse, selective, and robust | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper designs a high-performance deep convolutional network (DeepID2+)
for face recognition. It is learned with the identification-verification
supervisory signal. By increasing the dimension of hidden representations and
adding supervision to early convolutional layers, DeepID2+ achieves new
state-of-the-art on LFW and YouTube Faces benchmarks. Through empirical
studies, we have discovered three properties of its deep neural activations
critical for the high performance: sparsity, selectiveness and robustness. (1)
It is observed that neural activations are moderately sparse. Moderate sparsity
maximizes the discriminative power of the deep net as well as the distance
between images. It is surprising that DeepID2+ still can achieve high
recognition accuracy even after the neural responses are binarized. (2) Its
neurons in higher layers are highly selective to identities and
identity-related attributes. We can identify different subsets of neurons which
are either constantly excited or inhibited when different identities or
attributes are present. Although DeepID2+ is not taught to distinguish
attributes during training, it has implicitly learned such high-level concepts.
(3) It is much more robust to occlusions, although occlusion patterns are not
included in the training set.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 10:37:13 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Sun",
"Yi",
""
],
[
"Wang",
"Xiaogang",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Deeply learned face representations are sparse, selective, and robust
ABSTRACT: This paper designs a high-performance deep convolutional network (DeepID2+)
for face recognition. It is learned with the identification-verification
supervisory signal. By increasing the dimension of hidden representations and
adding supervision to early convolutional layers, DeepID2+ achieves new
state-of-the-art on LFW and YouTube Faces benchmarks. Through empirical
studies, we have discovered three properties of its deep neural activations
critical for the high performance: sparsity, selectiveness and robustness. (1)
It is observed that neural activations are moderately sparse. Moderate sparsity
maximizes the discriminative power of the deep net as well as the distance
between images. It is surprising that DeepID2+ still can achieve high
recognition accuracy even after the neural responses are binarized. (2) Its
neurons in higher layers are highly selective to identities and
identity-related attributes. We can identify different subsets of neurons which
are either constantly excited or inhibited when different identities or
attributes are present. Although DeepID2+ is not taught to distinguish
attributes during training, it has implicitly learned such high-level concepts.
(3) It is much more robust to occlusions, although occlusion patterns are not
included in the training set.
|
1412.1442 | Maxwell Collins | Maxwell D. Collins and Pushmeet Kohli | Memory Bounded Deep Convolutional Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we investigate the use of sparsity-inducing regularizers during
training of Convolution Neural Networks (CNNs). These regularizers encourage
that fewer connections in the convolution and fully connected layers take
non-zero values and in effect result in sparse connectivity between hidden
units in the deep network. This in turn reduces the memory and runtime cost
involved in deploying the learned CNNs. We show that training with such
regularization can still be performed using stochastic gradient descent
implying that it can be used easily in existing codebases. Experimental
evaluation of our approach on MNIST, CIFAR, and ImageNet datasets shows that
our regularizers can result in dramatic reductions in memory requirements. For
instance, when applied on AlexNet, our method can reduce the memory consumption
by a factor of four with minimal loss in accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 19:08:38 GMT"
}
] | 2014-12-04T00:00:00 | [
[
"Collins",
"Maxwell D.",
""
],
[
"Kohli",
"Pushmeet",
""
]
] | TITLE: Memory Bounded Deep Convolutional Networks
ABSTRACT: In this work, we investigate the use of sparsity-inducing regularizers during
training of Convolution Neural Networks (CNNs). These regularizers encourage
that fewer connections in the convolution and fully connected layers take
non-zero values and in effect result in sparse connectivity between hidden
units in the deep network. This in turn reduces the memory and runtime cost
involved in deploying the learned CNNs. We show that training with such
regularization can still be performed using stochastic gradient descent
implying that it can be used easily in existing codebases. Experimental
evaluation of our approach on MNIST, CIFAR, and ImageNet datasets shows that
our regularizers can result in dramatic reductions in memory requirements. For
instance, when applied on AlexNet, our method can reduce the memory consumption
by a factor of four with minimal loss in accuracy.
|
1409.3809 | Daniel Crankshaw | Daniel Crankshaw, Peter Bailis, Joseph E. Gonzalez, Haoyuan Li, Zhao
Zhang, Michael J. Franklin, Ali Ghodsi, Michael I. Jordan | The Missing Piece in Complex Analytics: Low Latency, Scalable Model
Management and Serving with Velox | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To support complex data-intensive applications such as personalized
recommendations, targeted advertising, and intelligent services, the data
management community has focused heavily on the design of systems to support
training complex models on large datasets. Unfortunately, the design of these
systems largely ignores a critical component of the overall analytics process:
the deployment and serving of models at scale. In this work, we present Velox,
a new component of the Berkeley Data Analytics Stack. Velox is a data
management system for facilitating the next steps in real-world, large-scale
analytics pipelines: online model management, maintenance, and serving. Velox
provides end-user applications and services with a low-latency, intuitive
interface to models, transforming the raw statistical models currently trained
using existing offline large-scale compute frameworks into full-blown,
end-to-end data products capable of recommending products, targeting
advertisements, and personalizing web content. To provide up-to-date results
for these complex models, Velox also facilitates lightweight online model
maintenance and selection (i.e., dynamic weighting). In this paper, we describe
the challenges and architectural considerations required to achieve this
functionality, including the abilities to span online and offline systems, to
adaptively adjust model materialization strategies, and to exploit inherent
statistical properties such as model error tolerance, all while operating at
"Big Data" scale.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2014 18:12:24 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 23:20:30 GMT"
}
] | 2014-12-03T00:00:00 | [
[
"Crankshaw",
"Daniel",
""
],
[
"Bailis",
"Peter",
""
],
[
"Gonzalez",
"Joseph E.",
""
],
[
"Li",
"Haoyuan",
""
],
[
"Zhang",
"Zhao",
""
],
[
"Franklin",
"Michael J.",
""
],
[
"Ghodsi",
"Ali",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: The Missing Piece in Complex Analytics: Low Latency, Scalable Model
Management and Serving with Velox
ABSTRACT: To support complex data-intensive applications such as personalized
recommendations, targeted advertising, and intelligent services, the data
management community has focused heavily on the design of systems to support
training complex models on large datasets. Unfortunately, the design of these
systems largely ignores a critical component of the overall analytics process:
the deployment and serving of models at scale. In this work, we present Velox,
a new component of the Berkeley Data Analytics Stack. Velox is a data
management system for facilitating the next steps in real-world, large-scale
analytics pipelines: online model management, maintenance, and serving. Velox
provides end-user applications and services with a low-latency, intuitive
interface to models, transforming the raw statistical models currently trained
using existing offline large-scale compute frameworks into full-blown,
end-to-end data products capable of recommending products, targeting
advertisements, and personalizing web content. To provide up-to-date results
for these complex models, Velox also facilitates lightweight online model
maintenance and selection (i.e., dynamic weighting). In this paper, we describe
the challenges and architectural considerations required to achieve this
functionality, including the abilities to span online and offline systems, to
adaptively adjust model materialization strategies, and to exploit inherent
statistical properties such as model error tolerance, all while operating at
"Big Data" scale.
|
1409.5308 | Mohammed El-Kebir | Mohammed El-Kebir and Gunnar W. Klau | Solving the Maximum-Weight Connected Subgraph Problem to Optimality | 11th DIMACS implementation challenge | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an undirected node-weighted graph, the Maximum-Weight Connected
Subgraph problem (MWCS) is to identify a subset of nodes of maximalsum of
weights that induce a connected subgraph. MWCS is closely related to the
well-studied Prize Collecting Steiner Tree problem and has many applications in
different areas, including computational biology, network design and computer
vision. The problem is NP-hard and even hard to approximate within a constant
factor. In this work we describe an algorithmic scheme for solving MWCS to
provable optimality, which is based on preprocessing rules, new results on
decomposing an instance into its biconnected and triconnected components and a
branch-and-cut approach combined with a primal heuristic. We demonstrate the
performance of our method on the benchmark instances of the 11th DIMACS
implementation challenge consisting of MWCS as well as transformed PCST
instances.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2014 14:15:45 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 22:13:05 GMT"
}
] | 2014-12-03T00:00:00 | [
[
"El-Kebir",
"Mohammed",
""
],
[
"Klau",
"Gunnar W.",
""
]
] | TITLE: Solving the Maximum-Weight Connected Subgraph Problem to Optimality
ABSTRACT: Given an undirected node-weighted graph, the Maximum-Weight Connected
Subgraph problem (MWCS) is to identify a subset of nodes of maximalsum of
weights that induce a connected subgraph. MWCS is closely related to the
well-studied Prize Collecting Steiner Tree problem and has many applications in
different areas, including computational biology, network design and computer
vision. The problem is NP-hard and even hard to approximate within a constant
factor. In this work we describe an algorithmic scheme for solving MWCS to
provable optimality, which is based on preprocessing rules, new results on
decomposing an instance into its biconnected and triconnected components and a
branch-and-cut approach combined with a primal heuristic. We demonstrate the
performance of our method on the benchmark instances of the 11th DIMACS
implementation challenge consisting of MWCS as well as transformed PCST
instances.
|
1301.5887 | Tamara Kolda | Tamara G. Kolda and Ali Pinar and Todd Plantenga and C. Seshadhri and
Christine Task | Counting Triangles in Massive Graphs with MapReduce | null | SIAM Journal on Scientific Computing, Vol. 36, No. 5, pp. S44-S77,
October 2014 | 10.1137/13090729X | null | cs.SI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graphs and networks are used to model interactions in a variety of contexts.
There is a growing need to quickly assess the characteristics of a graph in
order to understand its underlying structure. Some of the most useful metrics
are triangle-based and give a measure of the connectedness of mutual friends.
This is often summarized in terms of clustering coefficients, which measure the
likelihood that two neighbors of a node are themselves connected. Computing
these measures exactly for large-scale networks is prohibitively expensive in
both memory and time. However, a recent wedge sampling algorithm has proved
successful in efficiently and accurately estimating clustering coefficients. In
this paper, we describe how to implement this approach in MapReduce to deal
with massive graphs. We show results on publicly-available networks, the
largest of which is 132M nodes and 4.7B edges, as well as artificially
generated networks (using the Graph500 benchmark), the largest of which has
240M nodes and 8.5B edges. We can estimate the clustering coefficient by degree
bin (e.g., we use exponential binning) and the number of triangles per bin, as
well as the global clustering coefficient and total number of triangles, in an
average of 0.33 seconds per million edges plus overhead (approximately 225
seconds total for our configuration). The technique can also be used to study
triangle statistics such as the ratio of the highest and lowest degree, and we
highlight differences between social and non-social networks. To the best of
our knowledge, these are the largest triangle-based graph computations
published to date.
| [
{
"version": "v1",
"created": "Thu, 24 Jan 2013 20:32:25 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2013 21:45:16 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Dec 2013 20:37:01 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Kolda",
"Tamara G.",
""
],
[
"Pinar",
"Ali",
""
],
[
"Plantenga",
"Todd",
""
],
[
"Seshadhri",
"C.",
""
],
[
"Task",
"Christine",
""
]
] | TITLE: Counting Triangles in Massive Graphs with MapReduce
ABSTRACT: Graphs and networks are used to model interactions in a variety of contexts.
There is a growing need to quickly assess the characteristics of a graph in
order to understand its underlying structure. Some of the most useful metrics
are triangle-based and give a measure of the connectedness of mutual friends.
This is often summarized in terms of clustering coefficients, which measure the
likelihood that two neighbors of a node are themselves connected. Computing
these measures exactly for large-scale networks is prohibitively expensive in
both memory and time. However, a recent wedge sampling algorithm has proved
successful in efficiently and accurately estimating clustering coefficients. In
this paper, we describe how to implement this approach in MapReduce to deal
with massive graphs. We show results on publicly-available networks, the
largest of which is 132M nodes and 4.7B edges, as well as artificially
generated networks (using the Graph500 benchmark), the largest of which has
240M nodes and 8.5B edges. We can estimate the clustering coefficient by degree
bin (e.g., we use exponential binning) and the number of triangles per bin, as
well as the global clustering coefficient and total number of triangles, in an
average of 0.33 seconds per million edges plus overhead (approximately 225
seconds total for our configuration). The technique can also be used to study
triangle statistics such as the ratio of the highest and lowest degree, and we
highlight differences between social and non-social networks. To the best of
our knowledge, these are the largest triangle-based graph computations
published to date.
|
1306.0225 | Qing Hui | Qing Hui, Haopeng Zhang | Convergence Analysis and Parallel Computing Implementation for the
Multiagent Coordination Optimization Algorithm | 51 pages, 34 figures | null | null | CSEL-06-13 | math.OC cs.NE math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this report, a novel variation of Particle Swarm Optimization (PSO)
algorithm, called Multiagent Coordination Optimization (MCO), is implemented in
a parallel computing way for practical use by introducing MATLAB built-in
function "parfor" into MCO. Then we rigorously analyze the global convergence
of MCO by means of semistability theory. Besides sharing global optimal
solutions with the PSO algorithm, the MCO algorithm integrates cooperative
swarm behavior of multiple agents into the update formula by sharing velocity
and position information between neighbors to improve its performance.
Numerical evaluation of the parallel MCO algorithm is provided in the report by
running the proposed algorithm on supercomputers in the High Performance
Computing Center at Texas Tech University. In particular, the optimal value and
consuming time are compared with PSO and serial MCO by solving several
benchmark functions in the literature, respectively. Based on the simulation
results, the performance of the parallel MCO is not only superb compared with
PSO for solving many nonlinear, noncovex optimization problems, but also is of
high efficiency by saving the computational time.
| [
{
"version": "v1",
"created": "Sun, 2 Jun 2013 16:17:18 GMT"
},
{
"version": "v10",
"created": "Sat, 29 Nov 2014 18:10:07 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Aug 2013 22:00:32 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Aug 2013 16:04:05 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Sep 2013 14:57:27 GMT"
},
{
"version": "v5",
"created": "Wed, 30 Oct 2013 19:13:18 GMT"
},
{
"version": "v6",
"created": "Thu, 31 Oct 2013 23:03:38 GMT"
},
{
"version": "v7",
"created": "Fri, 8 Nov 2013 23:21:39 GMT"
},
{
"version": "v8",
"created": "Sat, 7 Dec 2013 01:48:39 GMT"
},
{
"version": "v9",
"created": "Thu, 20 Feb 2014 02:24:13 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Hui",
"Qing",
""
],
[
"Zhang",
"Haopeng",
""
]
] | TITLE: Convergence Analysis and Parallel Computing Implementation for the
Multiagent Coordination Optimization Algorithm
ABSTRACT: In this report, a novel variation of Particle Swarm Optimization (PSO)
algorithm, called Multiagent Coordination Optimization (MCO), is implemented in
a parallel computing way for practical use by introducing MATLAB built-in
function "parfor" into MCO. Then we rigorously analyze the global convergence
of MCO by means of semistability theory. Besides sharing global optimal
solutions with the PSO algorithm, the MCO algorithm integrates cooperative
swarm behavior of multiple agents into the update formula by sharing velocity
and position information between neighbors to improve its performance.
Numerical evaluation of the parallel MCO algorithm is provided in the report by
running the proposed algorithm on supercomputers in the High Performance
Computing Center at Texas Tech University. In particular, the optimal value and
consuming time are compared with PSO and serial MCO by solving several
benchmark functions in the literature, respectively. Based on the simulation
results, the performance of the parallel MCO is not only superb compared with
PSO for solving many nonlinear, noncovex optimization problems, but also is of
high efficiency by saving the computational time.
|
1311.3984 | Richard Darst | Richard K. Darst, Zohar Nussinov, Santo Fortunato | Improving the performance of algorithms to find communities in networks | 9 pages, 6 figures. Published version | Phys. Rev. E 89, 032809 (2014) | 10.1103/PhysRevE.89.032809 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many algorithms to detect communities in networks typically work without any
information on the cluster structure to be found, as one has no a priori
knowledge of it, in general. Not surprisingly, knowing some features of the
unknown partition could help its identification, yielding an improvement of the
performance of the method. Here we show that, if the number of clusters were
known beforehand, standard methods, like modularity optimization, would
considerably gain in accuracy, mitigating the severe resolution bias that
undermines the reliability of the results of the original unconstrained
version. The number of clusters can be inferred from the spectra of the
recently introduced non-backtracking and flow matrices, even in benchmark
graphs with realistic community structure. The limit of such two-step procedure
is the overhead of the computation of the spectra.
| [
{
"version": "v1",
"created": "Fri, 15 Nov 2013 21:28:29 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 11:50:07 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Darst",
"Richard K.",
""
],
[
"Nussinov",
"Zohar",
""
],
[
"Fortunato",
"Santo",
""
]
] | TITLE: Improving the performance of algorithms to find communities in networks
ABSTRACT: Many algorithms to detect communities in networks typically work without any
information on the cluster structure to be found, as one has no a priori
knowledge of it, in general. Not surprisingly, knowing some features of the
unknown partition could help its identification, yielding an improvement of the
performance of the method. Here we show that, if the number of clusters were
known beforehand, standard methods, like modularity optimization, would
considerably gain in accuracy, mitigating the severe resolution bias that
undermines the reliability of the results of the original unconstrained
version. The number of clusters can be inferred from the spectra of the
recently introduced non-backtracking and flow matrices, even in benchmark
graphs with realistic community structure. The limit of such two-step procedure
is the overhead of the computation of the spectra.
|
1402.3384 | Weina Wang | Weina Wang, Lei Ying and Junshan Zhang | A Minimax Distortion View of Differentially Private Query Release | null | null | null | null | cs.CR cs.DB cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of differentially private query release through a
synthetic database approach. Departing from the existing approaches that
require the query set to be specified in advance, we advocate to devise
query-set independent mechanisms, with an ambitious goal of providing accurate
answers, while meeting the privacy constraints, for all queries in a general
query class. Specifically, a differentially private mechanism is constructed to
"encode" rich stochastic structure into the synthetic database, and
"customized" companion estimators are then derived to provide accurate answers
by making use of all available information, including the mechanism (which is
public information) and the query functions. Accordingly, the distortion under
the best of this kind of mechanisms at the worst-case query in a general query
class, so called the minimax distortion, provides a fundamental
characterization of differentially private query release.
For the general class of statistical queries, we prove that with the
squared-error distortion measure, the minimax distortion is $O(1/n)$ by
deriving asymptotically tight upper and lower bounds in the regime that the
database size $n$ goes to infinity. The upper bound is achievable by a
mechanism $\mathcal{E}$ and its corresponding companion estimators, which
points directly to the feasibility of the proposed approach in large databases.
We further evaluate the mechanism $\mathcal{E}$ and the companion estimators
through experiments on real datasets from Netflix and Facebook. Experimental
results show improvement over the state-of-art MWEM algorithm and verify the
scaling behavior $O(1/n)$ of the minimax distortion.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2014 06:54:49 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2014 07:01:08 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Wang",
"Weina",
""
],
[
"Ying",
"Lei",
""
],
[
"Zhang",
"Junshan",
""
]
] | TITLE: A Minimax Distortion View of Differentially Private Query Release
ABSTRACT: We consider the problem of differentially private query release through a
synthetic database approach. Departing from the existing approaches that
require the query set to be specified in advance, we advocate to devise
query-set independent mechanisms, with an ambitious goal of providing accurate
answers, while meeting the privacy constraints, for all queries in a general
query class. Specifically, a differentially private mechanism is constructed to
"encode" rich stochastic structure into the synthetic database, and
"customized" companion estimators are then derived to provide accurate answers
by making use of all available information, including the mechanism (which is
public information) and the query functions. Accordingly, the distortion under
the best of this kind of mechanisms at the worst-case query in a general query
class, so called the minimax distortion, provides a fundamental
characterization of differentially private query release.
For the general class of statistical queries, we prove that with the
squared-error distortion measure, the minimax distortion is $O(1/n)$ by
deriving asymptotically tight upper and lower bounds in the regime that the
database size $n$ goes to infinity. The upper bound is achievable by a
mechanism $\mathcal{E}$ and its corresponding companion estimators, which
points directly to the feasibility of the proposed approach in large databases.
We further evaluate the mechanism $\mathcal{E}$ and the companion estimators
through experiments on real datasets from Netflix and Facebook. Experimental
results show improvement over the state-of-art MWEM algorithm and verify the
scaling behavior $O(1/n)$ of the minimax distortion.
|
1410.3726 | Chee Seng Chan | Chern Hong Lim, Anhar Risnumawan and Chee Seng Chan | Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene
Understanding | Accepted in IEEE Transactions on Fuzzy Systems | IEEE Transactions on Fuzzy Systems, vol. 22(6), pp. 1541 - 1556,
2014 | 10.1109/TFUZZ.2014.2298233 | null | cs.CV cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ambiguity or uncertainty is a pervasive element of many real world decision
making processes. Variation in decisions is a norm in this situation when the
same problem is posed to different subjects. Psychological and metaphysical
research had proven that decision making by human is subjective. It is
influenced by many factors such as experience, age, background, etc. Scene
understanding is one of the computer vision problems that fall into this
category. Conventional methods relax this problem by assuming scene images are
mutually exclusive; and therefore, focus on developing different approaches to
perform the binary classification tasks. In this paper, we show that scene
images are non-mutually exclusive, and propose the Fuzzy Qualitative Rank
Classifier (FQRC) to tackle the aforementioned problems. The proposed FQRC
provides a ranking interpretation instead of binary decision. Evaluations in
term of qualitative and quantitative using large numbers and challenging public
scene datasets have shown the effectiveness of our proposed method in modeling
the non-mutually exclusive scene images.
| [
{
"version": "v1",
"created": "Tue, 14 Oct 2014 15:19:43 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Lim",
"Chern Hong",
""
],
[
"Risnumawan",
"Anhar",
""
],
[
"Chan",
"Chee Seng",
""
]
] | TITLE: Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene
Understanding
ABSTRACT: Ambiguity or uncertainty is a pervasive element of many real world decision
making processes. Variation in decisions is a norm in this situation when the
same problem is posed to different subjects. Psychological and metaphysical
research had proven that decision making by human is subjective. It is
influenced by many factors such as experience, age, background, etc. Scene
understanding is one of the computer vision problems that fall into this
category. Conventional methods relax this problem by assuming scene images are
mutually exclusive; and therefore, focus on developing different approaches to
perform the binary classification tasks. In this paper, we show that scene
images are non-mutually exclusive, and propose the Fuzzy Qualitative Rank
Classifier (FQRC) to tackle the aforementioned problems. The proposed FQRC
provides a ranking interpretation instead of binary decision. Evaluations in
term of qualitative and quantitative using large numbers and challenging public
scene datasets have shown the effectiveness of our proposed method in modeling
the non-mutually exclusive scene images.
|
1412.0008 | Robert Templeman | Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, Apu
Kapadia | ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We live and work in environments that are inundated with cameras embedded in
devices such as phones, tablets, laptops, and monitors. Newer wearable devices
like Google Glass, Narrative Clip, and Autographer offer the ability to quietly
log our lives with cameras from a `first person' perspective. While capturing
several meaningful and interesting moments, a significant number of images
captured by these wearable cameras can contain computer screens. Given the
potentially sensitive information that is visible on our displays, there is a
need to guard computer screens from undesired photography. People need
protection against photography of their screens, whether by other people's
cameras or their own cameras.
We present ScreenAvoider, a framework that controls the collection and
disclosure of images with computer screens and their sensitive content.
ScreenAvoider can detect images with computer screens with high accuracy and
can even go so far as to discriminate amongst screen content. We also introduce
a ScreenTag system that aids in the identification of screen content, flagging
images with highly sensitive content such as messaging applications or email
webpages. We evaluate our concept on realistic lifelogging datasets, showing
that ScreenAvoider provides a practical and useful solution that can help users
manage their privacy.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2014 01:50:53 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Korayem",
"Mohammed",
""
],
[
"Templeman",
"Robert",
""
],
[
"Chen",
"Dennis",
""
],
[
"Crandall",
"David",
""
],
[
"Kapadia",
"Apu",
""
]
] | TITLE: ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras
ABSTRACT: We live and work in environments that are inundated with cameras embedded in
devices such as phones, tablets, laptops, and monitors. Newer wearable devices
like Google Glass, Narrative Clip, and Autographer offer the ability to quietly
log our lives with cameras from a `first person' perspective. While capturing
several meaningful and interesting moments, a significant number of images
captured by these wearable cameras can contain computer screens. Given the
potentially sensitive information that is visible on our displays, there is a
need to guard computer screens from undesired photography. People need
protection against photography of their screens, whether by other people's
cameras or their own cameras.
We present ScreenAvoider, a framework that controls the collection and
disclosure of images with computer screens and their sensitive content.
ScreenAvoider can detect images with computer screens with high accuracy and
can even go so far as to discriminate amongst screen content. We also introduce
a ScreenTag system that aids in the identification of screen content, flagging
images with highly sensitive content such as messaging applications or email
webpages. We evaluate our concept on realistic lifelogging datasets, showing
that ScreenAvoider provides a practical and useful solution that can help users
manage their privacy.
|
1412.0059 | Takashi Sakuragawa | Kent Miyajima and Takashi Sakuragawa | Continuous and robust clustering coefficients for weighted and directed
networks | 29 pages, 14 figures | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce new clustering coefficients for weighted networks. They are
continuous and robust against edge weight changes. Recently, generalized
clustering coefficients for weighted and directed networks have been proposed.
These generalizations have a common property, that their values are not
continuous. They are sensitive with edge weight changes, especially at zero
weight. With these generalizations, if vanishingly low weights of edges are
truncated to weight zero for some reason, the coefficient value may change
significantly from the original value. It is preferable that small changes of
edge weights cause small changes of coefficient value. We call this property
the continuity of generalized clustering coefficients. Our new coefficients
admit this property. In the past, few studies have focused on the continuity of
generalized clustering coefficients. In experiments, we performed comparative
assessments of existing and our generalizations. In the case of a real world
network dataset (C. Elegans Neural network), after adding random edge weight
errors, though the value of one discontinuous generalization was changed about
436%, the value of proposed one was only changed 0.2%.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2014 01:57:08 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Miyajima",
"Kent",
""
],
[
"Sakuragawa",
"Takashi",
""
]
] | TITLE: Continuous and robust clustering coefficients for weighted and directed
networks
ABSTRACT: We introduce new clustering coefficients for weighted networks. They are
continuous and robust against edge weight changes. Recently, generalized
clustering coefficients for weighted and directed networks have been proposed.
These generalizations have a common property, that their values are not
continuous. They are sensitive with edge weight changes, especially at zero
weight. With these generalizations, if vanishingly low weights of edges are
truncated to weight zero for some reason, the coefficient value may change
significantly from the original value. It is preferable that small changes of
edge weights cause small changes of coefficient value. We call this property
the continuity of generalized clustering coefficients. Our new coefficients
admit this property. In the past, few studies have focused on the continuity of
generalized clustering coefficients. In experiments, we performed comparative
assessments of existing and our generalizations. In the case of a real world
network dataset (C. Elegans Neural network), after adding random edge weight
errors, though the value of one discontinuous generalization was changed about
436%, the value of proposed one was only changed 0.2%.
|
1412.0065 | Gr\'egory Rogez | Gregory Rogez, James S. Supancic III, Maryam Khademi, Jose Maria
Martinez Montiel, Deva Ramanan | 3D Hand Pose Detection in Egocentric RGB-D Images | 14 pages, 15 figures, extended version of the corresponding ECCV
workshop paper, submitted to International Journal of Computer Vision | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on the task of everyday hand pose estimation from egocentric
viewpoints. For this task, we show that depth sensors are particularly
informative for extracting near-field interactions of the camera wearer with
his/her environment. Despite the recent advances in full-body pose estimation
using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D
images is still an unsolved problem. The problem is considerably exacerbated
when analyzing hands performing daily activities from a first-person viewpoint,
due to severe occlusions arising from object manipulations and a limited
field-of-view. Our system addresses these difficulties by exploiting strong
priors over viewpoint and pose in a discriminative tracking-by-detection
framework. Our priors are operationalized through a photorealistic synthetic
model of egocentric scenes, which is used to generate training data for
learning depth-based pose classifiers. We evaluate our approach on an annotated
dataset of real egocentric object manipulation scenes and compare to both
commercial and academic approaches. Our method provides state-of-the-art
performance for both hand detection and pose estimation in egocentric RGB-D
images.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2014 03:19:56 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Rogez",
"Gregory",
""
],
[
"Supancic",
"James S.",
"III"
],
[
"Khademi",
"Maryam",
""
],
[
"Montiel",
"Jose Maria Martinez",
""
],
[
"Ramanan",
"Deva",
""
]
] | TITLE: 3D Hand Pose Detection in Egocentric RGB-D Images
ABSTRACT: We focus on the task of everyday hand pose estimation from egocentric
viewpoints. For this task, we show that depth sensors are particularly
informative for extracting near-field interactions of the camera wearer with
his/her environment. Despite the recent advances in full-body pose estimation
using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D
images is still an unsolved problem. The problem is considerably exacerbated
when analyzing hands performing daily activities from a first-person viewpoint,
due to severe occlusions arising from object manipulations and a limited
field-of-view. Our system addresses these difficulties by exploiting strong
priors over viewpoint and pose in a discriminative tracking-by-detection
framework. Our priors are operationalized through a photorealistic synthetic
model of egocentric scenes, which is used to generate training data for
learning depth-based pose classifiers. We evaluate our approach on an annotated
dataset of real egocentric object manipulation scenes and compare to both
commercial and academic approaches. Our method provides state-of-the-art
performance for both hand detection and pose estimation in egocentric RGB-D
images.
|
1412.0069 | Yonglong Tian | Yonglong Tian, Ping Luo, Xiaogang Wang, Xiaoou Tang | Pedestrian Detection aided by Deep Learning Semantic Tasks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning methods have achieved great success in pedestrian detection,
owing to its ability to learn features from raw pixels. However, they mainly
capture middle-level representations, such as pose of pedestrian, but confuse
positive with hard negative samples, which have large ambiguity, e.g. the shape
and appearance of `tree trunk' or `wire pole' are similar to pedestrian in
certain viewpoint. This ambiguity can be distinguished by high-level
representation. To this end, this work jointly optimizes pedestrian detection
with semantic tasks, including pedestrian attributes (e.g. `carrying backpack')
and scene attributes (e.g. `road', `tree', and `horizontal'). Rather than
expensively annotating scene attributes, we transfer attributes information
from existing scene segmentation datasets to the pedestrian dataset, by
proposing a novel deep model to learn high-level features from multiple tasks
and multiple data sources. Since distinct tasks have distinct convergence rates
and data from different datasets have different distributions, a multi-task
objective function is carefully designed to coordinate tasks and reduce
discrepancies among datasets. The importance coefficients of tasks and network
parameters in this objective function can be iteratively estimated. Extensive
evaluations show that the proposed approach outperforms the state-of-the-art on
the challenging Caltech and ETH datasets, where it reduces the miss rates of
previous deep models by 17 and 5.5 percent, respectively.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2014 04:34:23 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Tian",
"Yonglong",
""
],
[
"Luo",
"Ping",
""
],
[
"Wang",
"Xiaogang",
""
],
[
"Tang",
"Xiaoou",
""
]
] | TITLE: Pedestrian Detection aided by Deep Learning Semantic Tasks
ABSTRACT: Deep learning methods have achieved great success in pedestrian detection,
owing to its ability to learn features from raw pixels. However, they mainly
capture middle-level representations, such as pose of pedestrian, but confuse
positive with hard negative samples, which have large ambiguity, e.g. the shape
and appearance of `tree trunk' or `wire pole' are similar to pedestrian in
certain viewpoint. This ambiguity can be distinguished by high-level
representation. To this end, this work jointly optimizes pedestrian detection
with semantic tasks, including pedestrian attributes (e.g. `carrying backpack')
and scene attributes (e.g. `road', `tree', and `horizontal'). Rather than
expensively annotating scene attributes, we transfer attributes information
from existing scene segmentation datasets to the pedestrian dataset, by
proposing a novel deep model to learn high-level features from multiple tasks
and multiple data sources. Since distinct tasks have distinct convergence rates
and data from different datasets have different distributions, a multi-task
objective function is carefully designed to coordinate tasks and reduce
discrepancies among datasets. The importance coefficients of tasks and network
parameters in this objective function can be iteratively estimated. Extensive
evaluations show that the proposed approach outperforms the state-of-the-art on
the challenging Caltech and ETH datasets, where it reduces the miss rates of
previous deep models by 17 and 5.5 percent, respectively.
|
1412.0100 | Stefan Mathe | Stefan Mathe, Cristian Sminchisescu | Multiple Instance Reinforcement Learning for Efficient Weakly-Supervised
Detection in Images | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | State-of-the-art visual recognition and detection systems increasingly rely
on large amounts of training data and complex classifiers. Therefore it becomes
increasingly expensive both to manually annotate datasets and to keep running
times at levels acceptable for practical applications. In this paper, we
propose two solutions to address these issues. First, we introduce a weakly
supervised, segmentation-based approach to learn accurate detectors and image
classifiers from weak supervisory signals that provide only approximate
constraints on target localization. We illustrate our system on the problem of
action detection in static images (Pascal VOC Actions 2012), using human visual
search patterns as our training signal. Second, inspired from the
saccade-and-fixate operating principle of the human visual system, we use
reinforcement learning techniques to train efficient search models for
detection. Our sequential method is weakly supervised and general (it does not
require eye movements), finds optimal search strategies for any given detection
confidence function and achieves performance similar to exhaustive sliding
window search at a fraction of its computational cost.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2014 12:18:14 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Mathe",
"Stefan",
""
],
[
"Sminchisescu",
"Cristian",
""
]
] | TITLE: Multiple Instance Reinforcement Learning for Efficient Weakly-Supervised
Detection in Images
ABSTRACT: State-of-the-art visual recognition and detection systems increasingly rely
on large amounts of training data and complex classifiers. Therefore it becomes
increasingly expensive both to manually annotate datasets and to keep running
times at levels acceptable for practical applications. In this paper, we
propose two solutions to address these issues. First, we introduce a weakly
supervised, segmentation-based approach to learn accurate detectors and image
classifiers from weak supervisory signals that provide only approximate
constraints on target localization. We illustrate our system on the problem of
action detection in static images (Pascal VOC Actions 2012), using human visual
search patterns as our training signal. Second, inspired from the
saccade-and-fixate operating principle of the human visual system, we use
reinforcement learning techniques to train efficient search models for
detection. Our sequential method is weakly supervised and general (it does not
require eye movements), finds optimal search strategies for any given detection
confidence function and achieves performance similar to exhaustive sliding
window search at a fraction of its computational cost.
|
1412.0111 | Hocine Cherifi | Mounir Omari, Abdelkaher Ait Abdelouahad, Mohammed El Hassouni and
Hocine Cherifi | Color image quality assessment measure using multivariate generalized
Gaussian distribution | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with color image quality assessment in the reduced-reference
framework based on natural scenes statistics. In this context, we propose to
model the statistics of the steerable pyramid coefficients by a Multivariate
Generalized Gaussian distribution (MGGD). This model allows taking into account
the high correlation between the components of the RGB color space. For each
selected scale and orientation, we extract a parameter matrix from the three
color components subbands. In order to quantify the visual degradation, we use
a closed-form of Kullback-Leibler Divergence (KLD) between two MGGDs. Using
"TID 2008" benchmark, the proposed measure has been compared with the most
influential methods according to the FRTV1 VQEG framework. Results demonstrates
its effectiveness for a great variety of distortion type. Among other benefits
this measure uses only very little information about the original image.
| [
{
"version": "v1",
"created": "Sat, 29 Nov 2014 14:45:14 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Omari",
"Mounir",
""
],
[
"Abdelouahad",
"Abdelkaher Ait",
""
],
[
"Hassouni",
"Mohammed El",
""
],
[
"Cherifi",
"Hocine",
""
]
] | TITLE: Color image quality assessment measure using multivariate generalized
Gaussian distribution
ABSTRACT: This paper deals with color image quality assessment in the reduced-reference
framework based on natural scenes statistics. In this context, we propose to
model the statistics of the steerable pyramid coefficients by a Multivariate
Generalized Gaussian distribution (MGGD). This model allows taking into account
the high correlation between the components of the RGB color space. For each
selected scale and orientation, we extract a parameter matrix from the three
color components subbands. In order to quantify the visual degradation, we use
a closed-form of Kullback-Leibler Divergence (KLD) between two MGGDs. Using
"TID 2008" benchmark, the proposed measure has been compared with the most
influential methods according to the FRTV1 VQEG framework. Results demonstrates
its effectiveness for a great variety of distortion type. Among other benefits
this measure uses only very little information about the original image.
|
1412.0296 | George Papandreou | George Papandreou and Iasonas Kokkinos and Pierre-Andr\'e Savalle | Untangling Local and Global Deformations in Deep Convolutional Networks
for Image Classification and Sliding Window Detection | 13 pages, 7 figures, 5 tables. arXiv admin note: substantial text
overlap with arXiv:1406.2732 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Convolutional Neural Networks (DCNNs) commonly use generic `max-pooling'
(MP) layers to extract deformation-invariant features, but we argue in favor of
a more refined treatment. First, we introduce epitomic convolution as a
building block alternative to the common convolution-MP cascade of DCNNs; while
having identical complexity to MP, Epitomic Convolution allows for parameter
sharing across different filters, resulting in faster convergence and better
generalization. Second, we introduce a Multiple Instance Learning approach to
explicitly accommodate global translation and scaling when training a DCNN
exclusively with class labels. For this we rely on a `patchwork' data structure
that efficiently lays out all image scales and positions as candidates to a
DCNN. Factoring global and local deformations allows a DCNN to `focus its
resources' on the treatment of non-rigid deformations and yields a substantial
classification accuracy improvement. Third, further pursuing this idea, we
develop an efficient DCNN sliding window object detector that employs explicit
search over position, scale, and aspect ratio. We provide competitive image
classification and localization results on the ImageNet dataset and object
detection results on the Pascal VOC 2007 benchmark.
| [
{
"version": "v1",
"created": "Sun, 30 Nov 2014 22:20:17 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Papandreou",
"George",
""
],
[
"Kokkinos",
"Iasonas",
""
],
[
"Savalle",
"Pierre-André",
""
]
] | TITLE: Untangling Local and Global Deformations in Deep Convolutional Networks
for Image Classification and Sliding Window Detection
ABSTRACT: Deep Convolutional Neural Networks (DCNNs) commonly use generic `max-pooling'
(MP) layers to extract deformation-invariant features, but we argue in favor of
a more refined treatment. First, we introduce epitomic convolution as a
building block alternative to the common convolution-MP cascade of DCNNs; while
having identical complexity to MP, Epitomic Convolution allows for parameter
sharing across different filters, resulting in faster convergence and better
generalization. Second, we introduce a Multiple Instance Learning approach to
explicitly accommodate global translation and scaling when training a DCNN
exclusively with class labels. For this we rely on a `patchwork' data structure
that efficiently lays out all image scales and positions as candidates to a
DCNN. Factoring global and local deformations allows a DCNN to `focus its
resources' on the treatment of non-rigid deformations and yields a substantial
classification accuracy improvement. Third, further pursuing this idea, we
develop an efficient DCNN sliding window object detector that employs explicit
search over position, scale, and aspect ratio. We provide competitive image
classification and localization results on the ImageNet dataset and object
detection results on the Pascal VOC 2007 benchmark.
|
1412.0327 | Jiajun Liu | Jiajun Liu, Kun Zhao, Saeed Khan, Mark Cameron, Raja Jurdak | Multi-scale Population and Mobility Estimation with Geo-tagged Tweets | 1st International Workshop on Big Data Analytics for Biosecurity
(BioBAD2015), 4 pages | null | null | null | cs.SI cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent outbreaks of Ebola and Dengue viruses have again elevated the
significance of the capability to quickly predict disease spread in an emergent
situation. However, existing approaches usually rely heavily on the
time-consuming census processes, or the privacy-sensitive call logs, leading to
their unresponsive nature when facing the abruptly changing dynamics in the
event of an outbreak. In this paper we study the feasibility of using
large-scale Twitter data as a proxy of human mobility to model and predict
disease spread. We report that for Australia, Twitter users' distribution
correlates well the census-based population distribution, and that the Twitter
users' travel patterns appear to loosely follow the gravity law at multiple
scales of geographic distances, i.e. national level, state level and
metropolitan level. The radiation model is also evaluated on this dataset
though it has shown inferior fitness as a result of Australia's sparse
population and large landmass. The outcomes of the study form the cornerstones
for future work towards a model-based, responsive prediction method from
Twitter data for disease spread.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2014 01:48:53 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Liu",
"Jiajun",
""
],
[
"Zhao",
"Kun",
""
],
[
"Khan",
"Saeed",
""
],
[
"Cameron",
"Mark",
""
],
[
"Jurdak",
"Raja",
""
]
] | TITLE: Multi-scale Population and Mobility Estimation with Geo-tagged Tweets
ABSTRACT: Recent outbreaks of Ebola and Dengue viruses have again elevated the
significance of the capability to quickly predict disease spread in an emergent
situation. However, existing approaches usually rely heavily on the
time-consuming census processes, or the privacy-sensitive call logs, leading to
their unresponsive nature when facing the abruptly changing dynamics in the
event of an outbreak. In this paper we study the feasibility of using
large-scale Twitter data as a proxy of human mobility to model and predict
disease spread. We report that for Australia, Twitter users' distribution
correlates well the census-based population distribution, and that the Twitter
users' travel patterns appear to loosely follow the gravity law at multiple
scales of geographic distances, i.e. national level, state level and
metropolitan level. The radiation model is also evaluated on this dataset
though it has shown inferior fitness as a result of Australia's sparse
population and large landmass. The outcomes of the study form the cornerstones
for future work towards a model-based, responsive prediction method from
Twitter data for disease spread.
|
1412.0488 | Pavel Tomancak | Tobias Pietzsch and Stephan Saalfeld and Stephan Preibisch and Pavel
Tomancak | BigDataViewer: Interactive Visualization and Image Processing for
Terabyte Data Sets | 38 pages, 1 main figure, 27 supplementary figures, under review at
Nature Methods | null | null | null | q-bio.QM cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasingly popular light sheet microscopy techniques generate very
large 3D time-lapse recordings of living biological specimen. The necessity to
make large volumetric datasets available for interactive visualization and
analysis has been widely recognized. However, existing solutions build on
dedicated servers to generate virtual slices that are transferred to the client
applications, practically leading to insufficient frame rates (less than 10
frames per second) for truly interactive experience. An easily accessible open
source solution for interactive arbitrary virtual re-slicing of very large
volumes and time series of volumes has yet been missing. We fill this gap with
BigDataViewer, a Fiji plugin to interactively navigate and visualize large
image sequences from both local and remote data sources.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2014 14:24:44 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Pietzsch",
"Tobias",
""
],
[
"Saalfeld",
"Stephan",
""
],
[
"Preibisch",
"Stephan",
""
],
[
"Tomancak",
"Pavel",
""
]
] | TITLE: BigDataViewer: Interactive Visualization and Image Processing for
Terabyte Data Sets
ABSTRACT: The increasingly popular light sheet microscopy techniques generate very
large 3D time-lapse recordings of living biological specimen. The necessity to
make large volumetric datasets available for interactive visualization and
analysis has been widely recognized. However, existing solutions build on
dedicated servers to generate virtual slices that are transferred to the client
applications, practically leading to insufficient frame rates (less than 10
frames per second) for truly interactive experience. An easily accessible open
source solution for interactive arbitrary virtual re-slicing of very large
volumes and time series of volumes has yet been missing. We fill this gap with
BigDataViewer, a Fiji plugin to interactively navigate and visualize large
image sequences from both local and remote data sources.
|
1412.0630 | Sean Anderson | Sean Anderson, Timothy D. Barfoot, Chi Hay Tong, Simo S\"arkk\"a | Batch Nonlinear Continuous-Time Trajectory Estimation as Exactly Sparse
Gaussian Process Regression | Submitted to Autonomous Robots on 20 November 2014, manuscript #
AURO-D-14-00185, 16 pages, 7 figures | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we revisit batch state estimation through the lens of Gaussian
process (GP) regression. We consider continuous-discrete estimation problems
wherein a trajectory is viewed as a one-dimensional GP, with time as the
independent variable. Our continuous-time prior can be defined by any
nonlinear, time-varying stochastic differential equation driven by white noise;
this allows the possibility of smoothing our trajectory estimates using a
variety of vehicle dynamics models (e.g., `constant-velocity'). We show that
this class of prior results in an inverse kernel matrix (i.e., covariance
matrix between all pairs of measurement times) that is exactly sparse
(block-tridiagonal) and that this can be exploited to carry out GP regression
(and interpolation) very efficiently. When the prior is based on a linear,
time-varying stochastic differential equation and the measurement model is also
linear, this GP approach is equivalent to classical, discrete-time smoothing
(at the measurement times); when a nonlinearity is present, we iterate over the
whole trajectory to maximize accuracy. We test the approach experimentally on a
simultaneous trajectory estimation and mapping problem using a mobile robot
dataset.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 2014 20:24:08 GMT"
}
] | 2014-12-02T00:00:00 | [
[
"Anderson",
"Sean",
""
],
[
"Barfoot",
"Timothy D.",
""
],
[
"Tong",
"Chi Hay",
""
],
[
"Särkkä",
"Simo",
""
]
] | TITLE: Batch Nonlinear Continuous-Time Trajectory Estimation as Exactly Sparse
Gaussian Process Regression
ABSTRACT: In this paper, we revisit batch state estimation through the lens of Gaussian
process (GP) regression. We consider continuous-discrete estimation problems
wherein a trajectory is viewed as a one-dimensional GP, with time as the
independent variable. Our continuous-time prior can be defined by any
nonlinear, time-varying stochastic differential equation driven by white noise;
this allows the possibility of smoothing our trajectory estimates using a
variety of vehicle dynamics models (e.g., `constant-velocity'). We show that
this class of prior results in an inverse kernel matrix (i.e., covariance
matrix between all pairs of measurement times) that is exactly sparse
(block-tridiagonal) and that this can be exploited to carry out GP regression
(and interpolation) very efficiently. When the prior is based on a linear,
time-varying stochastic differential equation and the measurement model is also
linear, this GP approach is equivalent to classical, discrete-time smoothing
(at the measurement times); when a nonlinearity is present, we iterate over the
whole trajectory to maximize accuracy. We test the approach experimentally on a
simultaneous trajectory estimation and mapping problem using a mobile robot
dataset.
|
1311.0402 | Yu-Hang Tang | Yu-Hang Tang and George Em Karniadakis | Accelerating Dissipative Particle Dynamics Simulations on GPUs:
Algorithms, Numerics and Applications | null | Computer Physics Communications, 2014, 185(11), 2809 - 2822 | 10.1016/j.cpc.2014.06.015 | null | cs.DC physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a scalable dissipative particle dynamics simulation code, fully
implemented on the Graphics Processing Units (GPUs) using a hybrid CUDA/MPI
programming model, which achieves 10-30 times speedup on a single GPU over 16
CPU cores and almost linear weak scaling across a thousand nodes. A unified
framework is developed within which the efficient generation of the neighbor
list and maintaining particle data locality are addressed. Our algorithm
generates strictly ordered neighbor lists in parallel, while the construction
is deterministic and makes no use of atomic operations or sorting. Such
neighbor list leads to optimal data loading efficiency when combined with a
two-level particle reordering scheme. A faster in situ generation scheme for
Gaussian random numbers is proposed using precomputed binary signatures. We
designed custom transcendental functions that are fast and accurate for
evaluating the pairwise interaction. The correctness and accuracy of the code
is verified through a set of test cases simulating Poiseuille flow and
spontaneous vesicle formation. Computer benchmarks demonstrate the speedup of
our implementation over the CPU implementation as well as strong and weak
scalability. A large-scale simulation of spontaneous vesicle formation
consisting of 128 million particles was conducted to further illustrate the
practicality of our code in real-world applications.
| [
{
"version": "v1",
"created": "Sat, 2 Nov 2013 18:51:53 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Tang",
"Yu-Hang",
""
],
[
"Karniadakis",
"George Em",
""
]
] | TITLE: Accelerating Dissipative Particle Dynamics Simulations on GPUs:
Algorithms, Numerics and Applications
ABSTRACT: We present a scalable dissipative particle dynamics simulation code, fully
implemented on the Graphics Processing Units (GPUs) using a hybrid CUDA/MPI
programming model, which achieves 10-30 times speedup on a single GPU over 16
CPU cores and almost linear weak scaling across a thousand nodes. A unified
framework is developed within which the efficient generation of the neighbor
list and maintaining particle data locality are addressed. Our algorithm
generates strictly ordered neighbor lists in parallel, while the construction
is deterministic and makes no use of atomic operations or sorting. Such
neighbor list leads to optimal data loading efficiency when combined with a
two-level particle reordering scheme. A faster in situ generation scheme for
Gaussian random numbers is proposed using precomputed binary signatures. We
designed custom transcendental functions that are fast and accurate for
evaluating the pairwise interaction. The correctness and accuracy of the code
is verified through a set of test cases simulating Poiseuille flow and
spontaneous vesicle formation. Computer benchmarks demonstrate the speedup of
our implementation over the CPU implementation as well as strong and weak
scalability. A large-scale simulation of spontaneous vesicle formation
consisting of 128 million particles was conducted to further illustrate the
practicality of our code in real-world applications.
|
1411.7441 | Stefano Ermon | Stefano Ermon, Ronan Le Bras, Santosh K. Suram, John M. Gregoire,
Carla Gomes, Bart Selman, Robert B. van Dover | Pattern Decomposition with Complex Combinatorial Constraints:
Application to Materials Discovery | null | null | null | null | cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identifying important components or factors in large amounts of noisy data is
a key problem in machine learning and data mining. Motivated by a pattern
decomposition problem in materials discovery, aimed at discovering new
materials for renewable energy, e.g. for fuel and solar cells, we introduce
CombiFD, a framework for factor based pattern decomposition that allows the
incorporation of a-priori knowledge as constraints, including complex
combinatorial constraints. In addition, we propose a new pattern decomposition
algorithm, called AMIQO, based on solving a sequence of (mixed-integer)
quadratic programs. Our approach considerably outperforms the state of the art
on the materials discovery problem, scaling to larger datasets and recovering
more precise and physically meaningful decompositions. We also show the
effectiveness of our approach for enforcing background knowledge on other
application domains.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 02:31:41 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Ermon",
"Stefano",
""
],
[
"Bras",
"Ronan Le",
""
],
[
"Suram",
"Santosh K.",
""
],
[
"Gregoire",
"John M.",
""
],
[
"Gomes",
"Carla",
""
],
[
"Selman",
"Bart",
""
],
[
"van Dover",
"Robert B.",
""
]
] | TITLE: Pattern Decomposition with Complex Combinatorial Constraints:
Application to Materials Discovery
ABSTRACT: Identifying important components or factors in large amounts of noisy data is
a key problem in machine learning and data mining. Motivated by a pattern
decomposition problem in materials discovery, aimed at discovering new
materials for renewable energy, e.g. for fuel and solar cells, we introduce
CombiFD, a framework for factor based pattern decomposition that allows the
incorporation of a-priori knowledge as constraints, including complex
combinatorial constraints. In addition, we propose a new pattern decomposition
algorithm, called AMIQO, based on solving a sequence of (mixed-integer)
quadratic programs. Our approach considerably outperforms the state of the art
on the materials discovery problem, scaling to larger datasets and recovering
more precise and physically meaningful decompositions. We also show the
effectiveness of our approach for enforcing background knowledge on other
application domains.
|
1411.7445 | Chao Xu | Tao Han, Chao Xu, Ryan Loxton, Lei Xie | Bi-objective Optimization for Robust RGB-D Visual Odometry | null | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a new bi-objective optimization formulation for robust
RGB-D visual odometry. We investigate two methods for solving the proposed
bi-objective optimization problem: the weighted sum method (in which the
objective functions are combined into a single objective function) and the
bounded objective method (in which one of the objective functions is optimized
and the value of the other objective function is bounded via a constraint). Our
experimental results for the open source TUM RGB-D dataset show that the new
bi-objective optimization formulation is superior to several existing RGB-D
odometry methods. In particular, the new formulation yields more accurate
motion estimates and is more robust when textural or structural features in the
image sequence are lacking.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 02:37:41 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Han",
"Tao",
""
],
[
"Xu",
"Chao",
""
],
[
"Loxton",
"Ryan",
""
],
[
"Xie",
"Lei",
""
]
] | TITLE: Bi-objective Optimization for Robust RGB-D Visual Odometry
ABSTRACT: This paper considers a new bi-objective optimization formulation for robust
RGB-D visual odometry. We investigate two methods for solving the proposed
bi-objective optimization problem: the weighted sum method (in which the
objective functions are combined into a single objective function) and the
bounded objective method (in which one of the objective functions is optimized
and the value of the other objective function is bounded via a constraint). Our
experimental results for the open source TUM RGB-D dataset show that the new
bi-objective optimization formulation is superior to several existing RGB-D
odometry methods. In particular, the new formulation yields more accurate
motion estimates and is more robust when textural or structural features in the
image sequence are lacking.
|
1411.7466 | Chunhua Shen | Lingqiao Liu, Chunhua Shen, Anton van den Hengel | The Treasure beneath Convolutional Layers: Cross-convolutional-layer
Pooling for Image Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A number of recent studies have shown that a Deep Convolutional Neural
Network (DCNN) pretrained on a large dataset can be adopted as a universal
image description which leads to astounding performance in many visual
classification tasks. Most of these studies, if not all, adopt activations of
the fully-connected layer of a DCNN as the image or region representation and
it is believed that convolutional layer activations are less discriminative.
This paper, however, advocates that if used appropriately convolutional layer
activations can be turned into a powerful image representation which enjoys
many advantages over fully-connected layer activations. This is achieved by
adopting a new technique proposed in this paper called
cross-convolutional-layer pooling. More specifically, it extracts subarrays of
feature maps of one convolutional layer as local features and pools the
extracted features with the guidance of feature maps of the successive
convolutional layer. Compared with exising methods that apply DCNNs in the
local feature setting, the proposed method is significantly faster since it
requires much fewer times of DCNN forward computation. Moreover, it avoids the
domain mismatch issue which is usually encountered when applying fully
connected layer activations to describe local regions. By applying our method
to four popular visual classification tasks, it is demonstrated that the
proposed method can achieve comparable or in some cases significantly better
performance than existing fully-connected layer based image representations
while incurring much lower computational cost.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 04:12:57 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Liu",
"Lingqiao",
""
],
[
"Shen",
"Chunhua",
""
],
[
"Hengel",
"Anton van den",
""
]
] | TITLE: The Treasure beneath Convolutional Layers: Cross-convolutional-layer
Pooling for Image Classification
ABSTRACT: A number of recent studies have shown that a Deep Convolutional Neural
Network (DCNN) pretrained on a large dataset can be adopted as a universal
image description which leads to astounding performance in many visual
classification tasks. Most of these studies, if not all, adopt activations of
the fully-connected layer of a DCNN as the image or region representation and
it is believed that convolutional layer activations are less discriminative.
This paper, however, advocates that if used appropriately convolutional layer
activations can be turned into a powerful image representation which enjoys
many advantages over fully-connected layer activations. This is achieved by
adopting a new technique proposed in this paper called
cross-convolutional-layer pooling. More specifically, it extracts subarrays of
feature maps of one convolutional layer as local features and pools the
extracted features with the guidance of feature maps of the successive
convolutional layer. Compared with exising methods that apply DCNNs in the
local feature setting, the proposed method is significantly faster since it
requires much fewer times of DCNN forward computation. Moreover, it avoids the
domain mismatch issue which is usually encountered when applying fully
connected layer activations to describe local regions. By applying our method
to four popular visual classification tasks, it is demonstrated that the
proposed method can achieve comparable or in some cases significantly better
performance than existing fully-connected layer based image representations
while incurring much lower computational cost.
|
1411.7469 | Sanjay Chakraborty | Lopamudra Dey and Sanjay Chakraborty | Canonical PSO Based k-Means Clustering Approach for Real Datasets | null | null | null | null | cs.DB | http://creativecommons.org/licenses/by/3.0/ | "Clustering" the significance and application of this technique is spread
over various fields. Clustering is an unsupervised process in data mining, that
is why the proper evaluation of the results and measuring the compactness and
separability of the clusters are important issues.The procedure of evaluating
the results of a clustering algorithm is known as cluster validity measure.
Different types of indexes are used to solve different types of problems and
indices selection depends on the kind of available data.This paper first
proposes Canonical PSO based K-means clustering algorithm and also analyses
some important clustering indices (intercluster, intracluster) and then
evaluates the effects of those indices on real-time air pollution
database,wholesale customer, wine, and vehicle datasets using typical K-means,
Canonical PSO based K-means, simple PSO based K-means,DBSCAN, and Hierarchical
clustering algorithms.This paper also describes the nature of the clusters and
finally compares the performances of these clustering algorithms according to
the validity assessment. It also defines which algorithm will be more desirable
among all these algorithms to make proper compact clusters on this particular
real life datasets. It actually deals with the behaviour of these clustering
algorithms with respect to validation indexes and represents their results of
evaluation in terms of mathematical and graphical forms.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 04:50:30 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Dey",
"Lopamudra",
""
],
[
"Chakraborty",
"Sanjay",
""
]
] | TITLE: Canonical PSO Based k-Means Clustering Approach for Real Datasets
ABSTRACT: "Clustering" the significance and application of this technique is spread
over various fields. Clustering is an unsupervised process in data mining, that
is why the proper evaluation of the results and measuring the compactness and
separability of the clusters are important issues.The procedure of evaluating
the results of a clustering algorithm is known as cluster validity measure.
Different types of indexes are used to solve different types of problems and
indices selection depends on the kind of available data.This paper first
proposes Canonical PSO based K-means clustering algorithm and also analyses
some important clustering indices (intercluster, intracluster) and then
evaluates the effects of those indices on real-time air pollution
database,wholesale customer, wine, and vehicle datasets using typical K-means,
Canonical PSO based K-means, simple PSO based K-means,DBSCAN, and Hierarchical
clustering algorithms.This paper also describes the nature of the clusters and
finally compares the performances of these clustering algorithms according to
the validity assessment. It also defines which algorithm will be more desirable
among all these algorithms to make proper compact clusters on this particular
real life datasets. It actually deals with the behaviour of these clustering
algorithms with respect to validation indexes and represents their results of
evaluation in terms of mathematical and graphical forms.
|
1411.7474 | Deepinder Kaur Er. | Deepinder Kaur | A Comparative Study of Various Distance Measures for Software fault
prediction | 4 pages,2 figures,"Published with International Journal of Computer
Trends and Technology (IJCTT)" | International Journal of Computer Trends and Technology (IJCTT),
17(3): 117-120, Nov 2014 | 10.14445/22312803/IJCTT-V17P122 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Different distance measures have been used for efficiently predicting
software faults at early stages of software development. One stereotyped
approach for software fault prediction due to its computational efficiency is
K-means clustering, which partitions the dataset into K number of clusters
using any distance measure. Distance measures by using some metrics are used to
extract similar data objects which help in developing efficient algorithms for
clustering and classification. In this paper, we study K-means clustering with
three different distance measures Euclidean, Sorensen and Canberra by using
datasets that have been collected from NASA MDP (metrics data program) .Results
are displayed with the help of ROC curve. The experimental results shows that
K-means clustering with Sorensen distance is better than Euclidean distance and
Canberra distance.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 06:07:46 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Kaur",
"Deepinder",
""
]
] | TITLE: A Comparative Study of Various Distance Measures for Software fault
prediction
ABSTRACT: Different distance measures have been used for efficiently predicting
software faults at early stages of software development. One stereotyped
approach for software fault prediction due to its computational efficiency is
K-means clustering, which partitions the dataset into K number of clusters
using any distance measure. Distance measures by using some metrics are used to
extract similar data objects which help in developing efficient algorithms for
clustering and classification. In this paper, we study K-means clustering with
three different distance measures Euclidean, Sorensen and Canberra by using
datasets that have been collected from NASA MDP (metrics data program) .Results
are displayed with the help of ROC curve. The experimental results shows that
K-means clustering with Sorensen distance is better than Euclidean distance and
Canberra distance.
|
1411.7480 | Christopher Rosin | Christopher D. Rosin | Unweighted Stochastic Local Search can be Effective for Random CSP
Benchmarks | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present ULSA, a novel stochastic local search algorithm for random binary
constraint satisfaction problems (CSP). ULSA is many times faster than the
prior state of the art on a widely-studied suite of random CSP benchmarks.
Unlike the best previous methods for these benchmarks, ULSA is a simple
unweighted method that does not require dynamic adaptation of weights or
penalties. ULSA obtains new record best solutions satisfying 99 of 100
variables in the challenging frb100-40 benchmark instance.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 06:41:22 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Rosin",
"Christopher D.",
""
]
] | TITLE: Unweighted Stochastic Local Search can be Effective for Random CSP
Benchmarks
ABSTRACT: We present ULSA, a novel stochastic local search algorithm for random binary
constraint satisfaction problems (CSP). ULSA is many times faster than the
prior state of the art on a widely-studied suite of random CSP benchmarks.
Unlike the best previous methods for these benchmarks, ULSA is a simple
unweighted method that does not require dynamic adaptation of weights or
penalties. ULSA obtains new record best solutions satisfying 99 of 100
variables in the challenging frb100-40 benchmark instance.
|
1411.7507 | Akshay M S Mr | Akshay MS, Suhas Mohan, Vincent Kuri, Dinkar Sitaram, H. L.
Phalachandra | Efficient Support of Big Data Storage Systems on the Cloud | Presented at 2nd International Workshop on Cloud Computing
Applications (ICWA) during IEEE International Conference on High Performance
Computing (HiPC) 2013 | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to its advantages over traditional data centers, there has been a rapid
growth in the usage of cloud infrastructures. These include public clouds
(e.g., Amazon EC2), or private clouds, such as clouds deployed using OpenStack.
A common factor in many of the well known infrastructures, for example
OpenStack and CloudStack, is that networked storage is used for storage of
persistent data. However, traditional Big Data systems, including Hadoop, store
data in commodity local storage for reasons of high performance and low cost.
We present an architecture for supporting Hadoop on Openstack using local
storage. Subsequently, we use benchmarks on Openstack and Amazon to show that
for supporting Hadoop, local storage has better performance and lower cost. We
conclude that cloud systems should support local storage for persistent data
(in addition to networked storage) so as to provide efficient support for
Hadoop and other Big Data systems
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 09:25:54 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"MS",
"Akshay",
""
],
[
"Mohan",
"Suhas",
""
],
[
"Kuri",
"Vincent",
""
],
[
"Sitaram",
"Dinkar",
""
],
[
"Phalachandra",
"H. L.",
""
]
] | TITLE: Efficient Support of Big Data Storage Systems on the Cloud
ABSTRACT: Due to its advantages over traditional data centers, there has been a rapid
growth in the usage of cloud infrastructures. These include public clouds
(e.g., Amazon EC2), or private clouds, such as clouds deployed using OpenStack.
A common factor in many of the well known infrastructures, for example
OpenStack and CloudStack, is that networked storage is used for storage of
persistent data. However, traditional Big Data systems, including Hadoop, store
data in commodity local storage for reasons of high performance and low cost.
We present an architecture for supporting Hadoop on Openstack using local
storage. Subsequently, we use benchmarks on Openstack and Amazon to show that
for supporting Hadoop, local storage has better performance and lower cost. We
conclude that cloud systems should support local storage for persistent data
(in addition to networked storage) so as to provide efficient support for
Hadoop and other Big Data systems
|
1411.7655 | Hocine Cherifi | Mounir Omari, Mohammed El Hassouni, Abdelkaher Ait Abdelouahad, Hocine
Cherifi | A statistical reduced-reference method for color image quality
assessment | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although color is a fundamental feature of human visual perception, it has
been largely unexplored in the reduced-reference (RR) image quality assessment
(IQA) schemes. In this paper, we propose a natural scene statistic (NSS)
method, which efficiently uses this information. It is based on the statistical
deviation between the steerable pyramid coefficients of the reference color
image and the degraded one. We propose and analyze the multivariate generalized
Gaussian distribution (MGGD) to model the underlying statistics. In order to
quantify the degradation, we develop and evaluate two measures based
respectively on the Geodesic distance between two MGGDs and on the closed-form
of the Kullback Leibler divergence. We performed an extensive evaluation of
both metrics in various color spaces (RGB, HSV, CIELAB and YCrCb) using the TID
2008 benchmark and the FRTV Phase I validation process. Experimental results
demonstrate the effectiveness of the proposed framework to achieve a good
consistency with human visual perception. Furthermore, the best configuration
is obtained with CIELAB color space associated to KLD deviation measure.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 17:24:59 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Omari",
"Mounir",
""
],
[
"Hassouni",
"Mohammed El",
""
],
[
"Abdelouahad",
"Abdelkaher Ait",
""
],
[
"Cherifi",
"Hocine",
""
]
] | TITLE: A statistical reduced-reference method for color image quality
assessment
ABSTRACT: Although color is a fundamental feature of human visual perception, it has
been largely unexplored in the reduced-reference (RR) image quality assessment
(IQA) schemes. In this paper, we propose a natural scene statistic (NSS)
method, which efficiently uses this information. It is based on the statistical
deviation between the steerable pyramid coefficients of the reference color
image and the degraded one. We propose and analyze the multivariate generalized
Gaussian distribution (MGGD) to model the underlying statistics. In order to
quantify the degradation, we develop and evaluate two measures based
respectively on the Geodesic distance between two MGGDs and on the closed-form
of the Kullback Leibler divergence. We performed an extensive evaluation of
both metrics in various color spaces (RGB, HSV, CIELAB and YCrCb) using the TID
2008 benchmark and the FRTV Phase I validation process. Experimental results
demonstrate the effectiveness of the proposed framework to achieve a good
consistency with human visual perception. Furthermore, the best configuration
is obtained with CIELAB color space associated to KLD deviation measure.
|
1411.7682 | Hocine Cherifi | Mounir Omari, Mohammed El Hassouni, Hocine Cherifi and Abdelkaher Ait
Abdelouahad | On color image quality assessment using natural image statistics | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Color distortion can introduce a significant damage in visual quality
perception, however, most of existing reduced-reference quality measures are
designed for grayscale images. In this paper, we consider a basic extension of
well-known image-statistics based quality assessment measures to color images.
In order to evaluate the impact of color information on the measures
efficiency, two color spaces are investigated: RGB and CIELAB. Results of an
extensive evaluation using TID 2013 benchmark demonstrates that significant
improvement can be achieved for a great number of distortion type when the
CIELAB color representation is used.
| [
{
"version": "v1",
"created": "Thu, 27 Nov 2014 19:04:30 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Omari",
"Mounir",
""
],
[
"Hassouni",
"Mohammed El",
""
],
[
"Cherifi",
"Hocine",
""
],
[
"Abdelouahad",
"Abdelkaher Ait",
""
]
] | TITLE: On color image quality assessment using natural image statistics
ABSTRACT: Color distortion can introduce a significant damage in visual quality
perception, however, most of existing reduced-reference quality measures are
designed for grayscale images. In this paper, we consider a basic extension of
well-known image-statistics based quality assessment measures to color images.
In order to evaluate the impact of color information on the measures
efficiency, two color spaces are investigated: RGB and CIELAB. Results of an
extensive evaluation using TID 2013 benchmark demonstrates that significant
improvement can be achieved for a great number of distortion type when the
CIELAB color representation is used.
|
1411.7923 | Dong Yi | Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z. Li | Learning Face Representation from Scratch | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pushing by big data and deep convolutional neural network (CNN), the
performance of face recognition is becoming comparable to human. Using private
large scale training datasets, several groups achieve very high performance on
LFW, i.e., 97% to 99%. While there are many open source implementations of CNN,
none of large scale face dataset is publicly available. The current situation
in the field of face recognition is that data is more important than algorithm.
To solve this problem, this paper proposes a semi-automatical way to collect
face images from Internet and builds a large scale dataset containing about
10,000 subjects and 500,000 images, called CASIAWebFace. Based on the database,
we use a 11-layer CNN to learn discriminative representation and obtain
state-of-theart accuracy on LFW and YTF. The publication of CASIAWebFace will
attract more research groups entering this field and accelerate the development
of face recognition in the wild.
| [
{
"version": "v1",
"created": "Fri, 28 Nov 2014 16:05:18 GMT"
}
] | 2014-12-01T00:00:00 | [
[
"Yi",
"Dong",
""
],
[
"Lei",
"Zhen",
""
],
[
"Liao",
"Shengcai",
""
],
[
"Li",
"Stan Z.",
""
]
] | TITLE: Learning Face Representation from Scratch
ABSTRACT: Pushing by big data and deep convolutional neural network (CNN), the
performance of face recognition is becoming comparable to human. Using private
large scale training datasets, several groups achieve very high performance on
LFW, i.e., 97% to 99%. While there are many open source implementations of CNN,
none of large scale face dataset is publicly available. The current situation
in the field of face recognition is that data is more important than algorithm.
To solve this problem, this paper proposes a semi-automatical way to collect
face images from Internet and builds a large scale dataset containing about
10,000 subjects and 500,000 images, called CASIAWebFace. Based on the database,
we use a 11-layer CNN to learn discriminative representation and obtain
state-of-theart accuracy on LFW and YTF. The publication of CASIAWebFace will
attract more research groups entering this field and accelerate the development
of face recognition in the wild.
|
1404.4114 | Matthew D. Hoffman | Matthew D. Hoffman and David M. Blei | Structured Stochastic Variational Inference | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stochastic variational inference makes it possible to approximate posterior
distributions induced by large datasets quickly using stochastic optimization.
The algorithm relies on the use of fully factorized variational distributions.
However, this "mean-field" independence approximation limits the fidelity of
the posterior approximation, and introduces local optima. We show how to relax
the mean-field approximation to allow arbitrary dependencies between global
parameters and local hidden variables, producing better parameter estimates by
reducing bias, sensitivity to local optima, and sensitivity to hyperparameters.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2014 00:12:03 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2014 18:56:38 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Nov 2014 04:14:16 GMT"
}
] | 2014-11-27T00:00:00 | [
[
"Hoffman",
"Matthew D.",
""
],
[
"Blei",
"David M.",
""
]
] | TITLE: Structured Stochastic Variational Inference
ABSTRACT: Stochastic variational inference makes it possible to approximate posterior
distributions induced by large datasets quickly using stochastic optimization.
The algorithm relies on the use of fully factorized variational distributions.
However, this "mean-field" independence approximation limits the fidelity of
the posterior approximation, and introduces local optima. We show how to relax
the mean-field approximation to allow arbitrary dependencies between global
parameters and local hidden variables, producing better parameter estimates by
reducing bias, sensitivity to local optima, and sensitivity to hyperparameters.
|
1410.7724 | Andreas Pavlogiannis | Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Andreas Pavlogiannis,
Prateesh Goyal | Faster Algorithms for Algebraic Path Properties in RSMs with Constant
Treewidth | null | null | null | null | cs.PL cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interprocedural analysis is at the heart of numerous applications in
programming languages, such as alias analysis, constant propagation, etc.
Recursive state machines (RSMs) are standard models for interprocedural
analysis. We consider a general framework with RSMs where the transitions are
labeled from a semiring, and path properties are algebraic with semiring
operations. RSMs with algebraic path properties can model interprocedural
dataflow analysis problems, the shortest path problem, the most probable path
problem, etc. The traditional algorithms for interprocedural analysis focus on
path properties where the starting point is \emph{fixed} as the entry point of
a specific method. In this work, we consider possible multiple queries as
required in many applications such as in alias analysis. The study of multiple
queries allows us to bring in a very important algorithmic distinction between
the resource usage of the \emph{one-time} preprocessing vs for \emph{each
individual} query. The second aspect that we consider is that the control flow
graphs for most programs have constant treewidth.
Our main contributions are simple and implementable algorithms that support
multiple queries for algebraic path properties for RSMs that have constant
treewidth. Our theoretical results show that our algorithms have small
additional one-time preprocessing, but can answer subsequent queries
significantly faster as compared to the current best-known solutions for
several important problems, such as interprocedural reachability and shortest
path. We provide a prototype implementation for interprocedural reachability
and intraprocedural shortest path that gives a significant speed-up on several
benchmarks.
| [
{
"version": "v1",
"created": "Tue, 28 Oct 2014 18:27:10 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2014 21:40:40 GMT"
}
] | 2014-11-27T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Ibsen-Jensen",
"Rasmus",
""
],
[
"Pavlogiannis",
"Andreas",
""
],
[
"Goyal",
"Prateesh",
""
]
] | TITLE: Faster Algorithms for Algebraic Path Properties in RSMs with Constant
Treewidth
ABSTRACT: Interprocedural analysis is at the heart of numerous applications in
programming languages, such as alias analysis, constant propagation, etc.
Recursive state machines (RSMs) are standard models for interprocedural
analysis. We consider a general framework with RSMs where the transitions are
labeled from a semiring, and path properties are algebraic with semiring
operations. RSMs with algebraic path properties can model interprocedural
dataflow analysis problems, the shortest path problem, the most probable path
problem, etc. The traditional algorithms for interprocedural analysis focus on
path properties where the starting point is \emph{fixed} as the entry point of
a specific method. In this work, we consider possible multiple queries as
required in many applications such as in alias analysis. The study of multiple
queries allows us to bring in a very important algorithmic distinction between
the resource usage of the \emph{one-time} preprocessing vs for \emph{each
individual} query. The second aspect that we consider is that the control flow
graphs for most programs have constant treewidth.
Our main contributions are simple and implementable algorithms that support
multiple queries for algebraic path properties for RSMs that have constant
treewidth. Our theoretical results show that our algorithms have small
additional one-time preprocessing, but can answer subsequent queries
significantly faster as compared to the current best-known solutions for
several important problems, such as interprocedural reachability and shortest
path. We provide a prototype implementation for interprocedural reachability
and intraprocedural shortest path that gives a significant speed-up on several
benchmarks.
|
1411.7131 | Oussama Tahan PhD | Oussama Tahan | Towards Efficient OpenMP Strategies for Non-Uniform Architectures | International Journal of Advanced Studies in Computer Science and
Engineering (IJASCSE) | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parallel processing is considered as todays and future trend for improving
performance of computers. Computing devices ranging from small embedded systems
to big clusters of computers rely on parallelizing applications to reduce
execution time. Many of current computing systems rely on Non-Uniform Memory
Access (NUMA) based processors architectures. In these architectures, analyzing
and considering the non-uniformity is of high importance for improving
scalability of systems. In this paper, we analyze and develop a NUMA based
approach for the OpenMP parallel programming model. Our technique applies a
smart threads allocation method and an advanced tasks scheduling strategy for
reducing remote memory accesses and consequently their extra time consumption.
We implemented our approach within the NANOS runtime system. A set of tests was
conducted using the BOTS benchmarks and results showed the capacity of our
technique in improving the performance of OpenMP applications especially those
dealing with a large amount of data.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2014 08:15:52 GMT"
}
] | 2014-11-27T00:00:00 | [
[
"Tahan",
"Oussama",
""
]
] | TITLE: Towards Efficient OpenMP Strategies for Non-Uniform Architectures
ABSTRACT: Parallel processing is considered as todays and future trend for improving
performance of computers. Computing devices ranging from small embedded systems
to big clusters of computers rely on parallelizing applications to reduce
execution time. Many of current computing systems rely on Non-Uniform Memory
Access (NUMA) based processors architectures. In these architectures, analyzing
and considering the non-uniformity is of high importance for improving
scalability of systems. In this paper, we analyze and develop a NUMA based
approach for the OpenMP parallel programming model. Our technique applies a
smart threads allocation method and an advanced tasks scheduling strategy for
reducing remote memory accesses and consequently their extra time consumption.
We implemented our approach within the NANOS runtime system. A set of tests was
conducted using the BOTS benchmarks and results showed the capacity of our
technique in improving the performance of OpenMP applications especially those
dealing with a large amount of data.
|
1411.7336 | Mohammed alzaidi | Mohammed A. Talab, Siti Norul Huda Sheikh Abdullah, Bilal Bataineh | Edge direction matrixes-based local binar patterns descriptor for shape
pattern recognition | null | null | null | null | cs.CV cs.IR | http://creativecommons.org/licenses/by/3.0/ | Shapes and texture image recognition usage is an essential branch of pattern
recognition. It is made up of techniques that aim at extracting information
from images via human knowledge and works. Local Binary Pattern (LBP) ensures
encoding global and local information and scaling invariance by introducing a
look-up table to reflect the uniformity structure of an object. However, edge
direction matrixes (EDMS) only apply global invariant descriptor which employs
first and secondary order relationships. The main idea behind this methodology
is the need of improved recognition capabilities, a goal achieved by the
combinative use of these descriptors. This collaboration aims to make use of
the major advantages each one presents, by simultaneously complementing each
other, in order to elevate their weak points. By using multiple classifier
approaches such as random forest and multi-layer perceptron neural network, the
proposed combinative descriptor are compared with the state of the art
combinative methods based on Gray-Level Co-occurrence matrix (GLCM with EDMS),
LBP and moment invariant on four benchmark dataset MPEG-7 CE-Shape-1, KTH-TIPS
image, Enghlishfnt and Arabic calligraphy . The experiments have shown the
superiority of the introduced descriptor over the GLCM with EDMS, LBP and
moment invariants and other well-known descriptor such as Scale Invariant
Feature Transform from the literature.
| [
{
"version": "v1",
"created": "Wed, 26 Nov 2014 19:12:33 GMT"
}
] | 2014-11-27T00:00:00 | [
[
"Talab",
"Mohammed A.",
""
],
[
"Abdullah",
"Siti Norul Huda Sheikh",
""
],
[
"Bataineh",
"Bilal",
""
]
] | TITLE: Edge direction matrixes-based local binar patterns descriptor for shape
pattern recognition
ABSTRACT: Shapes and texture image recognition usage is an essential branch of pattern
recognition. It is made up of techniques that aim at extracting information
from images via human knowledge and works. Local Binary Pattern (LBP) ensures
encoding global and local information and scaling invariance by introducing a
look-up table to reflect the uniformity structure of an object. However, edge
direction matrixes (EDMS) only apply global invariant descriptor which employs
first and secondary order relationships. The main idea behind this methodology
is the need of improved recognition capabilities, a goal achieved by the
combinative use of these descriptors. This collaboration aims to make use of
the major advantages each one presents, by simultaneously complementing each
other, in order to elevate their weak points. By using multiple classifier
approaches such as random forest and multi-layer perceptron neural network, the
proposed combinative descriptor are compared with the state of the art
combinative methods based on Gray-Level Co-occurrence matrix (GLCM with EDMS),
LBP and moment invariant on four benchmark dataset MPEG-7 CE-Shape-1, KTH-TIPS
image, Enghlishfnt and Arabic calligraphy . The experiments have shown the
superiority of the introduced descriptor over the GLCM with EDMS, LBP and
moment invariants and other well-known descriptor such as Scale Invariant
Feature Transform from the literature.
|
1311.0380 | Peter Wittich | S. Amerio, D. Bastieri, M. Corvo, A. Gianelle, W. Ketchum, T. Liu, A.
Lonardo, D. Lucchesi, S. Poprocki, R. Rivera, L. Tosoratto, P. Vicini, P.
Wittich | Many-core applications to online track reconstruction in HEP experiments | Proceedings for the 20th International Conference on Computing in
High Energy and Nuclear Physics (CHEP); missing acks added | null | 10.1088/1742-6596/513/1/012002 | null | physics.ins-det cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interest in parallel architectures applied to real time selections is growing
in High Energy Physics (HEP) experiments. In this paper we describe performance
measurements of Graphic Processing Units (GPUs) and Intel Many Integrated Core
architecture (MIC) when applied to a typical HEP online task: the selection of
events based on the trajectories of charged particles. We use as benchmark a
scaled-up version of the algorithm used at CDF experiment at Tevatron for
online track reconstruction - the SVT algorithm - as a realistic test-case for
low-latency trigger systems using new computing architectures for LHC
experiment. We examine the complexity/performance trade-off in porting existing
serial algorithms to many-core devices. Measurements of both data processing
and data transfer latency are shown, considering different I/O strategies
to/from the parallel devices.
| [
{
"version": "v1",
"created": "Sat, 2 Nov 2013 14:37:09 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Nov 2013 20:58:15 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Amerio",
"S.",
""
],
[
"Bastieri",
"D.",
""
],
[
"Corvo",
"M.",
""
],
[
"Gianelle",
"A.",
""
],
[
"Ketchum",
"W.",
""
],
[
"Liu",
"T.",
""
],
[
"Lonardo",
"A.",
""
],
[
"Lucchesi",
"D.",
""
],
[
"Poprocki",
"S.",
""
],
[
"Rivera",
"R.",
""
],
[
"Tosoratto",
"L.",
""
],
[
"Vicini",
"P.",
""
],
[
"Wittich",
"P.",
""
]
] | TITLE: Many-core applications to online track reconstruction in HEP experiments
ABSTRACT: Interest in parallel architectures applied to real time selections is growing
in High Energy Physics (HEP) experiments. In this paper we describe performance
measurements of Graphic Processing Units (GPUs) and Intel Many Integrated Core
architecture (MIC) when applied to a typical HEP online task: the selection of
events based on the trajectories of charged particles. We use as benchmark a
scaled-up version of the algorithm used at CDF experiment at Tevatron for
online track reconstruction - the SVT algorithm - as a realistic test-case for
low-latency trigger systems using new computing architectures for LHC
experiment. We examine the complexity/performance trade-off in porting existing
serial algorithms to many-core devices. Measurements of both data processing
and data transfer latency are shown, considering different I/O strategies
to/from the parallel devices.
|
1406.5549 | Piotr Doll\'ar | Piotr Doll\'ar and C. Lawrence Zitnick | Fast Edge Detection Using Structured Forests | update corresponding to acceptance to PAMI | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Edge detection is a critical component of many vision systems, including
object detectors and image segmentation algorithms. Patches of edges exhibit
well-known forms of local structure, such as straight lines or T-junctions. In
this paper we take advantage of the structure present in local image patches to
learn both an accurate and computationally efficient edge detector. We
formulate the problem of predicting local edge masks in a structured learning
framework applied to random decision forests. Our novel approach to learning
decision trees robustly maps the structured labels to a discrete space on which
standard information gain measures may be evaluated. The result is an approach
that obtains realtime performance that is orders of magnitude faster than many
competing state-of-the-art approaches, while also achieving state-of-the-art
edge detection results on the BSDS500 Segmentation dataset and NYU Depth
dataset. Finally, we show the potential of our approach as a general purpose
edge detector by showing our learned edge models generalize well across
datasets.
| [
{
"version": "v1",
"created": "Fri, 20 Jun 2014 22:28:29 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2014 02:49:28 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Dollár",
"Piotr",
""
],
[
"Zitnick",
"C. Lawrence",
""
]
] | TITLE: Fast Edge Detection Using Structured Forests
ABSTRACT: Edge detection is a critical component of many vision systems, including
object detectors and image segmentation algorithms. Patches of edges exhibit
well-known forms of local structure, such as straight lines or T-junctions. In
this paper we take advantage of the structure present in local image patches to
learn both an accurate and computationally efficient edge detector. We
formulate the problem of predicting local edge masks in a structured learning
framework applied to random decision forests. Our novel approach to learning
decision trees robustly maps the structured labels to a discrete space on which
standard information gain measures may be evaluated. The result is an approach
that obtains realtime performance that is orders of magnitude faster than many
competing state-of-the-art approaches, while also achieving state-of-the-art
edge detection results on the BSDS500 Segmentation dataset and NYU Depth
dataset. Finally, we show the potential of our approach as a general purpose
edge detector by showing our learned edge models generalize well across
datasets.
|
1407.2170 | Giorgos Tolias | Giorgos Tolias (INRIA), Teddy Furon (INRIA), Herv\'e J\'egou (INRIA) | Orientation covariant aggregation of local descriptors with embeddings | European Conference on Computer Vision (2014) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image search systems based on local descriptors typically achieve orientation
invariance by aligning the patches on their dominant orientations. Albeit
successful, this choice introduces too much invariance because it does not
guarantee that the patches are rotated consistently. This paper introduces an
aggregation strategy of local descriptors that achieves this covariance
property by jointly encoding the angle in the aggregation stage in a continuous
manner. It is combined with an efficient monomial embedding to provide a
codebook-free method to aggregate local descriptors into a single vector
representation. Our strategy is also compatible and employed with several
popular encoding methods, in particular bag-of-words, VLAD and the Fisher
vector. Our geometric-aware aggregation strategy is effective for image search,
as shown by experiments performed on standard benchmarks for image and
particular object retrieval, namely Holidays and Oxford buildings.
| [
{
"version": "v1",
"created": "Tue, 8 Jul 2014 16:55:36 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2014 11:43:20 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Tolias",
"Giorgos",
"",
"INRIA"
],
[
"Furon",
"Teddy",
"",
"INRIA"
],
[
"Jégou",
"Hervé",
"",
"INRIA"
]
] | TITLE: Orientation covariant aggregation of local descriptors with embeddings
ABSTRACT: Image search systems based on local descriptors typically achieve orientation
invariance by aligning the patches on their dominant orientations. Albeit
successful, this choice introduces too much invariance because it does not
guarantee that the patches are rotated consistently. This paper introduces an
aggregation strategy of local descriptors that achieves this covariance
property by jointly encoding the angle in the aggregation stage in a continuous
manner. It is combined with an efficient monomial embedding to provide a
codebook-free method to aggregate local descriptors into a single vector
representation. Our strategy is also compatible and employed with several
popular encoding methods, in particular bag-of-words, VLAD and the Fisher
vector. Our geometric-aware aggregation strategy is effective for image search,
as shown by experiments performed on standard benchmarks for image and
particular object retrieval, namely Holidays and Oxford buildings.
|
1410.7182 | Leon Derczynski | Leon Derczynski, Diana Maynard, Giuseppe Rizzo, Marieke van Erp,
Genevieve Gorrell, Rapha\"el Troncy, Johann Petrak, Kalina Bontcheva | Analysis of Named Entity Recognition and Linking for Tweets | 35 pages, accepted to journal Information Processing and Management | Information Processing & Management 51 (2), 32-49, 2014 | 10.1016/j.ipm.2014.10.006 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applying natural language processing for mining and intelligent information
access to tweets (a form of microblog) is a challenging, emerging research
area. Unlike carefully authored news text and other longer content, tweets pose
a number of new challenges, due to their short, noisy, context-dependent, and
dynamic nature. Information extraction from tweets is typically performed in a
pipeline, comprising consecutive stages of language identification,
tokenisation, part-of-speech tagging, named entity recognition and entity
disambiguation (e.g. with respect to DBpedia). In this work, we describe a new
Twitter entity disambiguation dataset, and conduct an empirical analysis of
named entity recognition and disambiguation, investigating how robust a number
of state-of-the-art systems are on such noisy texts, what the main sources of
error are, and which problems should be further investigated to improve the
state of the art.
| [
{
"version": "v1",
"created": "Mon, 27 Oct 2014 11:09:36 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Derczynski",
"Leon",
""
],
[
"Maynard",
"Diana",
""
],
[
"Rizzo",
"Giuseppe",
""
],
[
"van Erp",
"Marieke",
""
],
[
"Gorrell",
"Genevieve",
""
],
[
"Troncy",
"Raphaël",
""
],
[
"Petrak",
"Johann",
""
],
[
"Bontcheva",
"Kalina",
""
]
] | TITLE: Analysis of Named Entity Recognition and Linking for Tweets
ABSTRACT: Applying natural language processing for mining and intelligent information
access to tweets (a form of microblog) is a challenging, emerging research
area. Unlike carefully authored news text and other longer content, tweets pose
a number of new challenges, due to their short, noisy, context-dependent, and
dynamic nature. Information extraction from tweets is typically performed in a
pipeline, comprising consecutive stages of language identification,
tokenisation, part-of-speech tagging, named entity recognition and entity
disambiguation (e.g. with respect to DBpedia). In this work, we describe a new
Twitter entity disambiguation dataset, and conduct an empirical analysis of
named entity recognition and disambiguation, investigating how robust a number
of state-of-the-art systems are on such noisy texts, what the main sources of
error are, and which problems should be further investigated to improve the
state of the art.
|
1411.5881 | Shaista Hussain | Shaista Hussain, Shih-Chii Liu and Arindam Basu | Hardware-Amenable Structural Learning for Spike-based Pattern
Classification using a Simple Model of Active Dendrites | Accepted for publication in Neural Computation | null | null | null | cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a spike-based model which employs neurons with
functionally distinct dendritic compartments for classifying high dimensional
binary patterns. The synaptic inputs arriving on each dendritic subunit are
nonlinearly processed before being linearly integrated at the soma, giving the
neuron a capacity to perform a large number of input-output mappings. The model
utilizes sparse synaptic connectivity; where each synapse takes a binary value.
The optimal connection pattern of a neuron is learned by using a simple
hardware-friendly, margin enhancing learning algorithm inspired by the
mechanism of structural plasticity in biological neurons. The learning
algorithm groups correlated synaptic inputs on the same dendritic branch. Since
the learning results in modified connection patterns, it can be incorporated
into current event-based neuromorphic systems with little overhead. This work
also presents a branch-specific spike-based version of this structural
plasticity rule. The proposed model is evaluated on benchmark binary
classification problems and its performance is compared against that achieved
using Support Vector Machine (SVM) and Extreme Learning Machine (ELM)
techniques. Our proposed method attains comparable performance while utilizing
10 to 50% less computational resources than the other reported techniques.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2014 07:50:06 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2014 08:03:27 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Hussain",
"Shaista",
""
],
[
"Liu",
"Shih-Chii",
""
],
[
"Basu",
"Arindam",
""
]
] | TITLE: Hardware-Amenable Structural Learning for Spike-based Pattern
Classification using a Simple Model of Active Dendrites
ABSTRACT: This paper presents a spike-based model which employs neurons with
functionally distinct dendritic compartments for classifying high dimensional
binary patterns. The synaptic inputs arriving on each dendritic subunit are
nonlinearly processed before being linearly integrated at the soma, giving the
neuron a capacity to perform a large number of input-output mappings. The model
utilizes sparse synaptic connectivity; where each synapse takes a binary value.
The optimal connection pattern of a neuron is learned by using a simple
hardware-friendly, margin enhancing learning algorithm inspired by the
mechanism of structural plasticity in biological neurons. The learning
algorithm groups correlated synaptic inputs on the same dendritic branch. Since
the learning results in modified connection patterns, it can be incorporated
into current event-based neuromorphic systems with little overhead. This work
also presents a branch-specific spike-based version of this structural
plasticity rule. The proposed model is evaluated on benchmark binary
classification problems and its performance is compared against that achieved
using Support Vector Machine (SVM) and Extreme Learning Machine (ELM)
techniques. Our proposed method attains comparable performance while utilizing
10 to 50% less computational resources than the other reported techniques.
|
1411.6777 | Debajyoti Mukhopadhyay Prof. | Laxmi Lahoti, Chaitali Chandankhede, Debajyoti Mukhopadhyay | Modified Apriori Approach for Evade Network Intrusion Detection System | 5 pages, 3 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intrusion Detection System or IDS is a software or hardware tool that
repeatedly scans and monitors events that took place in a computer or a
network. A set of rules are used by Signature based Network Intrusion Detection
Systems or NIDS to detect hostile traffic in network segments or packets, which
are so important in detecting malicious and anomalous behaviour over the
network like known attacks that hackers look for new techniques to go unseen.
Sometime, a single failure at any layer will cause the NIDS to miss that
attack. To overcome this problem, a technique is used that will trigger a
failure in that layer. Such technique is known as Evasive technique. An Evasion
can be defined as any technique that modifies a visible attack into any other
form in order to stay away from being detect. The proposed system is used for
detecting attacks which are going on the network and also gives actual
categorization of attacks. The proposed system has advantage of getting low
false alarm rate and high detection rate. So that leads into decrease in
complexity and overhead on the system. The paper presents the Evasion technique
for customized apriori algorithm. The paper aims to make a new functional
structure to evade NIDS. This framework can be used to audit NIDS. This
framework shows that a proof of concept showing how to evade a self built NIDS
considering two publicly available datasets.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2014 09:16:01 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Lahoti",
"Laxmi",
""
],
[
"Chandankhede",
"Chaitali",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] | TITLE: Modified Apriori Approach for Evade Network Intrusion Detection System
ABSTRACT: Intrusion Detection System or IDS is a software or hardware tool that
repeatedly scans and monitors events that took place in a computer or a
network. A set of rules are used by Signature based Network Intrusion Detection
Systems or NIDS to detect hostile traffic in network segments or packets, which
are so important in detecting malicious and anomalous behaviour over the
network like known attacks that hackers look for new techniques to go unseen.
Sometime, a single failure at any layer will cause the NIDS to miss that
attack. To overcome this problem, a technique is used that will trigger a
failure in that layer. Such technique is known as Evasive technique. An Evasion
can be defined as any technique that modifies a visible attack into any other
form in order to stay away from being detect. The proposed system is used for
detecting attacks which are going on the network and also gives actual
categorization of attacks. The proposed system has advantage of getting low
false alarm rate and high detection rate. So that leads into decrease in
complexity and overhead on the system. The paper presents the Evasion technique
for customized apriori algorithm. The paper aims to make a new functional
structure to evade NIDS. This framework can be used to audit NIDS. This
framework shows that a proof of concept showing how to evade a self built NIDS
considering two publicly available datasets.
|
1411.6850 | Khalid Jebari hassani | Amina Dik, Khalid Jebari, Abdelaziz Bouroumi and Aziz Ettouhami | Similarity- based approach for outlier detection | International Journal of Computer Science Issues 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new approach for detecting outliers by introducing the
notion of object's proximity. The main idea is that normal point has similar
characteristics with several neighbors. So the point in not an outlier if it
has a high degree of proximity and its neighbors are several. The performance
of this approach is illustrated through real datasets
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2014 13:13:47 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Dik",
"Amina",
""
],
[
"Jebari",
"Khalid",
""
],
[
"Bouroumi",
"Abdelaziz",
""
],
[
"Ettouhami",
"Aziz",
""
]
] | TITLE: Similarity- based approach for outlier detection
ABSTRACT: This paper presents a new approach for detecting outliers by introducing the
notion of object's proximity. The main idea is that normal point has similar
characteristics with several neighbors. So the point in not an outlier if it
has a high degree of proximity and its neighbors are several. The performance
of this approach is illustrated through real datasets
|
1411.6909 | Aaron Hertzmann | Hamid Izadinia, Ali Farhadi, Aaron Hertzmann, Matthew D. Hoffman | Image Classification and Retrieval from User-Supplied Tags | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes direct learning of image classification from
user-supplied tags, without filtering. Each tag is supplied by the user who
shared the image online. Enormous numbers of these tags are freely available
online, and they give insight about the image categories important to users and
to image classification. Our approach is complementary to the conventional
approach of manual annotation, which is extremely costly. We analyze of the
Flickr 100 Million Image dataset, making several useful observations about the
statistics of these tags. We introduce a large-scale robust classification
algorithm, in order to handle the inherent noise in these tags, and a
calibration procedure to better predict objective annotations. We show that
freely available, user-supplied tags can obtain similar or superior results to
large databases of costly manual annotations.
| [
{
"version": "v1",
"created": "Tue, 25 Nov 2014 16:17:09 GMT"
}
] | 2014-11-26T00:00:00 | [
[
"Izadinia",
"Hamid",
""
],
[
"Farhadi",
"Ali",
""
],
[
"Hertzmann",
"Aaron",
""
],
[
"Hoffman",
"Matthew D.",
""
]
] | TITLE: Image Classification and Retrieval from User-Supplied Tags
ABSTRACT: This paper proposes direct learning of image classification from
user-supplied tags, without filtering. Each tag is supplied by the user who
shared the image online. Enormous numbers of these tags are freely available
online, and they give insight about the image categories important to users and
to image classification. Our approach is complementary to the conventional
approach of manual annotation, which is extremely costly. We analyze of the
Flickr 100 Million Image dataset, making several useful observations about the
statistics of these tags. We introduce a large-scale robust classification
algorithm, in order to handle the inherent noise in these tags, and a
calibration procedure to better predict objective annotations. We show that
freely available, user-supplied tags can obtain similar or superior results to
large databases of costly manual annotations.
|
1210.5268 | Jacob Eisenstein | Jacob Eisenstein, Brendan O'Connor, Noah A. Smith, Eric P. Xing | Diffusion of Lexical Change in Social Media | preprint of PLOS-ONE paper from November 2014; PLoS ONE 9(11) e113114 | null | 10.1371/journal.pone.0113114 | null | cs.CL cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computer-mediated communication is driving fundamental changes in the nature
of written language. We investigate these changes by statistical analysis of a
dataset comprising 107 million Twitter messages (authored by 2.7 million unique
user accounts). Using a latent vector autoregressive model to aggregate across
thousands of words, we identify high-level patterns in diffusion of linguistic
change over the United States. Our model is robust to unpredictable changes in
Twitter's sampling rate, and provides a probabilistic characterization of the
relationship of macro-scale linguistic influence to a set of demographic and
geographic predictors. The results of this analysis offer support for prior
arguments that focus on geographical proximity and population size. However,
demographic similarity -- especially with regard to race -- plays an even more
central role, as cities with similar racial demographics are far more likely to
share linguistic influence. Rather than moving towards a single unified
"netspeak" dialect, language evolution in computer-mediated communication
reproduces existing fault lines in spoken American English.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2012 21:46:09 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2012 01:40:54 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Oct 2012 21:15:56 GMT"
},
{
"version": "v4",
"created": "Mon, 24 Nov 2014 03:34:24 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Eisenstein",
"Jacob",
""
],
[
"O'Connor",
"Brendan",
""
],
[
"Smith",
"Noah A.",
""
],
[
"Xing",
"Eric P.",
""
]
] | TITLE: Diffusion of Lexical Change in Social Media
ABSTRACT: Computer-mediated communication is driving fundamental changes in the nature
of written language. We investigate these changes by statistical analysis of a
dataset comprising 107 million Twitter messages (authored by 2.7 million unique
user accounts). Using a latent vector autoregressive model to aggregate across
thousands of words, we identify high-level patterns in diffusion of linguistic
change over the United States. Our model is robust to unpredictable changes in
Twitter's sampling rate, and provides a probabilistic characterization of the
relationship of macro-scale linguistic influence to a set of demographic and
geographic predictors. The results of this analysis offer support for prior
arguments that focus on geographical proximity and population size. However,
demographic similarity -- especially with regard to race -- plays an even more
central role, as cities with similar racial demographics are far more likely to
share linguistic influence. Rather than moving towards a single unified
"netspeak" dialect, language evolution in computer-mediated communication
reproduces existing fault lines in spoken American English.
|
1312.0917 | Peter Wittich | A. Gianelle, S. Amerio, D. Bastieri, M. Corvo, W. Ketchum, T. Liu, A.
Lonardo, D. Lucchesi, S. Poprocki, R. Rivera, L. Tosoratto, P. Vicini, P.
Wittich | Applications of Many-Core Technologies to On-line Event Reconstruction
in High Energy Physics Experiments | Proceedings for 2013 IEEE NSS/MIC conference; fixed author list
omission | null | 10.1109/NSSMIC.2013.6829552 | null | physics.ins-det cs.DC hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interest in many-core architectures applied to real time selections is
growing in High Energy Physics (HEP) experiments. In this paper we describe
performance measurements of many-core devices when applied to a typical HEP
online task: the selection of events based on the trajectories of charged
particles. We use as benchmark a scaled-up version of the algorithm used at CDF
experiment at Tevatron for online track reconstruction - the SVT algorithm - as
a realistic test-case for low-latency trigger systems using new computing
architectures for LHC experiment. We examine the complexity/performance
trade-off in porting existing serial algorithms to many-core devices. We
measure performance of different architectures (Intel Xeon Phi and AMD GPUs, in
addition to NVidia GPUs) and different software environments (OpenCL, in
addition to NVidia CUDA). Measurements of both data processing and data
transfer latency are shown, considering different I/O strategies to/from the
many-core devices.
| [
{
"version": "v1",
"created": "Tue, 3 Dec 2013 19:55:16 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Dec 2013 11:50:21 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Gianelle",
"A.",
""
],
[
"Amerio",
"S.",
""
],
[
"Bastieri",
"D.",
""
],
[
"Corvo",
"M.",
""
],
[
"Ketchum",
"W.",
""
],
[
"Liu",
"T.",
""
],
[
"Lonardo",
"A.",
""
],
[
"Lucchesi",
"D.",
""
],
[
"Poprocki",
"S.",
""
],
[
"Rivera",
"R.",
""
],
[
"Tosoratto",
"L.",
""
],
[
"Vicini",
"P.",
""
],
[
"Wittich",
"P.",
""
]
] | TITLE: Applications of Many-Core Technologies to On-line Event Reconstruction
in High Energy Physics Experiments
ABSTRACT: Interest in many-core architectures applied to real time selections is
growing in High Energy Physics (HEP) experiments. In this paper we describe
performance measurements of many-core devices when applied to a typical HEP
online task: the selection of events based on the trajectories of charged
particles. We use as benchmark a scaled-up version of the algorithm used at CDF
experiment at Tevatron for online track reconstruction - the SVT algorithm - as
a realistic test-case for low-latency trigger systems using new computing
architectures for LHC experiment. We examine the complexity/performance
trade-off in porting existing serial algorithms to many-core devices. We
measure performance of different architectures (Intel Xeon Phi and AMD GPUs, in
addition to NVidia GPUs) and different software environments (OpenCL, in
addition to NVidia CUDA). Measurements of both data processing and data
transfer latency are shown, considering different I/O strategies to/from the
many-core devices.
|
1405.2226 | Claudio Moraga | Fatima Hadjam, Claudio Moraga | Introduction to RIMEP2: A Multi-Expression Programming System for the
Design of Reversible Digital Circuits | 17 text pages, 8 Figures, Research Report, Contact author:
[email protected] | null | null | FSC-2014-02; European Centre for Soft Computing | cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum computers are considered as a future alternative to circumvent the
heat dissipation problem of VLSI circuits. The synthesis of reversible circuits
is a very promising area of study considering the expected further
technological advances towards quantum computing. In this report, we propose a
linear genetic programming system to design reversible circuits -RIMEP2-. The
system has evolved reversible circuits starting from scratch without resorting
to a pre-existing library. The results show that among the 26 considered
benchmarks, RIMEP2 outperformed the best published solutions for 20 of them and
matched the remaining 6. RIMEP2 is presented in this report as a promising
method with a considerable potential for reversible circuit design. It will be
considered as work reference for future studies based on this method.
| [
{
"version": "v1",
"created": "Fri, 9 May 2014 13:33:28 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Nov 2014 13:07:24 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Hadjam",
"Fatima",
""
],
[
"Moraga",
"Claudio",
""
]
] | TITLE: Introduction to RIMEP2: A Multi-Expression Programming System for the
Design of Reversible Digital Circuits
ABSTRACT: Quantum computers are considered as a future alternative to circumvent the
heat dissipation problem of VLSI circuits. The synthesis of reversible circuits
is a very promising area of study considering the expected further
technological advances towards quantum computing. In this report, we propose a
linear genetic programming system to design reversible circuits -RIMEP2-. The
system has evolved reversible circuits starting from scratch without resorting
to a pre-existing library. The results show that among the 26 considered
benchmarks, RIMEP2 outperformed the best published solutions for 20 of them and
matched the remaining 6. RIMEP2 is presented in this report as a promising
method with a considerable potential for reversible circuit design. It will be
considered as work reference for future studies based on this method.
|
1411.6191 | David Balduzzi | David Balduzzi, Hastagiri Vanchinathan, Joachim Buhmann | Kickback cuts Backprop's red-tape: Biologically plausible credit
assignment in neural networks | 7 pages. To appear, AAAI-15 | null | null | null | cs.LG cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Error backpropagation is an extremely effective algorithm for assigning
credit in artificial neural networks. However, weight updates under Backprop
depend on lengthy recursive computations and require separate output and error
messages -- features not shared by biological neurons, that are perhaps
unnecessary. In this paper, we revisit Backprop and the credit assignment
problem. We first decompose Backprop into a collection of interacting learning
algorithms; provide regret bounds on the performance of these sub-algorithms;
and factorize Backprop's error signals. Using these results, we derive a new
credit assignment algorithm for nonparametric regression, Kickback, that is
significantly simpler than Backprop. Finally, we provide a sufficient condition
for Kickback to follow error gradients, and show that Kickback matches
Backprop's performance on real-world regression benchmarks.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 04:58:22 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Balduzzi",
"David",
""
],
[
"Vanchinathan",
"Hastagiri",
""
],
[
"Buhmann",
"Joachim",
""
]
] | TITLE: Kickback cuts Backprop's red-tape: Biologically plausible credit
assignment in neural networks
ABSTRACT: Error backpropagation is an extremely effective algorithm for assigning
credit in artificial neural networks. However, weight updates under Backprop
depend on lengthy recursive computations and require separate output and error
messages -- features not shared by biological neurons, that are perhaps
unnecessary. In this paper, we revisit Backprop and the credit assignment
problem. We first decompose Backprop into a collection of interacting learning
algorithms; provide regret bounds on the performance of these sub-algorithms;
and factorize Backprop's error signals. Using these results, we derive a new
credit assignment algorithm for nonparametric regression, Kickback, that is
significantly simpler than Backprop. Finally, we provide a sufficient condition
for Kickback to follow error gradients, and show that Kickback matches
Backprop's performance on real-world regression benchmarks.
|
1411.6235 | Xiaojun Chang | Xiaojun Chang, Feiping Nie, Zhigang Ma, and Yi Yang | Balanced k-Means and Min-Cut Clustering | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clustering is an effective technique in data mining to generate groups that
are the matter of interest. Among various clustering approaches, the family of
k-means algorithms and min-cut algorithms gain most popularity due to their
simplicity and efficacy. The classical k-means algorithm partitions a number of
data points into several subsets by iteratively updating the clustering centers
and the associated data points. By contrast, a weighted undirected graph is
constructed in min-cut algorithms which partition the vertices of the graph
into two sets. However, existing clustering algorithms tend to cluster minority
of data points into a subset, which shall be avoided when the target dataset is
balanced. To achieve more accurate clustering for balanced dataset, we propose
to leverage exclusive lasso on k-means and min-cut to regulate the balance
degree of the clustering results. By optimizing our objective functions that
build atop the exclusive lasso, we can make the clustering result as much
balanced as possible. Extensive experiments on several large-scale datasets
validate the advantage of the proposed algorithms compared to the
state-of-the-art clustering algorithms.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 13:16:25 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Chang",
"Xiaojun",
""
],
[
"Nie",
"Feiping",
""
],
[
"Ma",
"Zhigang",
""
],
[
"Yang",
"Yi",
""
]
] | TITLE: Balanced k-Means and Min-Cut Clustering
ABSTRACT: Clustering is an effective technique in data mining to generate groups that
are the matter of interest. Among various clustering approaches, the family of
k-means algorithms and min-cut algorithms gain most popularity due to their
simplicity and efficacy. The classical k-means algorithm partitions a number of
data points into several subsets by iteratively updating the clustering centers
and the associated data points. By contrast, a weighted undirected graph is
constructed in min-cut algorithms which partition the vertices of the graph
into two sets. However, existing clustering algorithms tend to cluster minority
of data points into a subset, which shall be avoided when the target dataset is
balanced. To achieve more accurate clustering for balanced dataset, we propose
to leverage exclusive lasso on k-means and min-cut to regulate the balance
degree of the clustering results. By optimizing our objective functions that
build atop the exclusive lasso, we can make the clustering result as much
balanced as possible. Extensive experiments on several large-scale datasets
validate the advantage of the proposed algorithms compared to the
state-of-the-art clustering algorithms.
|
1411.6308 | Xiaojun Chang | Xiaojun Chang, Feiping Nie, Zhigang Ma, Yi Yang and Xiaofang Zhou | A Convex Formulation for Spectral Shrunk Clustering | AAAI2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectral clustering is a fundamental technique in the field of data mining
and information processing. Most existing spectral clustering algorithms
integrate dimensionality reduction into the clustering process assisted by
manifold learning in the original space. However, the manifold in
reduced-dimensional subspace is likely to exhibit altered properties in
contrast with the original space. Thus, applying manifold information obtained
from the original space to the clustering process in a low-dimensional subspace
is prone to inferior performance. Aiming to address this issue, we propose a
novel convex algorithm that mines the manifold structure in the low-dimensional
subspace. In addition, our unified learning process makes the manifold learning
particularly tailored for the clustering. Compared with other related methods,
the proposed algorithm results in more structured clustering result. To
validate the efficacy of the proposed algorithm, we perform extensive
experiments on several benchmark datasets in comparison with some
state-of-the-art clustering approaches. The experimental results demonstrate
that the proposed algorithm has quite promising clustering performance.
| [
{
"version": "v1",
"created": "Sun, 23 Nov 2014 22:12:52 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Chang",
"Xiaojun",
""
],
[
"Nie",
"Feiping",
""
],
[
"Ma",
"Zhigang",
""
],
[
"Yang",
"Yi",
""
],
[
"Zhou",
"Xiaofang",
""
]
] | TITLE: A Convex Formulation for Spectral Shrunk Clustering
ABSTRACT: Spectral clustering is a fundamental technique in the field of data mining
and information processing. Most existing spectral clustering algorithms
integrate dimensionality reduction into the clustering process assisted by
manifold learning in the original space. However, the manifold in
reduced-dimensional subspace is likely to exhibit altered properties in
contrast with the original space. Thus, applying manifold information obtained
from the original space to the clustering process in a low-dimensional subspace
is prone to inferior performance. Aiming to address this issue, we propose a
novel convex algorithm that mines the manifold structure in the low-dimensional
subspace. In addition, our unified learning process makes the manifold learning
particularly tailored for the clustering. Compared with other related methods,
the proposed algorithm results in more structured clustering result. To
validate the efficacy of the proposed algorithm, we perform extensive
experiments on several benchmark datasets in comparison with some
state-of-the-art clustering approaches. The experimental results demonstrate
that the proposed algorithm has quite promising clustering performance.
|
1411.6361 | Baptiste Wicht | Baptiste Wicht, Roberto A. Vitillo, Dehao Chen, David Levinthal | Hardware Counted Profile-Guided Optimization | 10 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Profile-Guided Optimization (PGO) is an excellent means to improve the
performance of a compiled program. Indeed, the execution path data it provides
helps the compiler to generate better code and better cacheline packing.
At the time of this writing, compilers only support instrumentation-based
PGO. This proved effective for optimizing programs. However, few projects use
it, due to its complicated dual-compilation model and its high overhead. Our
solution of sampling Hardware Performance Counters overcome these drawbacks. In
this paper, we propose a PGO solution for GCC by sampling Last Branch Record
(LBR) events and using debug symbols to recreate source locations of binary
instructions.
By using LBR-Sampling, the generated profiles are very accurate. This
solution achieved an average of 83% of the gains obtained with
instrumentation-based PGO and 93% on C++ benchmarks only. The profiling
overhead is only 1.06% on average whereas instrumentation incurs a 16% overhead
on average.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2014 07:01:31 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Wicht",
"Baptiste",
""
],
[
"Vitillo",
"Roberto A.",
""
],
[
"Chen",
"Dehao",
""
],
[
"Levinthal",
"David",
""
]
] | TITLE: Hardware Counted Profile-Guided Optimization
ABSTRACT: Profile-Guided Optimization (PGO) is an excellent means to improve the
performance of a compiled program. Indeed, the execution path data it provides
helps the compiler to generate better code and better cacheline packing.
At the time of this writing, compilers only support instrumentation-based
PGO. This proved effective for optimizing programs. However, few projects use
it, due to its complicated dual-compilation model and its high overhead. Our
solution of sampling Hardware Performance Counters overcome these drawbacks. In
this paper, we propose a PGO solution for GCC by sampling Last Branch Record
(LBR) events and using debug symbols to recreate source locations of binary
instructions.
By using LBR-Sampling, the generated profiles are very accurate. This
solution achieved an average of 83% of the gains obtained with
instrumentation-based PGO and 93% on C++ benchmarks only. The profiling
overhead is only 1.06% on average whereas instrumentation incurs a 16% overhead
on average.
|
1411.6447 | Tianjun Xiao | Tianjun Xiao, Yichong Xu, Kuiyuan Yang, Jiaxing Zhang, Yuxin Peng,
Zheng Zhang | The Application of Two-level Attention Models in Deep Convolutional
Neural Network for Fine-grained Image Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fine-grained classification is challenging because categories can only be
discriminated by subtle and local differences. Variances in the pose, scale or
rotation usually make the problem more difficult. Most fine-grained
classification systems follow the pipeline of finding foreground object or
object parts (where) to extract discriminative features (what).
In this paper, we propose to apply visual attention to fine-grained
classification task using deep neural network. Our pipeline integrates three
types of attention: the bottom-up attention that propose candidate patches, the
object-level top-down attention that selects relevant patches to a certain
object, and the part-level top-down attention that localizes discriminative
parts. We combine these attentions to train domain-specific deep nets, then use
it to improve both the what and where aspects. Importantly, we avoid using
expensive annotations like bounding box or part information from end-to-end.
The weak supervision constraint makes our work easier to generalize.
We have verified the effectiveness of the method on the subsets of ILSVRC2012
dataset and CUB200_2011 dataset. Our pipeline delivered significant
improvements and achieved the best accuracy under the weakest supervision
condition. The performance is competitive against other methods that rely on
additional annotations.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2014 13:30:07 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Xiao",
"Tianjun",
""
],
[
"Xu",
"Yichong",
""
],
[
"Yang",
"Kuiyuan",
""
],
[
"Zhang",
"Jiaxing",
""
],
[
"Peng",
"Yuxin",
""
],
[
"Zhang",
"Zheng",
""
]
] | TITLE: The Application of Two-level Attention Models in Deep Convolutional
Neural Network for Fine-grained Image Classification
ABSTRACT: Fine-grained classification is challenging because categories can only be
discriminated by subtle and local differences. Variances in the pose, scale or
rotation usually make the problem more difficult. Most fine-grained
classification systems follow the pipeline of finding foreground object or
object parts (where) to extract discriminative features (what).
In this paper, we propose to apply visual attention to fine-grained
classification task using deep neural network. Our pipeline integrates three
types of attention: the bottom-up attention that propose candidate patches, the
object-level top-down attention that selects relevant patches to a certain
object, and the part-level top-down attention that localizes discriminative
parts. We combine these attentions to train domain-specific deep nets, then use
it to improve both the what and where aspects. Importantly, we avoid using
expensive annotations like bounding box or part information from end-to-end.
The weak supervision constraint makes our work easier to generalize.
We have verified the effectiveness of the method on the subsets of ILSVRC2012
dataset and CUB200_2011 dataset. Our pipeline delivered significant
improvements and achieved the best accuracy under the weakest supervision
condition. The performance is competitive against other methods that rely on
additional annotations.
|
1411.6562 | Manas Joglekar | Manas Joglekar, Hector Garcia-Molina, Aditya Parameswaran | Evaluating the Crowd with Confidence | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Worker quality control is a crucial aspect of crowdsourcing systems;
typically occupying a large fraction of the time and money invested on
crowdsourcing. In this work, we devise techniques to generate confidence
intervals for worker error rate estimates, thereby enabling a better evaluation
of worker quality. We show that our techniques generate correct confidence
intervals on a range of real-world datasets, and demonstrate wide applicability
by using them to evict poorly performing workers, and provide confidence
intervals on the accuracy of the answers.
| [
{
"version": "v1",
"created": "Wed, 12 Nov 2014 23:50:43 GMT"
}
] | 2014-11-25T00:00:00 | [
[
"Joglekar",
"Manas",
""
],
[
"Garcia-Molina",
"Hector",
""
],
[
"Parameswaran",
"Aditya",
""
]
] | TITLE: Evaluating the Crowd with Confidence
ABSTRACT: Worker quality control is a crucial aspect of crowdsourcing systems;
typically occupying a large fraction of the time and money invested on
crowdsourcing. In this work, we devise techniques to generate confidence
intervals for worker error rate estimates, thereby enabling a better evaluation
of worker quality. We show that our techniques generate correct confidence
intervals on a range of real-world datasets, and demonstrate wide applicability
by using them to evict poorly performing workers, and provide confidence
intervals on the accuracy of the answers.
|
1405.0538 | Rados{\l}aw Michalski | Rados{\l}aw Michalski, Tomasz Kajdanowicz, Piotr Br\'odka,
Przemys{\l}aw Kazienko | Seed Selection for Spread of Influence in Social Networks: Temporal vs.
Static Approach | null | New Generation Computing, Vol. 32, Issue 3-4, pp. 213-235, 2014 | 10.1007/s00354-014-0402-9 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding optimal set of users for influencing others in the
social network has been widely studied. Because it is NP-hard, some heuristics
were proposed to find sub-optimal solutions. Still, one of the commonly used
assumption is the one that seeds are chosen on the static network, not the
dynamic one. This static approach is in fact far from the real-world networks,
where new nodes may appear and old ones dynamically disappear in course of
time.
The main purpose of this paper is to analyse how the results of one of the
typical models for spread of influence - linear threshold - differ depending on
the strategy of building the social network used later for choosing seeds. To
show the impact of network creation strategy on the final number of influenced
nodes - outcome of spread of influence, the results for three approaches were
studied: one static and two temporal with different granularities, i.e. various
number of time windows. Social networks for each time window encapsulated
dynamic changes in the network structure. Calculation of various node
structural measures like degree or betweenness respected these changes by means
of forgetting mechanism - more recent data had greater influence on node
measure values. These measures were, in turn, used for node ranking and their
selection for seeding.
All concepts were applied to experimental verification on five real datasets.
The results revealed that temporal approach is always better than static and
the higher granularity in the temporal social network while seeding, the more
finally influenced nodes. Additionally, outdegree measure with exponential
forgetting typically outperformed other time-dependent structural measures, if
used for seed candidate ranking.
| [
{
"version": "v1",
"created": "Fri, 2 May 2014 23:32:04 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2014 13:20:36 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Michalski",
"Radosław",
""
],
[
"Kajdanowicz",
"Tomasz",
""
],
[
"Bródka",
"Piotr",
""
],
[
"Kazienko",
"Przemysław",
""
]
] | TITLE: Seed Selection for Spread of Influence in Social Networks: Temporal vs.
Static Approach
ABSTRACT: The problem of finding optimal set of users for influencing others in the
social network has been widely studied. Because it is NP-hard, some heuristics
were proposed to find sub-optimal solutions. Still, one of the commonly used
assumption is the one that seeds are chosen on the static network, not the
dynamic one. This static approach is in fact far from the real-world networks,
where new nodes may appear and old ones dynamically disappear in course of
time.
The main purpose of this paper is to analyse how the results of one of the
typical models for spread of influence - linear threshold - differ depending on
the strategy of building the social network used later for choosing seeds. To
show the impact of network creation strategy on the final number of influenced
nodes - outcome of spread of influence, the results for three approaches were
studied: one static and two temporal with different granularities, i.e. various
number of time windows. Social networks for each time window encapsulated
dynamic changes in the network structure. Calculation of various node
structural measures like degree or betweenness respected these changes by means
of forgetting mechanism - more recent data had greater influence on node
measure values. These measures were, in turn, used for node ranking and their
selection for seeding.
All concepts were applied to experimental verification on five real datasets.
The results revealed that temporal approach is always better than static and
the higher granularity in the temporal social network while seeding, the more
finally influenced nodes. Additionally, outdegree measure with exponential
forgetting typically outperformed other time-dependent structural measures, if
used for seed candidate ranking.
|
1410.4510 | Finale Doshi-Velez | Finale Doshi-Velez and Byron Wallace and Ryan Adams | Graph-Sparse LDA: A Topic Model with Structured Sparsity | null | null | null | null | stat.ML cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Originally designed to model text, topic modeling has become a powerful tool
for uncovering latent structure in domains including medicine, finance, and
vision. The goals for the model vary depending on the application: in some
cases, the discovered topics may be used for prediction or some other
downstream task. In other cases, the content of the topic itself may be of
intrinsic scientific interest.
Unfortunately, even using modern sparse techniques, the discovered topics are
often difficult to interpret due to the high dimensionality of the underlying
space. To improve topic interpretability, we introduce Graph-Sparse LDA, a
hierarchical topic model that leverages knowledge of relationships between
words (e.g., as encoded by an ontology). In our model, topics are summarized by
a few latent concept-words from the underlying graph that explain the observed
words. Graph-Sparse LDA recovers sparse, interpretable summaries on two
real-world biomedical datasets while matching state-of-the-art prediction
performance.
| [
{
"version": "v1",
"created": "Thu, 16 Oct 2014 17:35:31 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2014 16:38:59 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Doshi-Velez",
"Finale",
""
],
[
"Wallace",
"Byron",
""
],
[
"Adams",
"Ryan",
""
]
] | TITLE: Graph-Sparse LDA: A Topic Model with Structured Sparsity
ABSTRACT: Originally designed to model text, topic modeling has become a powerful tool
for uncovering latent structure in domains including medicine, finance, and
vision. The goals for the model vary depending on the application: in some
cases, the discovered topics may be used for prediction or some other
downstream task. In other cases, the content of the topic itself may be of
intrinsic scientific interest.
Unfortunately, even using modern sparse techniques, the discovered topics are
often difficult to interpret due to the high dimensionality of the underlying
space. To improve topic interpretability, we introduce Graph-Sparse LDA, a
hierarchical topic model that leverages knowledge of relationships between
words (e.g., as encoded by an ontology). In our model, topics are summarized by
a few latent concept-words from the underlying graph that explain the observed
words. Graph-Sparse LDA recovers sparse, interpretable summaries on two
real-world biomedical datasets while matching state-of-the-art prediction
performance.
|
1411.5428 | Ben Stoddard | Ben Stoddard and Yan Chen and Ashwin Machanavajjhala | Differentially Private Algorithms for Empirical Machine Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important use of private data is to build machine learning classifiers.
While there is a burgeoning literature on differentially private classification
algorithms, we find that they are not practical in real applications due to two
reasons. First, existing differentially private classifiers provide poor
accuracy on real world datasets. Second, there is no known differentially
private algorithm for empirically evaluating the private classifier on a
private test dataset.
In this paper, we develop differentially private algorithms that mirror real
world empirical machine learning workflows. We consider the private classifier
training algorithm as a blackbox. We present private algorithms for selecting
features that are input to the classifier. Though adding a preprocessing step
takes away some of the privacy budget from the actual classification process
(thus potentially making it noisier and less accurate), we show that our novel
preprocessing techniques significantly increase classifier accuracy on three
real-world datasets. We also present the first private algorithms for
empirically constructing receiver operating characteristic (ROC) curves on a
private test set.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2014 03:10:47 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2014 20:41:04 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Stoddard",
"Ben",
""
],
[
"Chen",
"Yan",
""
],
[
"Machanavajjhala",
"Ashwin",
""
]
] | TITLE: Differentially Private Algorithms for Empirical Machine Learning
ABSTRACT: An important use of private data is to build machine learning classifiers.
While there is a burgeoning literature on differentially private classification
algorithms, we find that they are not practical in real applications due to two
reasons. First, existing differentially private classifiers provide poor
accuracy on real world datasets. Second, there is no known differentially
private algorithm for empirically evaluating the private classifier on a
private test dataset.
In this paper, we develop differentially private algorithms that mirror real
world empirical machine learning workflows. We consider the private classifier
training algorithm as a blackbox. We present private algorithms for selecting
features that are input to the classifier. Though adding a preprocessing step
takes away some of the privacy budget from the actual classification process
(thus potentially making it noisier and less accurate), we show that our novel
preprocessing techniques significantly increase classifier accuracy on three
real-world datasets. We also present the first private algorithms for
empirically constructing receiver operating characteristic (ROC) curves on a
private test set.
|
1411.5731 | Suleyman Cetintas | Can Xu, Suleyman Cetintas, Kuang-Chih Lee, Li-Jia Li | Visual Sentiment Prediction with Deep Convolutional Neural Networks | null | null | null | null | cs.CV cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Images have become one of the most popular types of media through which users
convey their emotions within online social networks. Although vast amount of
research is devoted to sentiment analysis of textual data, there has been very
limited work that focuses on analyzing sentiment of image data. In this work,
we propose a novel visual sentiment prediction framework that performs image
understanding with Deep Convolutional Neural Networks (CNN). Specifically, the
proposed sentiment prediction framework performs transfer learning from a CNN
with millions of parameters, which is pre-trained on large-scale data for
object recognition. Experiments conducted on two real-world datasets from
Twitter and Tumblr demonstrate the effectiveness of the proposed visual
sentiment analysis framework.
| [
{
"version": "v1",
"created": "Fri, 21 Nov 2014 00:39:43 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Xu",
"Can",
""
],
[
"Cetintas",
"Suleyman",
""
],
[
"Lee",
"Kuang-Chih",
""
],
[
"Li",
"Li-Jia",
""
]
] | TITLE: Visual Sentiment Prediction with Deep Convolutional Neural Networks
ABSTRACT: Images have become one of the most popular types of media through which users
convey their emotions within online social networks. Although vast amount of
research is devoted to sentiment analysis of textual data, there has been very
limited work that focuses on analyzing sentiment of image data. In this work,
we propose a novel visual sentiment prediction framework that performs image
understanding with Deep Convolutional Neural Networks (CNN). Specifically, the
proposed sentiment prediction framework performs transfer learning from a CNN
with millions of parameters, which is pre-trained on large-scale data for
object recognition. Experiments conducted on two real-world datasets from
Twitter and Tumblr demonstrate the effectiveness of the proposed visual
sentiment analysis framework.
|
1411.5935 | M. Zeeshan Zia | M.Zeeshan Zia, Michael Stark, Konrad Schindler | Towards Scene Understanding with Detailed 3D Object Representations | International Journal of Computer Vision (appeared online on 4
November 2014). Online version:
http://link.springer.com/article/10.1007/s11263-014-0780-y | null | 10.1007/s11263-014-0780-y | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current approaches to semantic image and scene understanding typically employ
rather simple object representations such as 2D or 3D bounding boxes. While
such coarse models are robust and allow for reliable object detection, they
discard much of the information about objects' 3D shape and pose, and thus do
not lend themselves well to higher-level reasoning. Here, we propose to base
scene understanding on a high-resolution object representation. An object class
- in our case cars - is modeled as a deformable 3D wireframe, which enables
fine-grained modeling at the level of individual vertices and faces. We augment
that model to explicitly include vertex-level occlusion, and embed all
instances in a common coordinate frame, in order to infer and exploit
object-object interactions. Specifically, from a single view we jointly
estimate the shapes and poses of multiple objects in a common 3D frame. A
ground plane in that frame is estimated by consensus among different objects,
which significantly stabilizes monocular 3D pose estimation. The fine-grained
model, in conjunction with the explicit 3D scene model, further allows one to
infer part-level occlusions between the modeled objects, as well as occlusions
by other, unmodeled scene elements. To demonstrate the benefits of such
detailed object class models in the context of scene understanding we
systematically evaluate our approach on the challenging KITTI street scene
dataset. The experiments show that the model's ability to utilize image
evidence at the level of individual parts improves monocular 3D pose estimation
w.r.t. both location and (continuous) viewpoint.
| [
{
"version": "v1",
"created": "Tue, 18 Nov 2014 15:07:19 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Zia",
"M. Zeeshan",
""
],
[
"Stark",
"Michael",
""
],
[
"Schindler",
"Konrad",
""
]
] | TITLE: Towards Scene Understanding with Detailed 3D Object Representations
ABSTRACT: Current approaches to semantic image and scene understanding typically employ
rather simple object representations such as 2D or 3D bounding boxes. While
such coarse models are robust and allow for reliable object detection, they
discard much of the information about objects' 3D shape and pose, and thus do
not lend themselves well to higher-level reasoning. Here, we propose to base
scene understanding on a high-resolution object representation. An object class
- in our case cars - is modeled as a deformable 3D wireframe, which enables
fine-grained modeling at the level of individual vertices and faces. We augment
that model to explicitly include vertex-level occlusion, and embed all
instances in a common coordinate frame, in order to infer and exploit
object-object interactions. Specifically, from a single view we jointly
estimate the shapes and poses of multiple objects in a common 3D frame. A
ground plane in that frame is estimated by consensus among different objects,
which significantly stabilizes monocular 3D pose estimation. The fine-grained
model, in conjunction with the explicit 3D scene model, further allows one to
infer part-level occlusions between the modeled objects, as well as occlusions
by other, unmodeled scene elements. To demonstrate the benefits of such
detailed object class models in the context of scene understanding we
systematically evaluate our approach on the challenging KITTI street scene
dataset. The experiments show that the model's ability to utilize image
evidence at the level of individual parts improves monocular 3D pose estimation
w.r.t. both location and (continuous) viewpoint.
|
1411.5995 | George Ovchinnikov | G.V. Ovchinnikov, D.A. Kolesnikov, I.V. Oseledets | Algebraic reputation model RepRank and its application to spambot
detection | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to popularity surge social networks became lucrative targets for spammers
and guerilla marketers, who are trying to game ranking systems and broadcast
their messages at little to none cost. Ranking systems, for example Twitter's
Trends, can be gamed by scripted users also called bots, who are automatically
or semi-automatically twitting essentially the same message. Judging by the
prices and abundance of supply from PR firms this is an easy to implement and
widely used tactic, at least in Russian blogosphere. Aggregative analysis of
social networks should at best mark those messages as spam or at least
correctly downplay their importance as they represent opinions only of a few,
if dedicated, users. Hence bot detection plays a crucial role in social network
mining and analysis. In this paper we propose technique called RepRank which
could be viewed as Markov chain based model for reputation propagation on
graphs utilizing simultaneous trust and anti-trust propagation and provide
effective numerical approach for its computation. Comparison with another
models such as TrustRank and some of its modifications on sample of 320000
Russian speaking Twitter users is presented. The dataset is presented as well.
| [
{
"version": "v1",
"created": "Thu, 20 Nov 2014 13:50:39 GMT"
}
] | 2014-11-24T00:00:00 | [
[
"Ovchinnikov",
"G. V.",
""
],
[
"Kolesnikov",
"D. A.",
""
],
[
"Oseledets",
"I. V.",
""
]
] | TITLE: Algebraic reputation model RepRank and its application to spambot
detection
ABSTRACT: Due to popularity surge social networks became lucrative targets for spammers
and guerilla marketers, who are trying to game ranking systems and broadcast
their messages at little to none cost. Ranking systems, for example Twitter's
Trends, can be gamed by scripted users also called bots, who are automatically
or semi-automatically twitting essentially the same message. Judging by the
prices and abundance of supply from PR firms this is an easy to implement and
widely used tactic, at least in Russian blogosphere. Aggregative analysis of
social networks should at best mark those messages as spam or at least
correctly downplay their importance as they represent opinions only of a few,
if dedicated, users. Hence bot detection plays a crucial role in social network
mining and analysis. In this paper we propose technique called RepRank which
could be viewed as Markov chain based model for reputation propagation on
graphs utilizing simultaneous trust and anti-trust propagation and provide
effective numerical approach for its computation. Comparison with another
models such as TrustRank and some of its modifications on sample of 320000
Russian speaking Twitter users is presented. The dataset is presented as well.
|
1307.3176 | L.A. Prashanth | Nathaniel Korda, Prashanth L.A. and R\'emi Munos | Fast gradient descent for drifting least squares regression, with
application to bandits | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online learning algorithms require to often recompute least squares
regression estimates of parameters. We study improving the computational
complexity of such algorithms by using stochastic gradient descent (SGD) type
schemes in place of classic regression solvers. We show that SGD schemes
efficiently track the true solutions of the regression problems, even in the
presence of a drift. This finding coupled with an $O(d)$ improvement in
complexity, where $d$ is the dimension of the data, make them attractive for
implementation in the big data settings. In the case when strong convexity in
the regression problem is guaranteed, we provide bounds on the error both in
expectation and high probability (the latter is often needed to provide
theoretical guarantees for higher level algorithms), despite the drifting least
squares solution. As an example of this case we prove that the regret
performance of an SGD version of the PEGE linear bandit algorithm
[Rusmevichientong and Tsitsiklis 2010] is worse that that of PEGE itself only
by a factor of $O(\log^4 n)$. When strong convexity of the regression problem
cannot be guaranteed, we investigate using an adaptive regularisation. We make
an empirical study of an adaptively regularised, SGD version of LinUCB [Li et
al. 2010] in a news article recommendation application, which uses the large
scale news recommendation dataset from Yahoo! front page. These experiments
show a large gain in computational complexity, with a consistently low tracking
error and click-through-rate (CTR) performance that is $75\%$ close.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2013 16:36:29 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Feb 2014 00:27:18 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2014 14:29:52 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Nov 2014 12:40:48 GMT"
}
] | 2014-11-21T00:00:00 | [
[
"Korda",
"Nathaniel",
""
],
[
"A.",
"Prashanth L.",
""
],
[
"Munos",
"Rémi",
""
]
] | TITLE: Fast gradient descent for drifting least squares regression, with
application to bandits
ABSTRACT: Online learning algorithms require to often recompute least squares
regression estimates of parameters. We study improving the computational
complexity of such algorithms by using stochastic gradient descent (SGD) type
schemes in place of classic regression solvers. We show that SGD schemes
efficiently track the true solutions of the regression problems, even in the
presence of a drift. This finding coupled with an $O(d)$ improvement in
complexity, where $d$ is the dimension of the data, make them attractive for
implementation in the big data settings. In the case when strong convexity in
the regression problem is guaranteed, we provide bounds on the error both in
expectation and high probability (the latter is often needed to provide
theoretical guarantees for higher level algorithms), despite the drifting least
squares solution. As an example of this case we prove that the regret
performance of an SGD version of the PEGE linear bandit algorithm
[Rusmevichientong and Tsitsiklis 2010] is worse that that of PEGE itself only
by a factor of $O(\log^4 n)$. When strong convexity of the regression problem
cannot be guaranteed, we investigate using an adaptive regularisation. We make
an empirical study of an adaptively regularised, SGD version of LinUCB [Li et
al. 2010] in a news article recommendation application, which uses the large
scale news recommendation dataset from Yahoo! front page. These experiments
show a large gain in computational complexity, with a consistently low tracking
error and click-through-rate (CTR) performance that is $75\%$ close.
|
1406.6312 | Ahmed El-Kishky | Ahmed El-Kishky, Yanglei Song, Chi Wang, Clare Voss, Jiawei Han | Scalable Topical Phrase Mining from Text Corpora | null | Proceedings of the VLDB Endowment, Vol. 8(3), pp. 305 - 316, 2014 | null | null | cs.CL cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While most topic modeling algorithms model text corpora with unigrams, human
interpretation often relies on inherent grouping of terms into phrases. As
such, we consider the problem of discovering topical phrases of mixed lengths.
Existing work either performs post processing to the inference results of
unigram-based topic models, or utilizes complex n-gram-discovery topic models.
These methods generally produce low-quality topical phrases or suffer from poor
scalability on even moderately-sized datasets. We propose a different approach
that is both computationally efficient and effective. Our solution combines a
novel phrase mining framework to segment a document into single and multi-word
phrases, and a new topic model that operates on the induced document partition.
Our approach discovers high quality topical phrases with negligible extra cost
to the bag-of-words topic model in a variety of datasets including research
publication titles, abstracts, reviews, and news articles.
| [
{
"version": "v1",
"created": "Tue, 24 Jun 2014 17:10:29 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Nov 2014 00:18:06 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"El-Kishky",
"Ahmed",
""
],
[
"Song",
"Yanglei",
""
],
[
"Wang",
"Chi",
""
],
[
"Voss",
"Clare",
""
],
[
"Han",
"Jiawei",
""
]
] | TITLE: Scalable Topical Phrase Mining from Text Corpora
ABSTRACT: While most topic modeling algorithms model text corpora with unigrams, human
interpretation often relies on inherent grouping of terms into phrases. As
such, we consider the problem of discovering topical phrases of mixed lengths.
Existing work either performs post processing to the inference results of
unigram-based topic models, or utilizes complex n-gram-discovery topic models.
These methods generally produce low-quality topical phrases or suffer from poor
scalability on even moderately-sized datasets. We propose a different approach
that is both computationally efficient and effective. Our solution combines a
novel phrase mining framework to segment a document into single and multi-word
phrases, and a new topic model that operates on the induced document partition.
Our approach discovers high quality topical phrases with negligible extra cost
to the bag-of-words topic model in a variety of datasets including research
publication titles, abstracts, reviews, and news articles.
|
1407.7094 | Bruno Gon\c{c}alves | Bruno Gon\c{c}alves and David S\'anchez | Crowdsourcing Dialect Characterization through Twitter | 10 pages, 5 figures | PLoS One 9, E112074 (2014) | 10.1371/journal.pone.0112074 | null | physics.soc-ph cs.CL cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform a large-scale analysis of language diatopic variation using
geotagged microblogging datasets. By collecting all Twitter messages written in
Spanish over more than two years, we build a corpus from which a carefully
selected list of concepts allows us to characterize Spanish varieties on a
global scale. A cluster analysis proves the existence of well defined
macroregions sharing common lexical properties. Remarkably enough, we find that
Spanish language is split into two superdialects, namely, an urban speech used
across major American and Spanish citites and a diverse form that encompasses
rural areas and small towns. The latter can be further clustered into smaller
varieties with a stronger regional character.
| [
{
"version": "v1",
"created": "Sat, 26 Jul 2014 04:16:31 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Gonçalves",
"Bruno",
""
],
[
"Sánchez",
"David",
""
]
] | TITLE: Crowdsourcing Dialect Characterization through Twitter
ABSTRACT: We perform a large-scale analysis of language diatopic variation using
geotagged microblogging datasets. By collecting all Twitter messages written in
Spanish over more than two years, we build a corpus from which a carefully
selected list of concepts allows us to characterize Spanish varieties on a
global scale. A cluster analysis proves the existence of well defined
macroregions sharing common lexical properties. Remarkably enough, we find that
Spanish language is split into two superdialects, namely, an urban speech used
across major American and Spanish citites and a diverse form that encompasses
rural areas and small towns. The latter can be further clustered into smaller
varieties with a stronger regional character.
|
1410.0745 | Robinson Piramuthu Robinson Piramuthu | Qiaosong Wang, Vignesh Jagadeesh, Bryan Ressler, Robinson Piramuthu | Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer
Depth Camera and Synthetic Data | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in consumer depth sensors have created many opportunities for
human body measurement and modeling. Estimation of 3D body shape is
particularly useful for fashion e-commerce applications such as virtual try-on
or fit personalization. In this paper, we propose a method for capturing
accurate human body shape and anthropometrics from a single consumer grade
depth sensor. We first generate a large dataset of synthetic 3D human body
models using real-world body size distributions. Next, we estimate key body
measurements from a single monocular depth image. We combine body measurement
estimates with local geometry features around key joint positions to form a
robust multi-dimensional feature vector. This allows us to conduct a fast
nearest-neighbor search to every sample in the dataset and return the closest
one. Compared to existing methods, our approach is able to predict accurate
full body parameters from a partial view using measurement parameters learned
from the synthetic dataset. Furthermore, our system is capable of generating 3D
human mesh models in real-time, which is significantly faster than methods
which attempt to model shape and pose deformations. To validate the efficiency
and applicability of our system, we collected a dataset that contains frontal
and back scans of 83 clothed people with ground truth height and weight.
Experiments on real-world dataset show that the proposed method can achieve
real-time performance with competing results achieving an average error of 1.9
cm in estimated measurements.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2014 02:33:08 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Nov 2014 20:30:32 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Wang",
"Qiaosong",
""
],
[
"Jagadeesh",
"Vignesh",
""
],
[
"Ressler",
"Bryan",
""
],
[
"Piramuthu",
"Robinson",
""
]
] | TITLE: Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer
Depth Camera and Synthetic Data
ABSTRACT: Recent advances in consumer depth sensors have created many opportunities for
human body measurement and modeling. Estimation of 3D body shape is
particularly useful for fashion e-commerce applications such as virtual try-on
or fit personalization. In this paper, we propose a method for capturing
accurate human body shape and anthropometrics from a single consumer grade
depth sensor. We first generate a large dataset of synthetic 3D human body
models using real-world body size distributions. Next, we estimate key body
measurements from a single monocular depth image. We combine body measurement
estimates with local geometry features around key joint positions to form a
robust multi-dimensional feature vector. This allows us to conduct a fast
nearest-neighbor search to every sample in the dataset and return the closest
one. Compared to existing methods, our approach is able to predict accurate
full body parameters from a partial view using measurement parameters learned
from the synthetic dataset. Furthermore, our system is capable of generating 3D
human mesh models in real-time, which is significantly faster than methods
which attempt to model shape and pose deformations. To validate the efficiency
and applicability of our system, we collected a dataset that contains frontal
and back scans of 83 clothed people with ground truth height and weight.
Experiments on real-world dataset show that the proposed method can achieve
real-time performance with competing results achieving an average error of 1.9
cm in estimated measurements.
|
1411.5140 | Qian Wang | Qian Wang, Jiaxing Zhang, Sen Song, Zheng Zhang | Attentional Neural Network: Feature Selection Using Cognitive Feedback | Poster in Neural Information Processing Systems (NIPS) 2014 | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Attentional Neural Network is a new framework that integrates top-down
cognitive bias and bottom-up feature extraction in one coherent architecture.
The top-down influence is especially effective when dealing with high noise or
difficult segmentation problems. Our system is modular and extensible. It is
also easy to train and cheap to run, and yet can accommodate complex behaviors.
We obtain classification accuracy better than or competitive with state of art
results on the MNIST variation dataset, and successfully disentangle overlaid
digits with high success rates. We view such a general purpose framework as an
essential foundation for a larger system emulating the cognitive abilities of
the whole brain.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 08:33:28 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Wang",
"Qian",
""
],
[
"Zhang",
"Jiaxing",
""
],
[
"Song",
"Sen",
""
],
[
"Zhang",
"Zheng",
""
]
] | TITLE: Attentional Neural Network: Feature Selection Using Cognitive Feedback
ABSTRACT: Attentional Neural Network is a new framework that integrates top-down
cognitive bias and bottom-up feature extraction in one coherent architecture.
The top-down influence is especially effective when dealing with high noise or
difficult segmentation problems. Our system is modular and extensible. It is
also easy to train and cheap to run, and yet can accommodate complex behaviors.
We obtain classification accuracy better than or competitive with state of art
results on the MNIST variation dataset, and successfully disentangle overlaid
digits with high success rates. We view such a general purpose framework as an
essential foundation for a larger system emulating the cognitive abilities of
the whole brain.
|
1411.5204 | Diego Saez-Trumper | Alessandro Venerandi, Giovanni Quattrone, Licia Capra, Daniele
Quercia, Diego Saez-Trumper | Measuring Urban Deprivation from User Generated Content | CSCW'15, March 14 - 18 2015, Vancouver, BC, Canada | null | 10.1145/2675133.2675233 | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Measuring socioeconomic deprivation of cities in an accurate and timely
fashion has become a priority for governments around the world, as the massive
urbanization process we are witnessing is causing high levels of inequalities
which require intervention. Traditionally, deprivation indexes have been
derived from census data, which is however very expensive to obtain, and thus
acquired only every few years. Alternative computational methods have been
proposed in recent years to automatically extract proxies of deprivation at a
fine spatio-temporal level of granularity; however, they usually require access
to datasets (e.g., call details records) that are not publicly available to
governments and agencies.
To remedy this, we propose a new method to automatically mine deprivation at
a fine level of spatio-temporal granularity that only requires access to freely
available user-generated content. More precisely, the method needs access to
datasets describing what urban elements are present in the physical
environment; examples of such datasets are Foursquare and OpenStreetMap. Using
these datasets, we quantitatively describe neighborhoods by means of a metric,
called {\em Offering Advantage}, that reflects which urban elements are
distinctive features of each neighborhood. We then use that metric to {\em (i)}
build accurate classifiers of urban deprivation and {\em (ii)} interpret the
outcomes through thematic analysis. We apply the method to three UK urban areas
of different scale and elaborate on the results in terms of precision and
recall.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 12:44:12 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Venerandi",
"Alessandro",
""
],
[
"Quattrone",
"Giovanni",
""
],
[
"Capra",
"Licia",
""
],
[
"Quercia",
"Daniele",
""
],
[
"Saez-Trumper",
"Diego",
""
]
] | TITLE: Measuring Urban Deprivation from User Generated Content
ABSTRACT: Measuring socioeconomic deprivation of cities in an accurate and timely
fashion has become a priority for governments around the world, as the massive
urbanization process we are witnessing is causing high levels of inequalities
which require intervention. Traditionally, deprivation indexes have been
derived from census data, which is however very expensive to obtain, and thus
acquired only every few years. Alternative computational methods have been
proposed in recent years to automatically extract proxies of deprivation at a
fine spatio-temporal level of granularity; however, they usually require access
to datasets (e.g., call details records) that are not publicly available to
governments and agencies.
To remedy this, we propose a new method to automatically mine deprivation at
a fine level of spatio-temporal granularity that only requires access to freely
available user-generated content. More precisely, the method needs access to
datasets describing what urban elements are present in the physical
environment; examples of such datasets are Foursquare and OpenStreetMap. Using
these datasets, we quantitatively describe neighborhoods by means of a metric,
called {\em Offering Advantage}, that reflects which urban elements are
distinctive features of each neighborhood. We then use that metric to {\em (i)}
build accurate classifiers of urban deprivation and {\em (ii)} interpret the
outcomes through thematic analysis. We apply the method to three UK urban areas
of different scale and elaborate on the results in terms of precision and
recall.
|
1411.5260 | Patrick Kimes | Patrick K. Kimes, D. Neil Hayes, J. S. Marron and Yufeng Liu | Large-Margin Classification with Multiple Decision Rules | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Binary classification is a common statistical learning problem in which a
model is estimated on a set of covariates for some outcome indicating the
membership of one of two classes. In the literature, there exists a distinction
between hard and soft classification. In soft classification, the conditional
class probability is modeled as a function of the covariates. In contrast, hard
classification methods only target the optimal prediction boundary. While hard
and soft classification methods have been studied extensively, not much work
has been done to compare the actual tasks of hard and soft classification. In
this paper we propose a spectrum of statistical learning problems which span
the hard and soft classification tasks based on fitting multiple decision rules
to the data. By doing so, we reveal a novel collection of learning tasks of
increasing complexity. We study the problems using the framework of
large-margin classifiers and a class of piecewise linear convex surrogates, for
which we derive statistical properties and a corresponding sub-gradient descent
algorithm. We conclude by applying our approach to simulation settings and a
magnetic resonance imaging (MRI) dataset from the Alzheimer's Disease
Neuroimaging Initiative (ADNI) study.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 15:45:54 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Kimes",
"Patrick K.",
""
],
[
"Hayes",
"D. Neil",
""
],
[
"Marron",
"J. S.",
""
],
[
"Liu",
"Yufeng",
""
]
] | TITLE: Large-Margin Classification with Multiple Decision Rules
ABSTRACT: Binary classification is a common statistical learning problem in which a
model is estimated on a set of covariates for some outcome indicating the
membership of one of two classes. In the literature, there exists a distinction
between hard and soft classification. In soft classification, the conditional
class probability is modeled as a function of the covariates. In contrast, hard
classification methods only target the optimal prediction boundary. While hard
and soft classification methods have been studied extensively, not much work
has been done to compare the actual tasks of hard and soft classification. In
this paper we propose a spectrum of statistical learning problems which span
the hard and soft classification tasks based on fitting multiple decision rules
to the data. By doing so, we reveal a novel collection of learning tasks of
increasing complexity. We study the problems using the framework of
large-margin classifiers and a class of piecewise linear convex surrogates, for
which we derive statistical properties and a corresponding sub-gradient descent
algorithm. We conclude by applying our approach to simulation settings and a
magnetic resonance imaging (MRI) dataset from the Alzheimer's Disease
Neuroimaging Initiative (ADNI) study.
|
1411.5283 | Zaid Alyasseri | Zaid Abdi Alkareem Alyasseri, Kadhim Al-Attar, Mazin Nasser | Parallelize Bubble and Merge Sort Algorithms Using Message Passing
Interface (MPI) | 5 pages, 5 figures. arXiv admin note: substantial text overlap with
arXiv:1407.6603 | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sorting has been a profound area for the algorithmic researchers and many
resources are invested to suggest more works for sorting algorithms. For this
purpose, many existing sorting algorithms were observed in terms of the
efficiency of the algorithmic complexity. In this paper we implemented the
bubble and merge sort algorithms using Message Passing Interface (MPI)
approach. The proposed work tested on two standard datasets (text file) with
different size. The main idea of the proposed algorithm is distributing the
elements of the input datasets into many additional temporary sub-arrays
according to a number of characters in each word. The sizes of each of these
sub-arrays are decided depending on a number of elements with the same number
of characters in the input array. We implemented MPI using Intel core i7-3610QM
,(8 CPUs),using two approaches (vectors of string and array 3D) . Finally, we
get the data structure effects on the performance of the algorithm for that we
choice the second approach.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 16:35:16 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Alyasseri",
"Zaid Abdi Alkareem",
""
],
[
"Al-Attar",
"Kadhim",
""
],
[
"Nasser",
"Mazin",
""
]
] | TITLE: Parallelize Bubble and Merge Sort Algorithms Using Message Passing
Interface (MPI)
ABSTRACT: Sorting has been a profound area for the algorithmic researchers and many
resources are invested to suggest more works for sorting algorithms. For this
purpose, many existing sorting algorithms were observed in terms of the
efficiency of the algorithmic complexity. In this paper we implemented the
bubble and merge sort algorithms using Message Passing Interface (MPI)
approach. The proposed work tested on two standard datasets (text file) with
different size. The main idea of the proposed algorithm is distributing the
elements of the input datasets into many additional temporary sub-arrays
according to a number of characters in each word. The sizes of each of these
sub-arrays are decided depending on a number of elements with the same number
of characters in the input array. We implemented MPI using Intel core i7-3610QM
,(8 CPUs),using two approaches (vectors of string and array 3D) . Finally, we
get the data structure effects on the performance of the algorithm for that we
choice the second approach.
|
1411.5307 | Robinson Piramuthu Robinson Piramuthu | Kevin Shih, Wei Di, Vignesh Jagadeesh, Robinson Piramuthu | Efficient Media Retrieval from Non-Cooperative Queries | 8 pages, 9 figures, 1 table | null | null | null | cs.IR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text is ubiquitous in the artificial world and easily attainable when it
comes to book title and author names. Using the images from the book cover set
from the Stanford Mobile Visual Search dataset and additional book covers and
metadata from openlibrary.org, we construct a large scale book cover retrieval
dataset, complete with 100K distractor covers and title and author strings for
each. Because our query images are poorly conditioned for clean text
extraction, we propose a method for extracting a matching noisy and erroneous
OCR readings and matching it against clean author and book title strings in a
standard document look-up problem setup. Finally, we demonstrate how to use
this text-matching as a feature in conjunction with popular retrieval features
such as VLAD using a simple learning setup to achieve significant improvements
in retrieval accuracy over that of either VLAD or the text alone.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 18:34:28 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Shih",
"Kevin",
""
],
[
"Di",
"Wei",
""
],
[
"Jagadeesh",
"Vignesh",
""
],
[
"Piramuthu",
"Robinson",
""
]
] | TITLE: Efficient Media Retrieval from Non-Cooperative Queries
ABSTRACT: Text is ubiquitous in the artificial world and easily attainable when it
comes to book title and author names. Using the images from the book cover set
from the Stanford Mobile Visual Search dataset and additional book covers and
metadata from openlibrary.org, we construct a large scale book cover retrieval
dataset, complete with 100K distractor covers and title and author strings for
each. Because our query images are poorly conditioned for clean text
extraction, we propose a method for extracting a matching noisy and erroneous
OCR readings and matching it against clean author and book title strings in a
standard document look-up problem setup. Finally, we demonstrate how to use
this text-matching as a feature in conjunction with popular retrieval features
such as VLAD using a simple learning setup to achieve significant improvements
in retrieval accuracy over that of either VLAD or the text alone.
|
1411.5309 | David Eigen | Li Wan and David Eigen and Rob Fergus | End-to-End Integration of a Convolutional Network, Deformable Parts
Model and Non-Maximum Suppression | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deformable Parts Models and Convolutional Networks each have achieved notable
performance in object detection. Yet these two approaches find their strengths
in complementary areas: DPMs are well-versed in object composition, modeling
fine-grained spatial relationships between parts; likewise, ConvNets are adept
at producing powerful image features, having been discriminatively trained
directly on the pixels. In this paper, we propose a new model that combines
these two approaches, obtaining the advantages of each. We train this model
using a new structured loss function that considers all bounding boxes within
an image, rather than isolated object instances. This enables the non-maximal
suppression (NMS) operation, previously treated as a separate post-processing
stage, to be integrated into the model. This allows for discriminative training
of our combined Convnet + DPM + NMS model in end-to-end fashion. We evaluate
our system on PASCAL VOC 2007 and 2011 datasets, achieving competitive results
on both benchmarks.
| [
{
"version": "v1",
"created": "Wed, 19 Nov 2014 18:36:09 GMT"
}
] | 2014-11-20T00:00:00 | [
[
"Wan",
"Li",
""
],
[
"Eigen",
"David",
""
],
[
"Fergus",
"Rob",
""
]
] | TITLE: End-to-End Integration of a Convolutional Network, Deformable Parts
Model and Non-Maximum Suppression
ABSTRACT: Deformable Parts Models and Convolutional Networks each have achieved notable
performance in object detection. Yet these two approaches find their strengths
in complementary areas: DPMs are well-versed in object composition, modeling
fine-grained spatial relationships between parts; likewise, ConvNets are adept
at producing powerful image features, having been discriminatively trained
directly on the pixels. In this paper, we propose a new model that combines
these two approaches, obtaining the advantages of each. We train this model
using a new structured loss function that considers all bounding boxes within
an image, rather than isolated object instances. This enables the non-maximal
suppression (NMS) operation, previously treated as a separate post-processing
stage, to be integrated into the model. This allows for discriminative training
of our combined Convnet + DPM + NMS model in end-to-end fashion. We evaluate
our system on PASCAL VOC 2007 and 2011 datasets, achieving competitive results
on both benchmarks.
|
1402.5138 | Dieter Pfoser | Mahmuda Ahmed and Sophia Karagiorgou and Dieter Pfoser and Carola Wenk | A Comparison and Evaluation of Map Construction Algorithms | null | null | 10.1007/s10707-014-0222-6 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Map construction methods automatically produce and/or update road network
datasets using vehicle tracking data. Enabled by the ubiquitous generation of
georeferenced tracking data, there has been a recent surge in map construction
algorithms coming from different computer science domains. A cross-comparison
of the various algorithms is still very rare, since (i) algorithms and
constructed maps are generally not publicly available and (ii) there is no
standard approach to assess the result quality, given the lack of benchmark
data and quantitative evaluation methods. This work represents a first
comprehensive attempt to benchmark map construction algorithms. We provide an
evaluation and comparison of seven algorithms using four datasets and four
different evaluation measures. In addition to this comprehensive comparison, we
make our datasets, source code of map construction algorithms and evaluation
measures publicly available on mapconstruction.org. This site has been
established as a repository for map con- struction data and algorithms and we
invite other researchers to contribute by uploading code and benchmark data
supporting their contributions to map construction algorithms.
| [
{
"version": "v1",
"created": "Wed, 19 Feb 2014 21:50:39 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jun 2014 14:51:46 GMT"
}
] | 2014-11-19T00:00:00 | [
[
"Ahmed",
"Mahmuda",
""
],
[
"Karagiorgou",
"Sophia",
""
],
[
"Pfoser",
"Dieter",
""
],
[
"Wenk",
"Carola",
""
]
] | TITLE: A Comparison and Evaluation of Map Construction Algorithms
ABSTRACT: Map construction methods automatically produce and/or update road network
datasets using vehicle tracking data. Enabled by the ubiquitous generation of
georeferenced tracking data, there has been a recent surge in map construction
algorithms coming from different computer science domains. A cross-comparison
of the various algorithms is still very rare, since (i) algorithms and
constructed maps are generally not publicly available and (ii) there is no
standard approach to assess the result quality, given the lack of benchmark
data and quantitative evaluation methods. This work represents a first
comprehensive attempt to benchmark map construction algorithms. We provide an
evaluation and comparison of seven algorithms using four datasets and four
different evaluation measures. In addition to this comprehensive comparison, we
make our datasets, source code of map construction algorithms and evaluation
measures publicly available on mapconstruction.org. This site has been
established as a repository for map con- struction data and algorithms and we
invite other researchers to contribute by uploading code and benchmark data
supporting their contributions to map construction algorithms.
|
1409.6911 | Zhiqiang Shen | Zhiqiang Shen and Xiangyang Xue | Do More Dropouts in Pool5 Feature Maps for Better Object Detection | 9 pages, 7 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Convolutional Neural Networks (CNNs) have gained great success in image
classification and object detection. In these fields, the outputs of all layers
of CNNs are usually considered as a high dimensional feature vector extracted
from an input image and the correspondence between finer level feature vectors
and concepts that the input image contains is all-important. However, fewer
studies focus on this deserving issue. On considering the correspondence, we
propose a novel approach which generates an edited version for each original
CNN feature vector by applying the maximum entropy principle to abandon
particular vectors. These selected vectors correspond to the unfriendly
concepts in each image category. The classifier trained from merged feature
sets can significantly improve model generalization of individual categories
when training data is limited. The experimental results for
classification-based object detection on canonical datasets including VOC 2007
(60.1%), 2010 (56.4%) and 2012 (56.3%) show obvious improvement in mean average
precision (mAP) with simple linear support vector machines.
| [
{
"version": "v1",
"created": "Wed, 24 Sep 2014 11:50:48 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 12:27:23 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Nov 2014 17:34:22 GMT"
}
] | 2014-11-19T00:00:00 | [
[
"Shen",
"Zhiqiang",
""
],
[
"Xue",
"Xiangyang",
""
]
] | TITLE: Do More Dropouts in Pool5 Feature Maps for Better Object Detection
ABSTRACT: Deep Convolutional Neural Networks (CNNs) have gained great success in image
classification and object detection. In these fields, the outputs of all layers
of CNNs are usually considered as a high dimensional feature vector extracted
from an input image and the correspondence between finer level feature vectors
and concepts that the input image contains is all-important. However, fewer
studies focus on this deserving issue. On considering the correspondence, we
propose a novel approach which generates an edited version for each original
CNN feature vector by applying the maximum entropy principle to abandon
particular vectors. These selected vectors correspond to the unfriendly
concepts in each image category. The classifier trained from merged feature
sets can significantly improve model generalization of individual categories
when training data is limited. The experimental results for
classification-based object detection on canonical datasets including VOC 2007
(60.1%), 2010 (56.4%) and 2012 (56.3%) show obvious improvement in mean average
precision (mAP) with simple linear support vector machines.
|
1411.4670 | Mohamed Hussein | Mohamed E. Hussein and Marwan Torki and Ahmed Elsallamy and Mahmoud
Fayyaz | AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline
Arabic Handwriting Recognition | 6 pages, 8 figure, and 6 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce the first phase of a new dataset for offline
Arabic handwriting recognition. The aim is to collect a very large dataset of
isolated Arabic words that covers all letters of the alphabet in all possible
shapes using a small number of simple words. The end goal is to collect a very
large dataset of segmented letter images, which can be used to build and
evaluate Arabic handwriting recognition systems that are based on segmented
letter recognition. The current version of the dataset contains $25114$ samples
of $109$ unique Arabic words that cover all possible shapes of all alphabet
letters. The samples were collected from $907$ writers. In its current form,
the dataset can be used for the problem of closed-vocabulary word recognition.
We evaluated a number of window-based descriptors and classifiers on this task
and obtained an accuracy of $92.16\%$ using a SIFT-based descriptor and ANN.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 21:23:26 GMT"
}
] | 2014-11-19T00:00:00 | [
[
"Hussein",
"Mohamed E.",
""
],
[
"Torki",
"Marwan",
""
],
[
"Elsallamy",
"Ahmed",
""
],
[
"Fayyaz",
"Mahmoud",
""
]
] | TITLE: AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline
Arabic Handwriting Recognition
ABSTRACT: In this paper, we introduce the first phase of a new dataset for offline
Arabic handwriting recognition. The aim is to collect a very large dataset of
isolated Arabic words that covers all letters of the alphabet in all possible
shapes using a small number of simple words. The end goal is to collect a very
large dataset of segmented letter images, which can be used to build and
evaluate Arabic handwriting recognition systems that are based on segmented
letter recognition. The current version of the dataset contains $25114$ samples
of $109$ unique Arabic words that cover all possible shapes of all alphabet
letters. The samples were collected from $907$ writers. In its current form,
the dataset can be used for the problem of closed-vocabulary word recognition.
We evaluated a number of window-based descriptors and classifiers on this task
and obtained an accuracy of $92.16\%$ using a SIFT-based descriptor and ANN.
|
1411.4958 | Xiaolong Wang | Xiaolong Wang, David F. Fouhey, Abhinav Gupta | Designing Deep Networks for Surface Normal Estimation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the past few years, convolutional neural nets (CNN) have shown incredible
promise for learning visual representations. In this paper, we use CNNs for the
task of predicting surface normals from a single image. But what is the right
architecture we should use? We propose to build upon the decades of hard work
in 3D scene understanding, to design new CNN architecture for the task of
surface normal estimation. We show by incorporating several constraints
(man-made, manhattan world) and meaningful intermediate representations (room
layout, edge labels) in the architecture leads to state of the art performance
on surface normal estimation. We also show that our network is quite robust and
show state of the art results on other datasets as well without any
fine-tuning.
| [
{
"version": "v1",
"created": "Tue, 18 Nov 2014 18:39:48 GMT"
}
] | 2014-11-19T00:00:00 | [
[
"Wang",
"Xiaolong",
""
],
[
"Fouhey",
"David F.",
""
],
[
"Gupta",
"Abhinav",
""
]
] | TITLE: Designing Deep Networks for Surface Normal Estimation
ABSTRACT: In the past few years, convolutional neural nets (CNN) have shown incredible
promise for learning visual representations. In this paper, we use CNNs for the
task of predicting surface normals from a single image. But what is the right
architecture we should use? We propose to build upon the decades of hard work
in 3D scene understanding, to design new CNN architecture for the task of
surface normal estimation. We show by incorporating several constraints
(man-made, manhattan world) and meaningful intermediate representations (room
layout, edge labels) in the architecture leads to state of the art performance
on surface normal estimation. We also show that our network is quite robust and
show state of the art results on other datasets as well without any
fine-tuning.
|
1411.4960 | Ana Me\v{s}trovi\'c | Hana Rizvi\'c, Sanda Martin\v{c}i\'c-Ip\v{s}i\'c, Ana Me\v{s}trovi\'c | Network Motifs Analysis of Croatian Literature | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we analyse network motifs in the co-occurrence directed
networks constructed from five different texts (four books and one portal) in
the Croatian language. After preparing the data and network construction, we
perform the network motif analysis. We analyse the motif frequencies and
Z-scores in the five networks. We present the triad significance profile for
five datasets. Furthermore, we compare our results with the existing results
for the linguistic networks. Firstly, we show that the triad significance
profile for the Croatian language is very similar with the other languages and
all the networks belong to the same family of networks. However, there are
certain differences between the Croatian language and other analysed languages.
We conclude that this is due to the free word-order of the Croatian language.
| [
{
"version": "v1",
"created": "Tue, 18 Nov 2014 18:46:36 GMT"
}
] | 2014-11-19T00:00:00 | [
[
"Rizvić",
"Hana",
""
],
[
"Martinčić-Ipšić",
"Sanda",
""
],
[
"Meštrović",
"Ana",
""
]
] | TITLE: Network Motifs Analysis of Croatian Literature
ABSTRACT: In this paper we analyse network motifs in the co-occurrence directed
networks constructed from five different texts (four books and one portal) in
the Croatian language. After preparing the data and network construction, we
perform the network motif analysis. We analyse the motif frequencies and
Z-scores in the five networks. We present the triad significance profile for
five datasets. Furthermore, we compare our results with the existing results
for the linguistic networks. Firstly, we show that the triad significance
profile for the Croatian language is very similar with the other languages and
all the networks belong to the same family of networks. However, there are
certain differences between the Croatian language and other analysed languages.
We conclude that this is due to the free word-order of the Croatian language.
|
1303.2042 | Matthew Amy | Matthew Amy, Dmitri Maslov, and Michele Mosca | Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid
Partitioning | Version 2 contains substantial improvements and extensions to the
previous version. We describe a new, more robust algorithm and achieve
significantly improved experimental results | IEEE Transactions on Computer-Aided Design of Integrated Circuits
and Systems 33(10): 1476-1489, 2014 | 10.1109/TCAD.2014.2341953 | null | quant-ph cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most work in quantum circuit optimization has been performed in isolation
from the results of quantum fault-tolerance. Here we present a polynomial-time
algorithm for optimizing quantum circuits that takes the actual implementation
of fault-tolerant logical gates into consideration. Our algorithm
re-synthesizes quantum circuits composed of Clifford group and T gates, the
latter being typically the most costly gate in fault-tolerant models, e.g.,
those based on the Steane or surface codes, with the purpose of minimizing both
T-count and T-depth. A major feature of the algorithm is the ability to
re-synthesize circuits with additional ancillae to reduce T-depth at
effectively no cost. The tested benchmarks show up to 65.7% reduction in
T-count and up to 87.6% reduction in T-depth without ancillae, or 99.7%
reduction in T-depth using ancillae.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2013 16:20:34 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Dec 2013 17:31:54 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Amy",
"Matthew",
""
],
[
"Maslov",
"Dmitri",
""
],
[
"Mosca",
"Michele",
""
]
] | TITLE: Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid
Partitioning
ABSTRACT: Most work in quantum circuit optimization has been performed in isolation
from the results of quantum fault-tolerance. Here we present a polynomial-time
algorithm for optimizing quantum circuits that takes the actual implementation
of fault-tolerant logical gates into consideration. Our algorithm
re-synthesizes quantum circuits composed of Clifford group and T gates, the
latter being typically the most costly gate in fault-tolerant models, e.g.,
those based on the Steane or surface codes, with the purpose of minimizing both
T-count and T-depth. A major feature of the algorithm is the ability to
re-synthesize circuits with additional ancillae to reduce T-depth at
effectively no cost. The tested benchmarks show up to 65.7% reduction in
T-count and up to 87.6% reduction in T-depth without ancillae, or 99.7%
reduction in T-depth using ancillae.
|
1403.3155 | Fei-Yun Zhu | Feiyun Zhu, Ying Wang, Bin Fan, Gaofeng Meng, Shiming Xiang and
Chunhong Pan | Spectral Unmixing via Data-guided Sparsity | null | null | 10.1109/TIP.2014.2363423 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral unmixing, the process of estimating a common set of spectral
bases and their corresponding composite percentages at each pixel, is an
important task for hyperspectral analysis, visualization and understanding.
From an unsupervised learning perspective, this problem is very
challenging---both the spectral bases and their composite percentages are
unknown, making the solution space too large. To reduce the solution space,
many approaches have been proposed by exploiting various priors. In practice,
these priors would easily lead to some unsuitable solution. This is because
they are achieved by applying an identical strength of constraints to all the
factors, which does not hold in practice. To overcome this limitation, we
propose a novel sparsity based method by learning a data-guided map to describe
the individual mixed level of each pixel. Through this data-guided map, the
$\ell_{p}(0<p<1)$ constraint is applied in an adaptive manner. Such
implementation not only meets the practical situation, but also guides the
spectral bases toward the pixels under highly sparse constraint. What's more,
an elegant optimization scheme as well as its convergence proof have been
provided in this paper. Extensive experiments on several datasets also
demonstrate that the data-guided map is feasible, and high quality unmixing
results could be obtained by our method.
| [
{
"version": "v1",
"created": "Thu, 13 Mar 2014 03:29:22 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2014 13:49:14 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Sep 2014 02:59:51 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Nov 2014 15:18:15 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Zhu",
"Feiyun",
""
],
[
"Wang",
"Ying",
""
],
[
"Fan",
"Bin",
""
],
[
"Meng",
"Gaofeng",
""
],
[
"Xiang",
"Shiming",
""
],
[
"Pan",
"Chunhong",
""
]
] | TITLE: Spectral Unmixing via Data-guided Sparsity
ABSTRACT: Hyperspectral unmixing, the process of estimating a common set of spectral
bases and their corresponding composite percentages at each pixel, is an
important task for hyperspectral analysis, visualization and understanding.
From an unsupervised learning perspective, this problem is very
challenging---both the spectral bases and their composite percentages are
unknown, making the solution space too large. To reduce the solution space,
many approaches have been proposed by exploiting various priors. In practice,
these priors would easily lead to some unsuitable solution. This is because
they are achieved by applying an identical strength of constraints to all the
factors, which does not hold in practice. To overcome this limitation, we
propose a novel sparsity based method by learning a data-guided map to describe
the individual mixed level of each pixel. Through this data-guided map, the
$\ell_{p}(0<p<1)$ constraint is applied in an adaptive manner. Such
implementation not only meets the practical situation, but also guides the
spectral bases toward the pixels under highly sparse constraint. What's more,
an elegant optimization scheme as well as its convergence proof have been
provided in this paper. Extensive experiments on several datasets also
demonstrate that the data-guided map is feasible, and high quality unmixing
results could be obtained by our method.
|
1407.4764 | Ken Chatfield | Ken Chatfield, Karen Simonyan and Andrew Zisserman | Efficient On-the-fly Category Retrieval using ConvNets and GPUs | Published in proceedings of ACCV 2014 | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the gains in precision and speed, that can be obtained by
using Convolutional Networks (ConvNets) for on-the-fly retrieval - where
classifiers are learnt at run time for a textual query from downloaded images,
and used to rank large image or video datasets.
We make three contributions: (i) we present an evaluation of state-of-the-art
image representations for object category retrieval over standard benchmark
datasets containing 1M+ images; (ii) we show that ConvNets can be used to
obtain features which are incredibly performant, and yet much lower dimensional
than previous state-of-the-art image representations, and that their
dimensionality can be reduced further without loss in performance by
compression using product quantization or binarization. Consequently, features
with the state-of-the-art performance on large-scale datasets of millions of
images can fit in the memory of even a commodity GPU card; (iii) we show that
an SVM classifier can be learnt within a ConvNet framework on a GPU in parallel
with downloading the new training images, allowing for a continuous refinement
of the model as more images become available, and simultaneous training and
ranking. The outcome is an on-the-fly system that significantly outperforms its
predecessors in terms of: precision of retrieval, memory requirements, and
speed, facilitating accurate on-the-fly learning and ranking in under a second
on a single GPU.
| [
{
"version": "v1",
"created": "Thu, 17 Jul 2014 18:29:38 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Nov 2014 08:27:23 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Nov 2014 12:10:23 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Chatfield",
"Ken",
""
],
[
"Simonyan",
"Karen",
""
],
[
"Zisserman",
"Andrew",
""
]
] | TITLE: Efficient On-the-fly Category Retrieval using ConvNets and GPUs
ABSTRACT: We investigate the gains in precision and speed, that can be obtained by
using Convolutional Networks (ConvNets) for on-the-fly retrieval - where
classifiers are learnt at run time for a textual query from downloaded images,
and used to rank large image or video datasets.
We make three contributions: (i) we present an evaluation of state-of-the-art
image representations for object category retrieval over standard benchmark
datasets containing 1M+ images; (ii) we show that ConvNets can be used to
obtain features which are incredibly performant, and yet much lower dimensional
than previous state-of-the-art image representations, and that their
dimensionality can be reduced further without loss in performance by
compression using product quantization or binarization. Consequently, features
with the state-of-the-art performance on large-scale datasets of millions of
images can fit in the memory of even a commodity GPU card; (iii) we show that
an SVM classifier can be learnt within a ConvNet framework on a GPU in parallel
with downloading the new training images, allowing for a continuous refinement
of the model as more images become available, and simultaneous training and
ranking. The outcome is an on-the-fly system that significantly outperforms its
predecessors in terms of: precision of retrieval, memory requirements, and
speed, facilitating accurate on-the-fly learning and ranking in under a second
on a single GPU.
|
1407.7061 | Ciaran McCreesh | Ciaran McCreesh and Patrick Prosser | A Parallel Branch and Bound Algorithm for the Maximum Labelled Clique
Problem | Author-final version. Accepted to Optimization Letters | null | null | null | cs.DS cs.DC cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The maximum labelled clique problem is a variant of the maximum clique
problem where edges in the graph are given labels, and we are not allowed to
use more than a certain number of distinct labels in a solution. We introduce a
new branch-and-bound algorithm for the problem, and explain how it may be
parallelised. We evaluate an implementation on a set of benchmark instances,
and show that it is consistently faster than previously published results,
sometimes by four or five orders of magnitude.
| [
{
"version": "v1",
"created": "Fri, 25 Jul 2014 21:11:13 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 14:46:09 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"McCreesh",
"Ciaran",
""
],
[
"Prosser",
"Patrick",
""
]
] | TITLE: A Parallel Branch and Bound Algorithm for the Maximum Labelled Clique
Problem
ABSTRACT: The maximum labelled clique problem is a variant of the maximum clique
problem where edges in the graph are given labels, and we are not allowed to
use more than a certain number of distinct labels in a solution. We introduce a
new branch-and-bound algorithm for the problem, and explain how it may be
parallelised. We evaluate an implementation on a set of benchmark instances,
and show that it is consistently faster than previously published results,
sometimes by four or five orders of magnitude.
|
1409.3660 | Fei-Yun Zhu | Feiyun Zhu, Bin Fan, Xinliang Zhu, Ying Wang, Shiming Xiang and
Chunhong Pan | 10,000+ Times Accelerated Robust Subset Selection (ARSS) | null | null | null | null | cs.LG cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Subset selection from massive data with noised information is increasingly
popular for various applications. This problem is still highly challenging as
current methods are generally slow in speed and sensitive to outliers. To
address the above two issues, we propose an accelerated robust subset selection
(ARSS) method. Specifically in the subset selection area, this is the first
attempt to employ the $\ell_{p}(0<p\leq1)$-norm based measure for the
representation loss, preventing large errors from dominating our objective. As
a result, the robustness against outlier elements is greatly enhanced.
Actually, data size is generally much larger than feature length, i.e. $N\gg
L$. Based on this observation, we propose a speedup solver (via ALM and
equivalent derivations) to highly reduce the computational cost, theoretically
from $O(N^{4})$ to $O(N{}^{2}L)$. Extensive experiments on ten benchmark
datasets verify that our method not only outperforms state of the art methods,
but also runs 10,000+ times faster than the most related method.
| [
{
"version": "v1",
"created": "Fri, 12 Sep 2014 07:18:17 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Sep 2014 02:49:19 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Oct 2014 07:58:57 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Nov 2014 14:39:31 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Zhu",
"Feiyun",
""
],
[
"Fan",
"Bin",
""
],
[
"Zhu",
"Xinliang",
""
],
[
"Wang",
"Ying",
""
],
[
"Xiang",
"Shiming",
""
],
[
"Pan",
"Chunhong",
""
]
] | TITLE: 10,000+ Times Accelerated Robust Subset Selection (ARSS)
ABSTRACT: Subset selection from massive data with noised information is increasingly
popular for various applications. This problem is still highly challenging as
current methods are generally slow in speed and sensitive to outliers. To
address the above two issues, we propose an accelerated robust subset selection
(ARSS) method. Specifically in the subset selection area, this is the first
attempt to employ the $\ell_{p}(0<p\leq1)$-norm based measure for the
representation loss, preventing large errors from dominating our objective. As
a result, the robustness against outlier elements is greatly enhanced.
Actually, data size is generally much larger than feature length, i.e. $N\gg
L$. Based on this observation, we propose a speedup solver (via ALM and
equivalent derivations) to highly reduce the computational cost, theoretically
from $O(N^{4})$ to $O(N{}^{2}L)$. Extensive experiments on ten benchmark
datasets verify that our method not only outperforms state of the art methods,
but also runs 10,000+ times faster than the most related method.
|
1411.3519 | Mohamed Hussein | Marwan Torki, Mohamed E. Hussein, Ahmed Elsallamy, Mahmoud Fayyaz,
Shehab Yaser | Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A
Comparative Study on a Novel Dataset | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a comparative study for window-based descriptors on the
application of Arabic handwritten alphabet recognition. We show a detailed
experimental evaluation of different descriptors with several classifiers. The
objective of the paper is to evaluate different window-based descriptors on the
problem of Arabic letter recognition. Our experiments clearly show that they
perform very well. Moreover, we introduce a novel spatial pyramid partitioning
scheme that enhances the recognition accuracy for most descriptors. In
addition, we introduce a novel dataset for Arabic handwritten isolated alphabet
letters, which can serve as a benchmark for future research.
| [
{
"version": "v1",
"created": "Thu, 13 Nov 2014 12:22:57 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 17:55:32 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Torki",
"Marwan",
""
],
[
"Hussein",
"Mohamed E.",
""
],
[
"Elsallamy",
"Ahmed",
""
],
[
"Fayyaz",
"Mahmoud",
""
],
[
"Yaser",
"Shehab",
""
]
] | TITLE: Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A
Comparative Study on a Novel Dataset
ABSTRACT: This paper presents a comparative study for window-based descriptors on the
application of Arabic handwritten alphabet recognition. We show a detailed
experimental evaluation of different descriptors with several classifiers. The
objective of the paper is to evaluate different window-based descriptors on the
problem of Arabic letter recognition. Our experiments clearly show that they
perform very well. Moreover, we introduce a novel spatial pyramid partitioning
scheme that enhances the recognition accuracy for most descriptors. In
addition, we introduce a novel dataset for Arabic handwritten isolated alphabet
letters, which can serve as a benchmark for future research.
|
1411.4068 | Anh Pham The | Anh T. Pham, Raviv Raich, and Xiaoli Z. Fern | Dynamic Programming for Instance Annotation in Multi-instance
Multi-label Learning | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Labeling data for classification requires significant human effort. To reduce
labeling cost, instead of labeling every instance, a group of instances (bag)
is labeled by a single bag label. Computer algorithms are then used to infer
the label for each instance in a bag, a process referred to as instance
annotation. This task is challenging due to the ambiguity regarding the
instance labels. We propose a discriminative probabilistic model for the
instance annotation problem and introduce an expectation maximization framework
for inference, based on the maximum likelihood approach. For many probabilistic
approaches, brute-force computation of the instance label posterior probability
given its bag label is exponential in the number of instances in the bag. Our
key contribution is a dynamic programming method for computing the posterior
that is linear in the number of instances. We evaluate our methods using both
benchmark and real world data sets, in the domain of bird song, image
annotation, and activity recognition. In many cases, the proposed framework
outperforms, sometimes significantly, the current state-of-the-art MIML
learning methods, both in instance label prediction and bag label prediction.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2014 21:59:38 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Pham",
"Anh T.",
""
],
[
"Raich",
"Raviv",
""
],
[
"Fern",
"Xiaoli Z.",
""
]
] | TITLE: Dynamic Programming for Instance Annotation in Multi-instance
Multi-label Learning
ABSTRACT: Labeling data for classification requires significant human effort. To reduce
labeling cost, instead of labeling every instance, a group of instances (bag)
is labeled by a single bag label. Computer algorithms are then used to infer
the label for each instance in a bag, a process referred to as instance
annotation. This task is challenging due to the ambiguity regarding the
instance labels. We propose a discriminative probabilistic model for the
instance annotation problem and introduce an expectation maximization framework
for inference, based on the maximum likelihood approach. For many probabilistic
approaches, brute-force computation of the instance label posterior probability
given its bag label is exponential in the number of instances in the bag. Our
key contribution is a dynamic programming method for computing the posterior
that is linear in the number of instances. We evaluate our methods using both
benchmark and real world data sets, in the domain of bird song, image
annotation, and activity recognition. In many cases, the proposed framework
outperforms, sometimes significantly, the current state-of-the-art MIML
learning methods, both in instance label prediction and bag label prediction.
|
1411.4080 | Miriam Redi | Miriam Redi, Neil O Hare, Rossano Schifanella, Michele Trevisiol,
Alejandro Jaimes | 6 Seconds of Sound and Vision: Creativity in Micro-Videos | 8 pages, 1 figures, conference IEEE CVPR 2014 | null | 10.1109/CVPR.2014.544 | null | cs.MM cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The notion of creativity, as opposed to related concepts such as beauty or
interestingness, has not been studied from the perspective of automatic
analysis of multimedia content. Meanwhile, short online videos shared on social
media platforms, or micro-videos, have arisen as a new medium for creative
expression. In this paper we study creative micro-videos in an effort to
understand the features that make a video creative, and to address the problem
of automatic detection of creative content. Defining creative videos as those
that are novel and have aesthetic value, we conduct a crowdsourcing experiment
to create a dataset of over 3,800 micro-videos labelled as creative and
non-creative. We propose a set of computational features that we map to the
components of our definition of creativity, and conduct an analysis to
determine which of these features correlate most with creative video. Finally,
we evaluate a supervised approach to automatically detect creative video, with
promising results, showing that it is necessary to model both aesthetic value
and novelty to achieve optimal classification accuracy.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2014 23:29:18 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Redi",
"Miriam",
""
],
[
"Hare",
"Neil O",
""
],
[
"Schifanella",
"Rossano",
""
],
[
"Trevisiol",
"Michele",
""
],
[
"Jaimes",
"Alejandro",
""
]
] | TITLE: 6 Seconds of Sound and Vision: Creativity in Micro-Videos
ABSTRACT: The notion of creativity, as opposed to related concepts such as beauty or
interestingness, has not been studied from the perspective of automatic
analysis of multimedia content. Meanwhile, short online videos shared on social
media platforms, or micro-videos, have arisen as a new medium for creative
expression. In this paper we study creative micro-videos in an effort to
understand the features that make a video creative, and to address the problem
of automatic detection of creative content. Defining creative videos as those
that are novel and have aesthetic value, we conduct a crowdsourcing experiment
to create a dataset of over 3,800 micro-videos labelled as creative and
non-creative. We propose a set of computational features that we map to the
components of our definition of creativity, and conduct an analysis to
determine which of these features correlate most with creative video. Finally,
we evaluate a supervised approach to automatically detect creative video, with
promising results, showing that it is necessary to model both aesthetic value
and novelty to achieve optimal classification accuracy.
|
1411.4086 | Hongwei Li | Hongwei Li and Bin Yu | Error Rate Bounds and Iterative Weighted Majority Voting for
Crowdsourcing | Journal Submission | null | null | null | stat.ML cs.HC cs.LG math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourcing has become an effective and popular tool for human-powered
computation to label large datasets. Since the workers can be unreliable, it is
common in crowdsourcing to assign multiple workers to one task, and to
aggregate the labels in order to obtain results of high quality. In this paper,
we provide finite-sample exponential bounds on the error rate (in probability
and in expectation) of general aggregation rules under the Dawid-Skene
crowdsourcing model. The bounds are derived for multi-class labeling, and can
be used to analyze many aggregation methods, including majority voting,
weighted majority voting and the oracle Maximum A Posteriori (MAP) rule. We
show that the oracle MAP rule approximately optimizes our upper bound on the
mean error rate of weighted majority voting in certain setting. We propose an
iterative weighted majority voting (IWMV) method that optimizes the error rate
bound and approximates the oracle MAP rule. Its one step version has a provable
theoretical guarantee on the error rate. The IWMV method is intuitive and
computationally simple. Experimental results on simulated and real data show
that IWMV performs at least on par with the state-of-the-art methods, and it
has a much lower computational cost (around one hundred times faster) than the
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Sat, 15 Nov 2014 00:02:34 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Li",
"Hongwei",
""
],
[
"Yu",
"Bin",
""
]
] | TITLE: Error Rate Bounds and Iterative Weighted Majority Voting for
Crowdsourcing
ABSTRACT: Crowdsourcing has become an effective and popular tool for human-powered
computation to label large datasets. Since the workers can be unreliable, it is
common in crowdsourcing to assign multiple workers to one task, and to
aggregate the labels in order to obtain results of high quality. In this paper,
we provide finite-sample exponential bounds on the error rate (in probability
and in expectation) of general aggregation rules under the Dawid-Skene
crowdsourcing model. The bounds are derived for multi-class labeling, and can
be used to analyze many aggregation methods, including majority voting,
weighted majority voting and the oracle Maximum A Posteriori (MAP) rule. We
show that the oracle MAP rule approximately optimizes our upper bound on the
mean error rate of weighted majority voting in certain setting. We propose an
iterative weighted majority voting (IWMV) method that optimizes the error rate
bound and approximates the oracle MAP rule. Its one step version has a provable
theoretical guarantee on the error rate. The IWMV method is intuitive and
computationally simple. Experimental results on simulated and real data show
that IWMV performs at least on par with the state-of-the-art methods, and it
has a much lower computational cost (around one hundred times faster) than the
state-of-the-art methods.
|
1411.4101 | Rahul Mohan Mr. | Rahul Mohan | Deep Deconvolutional Networks for Scene Parsing | null | null | null | null | stat.ML cs.CV cs.LG | http://creativecommons.org/licenses/by/3.0/ | Scene parsing is an important and challenging prob- lem in computer vision.
It requires labeling each pixel in an image with the category it belongs to.
Tradition- ally, it has been approached with hand-engineered features from
color information in images. Recently convolutional neural networks (CNNs),
which automatically learn hierar- chies of features, have achieved record
performance on the task. These approaches typically include a post-processing
technique, such as superpixels, to produce the final label- ing. In this paper,
we propose a novel network architecture that combines deep deconvolutional
neural networks with CNNs. Our experiments show that deconvolutional neu- ral
networks are capable of learning higher order image structure beyond edge
primitives in comparison to CNNs. The new network architecture is employed for
multi-patch training, introduced as part of this work. Multi-patch train- ing
makes it possible to effectively learn spatial priors from scenes. The proposed
approach yields state-of-the-art per- formance on four scene parsing datasets,
namely Stanford Background, SIFT Flow, CamVid, and KITTI. In addition, our
system has the added advantage of having a training system that can be
completely automated end-to-end with- out requiring any post-processing.
| [
{
"version": "v1",
"created": "Sat, 15 Nov 2014 02:03:14 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Mohan",
"Rahul",
""
]
] | TITLE: Deep Deconvolutional Networks for Scene Parsing
ABSTRACT: Scene parsing is an important and challenging prob- lem in computer vision.
It requires labeling each pixel in an image with the category it belongs to.
Tradition- ally, it has been approached with hand-engineered features from
color information in images. Recently convolutional neural networks (CNNs),
which automatically learn hierar- chies of features, have achieved record
performance on the task. These approaches typically include a post-processing
technique, such as superpixels, to produce the final label- ing. In this paper,
we propose a novel network architecture that combines deep deconvolutional
neural networks with CNNs. Our experiments show that deconvolutional neu- ral
networks are capable of learning higher order image structure beyond edge
primitives in comparison to CNNs. The new network architecture is employed for
multi-patch training, introduced as part of this work. Multi-patch train- ing
makes it possible to effectively learn spatial priors from scenes. The proposed
approach yields state-of-the-art per- formance on four scene parsing datasets,
namely Stanford Background, SIFT Flow, CamVid, and KITTI. In addition, our
system has the added advantage of having a training system that can be
completely automated end-to-end with- out requiring any post-processing.
|
1411.4148 | Maumita Bhattacharya | Maumita Bhattacharya | Diversity Handling In Evolutionary Landscape | In the "Proceedings of the International Workshop on Combinations of
Intelligent Methods and Applications (CIMA 2014)", pp. 1-8, November'2014 | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The search ability of an Evolutionary Algorithm (EA) depends on the variation
among the individuals in the population. Maintaining an optimal level of
diversity in the EA population is imperative to ensure that progress of the EA
search is unhindered by premature convergence to suboptimal solutions. Clearer
understanding of the concept of population diversity, in the context of
evolutionary search and premature convergence in particular, is the key to
designing efficient EAs. To this end, this paper first presents a comprehensive
analysis of the EA population diversity issues. Next we present an
investigation on a counter-niching EA technique that introduces and maintains
constructive diversity in the population. The proposed approach uses informed
genetic operations to reach promising, but un-explored or under-explored areas
of the search space, while discouraging premature local convergence. Simulation
runs on a number of standard benchmark test functions with Genetic Algorithm
(GA) implementation shows promising results.
| [
{
"version": "v1",
"created": "Sat, 15 Nov 2014 14:19:22 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Bhattacharya",
"Maumita",
""
]
] | TITLE: Diversity Handling In Evolutionary Landscape
ABSTRACT: The search ability of an Evolutionary Algorithm (EA) depends on the variation
among the individuals in the population. Maintaining an optimal level of
diversity in the EA population is imperative to ensure that progress of the EA
search is unhindered by premature convergence to suboptimal solutions. Clearer
understanding of the concept of population diversity, in the context of
evolutionary search and premature convergence in particular, is the key to
designing efficient EAs. To this end, this paper first presents a comprehensive
analysis of the EA population diversity issues. Next we present an
investigation on a counter-niching EA technique that introduces and maintains
constructive diversity in the population. The proposed approach uses informed
genetic operations to reach promising, but un-explored or under-explored areas
of the search space, while discouraging premature local convergence. Simulation
runs on a number of standard benchmark test functions with Genetic Algorithm
(GA) implementation shows promising results.
|
1411.4199 | Ke Jiang | Ke Jiang, Qichao Que, Brian Kulis | Revisiting Kernelized Locality-Sensitive Hashing for Improved
Large-Scale Image Retrieval | 15 pages | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a simple but powerful reinterpretation of kernelized
locality-sensitive hashing (KLSH), a general and popular method developed in
the vision community for performing approximate nearest-neighbor searches in an
arbitrary reproducing kernel Hilbert space (RKHS). Our new perspective is based
on viewing the steps of the KLSH algorithm in an appropriately projected space,
and has several key theoretical and practical benefits. First, it eliminates
the problematic conceptual difficulties that are present in the existing
motivation of KLSH. Second, it yields the first formal retrieval performance
bounds for KLSH. Third, our analysis reveals two techniques for boosting the
empirical performance of KLSH. We evaluate these extensions on several
large-scale benchmark image retrieval data sets, and show that our analysis
leads to improved recall performance of at least 12%, and sometimes much
higher, over the standard KLSH method.
| [
{
"version": "v1",
"created": "Sun, 16 Nov 2014 00:08:24 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Jiang",
"Ke",
""
],
[
"Que",
"Qichao",
""
],
[
"Kulis",
"Brian",
""
]
] | TITLE: Revisiting Kernelized Locality-Sensitive Hashing for Improved
Large-Scale Image Retrieval
ABSTRACT: We present a simple but powerful reinterpretation of kernelized
locality-sensitive hashing (KLSH), a general and popular method developed in
the vision community for performing approximate nearest-neighbor searches in an
arbitrary reproducing kernel Hilbert space (RKHS). Our new perspective is based
on viewing the steps of the KLSH algorithm in an appropriately projected space,
and has several key theoretical and practical benefits. First, it eliminates
the problematic conceptual difficulties that are present in the existing
motivation of KLSH. Second, it yields the first formal retrieval performance
bounds for KLSH. Third, our analysis reveals two techniques for boosting the
empirical performance of KLSH. We evaluate these extensions on several
large-scale benchmark image retrieval data sets, and show that our analysis
leads to improved recall performance of at least 12%, and sometimes much
higher, over the standard KLSH method.
|
1411.4246 | Md Lisul Islam | Md. Lisul Islam, Swakkhar Shatabda and M. Sohel Rahman | GreMuTRRR: A Novel Genetic Algorithm to Solve Distance Geometry Problem
for Protein Structures | Accepted for publication in the 8th International Conference on
Electrical and Computer Engineering (ICECE 2014) | null | null | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nuclear Magnetic Resonance (NMR) Spectroscopy is a widely used technique to
predict the native structure of proteins. However, NMR machines are only able
to report approximate and partial distances between pair of atoms. To build the
protein structure one has to solve the Euclidean distance geometry problem
given the incomplete interval distance data produced by NMR machines. In this
paper, we propose a new genetic algorithm for solving the Euclidean distance
geometry problem for protein structure prediction given sparse NMR data. Our
genetic algorithm uses a greedy mutation operator to intensify the search, a
twin removal technique for diversification in the population and a random
restart method to recover stagnation. On a standard set of benchmark dataset,
our algorithm significantly outperforms standard genetic algorithms.
| [
{
"version": "v1",
"created": "Sun, 16 Nov 2014 11:26:06 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Islam",
"Md. Lisul",
""
],
[
"Shatabda",
"Swakkhar",
""
],
[
"Rahman",
"M. Sohel",
""
]
] | TITLE: GreMuTRRR: A Novel Genetic Algorithm to Solve Distance Geometry Problem
for Protein Structures
ABSTRACT: Nuclear Magnetic Resonance (NMR) Spectroscopy is a widely used technique to
predict the native structure of proteins. However, NMR machines are only able
to report approximate and partial distances between pair of atoms. To build the
protein structure one has to solve the Euclidean distance geometry problem
given the incomplete interval distance data produced by NMR machines. In this
paper, we propose a new genetic algorithm for solving the Euclidean distance
geometry problem for protein structure prediction given sparse NMR data. Our
genetic algorithm uses a greedy mutation operator to intensify the search, a
twin removal technique for diversification in the population and a random
restart method to recover stagnation. On a standard set of benchmark dataset,
our algorithm significantly outperforms standard genetic algorithms.
|
1411.4304 | Rodrigo Benenson | Rodrigo Benenson, Mohamed Omran, Jan Hosang, Bernt Schiele | Ten Years of Pedestrian Detection, What Have We Learned? | To appear in ECCV 2014 CVRSUAD workshop proceedings | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Paper-by-paper results make it easy to miss the forest for the trees.We
analyse the remarkable progress of the last decade by discussing the main ideas
explored in the 40+ detectors currently present in the Caltech pedestrian
detection benchmark. We observe that there exist three families of approaches,
all currently reaching similar detection quality. Based on our analysis, we
study the complementarity of the most promising ideas by combining multiple
published strategies. This new decision forest detector achieves the current
best known performance on the challenging Caltech-USA dataset.
| [
{
"version": "v1",
"created": "Sun, 16 Nov 2014 21:25:53 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Benenson",
"Rodrigo",
""
],
[
"Omran",
"Mohamed",
""
],
[
"Hosang",
"Jan",
""
],
[
"Schiele",
"Bernt",
""
]
] | TITLE: Ten Years of Pedestrian Detection, What Have We Learned?
ABSTRACT: Paper-by-paper results make it easy to miss the forest for the trees.We
analyse the remarkable progress of the last decade by discussing the main ideas
explored in the 40+ detectors currently present in the Caltech pedestrian
detection benchmark. We observe that there exist three families of approaches,
all currently reaching similar detection quality. Based on our analysis, we
study the complementarity of the most promising ideas by combining multiple
published strategies. This new decision forest detector achieves the current
best known performance on the challenging Caltech-USA dataset.
|
1411.4314 | Nikolai Sinitsyn | Benjamin H. Sims, Nikolai Sinitsyn, and Stephan J. Eidenbenz | Hierarchical and Matrix Structures in a Large Organizational Email
Network: Visualization and Modeling Approaches | 15 pages, 9 figures | null | null | null | cs.SI physics.soc-ph stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents findings from a study of the email network of a large
scientific research organization, focusing on methods for visualizing and
modeling organizational hierarchies within large, complex network datasets. In
the first part of the paper, we find that visualization and interpretation of
complex organizational network data is facilitated by integration of network
data with information on formal organizational divisions and levels. By
aggregating and visualizing email traffic between organizational units at
various levels, we derive several insights into how large subdivisions of the
organization interact with each other and with outside organizations. Our
analysis shows that line and program management interactions in this
organization systematically deviate from the idealized pattern of interaction
prescribed by "matrix management." In the second part of the paper, we propose
a power law model for predicting degree distribution of organizational email
traffic based on hierarchical relationships between managers and employees.
This model considers the influence of global email announcements sent from
managers to all employees under their supervision, and the role support staff
play in generating email traffic, acting as agents for managers. We also
analyze patterns in email traffic volume over the course of a work week.
| [
{
"version": "v1",
"created": "Sun, 16 Nov 2014 22:22:54 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Sims",
"Benjamin H.",
""
],
[
"Sinitsyn",
"Nikolai",
""
],
[
"Eidenbenz",
"Stephan J.",
""
]
] | TITLE: Hierarchical and Matrix Structures in a Large Organizational Email
Network: Visualization and Modeling Approaches
ABSTRACT: This paper presents findings from a study of the email network of a large
scientific research organization, focusing on methods for visualizing and
modeling organizational hierarchies within large, complex network datasets. In
the first part of the paper, we find that visualization and interpretation of
complex organizational network data is facilitated by integration of network
data with information on formal organizational divisions and levels. By
aggregating and visualizing email traffic between organizational units at
various levels, we derive several insights into how large subdivisions of the
organization interact with each other and with outside organizations. Our
analysis shows that line and program management interactions in this
organization systematically deviate from the idealized pattern of interaction
prescribed by "matrix management." In the second part of the paper, we propose
a power law model for predicting degree distribution of organizational email
traffic based on hierarchical relationships between managers and employees.
This model considers the influence of global email announcements sent from
managers to all employees under their supervision, and the role support staff
play in generating email traffic, acting as agents for managers. We also
analyze patterns in email traffic volume over the course of a work week.
|
1411.4331 | Jie Shen | Weipeng Zhang, Jie Shen, Guangcan Liu, Yong Yu | A Latent Clothing Attribute Approach for Human Pose Estimation | accepted to ACCV 2014, preceding work http://arxiv.org/abs/1404.4923 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a fundamental technique that concerns several vision tasks such as image
parsing, action recognition and clothing retrieval, human pose estimation (HPE)
has been extensively investigated in recent years. To achieve accurate and
reliable estimation of the human pose, it is well-recognized that the clothing
attributes are useful and should be utilized properly. Most previous
approaches, however, require to manually annotate the clothing attributes and
are therefore very costly. In this paper, we shall propose and explore a
\emph{latent} clothing attribute approach for HPE. Unlike previous approaches,
our approach models the clothing attributes as latent variables and thus
requires no explicit labeling for the clothing attributes. The inference of the
latent variables are accomplished by utilizing the framework of latent
structured support vector machines (LSSVM). We employ the strategy of
\emph{alternating direction} to train the LSSVM model: In each iteration, one
kind of variables (e.g., human pose or clothing attribute) are fixed and the
others are optimized. Our extensive experiments on two real-world benchmarks
show the state-of-the-art performance of our proposed approach.
| [
{
"version": "v1",
"created": "Sun, 16 Nov 2014 23:47:59 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Zhang",
"Weipeng",
""
],
[
"Shen",
"Jie",
""
],
[
"Liu",
"Guangcan",
""
],
[
"Yu",
"Yong",
""
]
] | TITLE: A Latent Clothing Attribute Approach for Human Pose Estimation
ABSTRACT: As a fundamental technique that concerns several vision tasks such as image
parsing, action recognition and clothing retrieval, human pose estimation (HPE)
has been extensively investigated in recent years. To achieve accurate and
reliable estimation of the human pose, it is well-recognized that the clothing
attributes are useful and should be utilized properly. Most previous
approaches, however, require to manually annotate the clothing attributes and
are therefore very costly. In this paper, we shall propose and explore a
\emph{latent} clothing attribute approach for HPE. Unlike previous approaches,
our approach models the clothing attributes as latent variables and thus
requires no explicit labeling for the clothing attributes. The inference of the
latent variables are accomplished by utilizing the framework of latent
structured support vector machines (LSSVM). We employ the strategy of
\emph{alternating direction} to train the LSSVM model: In each iteration, one
kind of variables (e.g., human pose or clothing attribute) are fixed and the
others are optimized. Our extensive experiments on two real-world benchmarks
show the state-of-the-art performance of our proposed approach.
|
1411.4379 | Md Lisul Islam | Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda and M Sohel Rahman | FGPGA: An Efficient Genetic Approach for Producing Feasible Graph
Partitions | Accepted in the 1st International Conference on Networking Systems
and Security 2015 (NSysS 2015) | null | null | null | cs.NE cs.AI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph partitioning, a well studied problem of parallel computing has many
applications in diversified fields such as distributed computing, social
network analysis, data mining and many other domains. In this paper, we
introduce FGPGA, an efficient genetic approach for producing feasible graph
partitions. Our method takes into account the heterogeneity and capacity
constraints of the partitions to ensure balanced partitioning. Such approach
has various applications in mobile cloud computing that include feasible
deployment of software applications on the more resourceful infrastructure in
the cloud instead of mobile hand set. Our proposed approach is light weight and
hence suitable for use in cloud architecture. We ensure feasibility of the
partitions generated by not allowing over-sized partitions to be generated
during the initialization and search. Our proposed method tested on standard
benchmark datasets significantly outperforms the state-of-the-art methods in
terms of quality of partitions and feasibility of the solutions.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 06:51:50 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Islam",
"Md. Lisul",
""
],
[
"Nurain",
"Novia",
""
],
[
"Shatabda",
"Swakkhar",
""
],
[
"Rahman",
"M Sohel",
""
]
] | TITLE: FGPGA: An Efficient Genetic Approach for Producing Feasible Graph
Partitions
ABSTRACT: Graph partitioning, a well studied problem of parallel computing has many
applications in diversified fields such as distributed computing, social
network analysis, data mining and many other domains. In this paper, we
introduce FGPGA, an efficient genetic approach for producing feasible graph
partitions. Our method takes into account the heterogeneity and capacity
constraints of the partitions to ensure balanced partitioning. Such approach
has various applications in mobile cloud computing that include feasible
deployment of software applications on the more resourceful infrastructure in
the cloud instead of mobile hand set. Our proposed approach is light weight and
hence suitable for use in cloud architecture. We ensure feasibility of the
partitions generated by not allowing over-sized partitions to be generated
during the initialization and search. Our proposed method tested on standard
benchmark datasets significantly outperforms the state-of-the-art methods in
terms of quality of partitions and feasibility of the solutions.
|
1411.4455 | Miao Fan | Miao Fan, Deli Zhao, Qiang Zhou, Zhiyuan Liu, Thomas Fang Zheng,
Edward Y. Chang | Errata: Distant Supervision for Relation Extraction with Matrix
Completion | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The essence of distantly supervised relation extraction is that it is an
incomplete multi-label classification problem with sparse and noisy features.
To tackle the sparsity and noise challenges, we propose solving the
classification problem using matrix completion on factorized matrix of
minimized rank. We formulate relation classification as completing the unknown
labels of testing items (entity pairs) in a sparse matrix that concatenates
training and testing textual features with training labels. Our algorithmic
framework is based on the assumption that the rank of item-by-feature and
item-by-label joint matrix is low. We apply two optimization models to recover
the underlying low-rank matrix leveraging the sparsity of feature-label matrix.
The matrix completion problem is then solved by the fixed point continuation
(FPC) algorithm, which can find the global optimum. Experiments on two widely
used datasets with different dimensions of textual features demonstrate that
our low-rank matrix completion approach significantly outperforms the baseline
and the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 12:43:30 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Fan",
"Miao",
""
],
[
"Zhao",
"Deli",
""
],
[
"Zhou",
"Qiang",
""
],
[
"Liu",
"Zhiyuan",
""
],
[
"Zheng",
"Thomas Fang",
""
],
[
"Chang",
"Edward Y.",
""
]
] | TITLE: Errata: Distant Supervision for Relation Extraction with Matrix
Completion
ABSTRACT: The essence of distantly supervised relation extraction is that it is an
incomplete multi-label classification problem with sparse and noisy features.
To tackle the sparsity and noise challenges, we propose solving the
classification problem using matrix completion on factorized matrix of
minimized rank. We formulate relation classification as completing the unknown
labels of testing items (entity pairs) in a sparse matrix that concatenates
training and testing textual features with training labels. Our algorithmic
framework is based on the assumption that the rank of item-by-feature and
item-by-label joint matrix is low. We apply two optimization models to recover
the underlying low-rank matrix leveraging the sparsity of feature-label matrix.
The matrix completion problem is then solved by the fixed point continuation
(FPC) algorithm, which can find the global optimum. Experiments on two widely
used datasets with different dimensions of textual features demonstrate that
our low-rank matrix completion approach significantly outperforms the baseline
and the state-of-the-art methods.
|
1411.4464 | Kai Kang | Kai Kang, Xiaogang Wang | Fully Convolutional Neural Networks for Crowd Segmentation | 9 pages,7 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we propose a fast fully convolutional neural network (FCNN)
for crowd segmentation. By replacing the fully connected layers in CNN with 1
by 1 convolution kernels, FCNN takes whole images as inputs and directly
outputs segmentation maps by one pass of forward propagation. It has the
property of translation invariance like patch-by-patch scanning but with much
lower computation cost. Once FCNN is learned, it can process input images of
any sizes without warping them to a standard size. These attractive properties
make it extendable to other general image segmentation problems. Based on FCNN,
a multi-stage deep learning is proposed to integrate appearance and motion cues
for crowd segmentation. Both appearance filters and motion filers are
pretrained stage-by-stage and then jointly optimized. Different combination
methods are investigated. The effectiveness of our approach and component-wise
analysis are evaluated on two crowd segmentation datasets created by us, which
include image frames from 235 and 11 scenes, respectively. They are currently
the largest crowd segmentation datasets and will be released to the public.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 13:09:09 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Kang",
"Kai",
""
],
[
"Wang",
"Xiaogang",
""
]
] | TITLE: Fully Convolutional Neural Networks for Crowd Segmentation
ABSTRACT: In this paper, we propose a fast fully convolutional neural network (FCNN)
for crowd segmentation. By replacing the fully connected layers in CNN with 1
by 1 convolution kernels, FCNN takes whole images as inputs and directly
outputs segmentation maps by one pass of forward propagation. It has the
property of translation invariance like patch-by-patch scanning but with much
lower computation cost. Once FCNN is learned, it can process input images of
any sizes without warping them to a standard size. These attractive properties
make it extendable to other general image segmentation problems. Based on FCNN,
a multi-stage deep learning is proposed to integrate appearance and motion cues
for crowd segmentation. Both appearance filters and motion filers are
pretrained stage-by-stage and then jointly optimized. Different combination
methods are investigated. The effectiveness of our approach and component-wise
analysis are evaluated on two crowd segmentation datasets created by us, which
include image frames from 235 and 11 scenes, respectively. They are currently
the largest crowd segmentation datasets and will be released to the public.
|
1411.4472 | Andrej Gajduk | Andrej Gajduk and Ljupco Kocarev | Opinion mining of text documents written in Macedonian language | In press, MASA proceedings | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to extract public opinion from web portals such as review sites,
social networks and blogs will enable companies and individuals to form a view,
an attitude and make decisions without having to do lengthy and costly
researches and surveys. In this paper machine learning techniques are used for
determining the polarity of forum posts on kajgana which are written in
Macedonian language. The posts are classified as being positive, negative or
neutral. We test different feature metrics and classifiers and provide detailed
evaluation of their participation in improving the overall performance on a
manually generated dataset. By achieving 92% accuracy, we show that the
performance of systems for automated opinion mining is comparable to a human
evaluator, thus making it a viable option for text data analysis. Finally, we
present a few statistics derived from the forum posts using the developed
system.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 13:36:49 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Gajduk",
"Andrej",
""
],
[
"Kocarev",
"Ljupco",
""
]
] | TITLE: Opinion mining of text documents written in Macedonian language
ABSTRACT: The ability to extract public opinion from web portals such as review sites,
social networks and blogs will enable companies and individuals to form a view,
an attitude and make decisions without having to do lengthy and costly
researches and surveys. In this paper machine learning techniques are used for
determining the polarity of forum posts on kajgana which are written in
Macedonian language. The posts are classified as being positive, negative or
neutral. We test different feature metrics and classifiers and provide detailed
evaluation of their participation in improving the overall performance on a
manually generated dataset. By achieving 92% accuracy, we show that the
performance of systems for automated opinion mining is comparable to a human
evaluator, thus making it a viable option for text data analysis. Finally, we
present a few statistics derived from the forum posts using the developed
system.
|
1411.4510 | Kian Hsiang Low | Kian Hsiang Low, Jiangbo Yu, Jie Chen, Patrick Jaillet | Parallel Gaussian Process Regression for Big Data: Low-Rank
Representation Meets Markov Approximation | 29th AAAI Conference on Artificial Intelligence (AAAI 2015), Extended
version with proofs, 10 pages | null | null | null | stat.ML cs.DC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The expressive power of a Gaussian process (GP) model comes at a cost of poor
scalability in the data size. To improve its scalability, this paper presents a
low-rank-cum-Markov approximation (LMA) of the GP model that is novel in
leveraging the dual computational advantages stemming from complementing a
low-rank approximate representation of the full-rank GP based on a support set
of inputs with a Markov approximation of the resulting residual process; the
latter approximation is guaranteed to be closest in the Kullback-Leibler
distance criterion subject to some constraint and is considerably more refined
than that of existing sparse GP models utilizing low-rank representations due
to its more relaxed conditional independence assumption (especially with larger
data). As a result, our LMA method can trade off between the size of the
support set and the order of the Markov property to (a) incur lower
computational cost than such sparse GP models while achieving predictive
performance comparable to them and (b) accurately represent features/patterns
of any scale. Interestingly, varying the Markov order produces a spectrum of
LMAs with PIC approximation and full-rank GP at the two extremes. An advantage
of our LMA method is that it is amenable to parallelization on multiple
machines/cores, thereby gaining greater scalability. Empirical evaluation on
three real-world datasets in clusters of up to 32 computing nodes shows that
our centralized and parallel LMA methods are significantly more time-efficient
and scalable than state-of-the-art sparse and full-rank GP regression methods
while achieving comparable predictive performances.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2014 15:31:04 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Low",
"Kian Hsiang",
""
],
[
"Yu",
"Jiangbo",
""
],
[
"Chen",
"Jie",
""
],
[
"Jaillet",
"Patrick",
""
]
] | TITLE: Parallel Gaussian Process Regression for Big Data: Low-Rank
Representation Meets Markov Approximation
ABSTRACT: The expressive power of a Gaussian process (GP) model comes at a cost of poor
scalability in the data size. To improve its scalability, this paper presents a
low-rank-cum-Markov approximation (LMA) of the GP model that is novel in
leveraging the dual computational advantages stemming from complementing a
low-rank approximate representation of the full-rank GP based on a support set
of inputs with a Markov approximation of the resulting residual process; the
latter approximation is guaranteed to be closest in the Kullback-Leibler
distance criterion subject to some constraint and is considerably more refined
than that of existing sparse GP models utilizing low-rank representations due
to its more relaxed conditional independence assumption (especially with larger
data). As a result, our LMA method can trade off between the size of the
support set and the order of the Markov property to (a) incur lower
computational cost than such sparse GP models while achieving predictive
performance comparable to them and (b) accurately represent features/patterns
of any scale. Interestingly, varying the Markov order produces a spectrum of
LMAs with PIC approximation and full-rank GP at the two extremes. An advantage
of our LMA method is that it is amenable to parallelization on multiple
machines/cores, thereby gaining greater scalability. Empirical evaluation on
three real-world datasets in clusters of up to 32 computing nodes shows that
our centralized and parallel LMA methods are significantly more time-efficient
and scalable than state-of-the-art sparse and full-rank GP regression methods
while achieving comparable predictive performances.
|
1411.3159 | Marcel Simon | Marcel Simon, Erik Rodner, Joachim Denzler | Part Detector Discovery in Deep Convolutional Neural Networks | Accepted for publication on Asian Conference on Computer Vision
(ACCV) 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current fine-grained classification approaches often rely on a robust
localization of object parts to extract localized feature representations
suitable for discrimination. However, part localization is a challenging task
due to the large variation of appearance and pose. In this paper, we show how
pre-trained convolutional neural networks can be used for robust and efficient
object part discovery and localization without the necessity to actually train
the network on the current dataset. Our approach called "part detector
discovery" (PDD) is based on analyzing the gradient maps of the network outputs
and finding activation centers spatially related to annotated semantic parts or
bounding boxes.
This allows us not just to obtain excellent performance on the CUB200-2011
dataset, but in contrast to previous approaches also to perform detection and
bird classification jointly without requiring a given bounding box annotation
during testing and ground-truth parts during training. The code is available at
http://www.inf-cv.uni-jena.de/part_discovery and
https://github.com/cvjena/PartDetectorDisovery.
| [
{
"version": "v1",
"created": "Wed, 12 Nov 2014 12:42:54 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Nov 2014 11:57:27 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Simon",
"Marcel",
""
],
[
"Rodner",
"Erik",
""
],
[
"Denzler",
"Joachim",
""
]
] | TITLE: Part Detector Discovery in Deep Convolutional Neural Networks
ABSTRACT: Current fine-grained classification approaches often rely on a robust
localization of object parts to extract localized feature representations
suitable for discrimination. However, part localization is a challenging task
due to the large variation of appearance and pose. In this paper, we show how
pre-trained convolutional neural networks can be used for robust and efficient
object part discovery and localization without the necessity to actually train
the network on the current dataset. Our approach called "part detector
discovery" (PDD) is based on analyzing the gradient maps of the network outputs
and finding activation centers spatially related to annotated semantic parts or
bounding boxes.
This allows us not just to obtain excellent performance on the CUB200-2011
dataset, but in contrast to previous approaches also to perform detection and
bird classification jointly without requiring a given bounding box annotation
during testing and ground-truth parts during training. The code is available at
http://www.inf-cv.uni-jena.de/part_discovery and
https://github.com/cvjena/PartDetectorDisovery.
|
1411.3749 | Timothy La Fond | Timothy La Fond, Jennifer Neville, Brian Gallagher | Anomaly Detection in Dynamic Networks of Varying Size | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic networks, also called network streams, are an important data
representation that applies to many real-world domains. Many sets of network
data such as e-mail networks, social networks, or internet traffic networks are
best represented by a dynamic network due to the temporal component of the
data. One important application in the domain of dynamic network analysis is
anomaly detection. Here the task is to identify points in time where the
network exhibits behavior radically different from a typical time, either due
to some event (like the failure of machines in a computer network) or a shift
in the network properties. This problem is made more difficult by the fluid
nature of what is considered "normal" network behavior. The volume of traffic
on a network, for example, can change over the course of a month or even vary
based on the time of the day without being considered unusual. Anomaly
detection tests using traditional network statistics have difficulty in these
scenarios due to their Density Dependence: as the volume of edges changes the
value of the statistics changes as well making it difficult to determine if the
change in signal is due to the traffic volume or due to some fundamental shift
in the behavior of the network. To more accurately detect anomalies in dynamic
networks, we introduce the concept of Density-Consistent network statistics. On
synthetically generated graphs anomaly detectors using these statistics show a
a 20-400% improvement in the recall when distinguishing graphs drawn from
different distributions. When applied to several real datasets
Density-Consistent statistics recover multiple network events which standard
statistics failed to find.
| [
{
"version": "v1",
"created": "Thu, 13 Nov 2014 21:41:55 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"La Fond",
"Timothy",
""
],
[
"Neville",
"Jennifer",
""
],
[
"Gallagher",
"Brian",
""
]
] | TITLE: Anomaly Detection in Dynamic Networks of Varying Size
ABSTRACT: Dynamic networks, also called network streams, are an important data
representation that applies to many real-world domains. Many sets of network
data such as e-mail networks, social networks, or internet traffic networks are
best represented by a dynamic network due to the temporal component of the
data. One important application in the domain of dynamic network analysis is
anomaly detection. Here the task is to identify points in time where the
network exhibits behavior radically different from a typical time, either due
to some event (like the failure of machines in a computer network) or a shift
in the network properties. This problem is made more difficult by the fluid
nature of what is considered "normal" network behavior. The volume of traffic
on a network, for example, can change over the course of a month or even vary
based on the time of the day without being considered unusual. Anomaly
detection tests using traditional network statistics have difficulty in these
scenarios due to their Density Dependence: as the volume of edges changes the
value of the statistics changes as well making it difficult to determine if the
change in signal is due to the traffic volume or due to some fundamental shift
in the behavior of the network. To more accurately detect anomalies in dynamic
networks, we introduce the concept of Density-Consistent network statistics. On
synthetically generated graphs anomaly detectors using these statistics show a
a 20-400% improvement in the recall when distinguishing graphs drawn from
different distributions. When applied to several real datasets
Density-Consistent statistics recover multiple network events which standard
statistics failed to find.
|
1411.3787 | Ping Li | Anshumali Shrivastava, Ping Li | Asymmetric Minwise Hashing | null | null | null | null | stat.ML cs.DB cs.DS cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minwise hashing (Minhash) is a widely popular indexing scheme in practice.
Minhash is designed for estimating set resemblance and is known to be
suboptimal in many applications where the desired measure is set overlap (i.e.,
inner product between binary vectors) or set containment. Minhash has inherent
bias towards smaller sets, which adversely affects its performance in
applications where such a penalization is not desirable. In this paper, we
propose asymmetric minwise hashing (MH-ALSH), to provide a solution to this
problem. The new scheme utilizes asymmetric transformations to cancel the bias
of traditional minhash towards smaller sets, making the final "collision
probability" monotonic in the inner product. Our theoretical comparisons show
that for the task of retrieving with binary inner products asymmetric minhash
is provably better than traditional minhash and other recently proposed hashing
algorithms for general inner products. Thus, we obtain an algorithmic
improvement over existing approaches in the literature. Experimental
evaluations on four publicly available high-dimensional datasets validate our
claims and the proposed scheme outperforms, often significantly, other hashing
algorithms on the task of near neighbor retrieval with set containment. Our
proposal is simple and easy to implement in practice.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2014 04:18:33 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Shrivastava",
"Anshumali",
""
],
[
"Li",
"Ping",
""
]
] | TITLE: Asymmetric Minwise Hashing
ABSTRACT: Minwise hashing (Minhash) is a widely popular indexing scheme in practice.
Minhash is designed for estimating set resemblance and is known to be
suboptimal in many applications where the desired measure is set overlap (i.e.,
inner product between binary vectors) or set containment. Minhash has inherent
bias towards smaller sets, which adversely affects its performance in
applications where such a penalization is not desirable. In this paper, we
propose asymmetric minwise hashing (MH-ALSH), to provide a solution to this
problem. The new scheme utilizes asymmetric transformations to cancel the bias
of traditional minhash towards smaller sets, making the final "collision
probability" monotonic in the inner product. Our theoretical comparisons show
that for the task of retrieving with binary inner products asymmetric minhash
is provably better than traditional minhash and other recently proposed hashing
algorithms for general inner products. Thus, we obtain an algorithmic
improvement over existing approaches in the literature. Experimental
evaluations on four publicly available high-dimensional datasets validate our
claims and the proposed scheme outperforms, often significantly, other hashing
algorithms on the task of near neighbor retrieval with set containment. Our
proposal is simple and easy to implement in practice.
|
1411.3806 | Sandhya Bansal | Sandhya Bansal, V. Katiyar | Integrating Fuzzy and Ant Colony System for Fuzzy Vehicle Routing
Problem with Time Windows | null | null | null | null | cs.AI cs.CE cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper fuzzy VRPTW with an uncertain travel time is considered.
Credibility theory is used to model the problem and specifies a preference
index at which it is desired that the travel times to reach the customers fall
into their time windows. We propose the integration of fuzzy and ant colony
system based evolutionary algorithm to solve the problem while preserving the
constraints. Computational results for certain benchmark problems having short
and long time horizons are presented to show the effectiveness of the
algorithm. Comparison between different preferences indexes have been obtained
to help the user in making suitable decisions.
| [
{
"version": "v1",
"created": "Fri, 14 Nov 2014 06:11:48 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Bansal",
"Sandhya",
""
],
[
"Katiyar",
"V.",
""
]
] | TITLE: Integrating Fuzzy and Ant Colony System for Fuzzy Vehicle Routing
Problem with Time Windows
ABSTRACT: In this paper fuzzy VRPTW with an uncertain travel time is considered.
Credibility theory is used to model the problem and specifies a preference
index at which it is desired that the travel times to reach the customers fall
into their time windows. We propose the integration of fuzzy and ant colony
system based evolutionary algorithm to solve the problem while preserving the
constraints. Computational results for certain benchmark problems having short
and long time horizons are presented to show the effectiveness of the
algorithm. Comparison between different preferences indexes have been obtained
to help the user in making suitable decisions.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.