id
large_string
submitter
large_string
authors
large_string
title
large_string
comments
large_string
journal-ref
large_string
doi
large_string
report-no
large_string
categories
large_string
license
large_string
abstract
large_string
versions
large list
update_date
timestamp[ms]
authors_parsed
large list
prompt
large_string
1412.1127
Ahmad Lashgar
Ahmad Lashgar and Alireza Majidi and Amirali Baniasadi
IPMACC: Open Source OpenACC to CUDA/OpenCL Translator
14 pages, 2 figures
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce IPMACC, a framework for translating OpenACC applications to CUDA or OpenCL. IPMACC is composed of set of translators translating OpenACC for C applications to CUDA or OpenCL. The framework uses the system compiler (e.g. nvcc) for generating final accelerator's binary. The framework can be used for extending the OpenACC API, executing OpenACC applications, or obtaining CUDA or OpenCL code which is equivalent to OpenACC code. We verify correctness of our framework under several benchmarks included from Rodinia Benchmark Suit and CUDA SDK. We also compare the performance of CUDA version of the benchmarks to OpenACC version which is compiled by our framework. By comparing CUDA and OpenACC versions, we discuss the limitations of OpenACC in achieving a performance near to highly-optimized CUDA version.
[ { "version": "v1", "created": "Tue, 2 Dec 2014 22:49:14 GMT" } ]
2014-12-04T00:00:00
[ [ "Lashgar", "Ahmad", "" ], [ "Majidi", "Alireza", "" ], [ "Baniasadi", "Amirali", "" ] ]
TITLE: IPMACC: Open Source OpenACC to CUDA/OpenCL Translator ABSTRACT: In this paper we introduce IPMACC, a framework for translating OpenACC applications to CUDA or OpenCL. IPMACC is composed of set of translators translating OpenACC for C applications to CUDA or OpenCL. The framework uses the system compiler (e.g. nvcc) for generating final accelerator's binary. The framework can be used for extending the OpenACC API, executing OpenACC applications, or obtaining CUDA or OpenCL code which is equivalent to OpenACC code. We verify correctness of our framework under several benchmarks included from Rodinia Benchmark Suit and CUDA SDK. We also compare the performance of CUDA version of the benchmarks to OpenACC version which is compiled by our framework. By comparing CUDA and OpenACC versions, we discuss the limitations of OpenACC in achieving a performance near to highly-optimized CUDA version.
1412.1138
Ben Fulcher
B. D. Fulcher, A. E. Georgieva, C. W. G. Redman, Nick S. Jones
Highly comparative fetal heart rate analysis
7 pages, 4 figures
Fulcher, B. D., Georgieva, A., Redman, C. W., & Jones, N. S. (2012). Highly comparative fetal heart rate analysis (pp. 3135-3138). Presented at the 34th Annual International Conference of the IEEE EMBS, San Diego, CA, USA
10.1109/EMBC.2012.6346629
null
cs.LG cs.AI q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A database of fetal heart rate (FHR) time series measured from 7221 patients during labor is analyzed with the aim of learning the types of features of these recordings that are informative of low cord pH. Our 'highly comparative' analysis involves extracting over 9000 time-series analysis features from each FHR time series, including measures of autocorrelation, entropy, distribution, and various model fits. This diverse collection of features was developed in previous work, and is publicly available. We describe five features that most accurately classify a balanced training set of 59 'low pH' and 59 'normal pH' FHR recordings. We then describe five of the features with the strongest linear correlation to cord pH across the full dataset of FHR time series. The features identified in this work may be used as part of a system for guiding intervention during labor in future. This work successfully demonstrates the utility of comparing across a large, interdisciplinary literature on time-series analysis to automatically contribute new scientific results for specific biomedical signal processing challenges.
[ { "version": "v1", "created": "Wed, 3 Dec 2014 00:00:42 GMT" } ]
2014-12-04T00:00:00
[ [ "Fulcher", "B. D.", "" ], [ "Georgieva", "A. E.", "" ], [ "Redman", "C. W. G.", "" ], [ "Jones", "Nick S.", "" ] ]
TITLE: Highly comparative fetal heart rate analysis ABSTRACT: A database of fetal heart rate (FHR) time series measured from 7221 patients during labor is analyzed with the aim of learning the types of features of these recordings that are informative of low cord pH. Our 'highly comparative' analysis involves extracting over 9000 time-series analysis features from each FHR time series, including measures of autocorrelation, entropy, distribution, and various model fits. This diverse collection of features was developed in previous work, and is publicly available. We describe five features that most accurately classify a balanced training set of 59 'low pH' and 59 'normal pH' FHR recordings. We then describe five of the features with the strongest linear correlation to cord pH across the full dataset of FHR time series. The features identified in this work may be used as part of a system for guiding intervention during labor in future. This work successfully demonstrates the utility of comparing across a large, interdisciplinary literature on time-series analysis to automatically contribute new scientific results for specific biomedical signal processing challenges.
1412.1194
Feng Shi
Feng Shi, Robert Laganiere, Emil Petriu
Gradient Boundary Histograms for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a high efficient local spatiotemporal descriptor, called gradient boundary histograms (GBH). The proposed GBH descriptor is built on simple spatio-temporal gradients, which are fast to compute. We demonstrate that it can better represent local structure and motion than other gradient-based descriptors, and significantly outperforms them on large realistic datasets. A comprehensive evaluation shows that the recognition accuracy is preserved while the spatial resolution is greatly reduced, which yields both high efficiency and low memory usage.
[ { "version": "v1", "created": "Wed, 3 Dec 2014 05:23:03 GMT" } ]
2014-12-04T00:00:00
[ [ "Shi", "Feng", "" ], [ "Laganiere", "Robert", "" ], [ "Petriu", "Emil", "" ] ]
TITLE: Gradient Boundary Histograms for Action Recognition ABSTRACT: This paper introduces a high efficient local spatiotemporal descriptor, called gradient boundary histograms (GBH). The proposed GBH descriptor is built on simple spatio-temporal gradients, which are fast to compute. We demonstrate that it can better represent local structure and motion than other gradient-based descriptors, and significantly outperforms them on large realistic datasets. A comprehensive evaluation shows that the recognition accuracy is preserved while the spatial resolution is greatly reduced, which yields both high efficiency and low memory usage.
1412.1265
Yi Sun
Yi Sun, Xiaogang Wang, Xiaoou Tang
Deeply learned face representations are sparse, selective, and robust
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper designs a high-performance deep convolutional network (DeepID2+) for face recognition. It is learned with the identification-verification supervisory signal. By increasing the dimension of hidden representations and adding supervision to early convolutional layers, DeepID2+ achieves new state-of-the-art on LFW and YouTube Faces benchmarks. Through empirical studies, we have discovered three properties of its deep neural activations critical for the high performance: sparsity, selectiveness and robustness. (1) It is observed that neural activations are moderately sparse. Moderate sparsity maximizes the discriminative power of the deep net as well as the distance between images. It is surprising that DeepID2+ still can achieve high recognition accuracy even after the neural responses are binarized. (2) Its neurons in higher layers are highly selective to identities and identity-related attributes. We can identify different subsets of neurons which are either constantly excited or inhibited when different identities or attributes are present. Although DeepID2+ is not taught to distinguish attributes during training, it has implicitly learned such high-level concepts. (3) It is much more robust to occlusions, although occlusion patterns are not included in the training set.
[ { "version": "v1", "created": "Wed, 3 Dec 2014 10:37:13 GMT" } ]
2014-12-04T00:00:00
[ [ "Sun", "Yi", "" ], [ "Wang", "Xiaogang", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Deeply learned face representations are sparse, selective, and robust ABSTRACT: This paper designs a high-performance deep convolutional network (DeepID2+) for face recognition. It is learned with the identification-verification supervisory signal. By increasing the dimension of hidden representations and adding supervision to early convolutional layers, DeepID2+ achieves new state-of-the-art on LFW and YouTube Faces benchmarks. Through empirical studies, we have discovered three properties of its deep neural activations critical for the high performance: sparsity, selectiveness and robustness. (1) It is observed that neural activations are moderately sparse. Moderate sparsity maximizes the discriminative power of the deep net as well as the distance between images. It is surprising that DeepID2+ still can achieve high recognition accuracy even after the neural responses are binarized. (2) Its neurons in higher layers are highly selective to identities and identity-related attributes. We can identify different subsets of neurons which are either constantly excited or inhibited when different identities or attributes are present. Although DeepID2+ is not taught to distinguish attributes during training, it has implicitly learned such high-level concepts. (3) It is much more robust to occlusions, although occlusion patterns are not included in the training set.
1412.1442
Maxwell Collins
Maxwell D. Collins and Pushmeet Kohli
Memory Bounded Deep Convolutional Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we investigate the use of sparsity-inducing regularizers during training of Convolution Neural Networks (CNNs). These regularizers encourage that fewer connections in the convolution and fully connected layers take non-zero values and in effect result in sparse connectivity between hidden units in the deep network. This in turn reduces the memory and runtime cost involved in deploying the learned CNNs. We show that training with such regularization can still be performed using stochastic gradient descent implying that it can be used easily in existing codebases. Experimental evaluation of our approach on MNIST, CIFAR, and ImageNet datasets shows that our regularizers can result in dramatic reductions in memory requirements. For instance, when applied on AlexNet, our method can reduce the memory consumption by a factor of four with minimal loss in accuracy.
[ { "version": "v1", "created": "Wed, 3 Dec 2014 19:08:38 GMT" } ]
2014-12-04T00:00:00
[ [ "Collins", "Maxwell D.", "" ], [ "Kohli", "Pushmeet", "" ] ]
TITLE: Memory Bounded Deep Convolutional Networks ABSTRACT: In this work, we investigate the use of sparsity-inducing regularizers during training of Convolution Neural Networks (CNNs). These regularizers encourage that fewer connections in the convolution and fully connected layers take non-zero values and in effect result in sparse connectivity between hidden units in the deep network. This in turn reduces the memory and runtime cost involved in deploying the learned CNNs. We show that training with such regularization can still be performed using stochastic gradient descent implying that it can be used easily in existing codebases. Experimental evaluation of our approach on MNIST, CIFAR, and ImageNet datasets shows that our regularizers can result in dramatic reductions in memory requirements. For instance, when applied on AlexNet, our method can reduce the memory consumption by a factor of four with minimal loss in accuracy.
1409.3809
Daniel Crankshaw
Daniel Crankshaw, Peter Bailis, Joseph E. Gonzalez, Haoyuan Li, Zhao Zhang, Michael J. Franklin, Ali Ghodsi, Michael I. Jordan
The Missing Piece in Complex Analytics: Low Latency, Scalable Model Management and Serving with Velox
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To support complex data-intensive applications such as personalized recommendations, targeted advertising, and intelligent services, the data management community has focused heavily on the design of systems to support training complex models on large datasets. Unfortunately, the design of these systems largely ignores a critical component of the overall analytics process: the deployment and serving of models at scale. In this work, we present Velox, a new component of the Berkeley Data Analytics Stack. Velox is a data management system for facilitating the next steps in real-world, large-scale analytics pipelines: online model management, maintenance, and serving. Velox provides end-user applications and services with a low-latency, intuitive interface to models, transforming the raw statistical models currently trained using existing offline large-scale compute frameworks into full-blown, end-to-end data products capable of recommending products, targeting advertisements, and personalizing web content. To provide up-to-date results for these complex models, Velox also facilitates lightweight online model maintenance and selection (i.e., dynamic weighting). In this paper, we describe the challenges and architectural considerations required to achieve this functionality, including the abilities to span online and offline systems, to adaptively adjust model materialization strategies, and to exploit inherent statistical properties such as model error tolerance, all while operating at "Big Data" scale.
[ { "version": "v1", "created": "Fri, 12 Sep 2014 18:12:24 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2014 23:20:30 GMT" } ]
2014-12-03T00:00:00
[ [ "Crankshaw", "Daniel", "" ], [ "Bailis", "Peter", "" ], [ "Gonzalez", "Joseph E.", "" ], [ "Li", "Haoyuan", "" ], [ "Zhang", "Zhao", "" ], [ "Franklin", "Michael J.", "" ], [ "Ghodsi", "Ali", "" ], [ "Jordan", "Michael I.", "" ] ]
TITLE: The Missing Piece in Complex Analytics: Low Latency, Scalable Model Management and Serving with Velox ABSTRACT: To support complex data-intensive applications such as personalized recommendations, targeted advertising, and intelligent services, the data management community has focused heavily on the design of systems to support training complex models on large datasets. Unfortunately, the design of these systems largely ignores a critical component of the overall analytics process: the deployment and serving of models at scale. In this work, we present Velox, a new component of the Berkeley Data Analytics Stack. Velox is a data management system for facilitating the next steps in real-world, large-scale analytics pipelines: online model management, maintenance, and serving. Velox provides end-user applications and services with a low-latency, intuitive interface to models, transforming the raw statistical models currently trained using existing offline large-scale compute frameworks into full-blown, end-to-end data products capable of recommending products, targeting advertisements, and personalizing web content. To provide up-to-date results for these complex models, Velox also facilitates lightweight online model maintenance and selection (i.e., dynamic weighting). In this paper, we describe the challenges and architectural considerations required to achieve this functionality, including the abilities to span online and offline systems, to adaptively adjust model materialization strategies, and to exploit inherent statistical properties such as model error tolerance, all while operating at "Big Data" scale.
1409.5308
Mohammed El-Kebir
Mohammed El-Kebir and Gunnar W. Klau
Solving the Maximum-Weight Connected Subgraph Problem to Optimality
11th DIMACS implementation challenge
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected node-weighted graph, the Maximum-Weight Connected Subgraph problem (MWCS) is to identify a subset of nodes of maximalsum of weights that induce a connected subgraph. MWCS is closely related to the well-studied Prize Collecting Steiner Tree problem and has many applications in different areas, including computational biology, network design and computer vision. The problem is NP-hard and even hard to approximate within a constant factor. In this work we describe an algorithmic scheme for solving MWCS to provable optimality, which is based on preprocessing rules, new results on decomposing an instance into its biconnected and triconnected components and a branch-and-cut approach combined with a primal heuristic. We demonstrate the performance of our method on the benchmark instances of the 11th DIMACS implementation challenge consisting of MWCS as well as transformed PCST instances.
[ { "version": "v1", "created": "Thu, 18 Sep 2014 14:15:45 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2014 22:13:05 GMT" } ]
2014-12-03T00:00:00
[ [ "El-Kebir", "Mohammed", "" ], [ "Klau", "Gunnar W.", "" ] ]
TITLE: Solving the Maximum-Weight Connected Subgraph Problem to Optimality ABSTRACT: Given an undirected node-weighted graph, the Maximum-Weight Connected Subgraph problem (MWCS) is to identify a subset of nodes of maximalsum of weights that induce a connected subgraph. MWCS is closely related to the well-studied Prize Collecting Steiner Tree problem and has many applications in different areas, including computational biology, network design and computer vision. The problem is NP-hard and even hard to approximate within a constant factor. In this work we describe an algorithmic scheme for solving MWCS to provable optimality, which is based on preprocessing rules, new results on decomposing an instance into its biconnected and triconnected components and a branch-and-cut approach combined with a primal heuristic. We demonstrate the performance of our method on the benchmark instances of the 11th DIMACS implementation challenge consisting of MWCS as well as transformed PCST instances.
1301.5887
Tamara Kolda
Tamara G. Kolda and Ali Pinar and Todd Plantenga and C. Seshadhri and Christine Task
Counting Triangles in Massive Graphs with MapReduce
null
SIAM Journal on Scientific Computing, Vol. 36, No. 5, pp. S44-S77, October 2014
10.1137/13090729X
null
cs.SI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graphs and networks are used to model interactions in a variety of contexts. There is a growing need to quickly assess the characteristics of a graph in order to understand its underlying structure. Some of the most useful metrics are triangle-based and give a measure of the connectedness of mutual friends. This is often summarized in terms of clustering coefficients, which measure the likelihood that two neighbors of a node are themselves connected. Computing these measures exactly for large-scale networks is prohibitively expensive in both memory and time. However, a recent wedge sampling algorithm has proved successful in efficiently and accurately estimating clustering coefficients. In this paper, we describe how to implement this approach in MapReduce to deal with massive graphs. We show results on publicly-available networks, the largest of which is 132M nodes and 4.7B edges, as well as artificially generated networks (using the Graph500 benchmark), the largest of which has 240M nodes and 8.5B edges. We can estimate the clustering coefficient by degree bin (e.g., we use exponential binning) and the number of triangles per bin, as well as the global clustering coefficient and total number of triangles, in an average of 0.33 seconds per million edges plus overhead (approximately 225 seconds total for our configuration). The technique can also be used to study triangle statistics such as the ratio of the highest and lowest degree, and we highlight differences between social and non-social networks. To the best of our knowledge, these are the largest triangle-based graph computations published to date.
[ { "version": "v1", "created": "Thu, 24 Jan 2013 20:32:25 GMT" }, { "version": "v2", "created": "Wed, 11 Sep 2013 21:45:16 GMT" }, { "version": "v3", "created": "Mon, 9 Dec 2013 20:37:01 GMT" } ]
2014-12-02T00:00:00
[ [ "Kolda", "Tamara G.", "" ], [ "Pinar", "Ali", "" ], [ "Plantenga", "Todd", "" ], [ "Seshadhri", "C.", "" ], [ "Task", "Christine", "" ] ]
TITLE: Counting Triangles in Massive Graphs with MapReduce ABSTRACT: Graphs and networks are used to model interactions in a variety of contexts. There is a growing need to quickly assess the characteristics of a graph in order to understand its underlying structure. Some of the most useful metrics are triangle-based and give a measure of the connectedness of mutual friends. This is often summarized in terms of clustering coefficients, which measure the likelihood that two neighbors of a node are themselves connected. Computing these measures exactly for large-scale networks is prohibitively expensive in both memory and time. However, a recent wedge sampling algorithm has proved successful in efficiently and accurately estimating clustering coefficients. In this paper, we describe how to implement this approach in MapReduce to deal with massive graphs. We show results on publicly-available networks, the largest of which is 132M nodes and 4.7B edges, as well as artificially generated networks (using the Graph500 benchmark), the largest of which has 240M nodes and 8.5B edges. We can estimate the clustering coefficient by degree bin (e.g., we use exponential binning) and the number of triangles per bin, as well as the global clustering coefficient and total number of triangles, in an average of 0.33 seconds per million edges plus overhead (approximately 225 seconds total for our configuration). The technique can also be used to study triangle statistics such as the ratio of the highest and lowest degree, and we highlight differences between social and non-social networks. To the best of our knowledge, these are the largest triangle-based graph computations published to date.
1306.0225
Qing Hui
Qing Hui, Haopeng Zhang
Convergence Analysis and Parallel Computing Implementation for the Multiagent Coordination Optimization Algorithm
51 pages, 34 figures
null
null
CSEL-06-13
math.OC cs.NE math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report, a novel variation of Particle Swarm Optimization (PSO) algorithm, called Multiagent Coordination Optimization (MCO), is implemented in a parallel computing way for practical use by introducing MATLAB built-in function "parfor" into MCO. Then we rigorously analyze the global convergence of MCO by means of semistability theory. Besides sharing global optimal solutions with the PSO algorithm, the MCO algorithm integrates cooperative swarm behavior of multiple agents into the update formula by sharing velocity and position information between neighbors to improve its performance. Numerical evaluation of the parallel MCO algorithm is provided in the report by running the proposed algorithm on supercomputers in the High Performance Computing Center at Texas Tech University. In particular, the optimal value and consuming time are compared with PSO and serial MCO by solving several benchmark functions in the literature, respectively. Based on the simulation results, the performance of the parallel MCO is not only superb compared with PSO for solving many nonlinear, noncovex optimization problems, but also is of high efficiency by saving the computational time.
[ { "version": "v1", "created": "Sun, 2 Jun 2013 16:17:18 GMT" }, { "version": "v10", "created": "Sat, 29 Nov 2014 18:10:07 GMT" }, { "version": "v2", "created": "Tue, 6 Aug 2013 22:00:32 GMT" }, { "version": "v3", "created": "Tue, 13 Aug 2013 16:04:05 GMT" }, { "version": "v4", "created": "Tue, 10 Sep 2013 14:57:27 GMT" }, { "version": "v5", "created": "Wed, 30 Oct 2013 19:13:18 GMT" }, { "version": "v6", "created": "Thu, 31 Oct 2013 23:03:38 GMT" }, { "version": "v7", "created": "Fri, 8 Nov 2013 23:21:39 GMT" }, { "version": "v8", "created": "Sat, 7 Dec 2013 01:48:39 GMT" }, { "version": "v9", "created": "Thu, 20 Feb 2014 02:24:13 GMT" } ]
2014-12-02T00:00:00
[ [ "Hui", "Qing", "" ], [ "Zhang", "Haopeng", "" ] ]
TITLE: Convergence Analysis and Parallel Computing Implementation for the Multiagent Coordination Optimization Algorithm ABSTRACT: In this report, a novel variation of Particle Swarm Optimization (PSO) algorithm, called Multiagent Coordination Optimization (MCO), is implemented in a parallel computing way for practical use by introducing MATLAB built-in function "parfor" into MCO. Then we rigorously analyze the global convergence of MCO by means of semistability theory. Besides sharing global optimal solutions with the PSO algorithm, the MCO algorithm integrates cooperative swarm behavior of multiple agents into the update formula by sharing velocity and position information between neighbors to improve its performance. Numerical evaluation of the parallel MCO algorithm is provided in the report by running the proposed algorithm on supercomputers in the High Performance Computing Center at Texas Tech University. In particular, the optimal value and consuming time are compared with PSO and serial MCO by solving several benchmark functions in the literature, respectively. Based on the simulation results, the performance of the parallel MCO is not only superb compared with PSO for solving many nonlinear, noncovex optimization problems, but also is of high efficiency by saving the computational time.
1311.3984
Richard Darst
Richard K. Darst, Zohar Nussinov, Santo Fortunato
Improving the performance of algorithms to find communities in networks
9 pages, 6 figures. Published version
Phys. Rev. E 89, 032809 (2014)
10.1103/PhysRevE.89.032809
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many algorithms to detect communities in networks typically work without any information on the cluster structure to be found, as one has no a priori knowledge of it, in general. Not surprisingly, knowing some features of the unknown partition could help its identification, yielding an improvement of the performance of the method. Here we show that, if the number of clusters were known beforehand, standard methods, like modularity optimization, would considerably gain in accuracy, mitigating the severe resolution bias that undermines the reliability of the results of the original unconstrained version. The number of clusters can be inferred from the spectra of the recently introduced non-backtracking and flow matrices, even in benchmark graphs with realistic community structure. The limit of such two-step procedure is the overhead of the computation of the spectra.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 21:28:29 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2014 11:50:07 GMT" } ]
2014-12-02T00:00:00
[ [ "Darst", "Richard K.", "" ], [ "Nussinov", "Zohar", "" ], [ "Fortunato", "Santo", "" ] ]
TITLE: Improving the performance of algorithms to find communities in networks ABSTRACT: Many algorithms to detect communities in networks typically work without any information on the cluster structure to be found, as one has no a priori knowledge of it, in general. Not surprisingly, knowing some features of the unknown partition could help its identification, yielding an improvement of the performance of the method. Here we show that, if the number of clusters were known beforehand, standard methods, like modularity optimization, would considerably gain in accuracy, mitigating the severe resolution bias that undermines the reliability of the results of the original unconstrained version. The number of clusters can be inferred from the spectra of the recently introduced non-backtracking and flow matrices, even in benchmark graphs with realistic community structure. The limit of such two-step procedure is the overhead of the computation of the spectra.
1402.3384
Weina Wang
Weina Wang, Lei Ying and Junshan Zhang
A Minimax Distortion View of Differentially Private Query Release
null
null
null
null
cs.CR cs.DB cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of differentially private query release through a synthetic database approach. Departing from the existing approaches that require the query set to be specified in advance, we advocate to devise query-set independent mechanisms, with an ambitious goal of providing accurate answers, while meeting the privacy constraints, for all queries in a general query class. Specifically, a differentially private mechanism is constructed to "encode" rich stochastic structure into the synthetic database, and "customized" companion estimators are then derived to provide accurate answers by making use of all available information, including the mechanism (which is public information) and the query functions. Accordingly, the distortion under the best of this kind of mechanisms at the worst-case query in a general query class, so called the minimax distortion, provides a fundamental characterization of differentially private query release. For the general class of statistical queries, we prove that with the squared-error distortion measure, the minimax distortion is $O(1/n)$ by deriving asymptotically tight upper and lower bounds in the regime that the database size $n$ goes to infinity. The upper bound is achievable by a mechanism $\mathcal{E}$ and its corresponding companion estimators, which points directly to the feasibility of the proposed approach in large databases. We further evaluate the mechanism $\mathcal{E}$ and the companion estimators through experiments on real datasets from Netflix and Facebook. Experimental results show improvement over the state-of-art MWEM algorithm and verify the scaling behavior $O(1/n)$ of the minimax distortion.
[ { "version": "v1", "created": "Fri, 14 Feb 2014 06:54:49 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2014 07:01:08 GMT" } ]
2014-12-02T00:00:00
[ [ "Wang", "Weina", "" ], [ "Ying", "Lei", "" ], [ "Zhang", "Junshan", "" ] ]
TITLE: A Minimax Distortion View of Differentially Private Query Release ABSTRACT: We consider the problem of differentially private query release through a synthetic database approach. Departing from the existing approaches that require the query set to be specified in advance, we advocate to devise query-set independent mechanisms, with an ambitious goal of providing accurate answers, while meeting the privacy constraints, for all queries in a general query class. Specifically, a differentially private mechanism is constructed to "encode" rich stochastic structure into the synthetic database, and "customized" companion estimators are then derived to provide accurate answers by making use of all available information, including the mechanism (which is public information) and the query functions. Accordingly, the distortion under the best of this kind of mechanisms at the worst-case query in a general query class, so called the minimax distortion, provides a fundamental characterization of differentially private query release. For the general class of statistical queries, we prove that with the squared-error distortion measure, the minimax distortion is $O(1/n)$ by deriving asymptotically tight upper and lower bounds in the regime that the database size $n$ goes to infinity. The upper bound is achievable by a mechanism $\mathcal{E}$ and its corresponding companion estimators, which points directly to the feasibility of the proposed approach in large databases. We further evaluate the mechanism $\mathcal{E}$ and the companion estimators through experiments on real datasets from Netflix and Facebook. Experimental results show improvement over the state-of-art MWEM algorithm and verify the scaling behavior $O(1/n)$ of the minimax distortion.
1410.3726
Chee Seng Chan
Chern Hong Lim, Anhar Risnumawan and Chee Seng Chan
Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene Understanding
Accepted in IEEE Transactions on Fuzzy Systems
IEEE Transactions on Fuzzy Systems, vol. 22(6), pp. 1541 - 1556, 2014
10.1109/TFUZZ.2014.2298233
null
cs.CV cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ambiguity or uncertainty is a pervasive element of many real world decision making processes. Variation in decisions is a norm in this situation when the same problem is posed to different subjects. Psychological and metaphysical research had proven that decision making by human is subjective. It is influenced by many factors such as experience, age, background, etc. Scene understanding is one of the computer vision problems that fall into this category. Conventional methods relax this problem by assuming scene images are mutually exclusive; and therefore, focus on developing different approaches to perform the binary classification tasks. In this paper, we show that scene images are non-mutually exclusive, and propose the Fuzzy Qualitative Rank Classifier (FQRC) to tackle the aforementioned problems. The proposed FQRC provides a ranking interpretation instead of binary decision. Evaluations in term of qualitative and quantitative using large numbers and challenging public scene datasets have shown the effectiveness of our proposed method in modeling the non-mutually exclusive scene images.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 15:19:43 GMT" } ]
2014-12-02T00:00:00
[ [ "Lim", "Chern Hong", "" ], [ "Risnumawan", "Anhar", "" ], [ "Chan", "Chee Seng", "" ] ]
TITLE: Scene Image is Non-Mutually Exclusive - A Fuzzy Qualitative Scene Understanding ABSTRACT: Ambiguity or uncertainty is a pervasive element of many real world decision making processes. Variation in decisions is a norm in this situation when the same problem is posed to different subjects. Psychological and metaphysical research had proven that decision making by human is subjective. It is influenced by many factors such as experience, age, background, etc. Scene understanding is one of the computer vision problems that fall into this category. Conventional methods relax this problem by assuming scene images are mutually exclusive; and therefore, focus on developing different approaches to perform the binary classification tasks. In this paper, we show that scene images are non-mutually exclusive, and propose the Fuzzy Qualitative Rank Classifier (FQRC) to tackle the aforementioned problems. The proposed FQRC provides a ranking interpretation instead of binary decision. Evaluations in term of qualitative and quantitative using large numbers and challenging public scene datasets have shown the effectiveness of our proposed method in modeling the non-mutually exclusive scene images.
1412.0008
Robert Templeman
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, Apu Kapadia
ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We live and work in environments that are inundated with cameras embedded in devices such as phones, tablets, laptops, and monitors. Newer wearable devices like Google Glass, Narrative Clip, and Autographer offer the ability to quietly log our lives with cameras from a `first person' perspective. While capturing several meaningful and interesting moments, a significant number of images captured by these wearable cameras can contain computer screens. Given the potentially sensitive information that is visible on our displays, there is a need to guard computer screens from undesired photography. People need protection against photography of their screens, whether by other people's cameras or their own cameras. We present ScreenAvoider, a framework that controls the collection and disclosure of images with computer screens and their sensitive content. ScreenAvoider can detect images with computer screens with high accuracy and can even go so far as to discriminate amongst screen content. We also introduce a ScreenTag system that aids in the identification of screen content, flagging images with highly sensitive content such as messaging applications or email webpages. We evaluate our concept on realistic lifelogging datasets, showing that ScreenAvoider provides a practical and useful solution that can help users manage their privacy.
[ { "version": "v1", "created": "Fri, 28 Nov 2014 01:50:53 GMT" } ]
2014-12-02T00:00:00
[ [ "Korayem", "Mohammed", "" ], [ "Templeman", "Robert", "" ], [ "Chen", "Dennis", "" ], [ "Crandall", "David", "" ], [ "Kapadia", "Apu", "" ] ]
TITLE: ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras ABSTRACT: We live and work in environments that are inundated with cameras embedded in devices such as phones, tablets, laptops, and monitors. Newer wearable devices like Google Glass, Narrative Clip, and Autographer offer the ability to quietly log our lives with cameras from a `first person' perspective. While capturing several meaningful and interesting moments, a significant number of images captured by these wearable cameras can contain computer screens. Given the potentially sensitive information that is visible on our displays, there is a need to guard computer screens from undesired photography. People need protection against photography of their screens, whether by other people's cameras or their own cameras. We present ScreenAvoider, a framework that controls the collection and disclosure of images with computer screens and their sensitive content. ScreenAvoider can detect images with computer screens with high accuracy and can even go so far as to discriminate amongst screen content. We also introduce a ScreenTag system that aids in the identification of screen content, flagging images with highly sensitive content such as messaging applications or email webpages. We evaluate our concept on realistic lifelogging datasets, showing that ScreenAvoider provides a practical and useful solution that can help users manage their privacy.
1412.0059
Takashi Sakuragawa
Kent Miyajima and Takashi Sakuragawa
Continuous and robust clustering coefficients for weighted and directed networks
29 pages, 14 figures
null
null
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce new clustering coefficients for weighted networks. They are continuous and robust against edge weight changes. Recently, generalized clustering coefficients for weighted and directed networks have been proposed. These generalizations have a common property, that their values are not continuous. They are sensitive with edge weight changes, especially at zero weight. With these generalizations, if vanishingly low weights of edges are truncated to weight zero for some reason, the coefficient value may change significantly from the original value. It is preferable that small changes of edge weights cause small changes of coefficient value. We call this property the continuity of generalized clustering coefficients. Our new coefficients admit this property. In the past, few studies have focused on the continuity of generalized clustering coefficients. In experiments, we performed comparative assessments of existing and our generalizations. In the case of a real world network dataset (C. Elegans Neural network), after adding random edge weight errors, though the value of one discontinuous generalization was changed about 436%, the value of proposed one was only changed 0.2%.
[ { "version": "v1", "created": "Sat, 29 Nov 2014 01:57:08 GMT" } ]
2014-12-02T00:00:00
[ [ "Miyajima", "Kent", "" ], [ "Sakuragawa", "Takashi", "" ] ]
TITLE: Continuous and robust clustering coefficients for weighted and directed networks ABSTRACT: We introduce new clustering coefficients for weighted networks. They are continuous and robust against edge weight changes. Recently, generalized clustering coefficients for weighted and directed networks have been proposed. These generalizations have a common property, that their values are not continuous. They are sensitive with edge weight changes, especially at zero weight. With these generalizations, if vanishingly low weights of edges are truncated to weight zero for some reason, the coefficient value may change significantly from the original value. It is preferable that small changes of edge weights cause small changes of coefficient value. We call this property the continuity of generalized clustering coefficients. Our new coefficients admit this property. In the past, few studies have focused on the continuity of generalized clustering coefficients. In experiments, we performed comparative assessments of existing and our generalizations. In the case of a real world network dataset (C. Elegans Neural network), after adding random edge weight errors, though the value of one discontinuous generalization was changed about 436%, the value of proposed one was only changed 0.2%.
1412.0065
Gr\'egory Rogez
Gregory Rogez, James S. Supancic III, Maryam Khademi, Jose Maria Martinez Montiel, Deva Ramanan
3D Hand Pose Detection in Egocentric RGB-D Images
14 pages, 15 figures, extended version of the corresponding ECCV workshop paper, submitted to International Journal of Computer Vision
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on the task of everyday hand pose estimation from egocentric viewpoints. For this task, we show that depth sensors are particularly informative for extracting near-field interactions of the camera wearer with his/her environment. Despite the recent advances in full-body pose estimation using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D images is still an unsolved problem. The problem is considerably exacerbated when analyzing hands performing daily activities from a first-person viewpoint, due to severe occlusions arising from object manipulations and a limited field-of-view. Our system addresses these difficulties by exploiting strong priors over viewpoint and pose in a discriminative tracking-by-detection framework. Our priors are operationalized through a photorealistic synthetic model of egocentric scenes, which is used to generate training data for learning depth-based pose classifiers. We evaluate our approach on an annotated dataset of real egocentric object manipulation scenes and compare to both commercial and academic approaches. Our method provides state-of-the-art performance for both hand detection and pose estimation in egocentric RGB-D images.
[ { "version": "v1", "created": "Sat, 29 Nov 2014 03:19:56 GMT" } ]
2014-12-02T00:00:00
[ [ "Rogez", "Gregory", "" ], [ "Supancic", "James S.", "III" ], [ "Khademi", "Maryam", "" ], [ "Montiel", "Jose Maria Martinez", "" ], [ "Ramanan", "Deva", "" ] ]
TITLE: 3D Hand Pose Detection in Egocentric RGB-D Images ABSTRACT: We focus on the task of everyday hand pose estimation from egocentric viewpoints. For this task, we show that depth sensors are particularly informative for extracting near-field interactions of the camera wearer with his/her environment. Despite the recent advances in full-body pose estimation using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D images is still an unsolved problem. The problem is considerably exacerbated when analyzing hands performing daily activities from a first-person viewpoint, due to severe occlusions arising from object manipulations and a limited field-of-view. Our system addresses these difficulties by exploiting strong priors over viewpoint and pose in a discriminative tracking-by-detection framework. Our priors are operationalized through a photorealistic synthetic model of egocentric scenes, which is used to generate training data for learning depth-based pose classifiers. We evaluate our approach on an annotated dataset of real egocentric object manipulation scenes and compare to both commercial and academic approaches. Our method provides state-of-the-art performance for both hand detection and pose estimation in egocentric RGB-D images.
1412.0069
Yonglong Tian
Yonglong Tian, Ping Luo, Xiaogang Wang, Xiaoou Tang
Pedestrian Detection aided by Deep Learning Semantic Tasks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning methods have achieved great success in pedestrian detection, owing to its ability to learn features from raw pixels. However, they mainly capture middle-level representations, such as pose of pedestrian, but confuse positive with hard negative samples, which have large ambiguity, e.g. the shape and appearance of `tree trunk' or `wire pole' are similar to pedestrian in certain viewpoint. This ambiguity can be distinguished by high-level representation. To this end, this work jointly optimizes pedestrian detection with semantic tasks, including pedestrian attributes (e.g. `carrying backpack') and scene attributes (e.g. `road', `tree', and `horizontal'). Rather than expensively annotating scene attributes, we transfer attributes information from existing scene segmentation datasets to the pedestrian dataset, by proposing a novel deep model to learn high-level features from multiple tasks and multiple data sources. Since distinct tasks have distinct convergence rates and data from different datasets have different distributions, a multi-task objective function is carefully designed to coordinate tasks and reduce discrepancies among datasets. The importance coefficients of tasks and network parameters in this objective function can be iteratively estimated. Extensive evaluations show that the proposed approach outperforms the state-of-the-art on the challenging Caltech and ETH datasets, where it reduces the miss rates of previous deep models by 17 and 5.5 percent, respectively.
[ { "version": "v1", "created": "Sat, 29 Nov 2014 04:34:23 GMT" } ]
2014-12-02T00:00:00
[ [ "Tian", "Yonglong", "" ], [ "Luo", "Ping", "" ], [ "Wang", "Xiaogang", "" ], [ "Tang", "Xiaoou", "" ] ]
TITLE: Pedestrian Detection aided by Deep Learning Semantic Tasks ABSTRACT: Deep learning methods have achieved great success in pedestrian detection, owing to its ability to learn features from raw pixels. However, they mainly capture middle-level representations, such as pose of pedestrian, but confuse positive with hard negative samples, which have large ambiguity, e.g. the shape and appearance of `tree trunk' or `wire pole' are similar to pedestrian in certain viewpoint. This ambiguity can be distinguished by high-level representation. To this end, this work jointly optimizes pedestrian detection with semantic tasks, including pedestrian attributes (e.g. `carrying backpack') and scene attributes (e.g. `road', `tree', and `horizontal'). Rather than expensively annotating scene attributes, we transfer attributes information from existing scene segmentation datasets to the pedestrian dataset, by proposing a novel deep model to learn high-level features from multiple tasks and multiple data sources. Since distinct tasks have distinct convergence rates and data from different datasets have different distributions, a multi-task objective function is carefully designed to coordinate tasks and reduce discrepancies among datasets. The importance coefficients of tasks and network parameters in this objective function can be iteratively estimated. Extensive evaluations show that the proposed approach outperforms the state-of-the-art on the challenging Caltech and ETH datasets, where it reduces the miss rates of previous deep models by 17 and 5.5 percent, respectively.
1412.0100
Stefan Mathe
Stefan Mathe, Cristian Sminchisescu
Multiple Instance Reinforcement Learning for Efficient Weakly-Supervised Detection in Images
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
State-of-the-art visual recognition and detection systems increasingly rely on large amounts of training data and complex classifiers. Therefore it becomes increasingly expensive both to manually annotate datasets and to keep running times at levels acceptable for practical applications. In this paper, we propose two solutions to address these issues. First, we introduce a weakly supervised, segmentation-based approach to learn accurate detectors and image classifiers from weak supervisory signals that provide only approximate constraints on target localization. We illustrate our system on the problem of action detection in static images (Pascal VOC Actions 2012), using human visual search patterns as our training signal. Second, inspired from the saccade-and-fixate operating principle of the human visual system, we use reinforcement learning techniques to train efficient search models for detection. Our sequential method is weakly supervised and general (it does not require eye movements), finds optimal search strategies for any given detection confidence function and achieves performance similar to exhaustive sliding window search at a fraction of its computational cost.
[ { "version": "v1", "created": "Sat, 29 Nov 2014 12:18:14 GMT" } ]
2014-12-02T00:00:00
[ [ "Mathe", "Stefan", "" ], [ "Sminchisescu", "Cristian", "" ] ]
TITLE: Multiple Instance Reinforcement Learning for Efficient Weakly-Supervised Detection in Images ABSTRACT: State-of-the-art visual recognition and detection systems increasingly rely on large amounts of training data and complex classifiers. Therefore it becomes increasingly expensive both to manually annotate datasets and to keep running times at levels acceptable for practical applications. In this paper, we propose two solutions to address these issues. First, we introduce a weakly supervised, segmentation-based approach to learn accurate detectors and image classifiers from weak supervisory signals that provide only approximate constraints on target localization. We illustrate our system on the problem of action detection in static images (Pascal VOC Actions 2012), using human visual search patterns as our training signal. Second, inspired from the saccade-and-fixate operating principle of the human visual system, we use reinforcement learning techniques to train efficient search models for detection. Our sequential method is weakly supervised and general (it does not require eye movements), finds optimal search strategies for any given detection confidence function and achieves performance similar to exhaustive sliding window search at a fraction of its computational cost.
1412.0111
Hocine Cherifi
Mounir Omari, Abdelkaher Ait Abdelouahad, Mohammed El Hassouni and Hocine Cherifi
Color image quality assessment measure using multivariate generalized Gaussian distribution
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with color image quality assessment in the reduced-reference framework based on natural scenes statistics. In this context, we propose to model the statistics of the steerable pyramid coefficients by a Multivariate Generalized Gaussian distribution (MGGD). This model allows taking into account the high correlation between the components of the RGB color space. For each selected scale and orientation, we extract a parameter matrix from the three color components subbands. In order to quantify the visual degradation, we use a closed-form of Kullback-Leibler Divergence (KLD) between two MGGDs. Using "TID 2008" benchmark, the proposed measure has been compared with the most influential methods according to the FRTV1 VQEG framework. Results demonstrates its effectiveness for a great variety of distortion type. Among other benefits this measure uses only very little information about the original image.
[ { "version": "v1", "created": "Sat, 29 Nov 2014 14:45:14 GMT" } ]
2014-12-02T00:00:00
[ [ "Omari", "Mounir", "" ], [ "Abdelouahad", "Abdelkaher Ait", "" ], [ "Hassouni", "Mohammed El", "" ], [ "Cherifi", "Hocine", "" ] ]
TITLE: Color image quality assessment measure using multivariate generalized Gaussian distribution ABSTRACT: This paper deals with color image quality assessment in the reduced-reference framework based on natural scenes statistics. In this context, we propose to model the statistics of the steerable pyramid coefficients by a Multivariate Generalized Gaussian distribution (MGGD). This model allows taking into account the high correlation between the components of the RGB color space. For each selected scale and orientation, we extract a parameter matrix from the three color components subbands. In order to quantify the visual degradation, we use a closed-form of Kullback-Leibler Divergence (KLD) between two MGGDs. Using "TID 2008" benchmark, the proposed measure has been compared with the most influential methods according to the FRTV1 VQEG framework. Results demonstrates its effectiveness for a great variety of distortion type. Among other benefits this measure uses only very little information about the original image.
1412.0296
George Papandreou
George Papandreou and Iasonas Kokkinos and Pierre-Andr\'e Savalle
Untangling Local and Global Deformations in Deep Convolutional Networks for Image Classification and Sliding Window Detection
13 pages, 7 figures, 5 tables. arXiv admin note: substantial text overlap with arXiv:1406.2732
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Convolutional Neural Networks (DCNNs) commonly use generic `max-pooling' (MP) layers to extract deformation-invariant features, but we argue in favor of a more refined treatment. First, we introduce epitomic convolution as a building block alternative to the common convolution-MP cascade of DCNNs; while having identical complexity to MP, Epitomic Convolution allows for parameter sharing across different filters, resulting in faster convergence and better generalization. Second, we introduce a Multiple Instance Learning approach to explicitly accommodate global translation and scaling when training a DCNN exclusively with class labels. For this we rely on a `patchwork' data structure that efficiently lays out all image scales and positions as candidates to a DCNN. Factoring global and local deformations allows a DCNN to `focus its resources' on the treatment of non-rigid deformations and yields a substantial classification accuracy improvement. Third, further pursuing this idea, we develop an efficient DCNN sliding window object detector that employs explicit search over position, scale, and aspect ratio. We provide competitive image classification and localization results on the ImageNet dataset and object detection results on the Pascal VOC 2007 benchmark.
[ { "version": "v1", "created": "Sun, 30 Nov 2014 22:20:17 GMT" } ]
2014-12-02T00:00:00
[ [ "Papandreou", "George", "" ], [ "Kokkinos", "Iasonas", "" ], [ "Savalle", "Pierre-André", "" ] ]
TITLE: Untangling Local and Global Deformations in Deep Convolutional Networks for Image Classification and Sliding Window Detection ABSTRACT: Deep Convolutional Neural Networks (DCNNs) commonly use generic `max-pooling' (MP) layers to extract deformation-invariant features, but we argue in favor of a more refined treatment. First, we introduce epitomic convolution as a building block alternative to the common convolution-MP cascade of DCNNs; while having identical complexity to MP, Epitomic Convolution allows for parameter sharing across different filters, resulting in faster convergence and better generalization. Second, we introduce a Multiple Instance Learning approach to explicitly accommodate global translation and scaling when training a DCNN exclusively with class labels. For this we rely on a `patchwork' data structure that efficiently lays out all image scales and positions as candidates to a DCNN. Factoring global and local deformations allows a DCNN to `focus its resources' on the treatment of non-rigid deformations and yields a substantial classification accuracy improvement. Third, further pursuing this idea, we develop an efficient DCNN sliding window object detector that employs explicit search over position, scale, and aspect ratio. We provide competitive image classification and localization results on the ImageNet dataset and object detection results on the Pascal VOC 2007 benchmark.
1412.0327
Jiajun Liu
Jiajun Liu, Kun Zhao, Saeed Khan, Mark Cameron, Raja Jurdak
Multi-scale Population and Mobility Estimation with Geo-tagged Tweets
1st International Workshop on Big Data Analytics for Biosecurity (BioBAD2015), 4 pages
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent outbreaks of Ebola and Dengue viruses have again elevated the significance of the capability to quickly predict disease spread in an emergent situation. However, existing approaches usually rely heavily on the time-consuming census processes, or the privacy-sensitive call logs, leading to their unresponsive nature when facing the abruptly changing dynamics in the event of an outbreak. In this paper we study the feasibility of using large-scale Twitter data as a proxy of human mobility to model and predict disease spread. We report that for Australia, Twitter users' distribution correlates well the census-based population distribution, and that the Twitter users' travel patterns appear to loosely follow the gravity law at multiple scales of geographic distances, i.e. national level, state level and metropolitan level. The radiation model is also evaluated on this dataset though it has shown inferior fitness as a result of Australia's sparse population and large landmass. The outcomes of the study form the cornerstones for future work towards a model-based, responsive prediction method from Twitter data for disease spread.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 01:48:53 GMT" } ]
2014-12-02T00:00:00
[ [ "Liu", "Jiajun", "" ], [ "Zhao", "Kun", "" ], [ "Khan", "Saeed", "" ], [ "Cameron", "Mark", "" ], [ "Jurdak", "Raja", "" ] ]
TITLE: Multi-scale Population and Mobility Estimation with Geo-tagged Tweets ABSTRACT: Recent outbreaks of Ebola and Dengue viruses have again elevated the significance of the capability to quickly predict disease spread in an emergent situation. However, existing approaches usually rely heavily on the time-consuming census processes, or the privacy-sensitive call logs, leading to their unresponsive nature when facing the abruptly changing dynamics in the event of an outbreak. In this paper we study the feasibility of using large-scale Twitter data as a proxy of human mobility to model and predict disease spread. We report that for Australia, Twitter users' distribution correlates well the census-based population distribution, and that the Twitter users' travel patterns appear to loosely follow the gravity law at multiple scales of geographic distances, i.e. national level, state level and metropolitan level. The radiation model is also evaluated on this dataset though it has shown inferior fitness as a result of Australia's sparse population and large landmass. The outcomes of the study form the cornerstones for future work towards a model-based, responsive prediction method from Twitter data for disease spread.
1412.0488
Pavel Tomancak
Tobias Pietzsch and Stephan Saalfeld and Stephan Preibisch and Pavel Tomancak
BigDataViewer: Interactive Visualization and Image Processing for Terabyte Data Sets
38 pages, 1 main figure, 27 supplementary figures, under review at Nature Methods
null
null
null
q-bio.QM cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasingly popular light sheet microscopy techniques generate very large 3D time-lapse recordings of living biological specimen. The necessity to make large volumetric datasets available for interactive visualization and analysis has been widely recognized. However, existing solutions build on dedicated servers to generate virtual slices that are transferred to the client applications, practically leading to insufficient frame rates (less than 10 frames per second) for truly interactive experience. An easily accessible open source solution for interactive arbitrary virtual re-slicing of very large volumes and time series of volumes has yet been missing. We fill this gap with BigDataViewer, a Fiji plugin to interactively navigate and visualize large image sequences from both local and remote data sources.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 14:24:44 GMT" } ]
2014-12-02T00:00:00
[ [ "Pietzsch", "Tobias", "" ], [ "Saalfeld", "Stephan", "" ], [ "Preibisch", "Stephan", "" ], [ "Tomancak", "Pavel", "" ] ]
TITLE: BigDataViewer: Interactive Visualization and Image Processing for Terabyte Data Sets ABSTRACT: The increasingly popular light sheet microscopy techniques generate very large 3D time-lapse recordings of living biological specimen. The necessity to make large volumetric datasets available for interactive visualization and analysis has been widely recognized. However, existing solutions build on dedicated servers to generate virtual slices that are transferred to the client applications, practically leading to insufficient frame rates (less than 10 frames per second) for truly interactive experience. An easily accessible open source solution for interactive arbitrary virtual re-slicing of very large volumes and time series of volumes has yet been missing. We fill this gap with BigDataViewer, a Fiji plugin to interactively navigate and visualize large image sequences from both local and remote data sources.
1412.0630
Sean Anderson
Sean Anderson, Timothy D. Barfoot, Chi Hay Tong, Simo S\"arkk\"a
Batch Nonlinear Continuous-Time Trajectory Estimation as Exactly Sparse Gaussian Process Regression
Submitted to Autonomous Robots on 20 November 2014, manuscript # AURO-D-14-00185, 16 pages, 7 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we revisit batch state estimation through the lens of Gaussian process (GP) regression. We consider continuous-discrete estimation problems wherein a trajectory is viewed as a one-dimensional GP, with time as the independent variable. Our continuous-time prior can be defined by any nonlinear, time-varying stochastic differential equation driven by white noise; this allows the possibility of smoothing our trajectory estimates using a variety of vehicle dynamics models (e.g., `constant-velocity'). We show that this class of prior results in an inverse kernel matrix (i.e., covariance matrix between all pairs of measurement times) that is exactly sparse (block-tridiagonal) and that this can be exploited to carry out GP regression (and interpolation) very efficiently. When the prior is based on a linear, time-varying stochastic differential equation and the measurement model is also linear, this GP approach is equivalent to classical, discrete-time smoothing (at the measurement times); when a nonlinearity is present, we iterate over the whole trajectory to maximize accuracy. We test the approach experimentally on a simultaneous trajectory estimation and mapping problem using a mobile robot dataset.
[ { "version": "v1", "created": "Mon, 1 Dec 2014 20:24:08 GMT" } ]
2014-12-02T00:00:00
[ [ "Anderson", "Sean", "" ], [ "Barfoot", "Timothy D.", "" ], [ "Tong", "Chi Hay", "" ], [ "Särkkä", "Simo", "" ] ]
TITLE: Batch Nonlinear Continuous-Time Trajectory Estimation as Exactly Sparse Gaussian Process Regression ABSTRACT: In this paper, we revisit batch state estimation through the lens of Gaussian process (GP) regression. We consider continuous-discrete estimation problems wherein a trajectory is viewed as a one-dimensional GP, with time as the independent variable. Our continuous-time prior can be defined by any nonlinear, time-varying stochastic differential equation driven by white noise; this allows the possibility of smoothing our trajectory estimates using a variety of vehicle dynamics models (e.g., `constant-velocity'). We show that this class of prior results in an inverse kernel matrix (i.e., covariance matrix between all pairs of measurement times) that is exactly sparse (block-tridiagonal) and that this can be exploited to carry out GP regression (and interpolation) very efficiently. When the prior is based on a linear, time-varying stochastic differential equation and the measurement model is also linear, this GP approach is equivalent to classical, discrete-time smoothing (at the measurement times); when a nonlinearity is present, we iterate over the whole trajectory to maximize accuracy. We test the approach experimentally on a simultaneous trajectory estimation and mapping problem using a mobile robot dataset.
1311.0402
Yu-Hang Tang
Yu-Hang Tang and George Em Karniadakis
Accelerating Dissipative Particle Dynamics Simulations on GPUs: Algorithms, Numerics and Applications
null
Computer Physics Communications, 2014, 185(11), 2809 - 2822
10.1016/j.cpc.2014.06.015
null
cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a scalable dissipative particle dynamics simulation code, fully implemented on the Graphics Processing Units (GPUs) using a hybrid CUDA/MPI programming model, which achieves 10-30 times speedup on a single GPU over 16 CPU cores and almost linear weak scaling across a thousand nodes. A unified framework is developed within which the efficient generation of the neighbor list and maintaining particle data locality are addressed. Our algorithm generates strictly ordered neighbor lists in parallel, while the construction is deterministic and makes no use of atomic operations or sorting. Such neighbor list leads to optimal data loading efficiency when combined with a two-level particle reordering scheme. A faster in situ generation scheme for Gaussian random numbers is proposed using precomputed binary signatures. We designed custom transcendental functions that are fast and accurate for evaluating the pairwise interaction. The correctness and accuracy of the code is verified through a set of test cases simulating Poiseuille flow and spontaneous vesicle formation. Computer benchmarks demonstrate the speedup of our implementation over the CPU implementation as well as strong and weak scalability. A large-scale simulation of spontaneous vesicle formation consisting of 128 million particles was conducted to further illustrate the practicality of our code in real-world applications.
[ { "version": "v1", "created": "Sat, 2 Nov 2013 18:51:53 GMT" } ]
2014-12-01T00:00:00
[ [ "Tang", "Yu-Hang", "" ], [ "Karniadakis", "George Em", "" ] ]
TITLE: Accelerating Dissipative Particle Dynamics Simulations on GPUs: Algorithms, Numerics and Applications ABSTRACT: We present a scalable dissipative particle dynamics simulation code, fully implemented on the Graphics Processing Units (GPUs) using a hybrid CUDA/MPI programming model, which achieves 10-30 times speedup on a single GPU over 16 CPU cores and almost linear weak scaling across a thousand nodes. A unified framework is developed within which the efficient generation of the neighbor list and maintaining particle data locality are addressed. Our algorithm generates strictly ordered neighbor lists in parallel, while the construction is deterministic and makes no use of atomic operations or sorting. Such neighbor list leads to optimal data loading efficiency when combined with a two-level particle reordering scheme. A faster in situ generation scheme for Gaussian random numbers is proposed using precomputed binary signatures. We designed custom transcendental functions that are fast and accurate for evaluating the pairwise interaction. The correctness and accuracy of the code is verified through a set of test cases simulating Poiseuille flow and spontaneous vesicle formation. Computer benchmarks demonstrate the speedup of our implementation over the CPU implementation as well as strong and weak scalability. A large-scale simulation of spontaneous vesicle formation consisting of 128 million particles was conducted to further illustrate the practicality of our code in real-world applications.
1411.7441
Stefano Ermon
Stefano Ermon, Ronan Le Bras, Santosh K. Suram, John M. Gregoire, Carla Gomes, Bart Selman, Robert B. van Dover
Pattern Decomposition with Complex Combinatorial Constraints: Application to Materials Discovery
null
null
null
null
cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying important components or factors in large amounts of noisy data is a key problem in machine learning and data mining. Motivated by a pattern decomposition problem in materials discovery, aimed at discovering new materials for renewable energy, e.g. for fuel and solar cells, we introduce CombiFD, a framework for factor based pattern decomposition that allows the incorporation of a-priori knowledge as constraints, including complex combinatorial constraints. In addition, we propose a new pattern decomposition algorithm, called AMIQO, based on solving a sequence of (mixed-integer) quadratic programs. Our approach considerably outperforms the state of the art on the materials discovery problem, scaling to larger datasets and recovering more precise and physically meaningful decompositions. We also show the effectiveness of our approach for enforcing background knowledge on other application domains.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 02:31:41 GMT" } ]
2014-12-01T00:00:00
[ [ "Ermon", "Stefano", "" ], [ "Bras", "Ronan Le", "" ], [ "Suram", "Santosh K.", "" ], [ "Gregoire", "John M.", "" ], [ "Gomes", "Carla", "" ], [ "Selman", "Bart", "" ], [ "van Dover", "Robert B.", "" ] ]
TITLE: Pattern Decomposition with Complex Combinatorial Constraints: Application to Materials Discovery ABSTRACT: Identifying important components or factors in large amounts of noisy data is a key problem in machine learning and data mining. Motivated by a pattern decomposition problem in materials discovery, aimed at discovering new materials for renewable energy, e.g. for fuel and solar cells, we introduce CombiFD, a framework for factor based pattern decomposition that allows the incorporation of a-priori knowledge as constraints, including complex combinatorial constraints. In addition, we propose a new pattern decomposition algorithm, called AMIQO, based on solving a sequence of (mixed-integer) quadratic programs. Our approach considerably outperforms the state of the art on the materials discovery problem, scaling to larger datasets and recovering more precise and physically meaningful decompositions. We also show the effectiveness of our approach for enforcing background knowledge on other application domains.
1411.7445
Chao Xu
Tao Han, Chao Xu, Ryan Loxton, Lei Xie
Bi-objective Optimization for Robust RGB-D Visual Odometry
null
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a new bi-objective optimization formulation for robust RGB-D visual odometry. We investigate two methods for solving the proposed bi-objective optimization problem: the weighted sum method (in which the objective functions are combined into a single objective function) and the bounded objective method (in which one of the objective functions is optimized and the value of the other objective function is bounded via a constraint). Our experimental results for the open source TUM RGB-D dataset show that the new bi-objective optimization formulation is superior to several existing RGB-D odometry methods. In particular, the new formulation yields more accurate motion estimates and is more robust when textural or structural features in the image sequence are lacking.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 02:37:41 GMT" } ]
2014-12-01T00:00:00
[ [ "Han", "Tao", "" ], [ "Xu", "Chao", "" ], [ "Loxton", "Ryan", "" ], [ "Xie", "Lei", "" ] ]
TITLE: Bi-objective Optimization for Robust RGB-D Visual Odometry ABSTRACT: This paper considers a new bi-objective optimization formulation for robust RGB-D visual odometry. We investigate two methods for solving the proposed bi-objective optimization problem: the weighted sum method (in which the objective functions are combined into a single objective function) and the bounded objective method (in which one of the objective functions is optimized and the value of the other objective function is bounded via a constraint). Our experimental results for the open source TUM RGB-D dataset show that the new bi-objective optimization formulation is superior to several existing RGB-D odometry methods. In particular, the new formulation yields more accurate motion estimates and is more robust when textural or structural features in the image sequence are lacking.
1411.7466
Chunhua Shen
Lingqiao Liu, Chunhua Shen, Anton van den Hengel
The Treasure beneath Convolutional Layers: Cross-convolutional-layer Pooling for Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of recent studies have shown that a Deep Convolutional Neural Network (DCNN) pretrained on a large dataset can be adopted as a universal image description which leads to astounding performance in many visual classification tasks. Most of these studies, if not all, adopt activations of the fully-connected layer of a DCNN as the image or region representation and it is believed that convolutional layer activations are less discriminative. This paper, however, advocates that if used appropriately convolutional layer activations can be turned into a powerful image representation which enjoys many advantages over fully-connected layer activations. This is achieved by adopting a new technique proposed in this paper called cross-convolutional-layer pooling. More specifically, it extracts subarrays of feature maps of one convolutional layer as local features and pools the extracted features with the guidance of feature maps of the successive convolutional layer. Compared with exising methods that apply DCNNs in the local feature setting, the proposed method is significantly faster since it requires much fewer times of DCNN forward computation. Moreover, it avoids the domain mismatch issue which is usually encountered when applying fully connected layer activations to describe local regions. By applying our method to four popular visual classification tasks, it is demonstrated that the proposed method can achieve comparable or in some cases significantly better performance than existing fully-connected layer based image representations while incurring much lower computational cost.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 04:12:57 GMT" } ]
2014-12-01T00:00:00
[ [ "Liu", "Lingqiao", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: The Treasure beneath Convolutional Layers: Cross-convolutional-layer Pooling for Image Classification ABSTRACT: A number of recent studies have shown that a Deep Convolutional Neural Network (DCNN) pretrained on a large dataset can be adopted as a universal image description which leads to astounding performance in many visual classification tasks. Most of these studies, if not all, adopt activations of the fully-connected layer of a DCNN as the image or region representation and it is believed that convolutional layer activations are less discriminative. This paper, however, advocates that if used appropriately convolutional layer activations can be turned into a powerful image representation which enjoys many advantages over fully-connected layer activations. This is achieved by adopting a new technique proposed in this paper called cross-convolutional-layer pooling. More specifically, it extracts subarrays of feature maps of one convolutional layer as local features and pools the extracted features with the guidance of feature maps of the successive convolutional layer. Compared with exising methods that apply DCNNs in the local feature setting, the proposed method is significantly faster since it requires much fewer times of DCNN forward computation. Moreover, it avoids the domain mismatch issue which is usually encountered when applying fully connected layer activations to describe local regions. By applying our method to four popular visual classification tasks, it is demonstrated that the proposed method can achieve comparable or in some cases significantly better performance than existing fully-connected layer based image representations while incurring much lower computational cost.
1411.7469
Sanjay Chakraborty
Lopamudra Dey and Sanjay Chakraborty
Canonical PSO Based k-Means Clustering Approach for Real Datasets
null
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
"Clustering" the significance and application of this technique is spread over various fields. Clustering is an unsupervised process in data mining, that is why the proper evaluation of the results and measuring the compactness and separability of the clusters are important issues.The procedure of evaluating the results of a clustering algorithm is known as cluster validity measure. Different types of indexes are used to solve different types of problems and indices selection depends on the kind of available data.This paper first proposes Canonical PSO based K-means clustering algorithm and also analyses some important clustering indices (intercluster, intracluster) and then evaluates the effects of those indices on real-time air pollution database,wholesale customer, wine, and vehicle datasets using typical K-means, Canonical PSO based K-means, simple PSO based K-means,DBSCAN, and Hierarchical clustering algorithms.This paper also describes the nature of the clusters and finally compares the performances of these clustering algorithms according to the validity assessment. It also defines which algorithm will be more desirable among all these algorithms to make proper compact clusters on this particular real life datasets. It actually deals with the behaviour of these clustering algorithms with respect to validation indexes and represents their results of evaluation in terms of mathematical and graphical forms.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 04:50:30 GMT" } ]
2014-12-01T00:00:00
[ [ "Dey", "Lopamudra", "" ], [ "Chakraborty", "Sanjay", "" ] ]
TITLE: Canonical PSO Based k-Means Clustering Approach for Real Datasets ABSTRACT: "Clustering" the significance and application of this technique is spread over various fields. Clustering is an unsupervised process in data mining, that is why the proper evaluation of the results and measuring the compactness and separability of the clusters are important issues.The procedure of evaluating the results of a clustering algorithm is known as cluster validity measure. Different types of indexes are used to solve different types of problems and indices selection depends on the kind of available data.This paper first proposes Canonical PSO based K-means clustering algorithm and also analyses some important clustering indices (intercluster, intracluster) and then evaluates the effects of those indices on real-time air pollution database,wholesale customer, wine, and vehicle datasets using typical K-means, Canonical PSO based K-means, simple PSO based K-means,DBSCAN, and Hierarchical clustering algorithms.This paper also describes the nature of the clusters and finally compares the performances of these clustering algorithms according to the validity assessment. It also defines which algorithm will be more desirable among all these algorithms to make proper compact clusters on this particular real life datasets. It actually deals with the behaviour of these clustering algorithms with respect to validation indexes and represents their results of evaluation in terms of mathematical and graphical forms.
1411.7474
Deepinder Kaur Er.
Deepinder Kaur
A Comparative Study of Various Distance Measures for Software fault prediction
4 pages,2 figures,"Published with International Journal of Computer Trends and Technology (IJCTT)"
International Journal of Computer Trends and Technology (IJCTT), 17(3): 117-120, Nov 2014
10.14445/22312803/IJCTT-V17P122
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different distance measures have been used for efficiently predicting software faults at early stages of software development. One stereotyped approach for software fault prediction due to its computational efficiency is K-means clustering, which partitions the dataset into K number of clusters using any distance measure. Distance measures by using some metrics are used to extract similar data objects which help in developing efficient algorithms for clustering and classification. In this paper, we study K-means clustering with three different distance measures Euclidean, Sorensen and Canberra by using datasets that have been collected from NASA MDP (metrics data program) .Results are displayed with the help of ROC curve. The experimental results shows that K-means clustering with Sorensen distance is better than Euclidean distance and Canberra distance.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 06:07:46 GMT" } ]
2014-12-01T00:00:00
[ [ "Kaur", "Deepinder", "" ] ]
TITLE: A Comparative Study of Various Distance Measures for Software fault prediction ABSTRACT: Different distance measures have been used for efficiently predicting software faults at early stages of software development. One stereotyped approach for software fault prediction due to its computational efficiency is K-means clustering, which partitions the dataset into K number of clusters using any distance measure. Distance measures by using some metrics are used to extract similar data objects which help in developing efficient algorithms for clustering and classification. In this paper, we study K-means clustering with three different distance measures Euclidean, Sorensen and Canberra by using datasets that have been collected from NASA MDP (metrics data program) .Results are displayed with the help of ROC curve. The experimental results shows that K-means clustering with Sorensen distance is better than Euclidean distance and Canberra distance.
1411.7480
Christopher Rosin
Christopher D. Rosin
Unweighted Stochastic Local Search can be Effective for Random CSP Benchmarks
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present ULSA, a novel stochastic local search algorithm for random binary constraint satisfaction problems (CSP). ULSA is many times faster than the prior state of the art on a widely-studied suite of random CSP benchmarks. Unlike the best previous methods for these benchmarks, ULSA is a simple unweighted method that does not require dynamic adaptation of weights or penalties. ULSA obtains new record best solutions satisfying 99 of 100 variables in the challenging frb100-40 benchmark instance.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 06:41:22 GMT" } ]
2014-12-01T00:00:00
[ [ "Rosin", "Christopher D.", "" ] ]
TITLE: Unweighted Stochastic Local Search can be Effective for Random CSP Benchmarks ABSTRACT: We present ULSA, a novel stochastic local search algorithm for random binary constraint satisfaction problems (CSP). ULSA is many times faster than the prior state of the art on a widely-studied suite of random CSP benchmarks. Unlike the best previous methods for these benchmarks, ULSA is a simple unweighted method that does not require dynamic adaptation of weights or penalties. ULSA obtains new record best solutions satisfying 99 of 100 variables in the challenging frb100-40 benchmark instance.
1411.7507
Akshay M S Mr
Akshay MS, Suhas Mohan, Vincent Kuri, Dinkar Sitaram, H. L. Phalachandra
Efficient Support of Big Data Storage Systems on the Cloud
Presented at 2nd International Workshop on Cloud Computing Applications (ICWA) during IEEE International Conference on High Performance Computing (HiPC) 2013
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to its advantages over traditional data centers, there has been a rapid growth in the usage of cloud infrastructures. These include public clouds (e.g., Amazon EC2), or private clouds, such as clouds deployed using OpenStack. A common factor in many of the well known infrastructures, for example OpenStack and CloudStack, is that networked storage is used for storage of persistent data. However, traditional Big Data systems, including Hadoop, store data in commodity local storage for reasons of high performance and low cost. We present an architecture for supporting Hadoop on Openstack using local storage. Subsequently, we use benchmarks on Openstack and Amazon to show that for supporting Hadoop, local storage has better performance and lower cost. We conclude that cloud systems should support local storage for persistent data (in addition to networked storage) so as to provide efficient support for Hadoop and other Big Data systems
[ { "version": "v1", "created": "Thu, 27 Nov 2014 09:25:54 GMT" } ]
2014-12-01T00:00:00
[ [ "MS", "Akshay", "" ], [ "Mohan", "Suhas", "" ], [ "Kuri", "Vincent", "" ], [ "Sitaram", "Dinkar", "" ], [ "Phalachandra", "H. L.", "" ] ]
TITLE: Efficient Support of Big Data Storage Systems on the Cloud ABSTRACT: Due to its advantages over traditional data centers, there has been a rapid growth in the usage of cloud infrastructures. These include public clouds (e.g., Amazon EC2), or private clouds, such as clouds deployed using OpenStack. A common factor in many of the well known infrastructures, for example OpenStack and CloudStack, is that networked storage is used for storage of persistent data. However, traditional Big Data systems, including Hadoop, store data in commodity local storage for reasons of high performance and low cost. We present an architecture for supporting Hadoop on Openstack using local storage. Subsequently, we use benchmarks on Openstack and Amazon to show that for supporting Hadoop, local storage has better performance and lower cost. We conclude that cloud systems should support local storage for persistent data (in addition to networked storage) so as to provide efficient support for Hadoop and other Big Data systems
1411.7655
Hocine Cherifi
Mounir Omari, Mohammed El Hassouni, Abdelkaher Ait Abdelouahad, Hocine Cherifi
A statistical reduced-reference method for color image quality assessment
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although color is a fundamental feature of human visual perception, it has been largely unexplored in the reduced-reference (RR) image quality assessment (IQA) schemes. In this paper, we propose a natural scene statistic (NSS) method, which efficiently uses this information. It is based on the statistical deviation between the steerable pyramid coefficients of the reference color image and the degraded one. We propose and analyze the multivariate generalized Gaussian distribution (MGGD) to model the underlying statistics. In order to quantify the degradation, we develop and evaluate two measures based respectively on the Geodesic distance between two MGGDs and on the closed-form of the Kullback Leibler divergence. We performed an extensive evaluation of both metrics in various color spaces (RGB, HSV, CIELAB and YCrCb) using the TID 2008 benchmark and the FRTV Phase I validation process. Experimental results demonstrate the effectiveness of the proposed framework to achieve a good consistency with human visual perception. Furthermore, the best configuration is obtained with CIELAB color space associated to KLD deviation measure.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 17:24:59 GMT" } ]
2014-12-01T00:00:00
[ [ "Omari", "Mounir", "" ], [ "Hassouni", "Mohammed El", "" ], [ "Abdelouahad", "Abdelkaher Ait", "" ], [ "Cherifi", "Hocine", "" ] ]
TITLE: A statistical reduced-reference method for color image quality assessment ABSTRACT: Although color is a fundamental feature of human visual perception, it has been largely unexplored in the reduced-reference (RR) image quality assessment (IQA) schemes. In this paper, we propose a natural scene statistic (NSS) method, which efficiently uses this information. It is based on the statistical deviation between the steerable pyramid coefficients of the reference color image and the degraded one. We propose and analyze the multivariate generalized Gaussian distribution (MGGD) to model the underlying statistics. In order to quantify the degradation, we develop and evaluate two measures based respectively on the Geodesic distance between two MGGDs and on the closed-form of the Kullback Leibler divergence. We performed an extensive evaluation of both metrics in various color spaces (RGB, HSV, CIELAB and YCrCb) using the TID 2008 benchmark and the FRTV Phase I validation process. Experimental results demonstrate the effectiveness of the proposed framework to achieve a good consistency with human visual perception. Furthermore, the best configuration is obtained with CIELAB color space associated to KLD deviation measure.
1411.7682
Hocine Cherifi
Mounir Omari, Mohammed El Hassouni, Hocine Cherifi and Abdelkaher Ait Abdelouahad
On color image quality assessment using natural image statistics
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Color distortion can introduce a significant damage in visual quality perception, however, most of existing reduced-reference quality measures are designed for grayscale images. In this paper, we consider a basic extension of well-known image-statistics based quality assessment measures to color images. In order to evaluate the impact of color information on the measures efficiency, two color spaces are investigated: RGB and CIELAB. Results of an extensive evaluation using TID 2013 benchmark demonstrates that significant improvement can be achieved for a great number of distortion type when the CIELAB color representation is used.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 19:04:30 GMT" } ]
2014-12-01T00:00:00
[ [ "Omari", "Mounir", "" ], [ "Hassouni", "Mohammed El", "" ], [ "Cherifi", "Hocine", "" ], [ "Abdelouahad", "Abdelkaher Ait", "" ] ]
TITLE: On color image quality assessment using natural image statistics ABSTRACT: Color distortion can introduce a significant damage in visual quality perception, however, most of existing reduced-reference quality measures are designed for grayscale images. In this paper, we consider a basic extension of well-known image-statistics based quality assessment measures to color images. In order to evaluate the impact of color information on the measures efficiency, two color spaces are investigated: RGB and CIELAB. Results of an extensive evaluation using TID 2013 benchmark demonstrates that significant improvement can be achieved for a great number of distortion type when the CIELAB color representation is used.
1411.7923
Dong Yi
Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z. Li
Learning Face Representation from Scratch
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pushing by big data and deep convolutional neural network (CNN), the performance of face recognition is becoming comparable to human. Using private large scale training datasets, several groups achieve very high performance on LFW, i.e., 97% to 99%. While there are many open source implementations of CNN, none of large scale face dataset is publicly available. The current situation in the field of face recognition is that data is more important than algorithm. To solve this problem, this paper proposes a semi-automatical way to collect face images from Internet and builds a large scale dataset containing about 10,000 subjects and 500,000 images, called CASIAWebFace. Based on the database, we use a 11-layer CNN to learn discriminative representation and obtain state-of-theart accuracy on LFW and YTF. The publication of CASIAWebFace will attract more research groups entering this field and accelerate the development of face recognition in the wild.
[ { "version": "v1", "created": "Fri, 28 Nov 2014 16:05:18 GMT" } ]
2014-12-01T00:00:00
[ [ "Yi", "Dong", "" ], [ "Lei", "Zhen", "" ], [ "Liao", "Shengcai", "" ], [ "Li", "Stan Z.", "" ] ]
TITLE: Learning Face Representation from Scratch ABSTRACT: Pushing by big data and deep convolutional neural network (CNN), the performance of face recognition is becoming comparable to human. Using private large scale training datasets, several groups achieve very high performance on LFW, i.e., 97% to 99%. While there are many open source implementations of CNN, none of large scale face dataset is publicly available. The current situation in the field of face recognition is that data is more important than algorithm. To solve this problem, this paper proposes a semi-automatical way to collect face images from Internet and builds a large scale dataset containing about 10,000 subjects and 500,000 images, called CASIAWebFace. Based on the database, we use a 11-layer CNN to learn discriminative representation and obtain state-of-theart accuracy on LFW and YTF. The publication of CASIAWebFace will attract more research groups entering this field and accelerate the development of face recognition in the wild.
1404.4114
Matthew D. Hoffman
Matthew D. Hoffman and David M. Blei
Structured Stochastic Variational Inference
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic variational inference makes it possible to approximate posterior distributions induced by large datasets quickly using stochastic optimization. The algorithm relies on the use of fully factorized variational distributions. However, this "mean-field" independence approximation limits the fidelity of the posterior approximation, and introduces local optima. We show how to relax the mean-field approximation to allow arbitrary dependencies between global parameters and local hidden variables, producing better parameter estimates by reducing bias, sensitivity to local optima, and sensitivity to hyperparameters.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 00:12:03 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2014 18:56:38 GMT" }, { "version": "v3", "created": "Wed, 26 Nov 2014 04:14:16 GMT" } ]
2014-11-27T00:00:00
[ [ "Hoffman", "Matthew D.", "" ], [ "Blei", "David M.", "" ] ]
TITLE: Structured Stochastic Variational Inference ABSTRACT: Stochastic variational inference makes it possible to approximate posterior distributions induced by large datasets quickly using stochastic optimization. The algorithm relies on the use of fully factorized variational distributions. However, this "mean-field" independence approximation limits the fidelity of the posterior approximation, and introduces local optima. We show how to relax the mean-field approximation to allow arbitrary dependencies between global parameters and local hidden variables, producing better parameter estimates by reducing bias, sensitivity to local optima, and sensitivity to hyperparameters.
1410.7724
Andreas Pavlogiannis
Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Andreas Pavlogiannis, Prateesh Goyal
Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth
null
null
null
null
cs.PL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive state machines (RSMs) are standard models for interprocedural analysis. We consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic with semiring operations. RSMs with algebraic path properties can model interprocedural dataflow analysis problems, the shortest path problem, the most probable path problem, etc. The traditional algorithms for interprocedural analysis focus on path properties where the starting point is \emph{fixed} as the entry point of a specific method. In this work, we consider possible multiple queries as required in many applications such as in alias analysis. The study of multiple queries allows us to bring in a very important algorithmic distinction between the resource usage of the \emph{one-time} preprocessing vs for \emph{each individual} query. The second aspect that we consider is that the control flow graphs for most programs have constant treewidth. Our main contributions are simple and implementable algorithms that support multiple queries for algebraic path properties for RSMs that have constant treewidth. Our theoretical results show that our algorithms have small additional one-time preprocessing, but can answer subsequent queries significantly faster as compared to the current best-known solutions for several important problems, such as interprocedural reachability and shortest path. We provide a prototype implementation for interprocedural reachability and intraprocedural shortest path that gives a significant speed-up on several benchmarks.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 18:27:10 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2014 21:40:40 GMT" } ]
2014-11-27T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Ibsen-Jensen", "Rasmus", "" ], [ "Pavlogiannis", "Andreas", "" ], [ "Goyal", "Prateesh", "" ] ]
TITLE: Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth ABSTRACT: Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive state machines (RSMs) are standard models for interprocedural analysis. We consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic with semiring operations. RSMs with algebraic path properties can model interprocedural dataflow analysis problems, the shortest path problem, the most probable path problem, etc. The traditional algorithms for interprocedural analysis focus on path properties where the starting point is \emph{fixed} as the entry point of a specific method. In this work, we consider possible multiple queries as required in many applications such as in alias analysis. The study of multiple queries allows us to bring in a very important algorithmic distinction between the resource usage of the \emph{one-time} preprocessing vs for \emph{each individual} query. The second aspect that we consider is that the control flow graphs for most programs have constant treewidth. Our main contributions are simple and implementable algorithms that support multiple queries for algebraic path properties for RSMs that have constant treewidth. Our theoretical results show that our algorithms have small additional one-time preprocessing, but can answer subsequent queries significantly faster as compared to the current best-known solutions for several important problems, such as interprocedural reachability and shortest path. We provide a prototype implementation for interprocedural reachability and intraprocedural shortest path that gives a significant speed-up on several benchmarks.
1411.7131
Oussama Tahan PhD
Oussama Tahan
Towards Efficient OpenMP Strategies for Non-Uniform Architectures
International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parallel processing is considered as todays and future trend for improving performance of computers. Computing devices ranging from small embedded systems to big clusters of computers rely on parallelizing applications to reduce execution time. Many of current computing systems rely on Non-Uniform Memory Access (NUMA) based processors architectures. In these architectures, analyzing and considering the non-uniformity is of high importance for improving scalability of systems. In this paper, we analyze and develop a NUMA based approach for the OpenMP parallel programming model. Our technique applies a smart threads allocation method and an advanced tasks scheduling strategy for reducing remote memory accesses and consequently their extra time consumption. We implemented our approach within the NANOS runtime system. A set of tests was conducted using the BOTS benchmarks and results showed the capacity of our technique in improving the performance of OpenMP applications especially those dealing with a large amount of data.
[ { "version": "v1", "created": "Wed, 26 Nov 2014 08:15:52 GMT" } ]
2014-11-27T00:00:00
[ [ "Tahan", "Oussama", "" ] ]
TITLE: Towards Efficient OpenMP Strategies for Non-Uniform Architectures ABSTRACT: Parallel processing is considered as todays and future trend for improving performance of computers. Computing devices ranging from small embedded systems to big clusters of computers rely on parallelizing applications to reduce execution time. Many of current computing systems rely on Non-Uniform Memory Access (NUMA) based processors architectures. In these architectures, analyzing and considering the non-uniformity is of high importance for improving scalability of systems. In this paper, we analyze and develop a NUMA based approach for the OpenMP parallel programming model. Our technique applies a smart threads allocation method and an advanced tasks scheduling strategy for reducing remote memory accesses and consequently their extra time consumption. We implemented our approach within the NANOS runtime system. A set of tests was conducted using the BOTS benchmarks and results showed the capacity of our technique in improving the performance of OpenMP applications especially those dealing with a large amount of data.
1411.7336
Mohammed alzaidi
Mohammed A. Talab, Siti Norul Huda Sheikh Abdullah, Bilal Bataineh
Edge direction matrixes-based local binar patterns descriptor for shape pattern recognition
null
null
null
null
cs.CV cs.IR
http://creativecommons.org/licenses/by/3.0/
Shapes and texture image recognition usage is an essential branch of pattern recognition. It is made up of techniques that aim at extracting information from images via human knowledge and works. Local Binary Pattern (LBP) ensures encoding global and local information and scaling invariance by introducing a look-up table to reflect the uniformity structure of an object. However, edge direction matrixes (EDMS) only apply global invariant descriptor which employs first and secondary order relationships. The main idea behind this methodology is the need of improved recognition capabilities, a goal achieved by the combinative use of these descriptors. This collaboration aims to make use of the major advantages each one presents, by simultaneously complementing each other, in order to elevate their weak points. By using multiple classifier approaches such as random forest and multi-layer perceptron neural network, the proposed combinative descriptor are compared with the state of the art combinative methods based on Gray-Level Co-occurrence matrix (GLCM with EDMS), LBP and moment invariant on four benchmark dataset MPEG-7 CE-Shape-1, KTH-TIPS image, Enghlishfnt and Arabic calligraphy . The experiments have shown the superiority of the introduced descriptor over the GLCM with EDMS, LBP and moment invariants and other well-known descriptor such as Scale Invariant Feature Transform from the literature.
[ { "version": "v1", "created": "Wed, 26 Nov 2014 19:12:33 GMT" } ]
2014-11-27T00:00:00
[ [ "Talab", "Mohammed A.", "" ], [ "Abdullah", "Siti Norul Huda Sheikh", "" ], [ "Bataineh", "Bilal", "" ] ]
TITLE: Edge direction matrixes-based local binar patterns descriptor for shape pattern recognition ABSTRACT: Shapes and texture image recognition usage is an essential branch of pattern recognition. It is made up of techniques that aim at extracting information from images via human knowledge and works. Local Binary Pattern (LBP) ensures encoding global and local information and scaling invariance by introducing a look-up table to reflect the uniformity structure of an object. However, edge direction matrixes (EDMS) only apply global invariant descriptor which employs first and secondary order relationships. The main idea behind this methodology is the need of improved recognition capabilities, a goal achieved by the combinative use of these descriptors. This collaboration aims to make use of the major advantages each one presents, by simultaneously complementing each other, in order to elevate their weak points. By using multiple classifier approaches such as random forest and multi-layer perceptron neural network, the proposed combinative descriptor are compared with the state of the art combinative methods based on Gray-Level Co-occurrence matrix (GLCM with EDMS), LBP and moment invariant on four benchmark dataset MPEG-7 CE-Shape-1, KTH-TIPS image, Enghlishfnt and Arabic calligraphy . The experiments have shown the superiority of the introduced descriptor over the GLCM with EDMS, LBP and moment invariants and other well-known descriptor such as Scale Invariant Feature Transform from the literature.
1311.0380
Peter Wittich
S. Amerio, D. Bastieri, M. Corvo, A. Gianelle, W. Ketchum, T. Liu, A. Lonardo, D. Lucchesi, S. Poprocki, R. Rivera, L. Tosoratto, P. Vicini, P. Wittich
Many-core applications to online track reconstruction in HEP experiments
Proceedings for the 20th International Conference on Computing in High Energy and Nuclear Physics (CHEP); missing acks added
null
10.1088/1742-6596/513/1/012002
null
physics.ins-det cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interest in parallel architectures applied to real time selections is growing in High Energy Physics (HEP) experiments. In this paper we describe performance measurements of Graphic Processing Units (GPUs) and Intel Many Integrated Core architecture (MIC) when applied to a typical HEP online task: the selection of events based on the trajectories of charged particles. We use as benchmark a scaled-up version of the algorithm used at CDF experiment at Tevatron for online track reconstruction - the SVT algorithm - as a realistic test-case for low-latency trigger systems using new computing architectures for LHC experiment. We examine the complexity/performance trade-off in porting existing serial algorithms to many-core devices. Measurements of both data processing and data transfer latency are shown, considering different I/O strategies to/from the parallel devices.
[ { "version": "v1", "created": "Sat, 2 Nov 2013 14:37:09 GMT" }, { "version": "v2", "created": "Mon, 11 Nov 2013 20:58:15 GMT" } ]
2014-11-26T00:00:00
[ [ "Amerio", "S.", "" ], [ "Bastieri", "D.", "" ], [ "Corvo", "M.", "" ], [ "Gianelle", "A.", "" ], [ "Ketchum", "W.", "" ], [ "Liu", "T.", "" ], [ "Lonardo", "A.", "" ], [ "Lucchesi", "D.", "" ], [ "Poprocki", "S.", "" ], [ "Rivera", "R.", "" ], [ "Tosoratto", "L.", "" ], [ "Vicini", "P.", "" ], [ "Wittich", "P.", "" ] ]
TITLE: Many-core applications to online track reconstruction in HEP experiments ABSTRACT: Interest in parallel architectures applied to real time selections is growing in High Energy Physics (HEP) experiments. In this paper we describe performance measurements of Graphic Processing Units (GPUs) and Intel Many Integrated Core architecture (MIC) when applied to a typical HEP online task: the selection of events based on the trajectories of charged particles. We use as benchmark a scaled-up version of the algorithm used at CDF experiment at Tevatron for online track reconstruction - the SVT algorithm - as a realistic test-case for low-latency trigger systems using new computing architectures for LHC experiment. We examine the complexity/performance trade-off in porting existing serial algorithms to many-core devices. Measurements of both data processing and data transfer latency are shown, considering different I/O strategies to/from the parallel devices.
1406.5549
Piotr Doll\'ar
Piotr Doll\'ar and C. Lawrence Zitnick
Fast Edge Detection Using Structured Forests
update corresponding to acceptance to PAMI
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Edge detection is a critical component of many vision systems, including object detectors and image segmentation algorithms. Patches of edges exhibit well-known forms of local structure, such as straight lines or T-junctions. In this paper we take advantage of the structure present in local image patches to learn both an accurate and computationally efficient edge detector. We formulate the problem of predicting local edge masks in a structured learning framework applied to random decision forests. Our novel approach to learning decision trees robustly maps the structured labels to a discrete space on which standard information gain measures may be evaluated. The result is an approach that obtains realtime performance that is orders of magnitude faster than many competing state-of-the-art approaches, while also achieving state-of-the-art edge detection results on the BSDS500 Segmentation dataset and NYU Depth dataset. Finally, we show the potential of our approach as a general purpose edge detector by showing our learned edge models generalize well across datasets.
[ { "version": "v1", "created": "Fri, 20 Jun 2014 22:28:29 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2014 02:49:28 GMT" } ]
2014-11-26T00:00:00
[ [ "Dollár", "Piotr", "" ], [ "Zitnick", "C. Lawrence", "" ] ]
TITLE: Fast Edge Detection Using Structured Forests ABSTRACT: Edge detection is a critical component of many vision systems, including object detectors and image segmentation algorithms. Patches of edges exhibit well-known forms of local structure, such as straight lines or T-junctions. In this paper we take advantage of the structure present in local image patches to learn both an accurate and computationally efficient edge detector. We formulate the problem of predicting local edge masks in a structured learning framework applied to random decision forests. Our novel approach to learning decision trees robustly maps the structured labels to a discrete space on which standard information gain measures may be evaluated. The result is an approach that obtains realtime performance that is orders of magnitude faster than many competing state-of-the-art approaches, while also achieving state-of-the-art edge detection results on the BSDS500 Segmentation dataset and NYU Depth dataset. Finally, we show the potential of our approach as a general purpose edge detector by showing our learned edge models generalize well across datasets.
1407.2170
Giorgos Tolias
Giorgos Tolias (INRIA), Teddy Furon (INRIA), Herv\'e J\'egou (INRIA)
Orientation covariant aggregation of local descriptors with embeddings
European Conference on Computer Vision (2014)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image search systems based on local descriptors typically achieve orientation invariance by aligning the patches on their dominant orientations. Albeit successful, this choice introduces too much invariance because it does not guarantee that the patches are rotated consistently. This paper introduces an aggregation strategy of local descriptors that achieves this covariance property by jointly encoding the angle in the aggregation stage in a continuous manner. It is combined with an efficient monomial embedding to provide a codebook-free method to aggregate local descriptors into a single vector representation. Our strategy is also compatible and employed with several popular encoding methods, in particular bag-of-words, VLAD and the Fisher vector. Our geometric-aware aggregation strategy is effective for image search, as shown by experiments performed on standard benchmarks for image and particular object retrieval, namely Holidays and Oxford buildings.
[ { "version": "v1", "created": "Tue, 8 Jul 2014 16:55:36 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2014 11:43:20 GMT" } ]
2014-11-26T00:00:00
[ [ "Tolias", "Giorgos", "", "INRIA" ], [ "Furon", "Teddy", "", "INRIA" ], [ "Jégou", "Hervé", "", "INRIA" ] ]
TITLE: Orientation covariant aggregation of local descriptors with embeddings ABSTRACT: Image search systems based on local descriptors typically achieve orientation invariance by aligning the patches on their dominant orientations. Albeit successful, this choice introduces too much invariance because it does not guarantee that the patches are rotated consistently. This paper introduces an aggregation strategy of local descriptors that achieves this covariance property by jointly encoding the angle in the aggregation stage in a continuous manner. It is combined with an efficient monomial embedding to provide a codebook-free method to aggregate local descriptors into a single vector representation. Our strategy is also compatible and employed with several popular encoding methods, in particular bag-of-words, VLAD and the Fisher vector. Our geometric-aware aggregation strategy is effective for image search, as shown by experiments performed on standard benchmarks for image and particular object retrieval, namely Holidays and Oxford buildings.
1410.7182
Leon Derczynski
Leon Derczynski, Diana Maynard, Giuseppe Rizzo, Marieke van Erp, Genevieve Gorrell, Rapha\"el Troncy, Johann Petrak, Kalina Bontcheva
Analysis of Named Entity Recognition and Linking for Tweets
35 pages, accepted to journal Information Processing and Management
Information Processing & Management 51 (2), 32-49, 2014
10.1016/j.ipm.2014.10.006
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applying natural language processing for mining and intelligent information access to tweets (a form of microblog) is a challenging, emerging research area. Unlike carefully authored news text and other longer content, tweets pose a number of new challenges, due to their short, noisy, context-dependent, and dynamic nature. Information extraction from tweets is typically performed in a pipeline, comprising consecutive stages of language identification, tokenisation, part-of-speech tagging, named entity recognition and entity disambiguation (e.g. with respect to DBpedia). In this work, we describe a new Twitter entity disambiguation dataset, and conduct an empirical analysis of named entity recognition and disambiguation, investigating how robust a number of state-of-the-art systems are on such noisy texts, what the main sources of error are, and which problems should be further investigated to improve the state of the art.
[ { "version": "v1", "created": "Mon, 27 Oct 2014 11:09:36 GMT" } ]
2014-11-26T00:00:00
[ [ "Derczynski", "Leon", "" ], [ "Maynard", "Diana", "" ], [ "Rizzo", "Giuseppe", "" ], [ "van Erp", "Marieke", "" ], [ "Gorrell", "Genevieve", "" ], [ "Troncy", "Raphaël", "" ], [ "Petrak", "Johann", "" ], [ "Bontcheva", "Kalina", "" ] ]
TITLE: Analysis of Named Entity Recognition and Linking for Tweets ABSTRACT: Applying natural language processing for mining and intelligent information access to tweets (a form of microblog) is a challenging, emerging research area. Unlike carefully authored news text and other longer content, tweets pose a number of new challenges, due to their short, noisy, context-dependent, and dynamic nature. Information extraction from tweets is typically performed in a pipeline, comprising consecutive stages of language identification, tokenisation, part-of-speech tagging, named entity recognition and entity disambiguation (e.g. with respect to DBpedia). In this work, we describe a new Twitter entity disambiguation dataset, and conduct an empirical analysis of named entity recognition and disambiguation, investigating how robust a number of state-of-the-art systems are on such noisy texts, what the main sources of error are, and which problems should be further investigated to improve the state of the art.
1411.5881
Shaista Hussain
Shaista Hussain, Shih-Chii Liu and Arindam Basu
Hardware-Amenable Structural Learning for Spike-based Pattern Classification using a Simple Model of Active Dendrites
Accepted for publication in Neural Computation
null
null
null
cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a spike-based model which employs neurons with functionally distinct dendritic compartments for classifying high dimensional binary patterns. The synaptic inputs arriving on each dendritic subunit are nonlinearly processed before being linearly integrated at the soma, giving the neuron a capacity to perform a large number of input-output mappings. The model utilizes sparse synaptic connectivity; where each synapse takes a binary value. The optimal connection pattern of a neuron is learned by using a simple hardware-friendly, margin enhancing learning algorithm inspired by the mechanism of structural plasticity in biological neurons. The learning algorithm groups correlated synaptic inputs on the same dendritic branch. Since the learning results in modified connection patterns, it can be incorporated into current event-based neuromorphic systems with little overhead. This work also presents a branch-specific spike-based version of this structural plasticity rule. The proposed model is evaluated on benchmark binary classification problems and its performance is compared against that achieved using Support Vector Machine (SVM) and Extreme Learning Machine (ELM) techniques. Our proposed method attains comparable performance while utilizing 10 to 50% less computational resources than the other reported techniques.
[ { "version": "v1", "created": "Thu, 20 Nov 2014 07:50:06 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2014 08:03:27 GMT" } ]
2014-11-26T00:00:00
[ [ "Hussain", "Shaista", "" ], [ "Liu", "Shih-Chii", "" ], [ "Basu", "Arindam", "" ] ]
TITLE: Hardware-Amenable Structural Learning for Spike-based Pattern Classification using a Simple Model of Active Dendrites ABSTRACT: This paper presents a spike-based model which employs neurons with functionally distinct dendritic compartments for classifying high dimensional binary patterns. The synaptic inputs arriving on each dendritic subunit are nonlinearly processed before being linearly integrated at the soma, giving the neuron a capacity to perform a large number of input-output mappings. The model utilizes sparse synaptic connectivity; where each synapse takes a binary value. The optimal connection pattern of a neuron is learned by using a simple hardware-friendly, margin enhancing learning algorithm inspired by the mechanism of structural plasticity in biological neurons. The learning algorithm groups correlated synaptic inputs on the same dendritic branch. Since the learning results in modified connection patterns, it can be incorporated into current event-based neuromorphic systems with little overhead. This work also presents a branch-specific spike-based version of this structural plasticity rule. The proposed model is evaluated on benchmark binary classification problems and its performance is compared against that achieved using Support Vector Machine (SVM) and Extreme Learning Machine (ELM) techniques. Our proposed method attains comparable performance while utilizing 10 to 50% less computational resources than the other reported techniques.
1411.6777
Debajyoti Mukhopadhyay Prof.
Laxmi Lahoti, Chaitali Chandankhede, Debajyoti Mukhopadhyay
Modified Apriori Approach for Evade Network Intrusion Detection System
5 pages, 3 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems or NIDS to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behaviour over the network like known attacks that hackers look for new techniques to go unseen. Sometime, a single failure at any layer will cause the NIDS to miss that attack. To overcome this problem, a technique is used that will trigger a failure in that layer. Such technique is known as Evasive technique. An Evasion can be defined as any technique that modifies a visible attack into any other form in order to stay away from being detect. The proposed system is used for detecting attacks which are going on the network and also gives actual categorization of attacks. The proposed system has advantage of getting low false alarm rate and high detection rate. So that leads into decrease in complexity and overhead on the system. The paper presents the Evasion technique for customized apriori algorithm. The paper aims to make a new functional structure to evade NIDS. This framework can be used to audit NIDS. This framework shows that a proof of concept showing how to evade a self built NIDS considering two publicly available datasets.
[ { "version": "v1", "created": "Tue, 25 Nov 2014 09:16:01 GMT" } ]
2014-11-26T00:00:00
[ [ "Lahoti", "Laxmi", "" ], [ "Chandankhede", "Chaitali", "" ], [ "Mukhopadhyay", "Debajyoti", "" ] ]
TITLE: Modified Apriori Approach for Evade Network Intrusion Detection System ABSTRACT: Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems or NIDS to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behaviour over the network like known attacks that hackers look for new techniques to go unseen. Sometime, a single failure at any layer will cause the NIDS to miss that attack. To overcome this problem, a technique is used that will trigger a failure in that layer. Such technique is known as Evasive technique. An Evasion can be defined as any technique that modifies a visible attack into any other form in order to stay away from being detect. The proposed system is used for detecting attacks which are going on the network and also gives actual categorization of attacks. The proposed system has advantage of getting low false alarm rate and high detection rate. So that leads into decrease in complexity and overhead on the system. The paper presents the Evasion technique for customized apriori algorithm. The paper aims to make a new functional structure to evade NIDS. This framework can be used to audit NIDS. This framework shows that a proof of concept showing how to evade a self built NIDS considering two publicly available datasets.
1411.6850
Khalid Jebari hassani
Amina Dik, Khalid Jebari, Abdelaziz Bouroumi and Aziz Ettouhami
Similarity- based approach for outlier detection
International Journal of Computer Science Issues 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new approach for detecting outliers by introducing the notion of object's proximity. The main idea is that normal point has similar characteristics with several neighbors. So the point in not an outlier if it has a high degree of proximity and its neighbors are several. The performance of this approach is illustrated through real datasets
[ { "version": "v1", "created": "Tue, 25 Nov 2014 13:13:47 GMT" } ]
2014-11-26T00:00:00
[ [ "Dik", "Amina", "" ], [ "Jebari", "Khalid", "" ], [ "Bouroumi", "Abdelaziz", "" ], [ "Ettouhami", "Aziz", "" ] ]
TITLE: Similarity- based approach for outlier detection ABSTRACT: This paper presents a new approach for detecting outliers by introducing the notion of object's proximity. The main idea is that normal point has similar characteristics with several neighbors. So the point in not an outlier if it has a high degree of proximity and its neighbors are several. The performance of this approach is illustrated through real datasets
1411.6909
Aaron Hertzmann
Hamid Izadinia, Ali Farhadi, Aaron Hertzmann, Matthew D. Hoffman
Image Classification and Retrieval from User-Supplied Tags
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes direct learning of image classification from user-supplied tags, without filtering. Each tag is supplied by the user who shared the image online. Enormous numbers of these tags are freely available online, and they give insight about the image categories important to users and to image classification. Our approach is complementary to the conventional approach of manual annotation, which is extremely costly. We analyze of the Flickr 100 Million Image dataset, making several useful observations about the statistics of these tags. We introduce a large-scale robust classification algorithm, in order to handle the inherent noise in these tags, and a calibration procedure to better predict objective annotations. We show that freely available, user-supplied tags can obtain similar or superior results to large databases of costly manual annotations.
[ { "version": "v1", "created": "Tue, 25 Nov 2014 16:17:09 GMT" } ]
2014-11-26T00:00:00
[ [ "Izadinia", "Hamid", "" ], [ "Farhadi", "Ali", "" ], [ "Hertzmann", "Aaron", "" ], [ "Hoffman", "Matthew D.", "" ] ]
TITLE: Image Classification and Retrieval from User-Supplied Tags ABSTRACT: This paper proposes direct learning of image classification from user-supplied tags, without filtering. Each tag is supplied by the user who shared the image online. Enormous numbers of these tags are freely available online, and they give insight about the image categories important to users and to image classification. Our approach is complementary to the conventional approach of manual annotation, which is extremely costly. We analyze of the Flickr 100 Million Image dataset, making several useful observations about the statistics of these tags. We introduce a large-scale robust classification algorithm, in order to handle the inherent noise in these tags, and a calibration procedure to better predict objective annotations. We show that freely available, user-supplied tags can obtain similar or superior results to large databases of costly manual annotations.
1210.5268
Jacob Eisenstein
Jacob Eisenstein, Brendan O'Connor, Noah A. Smith, Eric P. Xing
Diffusion of Lexical Change in Social Media
preprint of PLOS-ONE paper from November 2014; PLoS ONE 9(11) e113114
null
10.1371/journal.pone.0113114
null
cs.CL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer-mediated communication is driving fundamental changes in the nature of written language. We investigate these changes by statistical analysis of a dataset comprising 107 million Twitter messages (authored by 2.7 million unique user accounts). Using a latent vector autoregressive model to aggregate across thousands of words, we identify high-level patterns in diffusion of linguistic change over the United States. Our model is robust to unpredictable changes in Twitter's sampling rate, and provides a probabilistic characterization of the relationship of macro-scale linguistic influence to a set of demographic and geographic predictors. The results of this analysis offer support for prior arguments that focus on geographical proximity and population size. However, demographic similarity -- especially with regard to race -- plays an even more central role, as cities with similar racial demographics are far more likely to share linguistic influence. Rather than moving towards a single unified "netspeak" dialect, language evolution in computer-mediated communication reproduces existing fault lines in spoken American English.
[ { "version": "v1", "created": "Thu, 18 Oct 2012 21:46:09 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2012 01:40:54 GMT" }, { "version": "v3", "created": "Tue, 23 Oct 2012 21:15:56 GMT" }, { "version": "v4", "created": "Mon, 24 Nov 2014 03:34:24 GMT" } ]
2014-11-25T00:00:00
[ [ "Eisenstein", "Jacob", "" ], [ "O'Connor", "Brendan", "" ], [ "Smith", "Noah A.", "" ], [ "Xing", "Eric P.", "" ] ]
TITLE: Diffusion of Lexical Change in Social Media ABSTRACT: Computer-mediated communication is driving fundamental changes in the nature of written language. We investigate these changes by statistical analysis of a dataset comprising 107 million Twitter messages (authored by 2.7 million unique user accounts). Using a latent vector autoregressive model to aggregate across thousands of words, we identify high-level patterns in diffusion of linguistic change over the United States. Our model is robust to unpredictable changes in Twitter's sampling rate, and provides a probabilistic characterization of the relationship of macro-scale linguistic influence to a set of demographic and geographic predictors. The results of this analysis offer support for prior arguments that focus on geographical proximity and population size. However, demographic similarity -- especially with regard to race -- plays an even more central role, as cities with similar racial demographics are far more likely to share linguistic influence. Rather than moving towards a single unified "netspeak" dialect, language evolution in computer-mediated communication reproduces existing fault lines in spoken American English.
1312.0917
Peter Wittich
A. Gianelle, S. Amerio, D. Bastieri, M. Corvo, W. Ketchum, T. Liu, A. Lonardo, D. Lucchesi, S. Poprocki, R. Rivera, L. Tosoratto, P. Vicini, P. Wittich
Applications of Many-Core Technologies to On-line Event Reconstruction in High Energy Physics Experiments
Proceedings for 2013 IEEE NSS/MIC conference; fixed author list omission
null
10.1109/NSSMIC.2013.6829552
null
physics.ins-det cs.DC hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interest in many-core architectures applied to real time selections is growing in High Energy Physics (HEP) experiments. In this paper we describe performance measurements of many-core devices when applied to a typical HEP online task: the selection of events based on the trajectories of charged particles. We use as benchmark a scaled-up version of the algorithm used at CDF experiment at Tevatron for online track reconstruction - the SVT algorithm - as a realistic test-case for low-latency trigger systems using new computing architectures for LHC experiment. We examine the complexity/performance trade-off in porting existing serial algorithms to many-core devices. We measure performance of different architectures (Intel Xeon Phi and AMD GPUs, in addition to NVidia GPUs) and different software environments (OpenCL, in addition to NVidia CUDA). Measurements of both data processing and data transfer latency are shown, considering different I/O strategies to/from the many-core devices.
[ { "version": "v1", "created": "Tue, 3 Dec 2013 19:55:16 GMT" }, { "version": "v2", "created": "Wed, 4 Dec 2013 11:50:21 GMT" } ]
2014-11-25T00:00:00
[ [ "Gianelle", "A.", "" ], [ "Amerio", "S.", "" ], [ "Bastieri", "D.", "" ], [ "Corvo", "M.", "" ], [ "Ketchum", "W.", "" ], [ "Liu", "T.", "" ], [ "Lonardo", "A.", "" ], [ "Lucchesi", "D.", "" ], [ "Poprocki", "S.", "" ], [ "Rivera", "R.", "" ], [ "Tosoratto", "L.", "" ], [ "Vicini", "P.", "" ], [ "Wittich", "P.", "" ] ]
TITLE: Applications of Many-Core Technologies to On-line Event Reconstruction in High Energy Physics Experiments ABSTRACT: Interest in many-core architectures applied to real time selections is growing in High Energy Physics (HEP) experiments. In this paper we describe performance measurements of many-core devices when applied to a typical HEP online task: the selection of events based on the trajectories of charged particles. We use as benchmark a scaled-up version of the algorithm used at CDF experiment at Tevatron for online track reconstruction - the SVT algorithm - as a realistic test-case for low-latency trigger systems using new computing architectures for LHC experiment. We examine the complexity/performance trade-off in porting existing serial algorithms to many-core devices. We measure performance of different architectures (Intel Xeon Phi and AMD GPUs, in addition to NVidia GPUs) and different software environments (OpenCL, in addition to NVidia CUDA). Measurements of both data processing and data transfer latency are shown, considering different I/O strategies to/from the many-core devices.
1405.2226
Claudio Moraga
Fatima Hadjam, Claudio Moraga
Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits
17 text pages, 8 Figures, Research Report, Contact author: [email protected]
null
null
FSC-2014-02; European Centre for Soft Computing
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum computers are considered as a future alternative to circumvent the heat dissipation problem of VLSI circuits. The synthesis of reversible circuits is a very promising area of study considering the expected further technological advances towards quantum computing. In this report, we propose a linear genetic programming system to design reversible circuits -RIMEP2-. The system has evolved reversible circuits starting from scratch without resorting to a pre-existing library. The results show that among the 26 considered benchmarks, RIMEP2 outperformed the best published solutions for 20 of them and matched the remaining 6. RIMEP2 is presented in this report as a promising method with a considerable potential for reversible circuit design. It will be considered as work reference for future studies based on this method.
[ { "version": "v1", "created": "Fri, 9 May 2014 13:33:28 GMT" }, { "version": "v2", "created": "Mon, 24 Nov 2014 13:07:24 GMT" } ]
2014-11-25T00:00:00
[ [ "Hadjam", "Fatima", "" ], [ "Moraga", "Claudio", "" ] ]
TITLE: Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits ABSTRACT: Quantum computers are considered as a future alternative to circumvent the heat dissipation problem of VLSI circuits. The synthesis of reversible circuits is a very promising area of study considering the expected further technological advances towards quantum computing. In this report, we propose a linear genetic programming system to design reversible circuits -RIMEP2-. The system has evolved reversible circuits starting from scratch without resorting to a pre-existing library. The results show that among the 26 considered benchmarks, RIMEP2 outperformed the best published solutions for 20 of them and matched the remaining 6. RIMEP2 is presented in this report as a promising method with a considerable potential for reversible circuit design. It will be considered as work reference for future studies based on this method.
1411.6191
David Balduzzi
David Balduzzi, Hastagiri Vanchinathan, Joachim Buhmann
Kickback cuts Backprop's red-tape: Biologically plausible credit assignment in neural networks
7 pages. To appear, AAAI-15
null
null
null
cs.LG cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error backpropagation is an extremely effective algorithm for assigning credit in artificial neural networks. However, weight updates under Backprop depend on lengthy recursive computations and require separate output and error messages -- features not shared by biological neurons, that are perhaps unnecessary. In this paper, we revisit Backprop and the credit assignment problem. We first decompose Backprop into a collection of interacting learning algorithms; provide regret bounds on the performance of these sub-algorithms; and factorize Backprop's error signals. Using these results, we derive a new credit assignment algorithm for nonparametric regression, Kickback, that is significantly simpler than Backprop. Finally, we provide a sufficient condition for Kickback to follow error gradients, and show that Kickback matches Backprop's performance on real-world regression benchmarks.
[ { "version": "v1", "created": "Sun, 23 Nov 2014 04:58:22 GMT" } ]
2014-11-25T00:00:00
[ [ "Balduzzi", "David", "" ], [ "Vanchinathan", "Hastagiri", "" ], [ "Buhmann", "Joachim", "" ] ]
TITLE: Kickback cuts Backprop's red-tape: Biologically plausible credit assignment in neural networks ABSTRACT: Error backpropagation is an extremely effective algorithm for assigning credit in artificial neural networks. However, weight updates under Backprop depend on lengthy recursive computations and require separate output and error messages -- features not shared by biological neurons, that are perhaps unnecessary. In this paper, we revisit Backprop and the credit assignment problem. We first decompose Backprop into a collection of interacting learning algorithms; provide regret bounds on the performance of these sub-algorithms; and factorize Backprop's error signals. Using these results, we derive a new credit assignment algorithm for nonparametric regression, Kickback, that is significantly simpler than Backprop. Finally, we provide a sufficient condition for Kickback to follow error gradients, and show that Kickback matches Backprop's performance on real-world regression benchmarks.
1411.6235
Xiaojun Chang
Xiaojun Chang, Feiping Nie, Zhigang Ma, and Yi Yang
Balanced k-Means and Min-Cut Clustering
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering is an effective technique in data mining to generate groups that are the matter of interest. Among various clustering approaches, the family of k-means algorithms and min-cut algorithms gain most popularity due to their simplicity and efficacy. The classical k-means algorithm partitions a number of data points into several subsets by iteratively updating the clustering centers and the associated data points. By contrast, a weighted undirected graph is constructed in min-cut algorithms which partition the vertices of the graph into two sets. However, existing clustering algorithms tend to cluster minority of data points into a subset, which shall be avoided when the target dataset is balanced. To achieve more accurate clustering for balanced dataset, we propose to leverage exclusive lasso on k-means and min-cut to regulate the balance degree of the clustering results. By optimizing our objective functions that build atop the exclusive lasso, we can make the clustering result as much balanced as possible. Extensive experiments on several large-scale datasets validate the advantage of the proposed algorithms compared to the state-of-the-art clustering algorithms.
[ { "version": "v1", "created": "Sun, 23 Nov 2014 13:16:25 GMT" } ]
2014-11-25T00:00:00
[ [ "Chang", "Xiaojun", "" ], [ "Nie", "Feiping", "" ], [ "Ma", "Zhigang", "" ], [ "Yang", "Yi", "" ] ]
TITLE: Balanced k-Means and Min-Cut Clustering ABSTRACT: Clustering is an effective technique in data mining to generate groups that are the matter of interest. Among various clustering approaches, the family of k-means algorithms and min-cut algorithms gain most popularity due to their simplicity and efficacy. The classical k-means algorithm partitions a number of data points into several subsets by iteratively updating the clustering centers and the associated data points. By contrast, a weighted undirected graph is constructed in min-cut algorithms which partition the vertices of the graph into two sets. However, existing clustering algorithms tend to cluster minority of data points into a subset, which shall be avoided when the target dataset is balanced. To achieve more accurate clustering for balanced dataset, we propose to leverage exclusive lasso on k-means and min-cut to regulate the balance degree of the clustering results. By optimizing our objective functions that build atop the exclusive lasso, we can make the clustering result as much balanced as possible. Extensive experiments on several large-scale datasets validate the advantage of the proposed algorithms compared to the state-of-the-art clustering algorithms.
1411.6308
Xiaojun Chang
Xiaojun Chang, Feiping Nie, Zhigang Ma, Yi Yang and Xiaofang Zhou
A Convex Formulation for Spectral Shrunk Clustering
AAAI2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectral clustering is a fundamental technique in the field of data mining and information processing. Most existing spectral clustering algorithms integrate dimensionality reduction into the clustering process assisted by manifold learning in the original space. However, the manifold in reduced-dimensional subspace is likely to exhibit altered properties in contrast with the original space. Thus, applying manifold information obtained from the original space to the clustering process in a low-dimensional subspace is prone to inferior performance. Aiming to address this issue, we propose a novel convex algorithm that mines the manifold structure in the low-dimensional subspace. In addition, our unified learning process makes the manifold learning particularly tailored for the clustering. Compared with other related methods, the proposed algorithm results in more structured clustering result. To validate the efficacy of the proposed algorithm, we perform extensive experiments on several benchmark datasets in comparison with some state-of-the-art clustering approaches. The experimental results demonstrate that the proposed algorithm has quite promising clustering performance.
[ { "version": "v1", "created": "Sun, 23 Nov 2014 22:12:52 GMT" } ]
2014-11-25T00:00:00
[ [ "Chang", "Xiaojun", "" ], [ "Nie", "Feiping", "" ], [ "Ma", "Zhigang", "" ], [ "Yang", "Yi", "" ], [ "Zhou", "Xiaofang", "" ] ]
TITLE: A Convex Formulation for Spectral Shrunk Clustering ABSTRACT: Spectral clustering is a fundamental technique in the field of data mining and information processing. Most existing spectral clustering algorithms integrate dimensionality reduction into the clustering process assisted by manifold learning in the original space. However, the manifold in reduced-dimensional subspace is likely to exhibit altered properties in contrast with the original space. Thus, applying manifold information obtained from the original space to the clustering process in a low-dimensional subspace is prone to inferior performance. Aiming to address this issue, we propose a novel convex algorithm that mines the manifold structure in the low-dimensional subspace. In addition, our unified learning process makes the manifold learning particularly tailored for the clustering. Compared with other related methods, the proposed algorithm results in more structured clustering result. To validate the efficacy of the proposed algorithm, we perform extensive experiments on several benchmark datasets in comparison with some state-of-the-art clustering approaches. The experimental results demonstrate that the proposed algorithm has quite promising clustering performance.
1411.6361
Baptiste Wicht
Baptiste Wicht, Roberto A. Vitillo, Dehao Chen, David Levinthal
Hardware Counted Profile-Guided Optimization
10 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Profile-Guided Optimization (PGO) is an excellent means to improve the performance of a compiled program. Indeed, the execution path data it provides helps the compiler to generate better code and better cacheline packing. At the time of this writing, compilers only support instrumentation-based PGO. This proved effective for optimizing programs. However, few projects use it, due to its complicated dual-compilation model and its high overhead. Our solution of sampling Hardware Performance Counters overcome these drawbacks. In this paper, we propose a PGO solution for GCC by sampling Last Branch Record (LBR) events and using debug symbols to recreate source locations of binary instructions. By using LBR-Sampling, the generated profiles are very accurate. This solution achieved an average of 83% of the gains obtained with instrumentation-based PGO and 93% on C++ benchmarks only. The profiling overhead is only 1.06% on average whereas instrumentation incurs a 16% overhead on average.
[ { "version": "v1", "created": "Mon, 24 Nov 2014 07:01:31 GMT" } ]
2014-11-25T00:00:00
[ [ "Wicht", "Baptiste", "" ], [ "Vitillo", "Roberto A.", "" ], [ "Chen", "Dehao", "" ], [ "Levinthal", "David", "" ] ]
TITLE: Hardware Counted Profile-Guided Optimization ABSTRACT: Profile-Guided Optimization (PGO) is an excellent means to improve the performance of a compiled program. Indeed, the execution path data it provides helps the compiler to generate better code and better cacheline packing. At the time of this writing, compilers only support instrumentation-based PGO. This proved effective for optimizing programs. However, few projects use it, due to its complicated dual-compilation model and its high overhead. Our solution of sampling Hardware Performance Counters overcome these drawbacks. In this paper, we propose a PGO solution for GCC by sampling Last Branch Record (LBR) events and using debug symbols to recreate source locations of binary instructions. By using LBR-Sampling, the generated profiles are very accurate. This solution achieved an average of 83% of the gains obtained with instrumentation-based PGO and 93% on C++ benchmarks only. The profiling overhead is only 1.06% on average whereas instrumentation incurs a 16% overhead on average.
1411.6447
Tianjun Xiao
Tianjun Xiao, Yichong Xu, Kuiyuan Yang, Jiaxing Zhang, Yuxin Peng, Zheng Zhang
The Application of Two-level Attention Models in Deep Convolutional Neural Network for Fine-grained Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fine-grained classification is challenging because categories can only be discriminated by subtle and local differences. Variances in the pose, scale or rotation usually make the problem more difficult. Most fine-grained classification systems follow the pipeline of finding foreground object or object parts (where) to extract discriminative features (what). In this paper, we propose to apply visual attention to fine-grained classification task using deep neural network. Our pipeline integrates three types of attention: the bottom-up attention that propose candidate patches, the object-level top-down attention that selects relevant patches to a certain object, and the part-level top-down attention that localizes discriminative parts. We combine these attentions to train domain-specific deep nets, then use it to improve both the what and where aspects. Importantly, we avoid using expensive annotations like bounding box or part information from end-to-end. The weak supervision constraint makes our work easier to generalize. We have verified the effectiveness of the method on the subsets of ILSVRC2012 dataset and CUB200_2011 dataset. Our pipeline delivered significant improvements and achieved the best accuracy under the weakest supervision condition. The performance is competitive against other methods that rely on additional annotations.
[ { "version": "v1", "created": "Mon, 24 Nov 2014 13:30:07 GMT" } ]
2014-11-25T00:00:00
[ [ "Xiao", "Tianjun", "" ], [ "Xu", "Yichong", "" ], [ "Yang", "Kuiyuan", "" ], [ "Zhang", "Jiaxing", "" ], [ "Peng", "Yuxin", "" ], [ "Zhang", "Zheng", "" ] ]
TITLE: The Application of Two-level Attention Models in Deep Convolutional Neural Network for Fine-grained Image Classification ABSTRACT: Fine-grained classification is challenging because categories can only be discriminated by subtle and local differences. Variances in the pose, scale or rotation usually make the problem more difficult. Most fine-grained classification systems follow the pipeline of finding foreground object or object parts (where) to extract discriminative features (what). In this paper, we propose to apply visual attention to fine-grained classification task using deep neural network. Our pipeline integrates three types of attention: the bottom-up attention that propose candidate patches, the object-level top-down attention that selects relevant patches to a certain object, and the part-level top-down attention that localizes discriminative parts. We combine these attentions to train domain-specific deep nets, then use it to improve both the what and where aspects. Importantly, we avoid using expensive annotations like bounding box or part information from end-to-end. The weak supervision constraint makes our work easier to generalize. We have verified the effectiveness of the method on the subsets of ILSVRC2012 dataset and CUB200_2011 dataset. Our pipeline delivered significant improvements and achieved the best accuracy under the weakest supervision condition. The performance is competitive against other methods that rely on additional annotations.
1411.6562
Manas Joglekar
Manas Joglekar, Hector Garcia-Molina, Aditya Parameswaran
Evaluating the Crowd with Confidence
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Worker quality control is a crucial aspect of crowdsourcing systems; typically occupying a large fraction of the time and money invested on crowdsourcing. In this work, we devise techniques to generate confidence intervals for worker error rate estimates, thereby enabling a better evaluation of worker quality. We show that our techniques generate correct confidence intervals on a range of real-world datasets, and demonstrate wide applicability by using them to evict poorly performing workers, and provide confidence intervals on the accuracy of the answers.
[ { "version": "v1", "created": "Wed, 12 Nov 2014 23:50:43 GMT" } ]
2014-11-25T00:00:00
[ [ "Joglekar", "Manas", "" ], [ "Garcia-Molina", "Hector", "" ], [ "Parameswaran", "Aditya", "" ] ]
TITLE: Evaluating the Crowd with Confidence ABSTRACT: Worker quality control is a crucial aspect of crowdsourcing systems; typically occupying a large fraction of the time and money invested on crowdsourcing. In this work, we devise techniques to generate confidence intervals for worker error rate estimates, thereby enabling a better evaluation of worker quality. We show that our techniques generate correct confidence intervals on a range of real-world datasets, and demonstrate wide applicability by using them to evict poorly performing workers, and provide confidence intervals on the accuracy of the answers.
1405.0538
Rados{\l}aw Michalski
Rados{\l}aw Michalski, Tomasz Kajdanowicz, Piotr Br\'odka, Przemys{\l}aw Kazienko
Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach
null
New Generation Computing, Vol. 32, Issue 3-4, pp. 213-235, 2014
10.1007/s00354-014-0402-9
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of finding optimal set of users for influencing others in the social network has been widely studied. Because it is NP-hard, some heuristics were proposed to find sub-optimal solutions. Still, one of the commonly used assumption is the one that seeds are chosen on the static network, not the dynamic one. This static approach is in fact far from the real-world networks, where new nodes may appear and old ones dynamically disappear in course of time. The main purpose of this paper is to analyse how the results of one of the typical models for spread of influence - linear threshold - differ depending on the strategy of building the social network used later for choosing seeds. To show the impact of network creation strategy on the final number of influenced nodes - outcome of spread of influence, the results for three approaches were studied: one static and two temporal with different granularities, i.e. various number of time windows. Social networks for each time window encapsulated dynamic changes in the network structure. Calculation of various node structural measures like degree or betweenness respected these changes by means of forgetting mechanism - more recent data had greater influence on node measure values. These measures were, in turn, used for node ranking and their selection for seeding. All concepts were applied to experimental verification on five real datasets. The results revealed that temporal approach is always better than static and the higher granularity in the temporal social network while seeding, the more finally influenced nodes. Additionally, outdegree measure with exponential forgetting typically outperformed other time-dependent structural measures, if used for seed candidate ranking.
[ { "version": "v1", "created": "Fri, 2 May 2014 23:32:04 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2014 13:20:36 GMT" } ]
2014-11-24T00:00:00
[ [ "Michalski", "Radosław", "" ], [ "Kajdanowicz", "Tomasz", "" ], [ "Bródka", "Piotr", "" ], [ "Kazienko", "Przemysław", "" ] ]
TITLE: Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach ABSTRACT: The problem of finding optimal set of users for influencing others in the social network has been widely studied. Because it is NP-hard, some heuristics were proposed to find sub-optimal solutions. Still, one of the commonly used assumption is the one that seeds are chosen on the static network, not the dynamic one. This static approach is in fact far from the real-world networks, where new nodes may appear and old ones dynamically disappear in course of time. The main purpose of this paper is to analyse how the results of one of the typical models for spread of influence - linear threshold - differ depending on the strategy of building the social network used later for choosing seeds. To show the impact of network creation strategy on the final number of influenced nodes - outcome of spread of influence, the results for three approaches were studied: one static and two temporal with different granularities, i.e. various number of time windows. Social networks for each time window encapsulated dynamic changes in the network structure. Calculation of various node structural measures like degree or betweenness respected these changes by means of forgetting mechanism - more recent data had greater influence on node measure values. These measures were, in turn, used for node ranking and their selection for seeding. All concepts were applied to experimental verification on five real datasets. The results revealed that temporal approach is always better than static and the higher granularity in the temporal social network while seeding, the more finally influenced nodes. Additionally, outdegree measure with exponential forgetting typically outperformed other time-dependent structural measures, if used for seed candidate ranking.
1410.4510
Finale Doshi-Velez
Finale Doshi-Velez and Byron Wallace and Ryan Adams
Graph-Sparse LDA: A Topic Model with Structured Sparsity
null
null
null
null
stat.ML cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Originally designed to model text, topic modeling has become a powerful tool for uncovering latent structure in domains including medicine, finance, and vision. The goals for the model vary depending on the application: in some cases, the discovered topics may be used for prediction or some other downstream task. In other cases, the content of the topic itself may be of intrinsic scientific interest. Unfortunately, even using modern sparse techniques, the discovered topics are often difficult to interpret due to the high dimensionality of the underlying space. To improve topic interpretability, we introduce Graph-Sparse LDA, a hierarchical topic model that leverages knowledge of relationships between words (e.g., as encoded by an ontology). In our model, topics are summarized by a few latent concept-words from the underlying graph that explain the observed words. Graph-Sparse LDA recovers sparse, interpretable summaries on two real-world biomedical datasets while matching state-of-the-art prediction performance.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 17:35:31 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2014 16:38:59 GMT" } ]
2014-11-24T00:00:00
[ [ "Doshi-Velez", "Finale", "" ], [ "Wallace", "Byron", "" ], [ "Adams", "Ryan", "" ] ]
TITLE: Graph-Sparse LDA: A Topic Model with Structured Sparsity ABSTRACT: Originally designed to model text, topic modeling has become a powerful tool for uncovering latent structure in domains including medicine, finance, and vision. The goals for the model vary depending on the application: in some cases, the discovered topics may be used for prediction or some other downstream task. In other cases, the content of the topic itself may be of intrinsic scientific interest. Unfortunately, even using modern sparse techniques, the discovered topics are often difficult to interpret due to the high dimensionality of the underlying space. To improve topic interpretability, we introduce Graph-Sparse LDA, a hierarchical topic model that leverages knowledge of relationships between words (e.g., as encoded by an ontology). In our model, topics are summarized by a few latent concept-words from the underlying graph that explain the observed words. Graph-Sparse LDA recovers sparse, interpretable summaries on two real-world biomedical datasets while matching state-of-the-art prediction performance.
1411.5428
Ben Stoddard
Ben Stoddard and Yan Chen and Ashwin Machanavajjhala
Differentially Private Algorithms for Empirical Machine Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important use of private data is to build machine learning classifiers. While there is a burgeoning literature on differentially private classification algorithms, we find that they are not practical in real applications due to two reasons. First, existing differentially private classifiers provide poor accuracy on real world datasets. Second, there is no known differentially private algorithm for empirically evaluating the private classifier on a private test dataset. In this paper, we develop differentially private algorithms that mirror real world empirical machine learning workflows. We consider the private classifier training algorithm as a blackbox. We present private algorithms for selecting features that are input to the classifier. Though adding a preprocessing step takes away some of the privacy budget from the actual classification process (thus potentially making it noisier and less accurate), we show that our novel preprocessing techniques significantly increase classifier accuracy on three real-world datasets. We also present the first private algorithms for empirically constructing receiver operating characteristic (ROC) curves on a private test set.
[ { "version": "v1", "created": "Thu, 20 Nov 2014 03:10:47 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2014 20:41:04 GMT" } ]
2014-11-24T00:00:00
[ [ "Stoddard", "Ben", "" ], [ "Chen", "Yan", "" ], [ "Machanavajjhala", "Ashwin", "" ] ]
TITLE: Differentially Private Algorithms for Empirical Machine Learning ABSTRACT: An important use of private data is to build machine learning classifiers. While there is a burgeoning literature on differentially private classification algorithms, we find that they are not practical in real applications due to two reasons. First, existing differentially private classifiers provide poor accuracy on real world datasets. Second, there is no known differentially private algorithm for empirically evaluating the private classifier on a private test dataset. In this paper, we develop differentially private algorithms that mirror real world empirical machine learning workflows. We consider the private classifier training algorithm as a blackbox. We present private algorithms for selecting features that are input to the classifier. Though adding a preprocessing step takes away some of the privacy budget from the actual classification process (thus potentially making it noisier and less accurate), we show that our novel preprocessing techniques significantly increase classifier accuracy on three real-world datasets. We also present the first private algorithms for empirically constructing receiver operating characteristic (ROC) curves on a private test set.
1411.5731
Suleyman Cetintas
Can Xu, Suleyman Cetintas, Kuang-Chih Lee, Li-Jia Li
Visual Sentiment Prediction with Deep Convolutional Neural Networks
null
null
null
null
cs.CV cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Images have become one of the most popular types of media through which users convey their emotions within online social networks. Although vast amount of research is devoted to sentiment analysis of textual data, there has been very limited work that focuses on analyzing sentiment of image data. In this work, we propose a novel visual sentiment prediction framework that performs image understanding with Deep Convolutional Neural Networks (CNN). Specifically, the proposed sentiment prediction framework performs transfer learning from a CNN with millions of parameters, which is pre-trained on large-scale data for object recognition. Experiments conducted on two real-world datasets from Twitter and Tumblr demonstrate the effectiveness of the proposed visual sentiment analysis framework.
[ { "version": "v1", "created": "Fri, 21 Nov 2014 00:39:43 GMT" } ]
2014-11-24T00:00:00
[ [ "Xu", "Can", "" ], [ "Cetintas", "Suleyman", "" ], [ "Lee", "Kuang-Chih", "" ], [ "Li", "Li-Jia", "" ] ]
TITLE: Visual Sentiment Prediction with Deep Convolutional Neural Networks ABSTRACT: Images have become one of the most popular types of media through which users convey their emotions within online social networks. Although vast amount of research is devoted to sentiment analysis of textual data, there has been very limited work that focuses on analyzing sentiment of image data. In this work, we propose a novel visual sentiment prediction framework that performs image understanding with Deep Convolutional Neural Networks (CNN). Specifically, the proposed sentiment prediction framework performs transfer learning from a CNN with millions of parameters, which is pre-trained on large-scale data for object recognition. Experiments conducted on two real-world datasets from Twitter and Tumblr demonstrate the effectiveness of the proposed visual sentiment analysis framework.
1411.5935
M. Zeeshan Zia
M.Zeeshan Zia, Michael Stark, Konrad Schindler
Towards Scene Understanding with Detailed 3D Object Representations
International Journal of Computer Vision (appeared online on 4 November 2014). Online version: http://link.springer.com/article/10.1007/s11263-014-0780-y
null
10.1007/s11263-014-0780-y
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current approaches to semantic image and scene understanding typically employ rather simple object representations such as 2D or 3D bounding boxes. While such coarse models are robust and allow for reliable object detection, they discard much of the information about objects' 3D shape and pose, and thus do not lend themselves well to higher-level reasoning. Here, we propose to base scene understanding on a high-resolution object representation. An object class - in our case cars - is modeled as a deformable 3D wireframe, which enables fine-grained modeling at the level of individual vertices and faces. We augment that model to explicitly include vertex-level occlusion, and embed all instances in a common coordinate frame, in order to infer and exploit object-object interactions. Specifically, from a single view we jointly estimate the shapes and poses of multiple objects in a common 3D frame. A ground plane in that frame is estimated by consensus among different objects, which significantly stabilizes monocular 3D pose estimation. The fine-grained model, in conjunction with the explicit 3D scene model, further allows one to infer part-level occlusions between the modeled objects, as well as occlusions by other, unmodeled scene elements. To demonstrate the benefits of such detailed object class models in the context of scene understanding we systematically evaluate our approach on the challenging KITTI street scene dataset. The experiments show that the model's ability to utilize image evidence at the level of individual parts improves monocular 3D pose estimation w.r.t. both location and (continuous) viewpoint.
[ { "version": "v1", "created": "Tue, 18 Nov 2014 15:07:19 GMT" } ]
2014-11-24T00:00:00
[ [ "Zia", "M. Zeeshan", "" ], [ "Stark", "Michael", "" ], [ "Schindler", "Konrad", "" ] ]
TITLE: Towards Scene Understanding with Detailed 3D Object Representations ABSTRACT: Current approaches to semantic image and scene understanding typically employ rather simple object representations such as 2D or 3D bounding boxes. While such coarse models are robust and allow for reliable object detection, they discard much of the information about objects' 3D shape and pose, and thus do not lend themselves well to higher-level reasoning. Here, we propose to base scene understanding on a high-resolution object representation. An object class - in our case cars - is modeled as a deformable 3D wireframe, which enables fine-grained modeling at the level of individual vertices and faces. We augment that model to explicitly include vertex-level occlusion, and embed all instances in a common coordinate frame, in order to infer and exploit object-object interactions. Specifically, from a single view we jointly estimate the shapes and poses of multiple objects in a common 3D frame. A ground plane in that frame is estimated by consensus among different objects, which significantly stabilizes monocular 3D pose estimation. The fine-grained model, in conjunction with the explicit 3D scene model, further allows one to infer part-level occlusions between the modeled objects, as well as occlusions by other, unmodeled scene elements. To demonstrate the benefits of such detailed object class models in the context of scene understanding we systematically evaluate our approach on the challenging KITTI street scene dataset. The experiments show that the model's ability to utilize image evidence at the level of individual parts improves monocular 3D pose estimation w.r.t. both location and (continuous) viewpoint.
1411.5995
George Ovchinnikov
G.V. Ovchinnikov, D.A. Kolesnikov, I.V. Oseledets
Algebraic reputation model RepRank and its application to spambot detection
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to popularity surge social networks became lucrative targets for spammers and guerilla marketers, who are trying to game ranking systems and broadcast their messages at little to none cost. Ranking systems, for example Twitter's Trends, can be gamed by scripted users also called bots, who are automatically or semi-automatically twitting essentially the same message. Judging by the prices and abundance of supply from PR firms this is an easy to implement and widely used tactic, at least in Russian blogosphere. Aggregative analysis of social networks should at best mark those messages as spam or at least correctly downplay their importance as they represent opinions only of a few, if dedicated, users. Hence bot detection plays a crucial role in social network mining and analysis. In this paper we propose technique called RepRank which could be viewed as Markov chain based model for reputation propagation on graphs utilizing simultaneous trust and anti-trust propagation and provide effective numerical approach for its computation. Comparison with another models such as TrustRank and some of its modifications on sample of 320000 Russian speaking Twitter users is presented. The dataset is presented as well.
[ { "version": "v1", "created": "Thu, 20 Nov 2014 13:50:39 GMT" } ]
2014-11-24T00:00:00
[ [ "Ovchinnikov", "G. V.", "" ], [ "Kolesnikov", "D. A.", "" ], [ "Oseledets", "I. V.", "" ] ]
TITLE: Algebraic reputation model RepRank and its application to spambot detection ABSTRACT: Due to popularity surge social networks became lucrative targets for spammers and guerilla marketers, who are trying to game ranking systems and broadcast their messages at little to none cost. Ranking systems, for example Twitter's Trends, can be gamed by scripted users also called bots, who are automatically or semi-automatically twitting essentially the same message. Judging by the prices and abundance of supply from PR firms this is an easy to implement and widely used tactic, at least in Russian blogosphere. Aggregative analysis of social networks should at best mark those messages as spam or at least correctly downplay their importance as they represent opinions only of a few, if dedicated, users. Hence bot detection plays a crucial role in social network mining and analysis. In this paper we propose technique called RepRank which could be viewed as Markov chain based model for reputation propagation on graphs utilizing simultaneous trust and anti-trust propagation and provide effective numerical approach for its computation. Comparison with another models such as TrustRank and some of its modifications on sample of 320000 Russian speaking Twitter users is presented. The dataset is presented as well.
1307.3176
L.A. Prashanth
Nathaniel Korda, Prashanth L.A. and R\'emi Munos
Fast gradient descent for drifting least squares regression, with application to bandits
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online learning algorithms require to often recompute least squares regression estimates of parameters. We study improving the computational complexity of such algorithms by using stochastic gradient descent (SGD) type schemes in place of classic regression solvers. We show that SGD schemes efficiently track the true solutions of the regression problems, even in the presence of a drift. This finding coupled with an $O(d)$ improvement in complexity, where $d$ is the dimension of the data, make them attractive for implementation in the big data settings. In the case when strong convexity in the regression problem is guaranteed, we provide bounds on the error both in expectation and high probability (the latter is often needed to provide theoretical guarantees for higher level algorithms), despite the drifting least squares solution. As an example of this case we prove that the regret performance of an SGD version of the PEGE linear bandit algorithm [Rusmevichientong and Tsitsiklis 2010] is worse that that of PEGE itself only by a factor of $O(\log^4 n)$. When strong convexity of the regression problem cannot be guaranteed, we investigate using an adaptive regularisation. We make an empirical study of an adaptively regularised, SGD version of LinUCB [Li et al. 2010] in a news article recommendation application, which uses the large scale news recommendation dataset from Yahoo! front page. These experiments show a large gain in computational complexity, with a consistently low tracking error and click-through-rate (CTR) performance that is $75\%$ close.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 16:36:29 GMT" }, { "version": "v2", "created": "Wed, 19 Feb 2014 00:27:18 GMT" }, { "version": "v3", "created": "Thu, 24 Jul 2014 14:29:52 GMT" }, { "version": "v4", "created": "Thu, 20 Nov 2014 12:40:48 GMT" } ]
2014-11-21T00:00:00
[ [ "Korda", "Nathaniel", "" ], [ "A.", "Prashanth L.", "" ], [ "Munos", "Rémi", "" ] ]
TITLE: Fast gradient descent for drifting least squares regression, with application to bandits ABSTRACT: Online learning algorithms require to often recompute least squares regression estimates of parameters. We study improving the computational complexity of such algorithms by using stochastic gradient descent (SGD) type schemes in place of classic regression solvers. We show that SGD schemes efficiently track the true solutions of the regression problems, even in the presence of a drift. This finding coupled with an $O(d)$ improvement in complexity, where $d$ is the dimension of the data, make them attractive for implementation in the big data settings. In the case when strong convexity in the regression problem is guaranteed, we provide bounds on the error both in expectation and high probability (the latter is often needed to provide theoretical guarantees for higher level algorithms), despite the drifting least squares solution. As an example of this case we prove that the regret performance of an SGD version of the PEGE linear bandit algorithm [Rusmevichientong and Tsitsiklis 2010] is worse that that of PEGE itself only by a factor of $O(\log^4 n)$. When strong convexity of the regression problem cannot be guaranteed, we investigate using an adaptive regularisation. We make an empirical study of an adaptively regularised, SGD version of LinUCB [Li et al. 2010] in a news article recommendation application, which uses the large scale news recommendation dataset from Yahoo! front page. These experiments show a large gain in computational complexity, with a consistently low tracking error and click-through-rate (CTR) performance that is $75\%$ close.
1406.6312
Ahmed El-Kishky
Ahmed El-Kishky, Yanglei Song, Chi Wang, Clare Voss, Jiawei Han
Scalable Topical Phrase Mining from Text Corpora
null
Proceedings of the VLDB Endowment, Vol. 8(3), pp. 305 - 316, 2014
null
null
cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While most topic modeling algorithms model text corpora with unigrams, human interpretation often relies on inherent grouping of terms into phrases. As such, we consider the problem of discovering topical phrases of mixed lengths. Existing work either performs post processing to the inference results of unigram-based topic models, or utilizes complex n-gram-discovery topic models. These methods generally produce low-quality topical phrases or suffer from poor scalability on even moderately-sized datasets. We propose a different approach that is both computationally efficient and effective. Our solution combines a novel phrase mining framework to segment a document into single and multi-word phrases, and a new topic model that operates on the induced document partition. Our approach discovers high quality topical phrases with negligible extra cost to the bag-of-words topic model in a variety of datasets including research publication titles, abstracts, reviews, and news articles.
[ { "version": "v1", "created": "Tue, 24 Jun 2014 17:10:29 GMT" }, { "version": "v2", "created": "Wed, 19 Nov 2014 00:18:06 GMT" } ]
2014-11-20T00:00:00
[ [ "El-Kishky", "Ahmed", "" ], [ "Song", "Yanglei", "" ], [ "Wang", "Chi", "" ], [ "Voss", "Clare", "" ], [ "Han", "Jiawei", "" ] ]
TITLE: Scalable Topical Phrase Mining from Text Corpora ABSTRACT: While most topic modeling algorithms model text corpora with unigrams, human interpretation often relies on inherent grouping of terms into phrases. As such, we consider the problem of discovering topical phrases of mixed lengths. Existing work either performs post processing to the inference results of unigram-based topic models, or utilizes complex n-gram-discovery topic models. These methods generally produce low-quality topical phrases or suffer from poor scalability on even moderately-sized datasets. We propose a different approach that is both computationally efficient and effective. Our solution combines a novel phrase mining framework to segment a document into single and multi-word phrases, and a new topic model that operates on the induced document partition. Our approach discovers high quality topical phrases with negligible extra cost to the bag-of-words topic model in a variety of datasets including research publication titles, abstracts, reviews, and news articles.
1407.7094
Bruno Gon\c{c}alves
Bruno Gon\c{c}alves and David S\'anchez
Crowdsourcing Dialect Characterization through Twitter
10 pages, 5 figures
PLoS One 9, E112074 (2014)
10.1371/journal.pone.0112074
null
physics.soc-ph cs.CL cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform a large-scale analysis of language diatopic variation using geotagged microblogging datasets. By collecting all Twitter messages written in Spanish over more than two years, we build a corpus from which a carefully selected list of concepts allows us to characterize Spanish varieties on a global scale. A cluster analysis proves the existence of well defined macroregions sharing common lexical properties. Remarkably enough, we find that Spanish language is split into two superdialects, namely, an urban speech used across major American and Spanish citites and a diverse form that encompasses rural areas and small towns. The latter can be further clustered into smaller varieties with a stronger regional character.
[ { "version": "v1", "created": "Sat, 26 Jul 2014 04:16:31 GMT" } ]
2014-11-20T00:00:00
[ [ "Gonçalves", "Bruno", "" ], [ "Sánchez", "David", "" ] ]
TITLE: Crowdsourcing Dialect Characterization through Twitter ABSTRACT: We perform a large-scale analysis of language diatopic variation using geotagged microblogging datasets. By collecting all Twitter messages written in Spanish over more than two years, we build a corpus from which a carefully selected list of concepts allows us to characterize Spanish varieties on a global scale. A cluster analysis proves the existence of well defined macroregions sharing common lexical properties. Remarkably enough, we find that Spanish language is split into two superdialects, namely, an urban speech used across major American and Spanish citites and a diverse form that encompasses rural areas and small towns. The latter can be further clustered into smaller varieties with a stronger regional character.
1410.0745
Robinson Piramuthu Robinson Piramuthu
Qiaosong Wang, Vignesh Jagadeesh, Bryan Ressler, Robinson Piramuthu
Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer Depth Camera and Synthetic Data
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in consumer depth sensors have created many opportunities for human body measurement and modeling. Estimation of 3D body shape is particularly useful for fashion e-commerce applications such as virtual try-on or fit personalization. In this paper, we propose a method for capturing accurate human body shape and anthropometrics from a single consumer grade depth sensor. We first generate a large dataset of synthetic 3D human body models using real-world body size distributions. Next, we estimate key body measurements from a single monocular depth image. We combine body measurement estimates with local geometry features around key joint positions to form a robust multi-dimensional feature vector. This allows us to conduct a fast nearest-neighbor search to every sample in the dataset and return the closest one. Compared to existing methods, our approach is able to predict accurate full body parameters from a partial view using measurement parameters learned from the synthetic dataset. Furthermore, our system is capable of generating 3D human mesh models in real-time, which is significantly faster than methods which attempt to model shape and pose deformations. To validate the efficiency and applicability of our system, we collected a dataset that contains frontal and back scans of 83 clothed people with ground truth height and weight. Experiments on real-world dataset show that the proposed method can achieve real-time performance with competing results achieving an average error of 1.9 cm in estimated measurements.
[ { "version": "v1", "created": "Fri, 3 Oct 2014 02:33:08 GMT" }, { "version": "v2", "created": "Wed, 19 Nov 2014 20:30:32 GMT" } ]
2014-11-20T00:00:00
[ [ "Wang", "Qiaosong", "" ], [ "Jagadeesh", "Vignesh", "" ], [ "Ressler", "Bryan", "" ], [ "Piramuthu", "Robinson", "" ] ]
TITLE: Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer Depth Camera and Synthetic Data ABSTRACT: Recent advances in consumer depth sensors have created many opportunities for human body measurement and modeling. Estimation of 3D body shape is particularly useful for fashion e-commerce applications such as virtual try-on or fit personalization. In this paper, we propose a method for capturing accurate human body shape and anthropometrics from a single consumer grade depth sensor. We first generate a large dataset of synthetic 3D human body models using real-world body size distributions. Next, we estimate key body measurements from a single monocular depth image. We combine body measurement estimates with local geometry features around key joint positions to form a robust multi-dimensional feature vector. This allows us to conduct a fast nearest-neighbor search to every sample in the dataset and return the closest one. Compared to existing methods, our approach is able to predict accurate full body parameters from a partial view using measurement parameters learned from the synthetic dataset. Furthermore, our system is capable of generating 3D human mesh models in real-time, which is significantly faster than methods which attempt to model shape and pose deformations. To validate the efficiency and applicability of our system, we collected a dataset that contains frontal and back scans of 83 clothed people with ground truth height and weight. Experiments on real-world dataset show that the proposed method can achieve real-time performance with competing results achieving an average error of 1.9 cm in estimated measurements.
1411.5140
Qian Wang
Qian Wang, Jiaxing Zhang, Sen Song, Zheng Zhang
Attentional Neural Network: Feature Selection Using Cognitive Feedback
Poster in Neural Information Processing Systems (NIPS) 2014
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Attentional Neural Network is a new framework that integrates top-down cognitive bias and bottom-up feature extraction in one coherent architecture. The top-down influence is especially effective when dealing with high noise or difficult segmentation problems. Our system is modular and extensible. It is also easy to train and cheap to run, and yet can accommodate complex behaviors. We obtain classification accuracy better than or competitive with state of art results on the MNIST variation dataset, and successfully disentangle overlaid digits with high success rates. We view such a general purpose framework as an essential foundation for a larger system emulating the cognitive abilities of the whole brain.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 08:33:28 GMT" } ]
2014-11-20T00:00:00
[ [ "Wang", "Qian", "" ], [ "Zhang", "Jiaxing", "" ], [ "Song", "Sen", "" ], [ "Zhang", "Zheng", "" ] ]
TITLE: Attentional Neural Network: Feature Selection Using Cognitive Feedback ABSTRACT: Attentional Neural Network is a new framework that integrates top-down cognitive bias and bottom-up feature extraction in one coherent architecture. The top-down influence is especially effective when dealing with high noise or difficult segmentation problems. Our system is modular and extensible. It is also easy to train and cheap to run, and yet can accommodate complex behaviors. We obtain classification accuracy better than or competitive with state of art results on the MNIST variation dataset, and successfully disentangle overlaid digits with high success rates. We view such a general purpose framework as an essential foundation for a larger system emulating the cognitive abilities of the whole brain.
1411.5204
Diego Saez-Trumper
Alessandro Venerandi, Giovanni Quattrone, Licia Capra, Daniele Quercia, Diego Saez-Trumper
Measuring Urban Deprivation from User Generated Content
CSCW'15, March 14 - 18 2015, Vancouver, BC, Canada
null
10.1145/2675133.2675233
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Measuring socioeconomic deprivation of cities in an accurate and timely fashion has become a priority for governments around the world, as the massive urbanization process we are witnessing is causing high levels of inequalities which require intervention. Traditionally, deprivation indexes have been derived from census data, which is however very expensive to obtain, and thus acquired only every few years. Alternative computational methods have been proposed in recent years to automatically extract proxies of deprivation at a fine spatio-temporal level of granularity; however, they usually require access to datasets (e.g., call details records) that are not publicly available to governments and agencies. To remedy this, we propose a new method to automatically mine deprivation at a fine level of spatio-temporal granularity that only requires access to freely available user-generated content. More precisely, the method needs access to datasets describing what urban elements are present in the physical environment; examples of such datasets are Foursquare and OpenStreetMap. Using these datasets, we quantitatively describe neighborhoods by means of a metric, called {\em Offering Advantage}, that reflects which urban elements are distinctive features of each neighborhood. We then use that metric to {\em (i)} build accurate classifiers of urban deprivation and {\em (ii)} interpret the outcomes through thematic analysis. We apply the method to three UK urban areas of different scale and elaborate on the results in terms of precision and recall.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 12:44:12 GMT" } ]
2014-11-20T00:00:00
[ [ "Venerandi", "Alessandro", "" ], [ "Quattrone", "Giovanni", "" ], [ "Capra", "Licia", "" ], [ "Quercia", "Daniele", "" ], [ "Saez-Trumper", "Diego", "" ] ]
TITLE: Measuring Urban Deprivation from User Generated Content ABSTRACT: Measuring socioeconomic deprivation of cities in an accurate and timely fashion has become a priority for governments around the world, as the massive urbanization process we are witnessing is causing high levels of inequalities which require intervention. Traditionally, deprivation indexes have been derived from census data, which is however very expensive to obtain, and thus acquired only every few years. Alternative computational methods have been proposed in recent years to automatically extract proxies of deprivation at a fine spatio-temporal level of granularity; however, they usually require access to datasets (e.g., call details records) that are not publicly available to governments and agencies. To remedy this, we propose a new method to automatically mine deprivation at a fine level of spatio-temporal granularity that only requires access to freely available user-generated content. More precisely, the method needs access to datasets describing what urban elements are present in the physical environment; examples of such datasets are Foursquare and OpenStreetMap. Using these datasets, we quantitatively describe neighborhoods by means of a metric, called {\em Offering Advantage}, that reflects which urban elements are distinctive features of each neighborhood. We then use that metric to {\em (i)} build accurate classifiers of urban deprivation and {\em (ii)} interpret the outcomes through thematic analysis. We apply the method to three UK urban areas of different scale and elaborate on the results in terms of precision and recall.
1411.5260
Patrick Kimes
Patrick K. Kimes, D. Neil Hayes, J. S. Marron and Yufeng Liu
Large-Margin Classification with Multiple Decision Rules
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary classification is a common statistical learning problem in which a model is estimated on a set of covariates for some outcome indicating the membership of one of two classes. In the literature, there exists a distinction between hard and soft classification. In soft classification, the conditional class probability is modeled as a function of the covariates. In contrast, hard classification methods only target the optimal prediction boundary. While hard and soft classification methods have been studied extensively, not much work has been done to compare the actual tasks of hard and soft classification. In this paper we propose a spectrum of statistical learning problems which span the hard and soft classification tasks based on fitting multiple decision rules to the data. By doing so, we reveal a novel collection of learning tasks of increasing complexity. We study the problems using the framework of large-margin classifiers and a class of piecewise linear convex surrogates, for which we derive statistical properties and a corresponding sub-gradient descent algorithm. We conclude by applying our approach to simulation settings and a magnetic resonance imaging (MRI) dataset from the Alzheimer's Disease Neuroimaging Initiative (ADNI) study.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 15:45:54 GMT" } ]
2014-11-20T00:00:00
[ [ "Kimes", "Patrick K.", "" ], [ "Hayes", "D. Neil", "" ], [ "Marron", "J. S.", "" ], [ "Liu", "Yufeng", "" ] ]
TITLE: Large-Margin Classification with Multiple Decision Rules ABSTRACT: Binary classification is a common statistical learning problem in which a model is estimated on a set of covariates for some outcome indicating the membership of one of two classes. In the literature, there exists a distinction between hard and soft classification. In soft classification, the conditional class probability is modeled as a function of the covariates. In contrast, hard classification methods only target the optimal prediction boundary. While hard and soft classification methods have been studied extensively, not much work has been done to compare the actual tasks of hard and soft classification. In this paper we propose a spectrum of statistical learning problems which span the hard and soft classification tasks based on fitting multiple decision rules to the data. By doing so, we reveal a novel collection of learning tasks of increasing complexity. We study the problems using the framework of large-margin classifiers and a class of piecewise linear convex surrogates, for which we derive statistical properties and a corresponding sub-gradient descent algorithm. We conclude by applying our approach to simulation settings and a magnetic resonance imaging (MRI) dataset from the Alzheimer's Disease Neuroimaging Initiative (ADNI) study.
1411.5283
Zaid Alyasseri
Zaid Abdi Alkareem Alyasseri, Kadhim Al-Attar, Mazin Nasser
Parallelize Bubble and Merge Sort Algorithms Using Message Passing Interface (MPI)
5 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:1407.6603
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sorting has been a profound area for the algorithmic researchers and many resources are invested to suggest more works for sorting algorithms. For this purpose, many existing sorting algorithms were observed in terms of the efficiency of the algorithmic complexity. In this paper we implemented the bubble and merge sort algorithms using Message Passing Interface (MPI) approach. The proposed work tested on two standard datasets (text file) with different size. The main idea of the proposed algorithm is distributing the elements of the input datasets into many additional temporary sub-arrays according to a number of characters in each word. The sizes of each of these sub-arrays are decided depending on a number of elements with the same number of characters in the input array. We implemented MPI using Intel core i7-3610QM ,(8 CPUs),using two approaches (vectors of string and array 3D) . Finally, we get the data structure effects on the performance of the algorithm for that we choice the second approach.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 16:35:16 GMT" } ]
2014-11-20T00:00:00
[ [ "Alyasseri", "Zaid Abdi Alkareem", "" ], [ "Al-Attar", "Kadhim", "" ], [ "Nasser", "Mazin", "" ] ]
TITLE: Parallelize Bubble and Merge Sort Algorithms Using Message Passing Interface (MPI) ABSTRACT: Sorting has been a profound area for the algorithmic researchers and many resources are invested to suggest more works for sorting algorithms. For this purpose, many existing sorting algorithms were observed in terms of the efficiency of the algorithmic complexity. In this paper we implemented the bubble and merge sort algorithms using Message Passing Interface (MPI) approach. The proposed work tested on two standard datasets (text file) with different size. The main idea of the proposed algorithm is distributing the elements of the input datasets into many additional temporary sub-arrays according to a number of characters in each word. The sizes of each of these sub-arrays are decided depending on a number of elements with the same number of characters in the input array. We implemented MPI using Intel core i7-3610QM ,(8 CPUs),using two approaches (vectors of string and array 3D) . Finally, we get the data structure effects on the performance of the algorithm for that we choice the second approach.
1411.5307
Robinson Piramuthu Robinson Piramuthu
Kevin Shih, Wei Di, Vignesh Jagadeesh, Robinson Piramuthu
Efficient Media Retrieval from Non-Cooperative Queries
8 pages, 9 figures, 1 table
null
null
null
cs.IR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text is ubiquitous in the artificial world and easily attainable when it comes to book title and author names. Using the images from the book cover set from the Stanford Mobile Visual Search dataset and additional book covers and metadata from openlibrary.org, we construct a large scale book cover retrieval dataset, complete with 100K distractor covers and title and author strings for each. Because our query images are poorly conditioned for clean text extraction, we propose a method for extracting a matching noisy and erroneous OCR readings and matching it against clean author and book title strings in a standard document look-up problem setup. Finally, we demonstrate how to use this text-matching as a feature in conjunction with popular retrieval features such as VLAD using a simple learning setup to achieve significant improvements in retrieval accuracy over that of either VLAD or the text alone.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 18:34:28 GMT" } ]
2014-11-20T00:00:00
[ [ "Shih", "Kevin", "" ], [ "Di", "Wei", "" ], [ "Jagadeesh", "Vignesh", "" ], [ "Piramuthu", "Robinson", "" ] ]
TITLE: Efficient Media Retrieval from Non-Cooperative Queries ABSTRACT: Text is ubiquitous in the artificial world and easily attainable when it comes to book title and author names. Using the images from the book cover set from the Stanford Mobile Visual Search dataset and additional book covers and metadata from openlibrary.org, we construct a large scale book cover retrieval dataset, complete with 100K distractor covers and title and author strings for each. Because our query images are poorly conditioned for clean text extraction, we propose a method for extracting a matching noisy and erroneous OCR readings and matching it against clean author and book title strings in a standard document look-up problem setup. Finally, we demonstrate how to use this text-matching as a feature in conjunction with popular retrieval features such as VLAD using a simple learning setup to achieve significant improvements in retrieval accuracy over that of either VLAD or the text alone.
1411.5309
David Eigen
Li Wan and David Eigen and Rob Fergus
End-to-End Integration of a Convolutional Network, Deformable Parts Model and Non-Maximum Suppression
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deformable Parts Models and Convolutional Networks each have achieved notable performance in object detection. Yet these two approaches find their strengths in complementary areas: DPMs are well-versed in object composition, modeling fine-grained spatial relationships between parts; likewise, ConvNets are adept at producing powerful image features, having been discriminatively trained directly on the pixels. In this paper, we propose a new model that combines these two approaches, obtaining the advantages of each. We train this model using a new structured loss function that considers all bounding boxes within an image, rather than isolated object instances. This enables the non-maximal suppression (NMS) operation, previously treated as a separate post-processing stage, to be integrated into the model. This allows for discriminative training of our combined Convnet + DPM + NMS model in end-to-end fashion. We evaluate our system on PASCAL VOC 2007 and 2011 datasets, achieving competitive results on both benchmarks.
[ { "version": "v1", "created": "Wed, 19 Nov 2014 18:36:09 GMT" } ]
2014-11-20T00:00:00
[ [ "Wan", "Li", "" ], [ "Eigen", "David", "" ], [ "Fergus", "Rob", "" ] ]
TITLE: End-to-End Integration of a Convolutional Network, Deformable Parts Model and Non-Maximum Suppression ABSTRACT: Deformable Parts Models and Convolutional Networks each have achieved notable performance in object detection. Yet these two approaches find their strengths in complementary areas: DPMs are well-versed in object composition, modeling fine-grained spatial relationships between parts; likewise, ConvNets are adept at producing powerful image features, having been discriminatively trained directly on the pixels. In this paper, we propose a new model that combines these two approaches, obtaining the advantages of each. We train this model using a new structured loss function that considers all bounding boxes within an image, rather than isolated object instances. This enables the non-maximal suppression (NMS) operation, previously treated as a separate post-processing stage, to be integrated into the model. This allows for discriminative training of our combined Convnet + DPM + NMS model in end-to-end fashion. We evaluate our system on PASCAL VOC 2007 and 2011 datasets, achieving competitive results on both benchmarks.
1402.5138
Dieter Pfoser
Mahmuda Ahmed and Sophia Karagiorgou and Dieter Pfoser and Carola Wenk
A Comparison and Evaluation of Map Construction Algorithms
null
null
10.1007/s10707-014-0222-6
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Map construction methods automatically produce and/or update road network datasets using vehicle tracking data. Enabled by the ubiquitous generation of georeferenced tracking data, there has been a recent surge in map construction algorithms coming from different computer science domains. A cross-comparison of the various algorithms is still very rare, since (i) algorithms and constructed maps are generally not publicly available and (ii) there is no standard approach to assess the result quality, given the lack of benchmark data and quantitative evaluation methods. This work represents a first comprehensive attempt to benchmark map construction algorithms. We provide an evaluation and comparison of seven algorithms using four datasets and four different evaluation measures. In addition to this comprehensive comparison, we make our datasets, source code of map construction algorithms and evaluation measures publicly available on mapconstruction.org. This site has been established as a repository for map con- struction data and algorithms and we invite other researchers to contribute by uploading code and benchmark data supporting their contributions to map construction algorithms.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 21:50:39 GMT" }, { "version": "v2", "created": "Thu, 12 Jun 2014 14:51:46 GMT" } ]
2014-11-19T00:00:00
[ [ "Ahmed", "Mahmuda", "" ], [ "Karagiorgou", "Sophia", "" ], [ "Pfoser", "Dieter", "" ], [ "Wenk", "Carola", "" ] ]
TITLE: A Comparison and Evaluation of Map Construction Algorithms ABSTRACT: Map construction methods automatically produce and/or update road network datasets using vehicle tracking data. Enabled by the ubiquitous generation of georeferenced tracking data, there has been a recent surge in map construction algorithms coming from different computer science domains. A cross-comparison of the various algorithms is still very rare, since (i) algorithms and constructed maps are generally not publicly available and (ii) there is no standard approach to assess the result quality, given the lack of benchmark data and quantitative evaluation methods. This work represents a first comprehensive attempt to benchmark map construction algorithms. We provide an evaluation and comparison of seven algorithms using four datasets and four different evaluation measures. In addition to this comprehensive comparison, we make our datasets, source code of map construction algorithms and evaluation measures publicly available on mapconstruction.org. This site has been established as a repository for map con- struction data and algorithms and we invite other researchers to contribute by uploading code and benchmark data supporting their contributions to map construction algorithms.
1409.6911
Zhiqiang Shen
Zhiqiang Shen and Xiangyang Xue
Do More Dropouts in Pool5 Feature Maps for Better Object Detection
9 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Convolutional Neural Networks (CNNs) have gained great success in image classification and object detection. In these fields, the outputs of all layers of CNNs are usually considered as a high dimensional feature vector extracted from an input image and the correspondence between finer level feature vectors and concepts that the input image contains is all-important. However, fewer studies focus on this deserving issue. On considering the correspondence, we propose a novel approach which generates an edited version for each original CNN feature vector by applying the maximum entropy principle to abandon particular vectors. These selected vectors correspond to the unfriendly concepts in each image category. The classifier trained from merged feature sets can significantly improve model generalization of individual categories when training data is limited. The experimental results for classification-based object detection on canonical datasets including VOC 2007 (60.1%), 2010 (56.4%) and 2012 (56.3%) show obvious improvement in mean average precision (mAP) with simple linear support vector machines.
[ { "version": "v1", "created": "Wed, 24 Sep 2014 11:50:48 GMT" }, { "version": "v2", "created": "Mon, 17 Nov 2014 12:27:23 GMT" }, { "version": "v3", "created": "Tue, 18 Nov 2014 17:34:22 GMT" } ]
2014-11-19T00:00:00
[ [ "Shen", "Zhiqiang", "" ], [ "Xue", "Xiangyang", "" ] ]
TITLE: Do More Dropouts in Pool5 Feature Maps for Better Object Detection ABSTRACT: Deep Convolutional Neural Networks (CNNs) have gained great success in image classification and object detection. In these fields, the outputs of all layers of CNNs are usually considered as a high dimensional feature vector extracted from an input image and the correspondence between finer level feature vectors and concepts that the input image contains is all-important. However, fewer studies focus on this deserving issue. On considering the correspondence, we propose a novel approach which generates an edited version for each original CNN feature vector by applying the maximum entropy principle to abandon particular vectors. These selected vectors correspond to the unfriendly concepts in each image category. The classifier trained from merged feature sets can significantly improve model generalization of individual categories when training data is limited. The experimental results for classification-based object detection on canonical datasets including VOC 2007 (60.1%), 2010 (56.4%) and 2012 (56.3%) show obvious improvement in mean average precision (mAP) with simple linear support vector machines.
1411.4670
Mohamed Hussein
Mohamed E. Hussein and Marwan Torki and Ahmed Elsallamy and Mahmoud Fayyaz
AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline Arabic Handwriting Recognition
6 pages, 8 figure, and 6 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce the first phase of a new dataset for offline Arabic handwriting recognition. The aim is to collect a very large dataset of isolated Arabic words that covers all letters of the alphabet in all possible shapes using a small number of simple words. The end goal is to collect a very large dataset of segmented letter images, which can be used to build and evaluate Arabic handwriting recognition systems that are based on segmented letter recognition. The current version of the dataset contains $25114$ samples of $109$ unique Arabic words that cover all possible shapes of all alphabet letters. The samples were collected from $907$ writers. In its current form, the dataset can be used for the problem of closed-vocabulary word recognition. We evaluated a number of window-based descriptors and classifiers on this task and obtained an accuracy of $92.16\%$ using a SIFT-based descriptor and ANN.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 21:23:26 GMT" } ]
2014-11-19T00:00:00
[ [ "Hussein", "Mohamed E.", "" ], [ "Torki", "Marwan", "" ], [ "Elsallamy", "Ahmed", "" ], [ "Fayyaz", "Mahmoud", "" ] ]
TITLE: AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline Arabic Handwriting Recognition ABSTRACT: In this paper, we introduce the first phase of a new dataset for offline Arabic handwriting recognition. The aim is to collect a very large dataset of isolated Arabic words that covers all letters of the alphabet in all possible shapes using a small number of simple words. The end goal is to collect a very large dataset of segmented letter images, which can be used to build and evaluate Arabic handwriting recognition systems that are based on segmented letter recognition. The current version of the dataset contains $25114$ samples of $109$ unique Arabic words that cover all possible shapes of all alphabet letters. The samples were collected from $907$ writers. In its current form, the dataset can be used for the problem of closed-vocabulary word recognition. We evaluated a number of window-based descriptors and classifiers on this task and obtained an accuracy of $92.16\%$ using a SIFT-based descriptor and ANN.
1411.4958
Xiaolong Wang
Xiaolong Wang, David F. Fouhey, Abhinav Gupta
Designing Deep Networks for Surface Normal Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years, convolutional neural nets (CNN) have shown incredible promise for learning visual representations. In this paper, we use CNNs for the task of predicting surface normals from a single image. But what is the right architecture we should use? We propose to build upon the decades of hard work in 3D scene understanding, to design new CNN architecture for the task of surface normal estimation. We show by incorporating several constraints (man-made, manhattan world) and meaningful intermediate representations (room layout, edge labels) in the architecture leads to state of the art performance on surface normal estimation. We also show that our network is quite robust and show state of the art results on other datasets as well without any fine-tuning.
[ { "version": "v1", "created": "Tue, 18 Nov 2014 18:39:48 GMT" } ]
2014-11-19T00:00:00
[ [ "Wang", "Xiaolong", "" ], [ "Fouhey", "David F.", "" ], [ "Gupta", "Abhinav", "" ] ]
TITLE: Designing Deep Networks for Surface Normal Estimation ABSTRACT: In the past few years, convolutional neural nets (CNN) have shown incredible promise for learning visual representations. In this paper, we use CNNs for the task of predicting surface normals from a single image. But what is the right architecture we should use? We propose to build upon the decades of hard work in 3D scene understanding, to design new CNN architecture for the task of surface normal estimation. We show by incorporating several constraints (man-made, manhattan world) and meaningful intermediate representations (room layout, edge labels) in the architecture leads to state of the art performance on surface normal estimation. We also show that our network is quite robust and show state of the art results on other datasets as well without any fine-tuning.
1411.4960
Ana Me\v{s}trovi\'c
Hana Rizvi\'c, Sanda Martin\v{c}i\'c-Ip\v{s}i\'c, Ana Me\v{s}trovi\'c
Network Motifs Analysis of Croatian Literature
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyse network motifs in the co-occurrence directed networks constructed from five different texts (four books and one portal) in the Croatian language. After preparing the data and network construction, we perform the network motif analysis. We analyse the motif frequencies and Z-scores in the five networks. We present the triad significance profile for five datasets. Furthermore, we compare our results with the existing results for the linguistic networks. Firstly, we show that the triad significance profile for the Croatian language is very similar with the other languages and all the networks belong to the same family of networks. However, there are certain differences between the Croatian language and other analysed languages. We conclude that this is due to the free word-order of the Croatian language.
[ { "version": "v1", "created": "Tue, 18 Nov 2014 18:46:36 GMT" } ]
2014-11-19T00:00:00
[ [ "Rizvić", "Hana", "" ], [ "Martinčić-Ipšić", "Sanda", "" ], [ "Meštrović", "Ana", "" ] ]
TITLE: Network Motifs Analysis of Croatian Literature ABSTRACT: In this paper we analyse network motifs in the co-occurrence directed networks constructed from five different texts (four books and one portal) in the Croatian language. After preparing the data and network construction, we perform the network motif analysis. We analyse the motif frequencies and Z-scores in the five networks. We present the triad significance profile for five datasets. Furthermore, we compare our results with the existing results for the linguistic networks. Firstly, we show that the triad significance profile for the Croatian language is very similar with the other languages and all the networks belong to the same family of networks. However, there are certain differences between the Croatian language and other analysed languages. We conclude that this is due to the free word-order of the Croatian language.
1303.2042
Matthew Amy
Matthew Amy, Dmitri Maslov, and Michele Mosca
Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid Partitioning
Version 2 contains substantial improvements and extensions to the previous version. We describe a new, more robust algorithm and achieve significantly improved experimental results
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33(10): 1476-1489, 2014
10.1109/TCAD.2014.2341953
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most work in quantum circuit optimization has been performed in isolation from the results of quantum fault-tolerance. Here we present a polynomial-time algorithm for optimizing quantum circuits that takes the actual implementation of fault-tolerant logical gates into consideration. Our algorithm re-synthesizes quantum circuits composed of Clifford group and T gates, the latter being typically the most costly gate in fault-tolerant models, e.g., those based on the Steane or surface codes, with the purpose of minimizing both T-count and T-depth. A major feature of the algorithm is the ability to re-synthesize circuits with additional ancillae to reduce T-depth at effectively no cost. The tested benchmarks show up to 65.7% reduction in T-count and up to 87.6% reduction in T-depth without ancillae, or 99.7% reduction in T-depth using ancillae.
[ { "version": "v1", "created": "Fri, 8 Mar 2013 16:20:34 GMT" }, { "version": "v2", "created": "Fri, 13 Dec 2013 17:31:54 GMT" } ]
2014-11-18T00:00:00
[ [ "Amy", "Matthew", "" ], [ "Maslov", "Dmitri", "" ], [ "Mosca", "Michele", "" ] ]
TITLE: Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid Partitioning ABSTRACT: Most work in quantum circuit optimization has been performed in isolation from the results of quantum fault-tolerance. Here we present a polynomial-time algorithm for optimizing quantum circuits that takes the actual implementation of fault-tolerant logical gates into consideration. Our algorithm re-synthesizes quantum circuits composed of Clifford group and T gates, the latter being typically the most costly gate in fault-tolerant models, e.g., those based on the Steane or surface codes, with the purpose of minimizing both T-count and T-depth. A major feature of the algorithm is the ability to re-synthesize circuits with additional ancillae to reduce T-depth at effectively no cost. The tested benchmarks show up to 65.7% reduction in T-count and up to 87.6% reduction in T-depth without ancillae, or 99.7% reduction in T-depth using ancillae.
1403.3155
Fei-Yun Zhu
Feiyun Zhu, Ying Wang, Bin Fan, Gaofeng Meng, Shiming Xiang and Chunhong Pan
Spectral Unmixing via Data-guided Sparsity
null
null
10.1109/TIP.2014.2363423
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperspectral unmixing, the process of estimating a common set of spectral bases and their corresponding composite percentages at each pixel, is an important task for hyperspectral analysis, visualization and understanding. From an unsupervised learning perspective, this problem is very challenging---both the spectral bases and their composite percentages are unknown, making the solution space too large. To reduce the solution space, many approaches have been proposed by exploiting various priors. In practice, these priors would easily lead to some unsuitable solution. This is because they are achieved by applying an identical strength of constraints to all the factors, which does not hold in practice. To overcome this limitation, we propose a novel sparsity based method by learning a data-guided map to describe the individual mixed level of each pixel. Through this data-guided map, the $\ell_{p}(0<p<1)$ constraint is applied in an adaptive manner. Such implementation not only meets the practical situation, but also guides the spectral bases toward the pixels under highly sparse constraint. What's more, an elegant optimization scheme as well as its convergence proof have been provided in this paper. Extensive experiments on several datasets also demonstrate that the data-guided map is feasible, and high quality unmixing results could be obtained by our method.
[ { "version": "v1", "created": "Thu, 13 Mar 2014 03:29:22 GMT" }, { "version": "v2", "created": "Mon, 14 Jul 2014 13:49:14 GMT" }, { "version": "v3", "created": "Fri, 19 Sep 2014 02:59:51 GMT" }, { "version": "v4", "created": "Mon, 17 Nov 2014 15:18:15 GMT" } ]
2014-11-18T00:00:00
[ [ "Zhu", "Feiyun", "" ], [ "Wang", "Ying", "" ], [ "Fan", "Bin", "" ], [ "Meng", "Gaofeng", "" ], [ "Xiang", "Shiming", "" ], [ "Pan", "Chunhong", "" ] ]
TITLE: Spectral Unmixing via Data-guided Sparsity ABSTRACT: Hyperspectral unmixing, the process of estimating a common set of spectral bases and their corresponding composite percentages at each pixel, is an important task for hyperspectral analysis, visualization and understanding. From an unsupervised learning perspective, this problem is very challenging---both the spectral bases and their composite percentages are unknown, making the solution space too large. To reduce the solution space, many approaches have been proposed by exploiting various priors. In practice, these priors would easily lead to some unsuitable solution. This is because they are achieved by applying an identical strength of constraints to all the factors, which does not hold in practice. To overcome this limitation, we propose a novel sparsity based method by learning a data-guided map to describe the individual mixed level of each pixel. Through this data-guided map, the $\ell_{p}(0<p<1)$ constraint is applied in an adaptive manner. Such implementation not only meets the practical situation, but also guides the spectral bases toward the pixels under highly sparse constraint. What's more, an elegant optimization scheme as well as its convergence proof have been provided in this paper. Extensive experiments on several datasets also demonstrate that the data-guided map is feasible, and high quality unmixing results could be obtained by our method.
1407.4764
Ken Chatfield
Ken Chatfield, Karen Simonyan and Andrew Zisserman
Efficient On-the-fly Category Retrieval using ConvNets and GPUs
Published in proceedings of ACCV 2014
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the gains in precision and speed, that can be obtained by using Convolutional Networks (ConvNets) for on-the-fly retrieval - where classifiers are learnt at run time for a textual query from downloaded images, and used to rank large image or video datasets. We make three contributions: (i) we present an evaluation of state-of-the-art image representations for object category retrieval over standard benchmark datasets containing 1M+ images; (ii) we show that ConvNets can be used to obtain features which are incredibly performant, and yet much lower dimensional than previous state-of-the-art image representations, and that their dimensionality can be reduced further without loss in performance by compression using product quantization or binarization. Consequently, features with the state-of-the-art performance on large-scale datasets of millions of images can fit in the memory of even a commodity GPU card; (iii) we show that an SVM classifier can be learnt within a ConvNet framework on a GPU in parallel with downloading the new training images, allowing for a continuous refinement of the model as more images become available, and simultaneous training and ranking. The outcome is an on-the-fly system that significantly outperforms its predecessors in terms of: precision of retrieval, memory requirements, and speed, facilitating accurate on-the-fly learning and ranking in under a second on a single GPU.
[ { "version": "v1", "created": "Thu, 17 Jul 2014 18:29:38 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2014 08:27:23 GMT" }, { "version": "v3", "created": "Mon, 17 Nov 2014 12:10:23 GMT" } ]
2014-11-18T00:00:00
[ [ "Chatfield", "Ken", "" ], [ "Simonyan", "Karen", "" ], [ "Zisserman", "Andrew", "" ] ]
TITLE: Efficient On-the-fly Category Retrieval using ConvNets and GPUs ABSTRACT: We investigate the gains in precision and speed, that can be obtained by using Convolutional Networks (ConvNets) for on-the-fly retrieval - where classifiers are learnt at run time for a textual query from downloaded images, and used to rank large image or video datasets. We make three contributions: (i) we present an evaluation of state-of-the-art image representations for object category retrieval over standard benchmark datasets containing 1M+ images; (ii) we show that ConvNets can be used to obtain features which are incredibly performant, and yet much lower dimensional than previous state-of-the-art image representations, and that their dimensionality can be reduced further without loss in performance by compression using product quantization or binarization. Consequently, features with the state-of-the-art performance on large-scale datasets of millions of images can fit in the memory of even a commodity GPU card; (iii) we show that an SVM classifier can be learnt within a ConvNet framework on a GPU in parallel with downloading the new training images, allowing for a continuous refinement of the model as more images become available, and simultaneous training and ranking. The outcome is an on-the-fly system that significantly outperforms its predecessors in terms of: precision of retrieval, memory requirements, and speed, facilitating accurate on-the-fly learning and ranking in under a second on a single GPU.
1407.7061
Ciaran McCreesh
Ciaran McCreesh and Patrick Prosser
A Parallel Branch and Bound Algorithm for the Maximum Labelled Clique Problem
Author-final version. Accepted to Optimization Letters
null
null
null
cs.DS cs.DC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The maximum labelled clique problem is a variant of the maximum clique problem where edges in the graph are given labels, and we are not allowed to use more than a certain number of distinct labels in a solution. We introduce a new branch-and-bound algorithm for the problem, and explain how it may be parallelised. We evaluate an implementation on a set of benchmark instances, and show that it is consistently faster than previously published results, sometimes by four or five orders of magnitude.
[ { "version": "v1", "created": "Fri, 25 Jul 2014 21:11:13 GMT" }, { "version": "v2", "created": "Mon, 17 Nov 2014 14:46:09 GMT" } ]
2014-11-18T00:00:00
[ [ "McCreesh", "Ciaran", "" ], [ "Prosser", "Patrick", "" ] ]
TITLE: A Parallel Branch and Bound Algorithm for the Maximum Labelled Clique Problem ABSTRACT: The maximum labelled clique problem is a variant of the maximum clique problem where edges in the graph are given labels, and we are not allowed to use more than a certain number of distinct labels in a solution. We introduce a new branch-and-bound algorithm for the problem, and explain how it may be parallelised. We evaluate an implementation on a set of benchmark instances, and show that it is consistently faster than previously published results, sometimes by four or five orders of magnitude.
1409.3660
Fei-Yun Zhu
Feiyun Zhu, Bin Fan, Xinliang Zhu, Ying Wang, Shiming Xiang and Chunhong Pan
10,000+ Times Accelerated Robust Subset Selection (ARSS)
null
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Subset selection from massive data with noised information is increasingly popular for various applications. This problem is still highly challenging as current methods are generally slow in speed and sensitive to outliers. To address the above two issues, we propose an accelerated robust subset selection (ARSS) method. Specifically in the subset selection area, this is the first attempt to employ the $\ell_{p}(0<p\leq1)$-norm based measure for the representation loss, preventing large errors from dominating our objective. As a result, the robustness against outlier elements is greatly enhanced. Actually, data size is generally much larger than feature length, i.e. $N\gg L$. Based on this observation, we propose a speedup solver (via ALM and equivalent derivations) to highly reduce the computational cost, theoretically from $O(N^{4})$ to $O(N{}^{2}L)$. Extensive experiments on ten benchmark datasets verify that our method not only outperforms state of the art methods, but also runs 10,000+ times faster than the most related method.
[ { "version": "v1", "created": "Fri, 12 Sep 2014 07:18:17 GMT" }, { "version": "v2", "created": "Fri, 19 Sep 2014 02:49:19 GMT" }, { "version": "v3", "created": "Mon, 13 Oct 2014 07:58:57 GMT" }, { "version": "v4", "created": "Mon, 17 Nov 2014 14:39:31 GMT" } ]
2014-11-18T00:00:00
[ [ "Zhu", "Feiyun", "" ], [ "Fan", "Bin", "" ], [ "Zhu", "Xinliang", "" ], [ "Wang", "Ying", "" ], [ "Xiang", "Shiming", "" ], [ "Pan", "Chunhong", "" ] ]
TITLE: 10,000+ Times Accelerated Robust Subset Selection (ARSS) ABSTRACT: Subset selection from massive data with noised information is increasingly popular for various applications. This problem is still highly challenging as current methods are generally slow in speed and sensitive to outliers. To address the above two issues, we propose an accelerated robust subset selection (ARSS) method. Specifically in the subset selection area, this is the first attempt to employ the $\ell_{p}(0<p\leq1)$-norm based measure for the representation loss, preventing large errors from dominating our objective. As a result, the robustness against outlier elements is greatly enhanced. Actually, data size is generally much larger than feature length, i.e. $N\gg L$. Based on this observation, we propose a speedup solver (via ALM and equivalent derivations) to highly reduce the computational cost, theoretically from $O(N^{4})$ to $O(N{}^{2}L)$. Extensive experiments on ten benchmark datasets verify that our method not only outperforms state of the art methods, but also runs 10,000+ times faster than the most related method.
1411.3519
Mohamed Hussein
Marwan Torki, Mohamed E. Hussein, Ahmed Elsallamy, Mahmoud Fayyaz, Shehab Yaser
Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A Comparative Study on a Novel Dataset
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a comparative study for window-based descriptors on the application of Arabic handwritten alphabet recognition. We show a detailed experimental evaluation of different descriptors with several classifiers. The objective of the paper is to evaluate different window-based descriptors on the problem of Arabic letter recognition. Our experiments clearly show that they perform very well. Moreover, we introduce a novel spatial pyramid partitioning scheme that enhances the recognition accuracy for most descriptors. In addition, we introduce a novel dataset for Arabic handwritten isolated alphabet letters, which can serve as a benchmark for future research.
[ { "version": "v1", "created": "Thu, 13 Nov 2014 12:22:57 GMT" }, { "version": "v2", "created": "Mon, 17 Nov 2014 17:55:32 GMT" } ]
2014-11-18T00:00:00
[ [ "Torki", "Marwan", "" ], [ "Hussein", "Mohamed E.", "" ], [ "Elsallamy", "Ahmed", "" ], [ "Fayyaz", "Mahmoud", "" ], [ "Yaser", "Shehab", "" ] ]
TITLE: Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A Comparative Study on a Novel Dataset ABSTRACT: This paper presents a comparative study for window-based descriptors on the application of Arabic handwritten alphabet recognition. We show a detailed experimental evaluation of different descriptors with several classifiers. The objective of the paper is to evaluate different window-based descriptors on the problem of Arabic letter recognition. Our experiments clearly show that they perform very well. Moreover, we introduce a novel spatial pyramid partitioning scheme that enhances the recognition accuracy for most descriptors. In addition, we introduce a novel dataset for Arabic handwritten isolated alphabet letters, which can serve as a benchmark for future research.
1411.4068
Anh Pham The
Anh T. Pham, Raviv Raich, and Xiaoli Z. Fern
Dynamic Programming for Instance Annotation in Multi-instance Multi-label Learning
null
null
null
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Labeling data for classification requires significant human effort. To reduce labeling cost, instead of labeling every instance, a group of instances (bag) is labeled by a single bag label. Computer algorithms are then used to infer the label for each instance in a bag, a process referred to as instance annotation. This task is challenging due to the ambiguity regarding the instance labels. We propose a discriminative probabilistic model for the instance annotation problem and introduce an expectation maximization framework for inference, based on the maximum likelihood approach. For many probabilistic approaches, brute-force computation of the instance label posterior probability given its bag label is exponential in the number of instances in the bag. Our key contribution is a dynamic programming method for computing the posterior that is linear in the number of instances. We evaluate our methods using both benchmark and real world data sets, in the domain of bird song, image annotation, and activity recognition. In many cases, the proposed framework outperforms, sometimes significantly, the current state-of-the-art MIML learning methods, both in instance label prediction and bag label prediction.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 21:59:38 GMT" } ]
2014-11-18T00:00:00
[ [ "Pham", "Anh T.", "" ], [ "Raich", "Raviv", "" ], [ "Fern", "Xiaoli Z.", "" ] ]
TITLE: Dynamic Programming for Instance Annotation in Multi-instance Multi-label Learning ABSTRACT: Labeling data for classification requires significant human effort. To reduce labeling cost, instead of labeling every instance, a group of instances (bag) is labeled by a single bag label. Computer algorithms are then used to infer the label for each instance in a bag, a process referred to as instance annotation. This task is challenging due to the ambiguity regarding the instance labels. We propose a discriminative probabilistic model for the instance annotation problem and introduce an expectation maximization framework for inference, based on the maximum likelihood approach. For many probabilistic approaches, brute-force computation of the instance label posterior probability given its bag label is exponential in the number of instances in the bag. Our key contribution is a dynamic programming method for computing the posterior that is linear in the number of instances. We evaluate our methods using both benchmark and real world data sets, in the domain of bird song, image annotation, and activity recognition. In many cases, the proposed framework outperforms, sometimes significantly, the current state-of-the-art MIML learning methods, both in instance label prediction and bag label prediction.
1411.4080
Miriam Redi
Miriam Redi, Neil O Hare, Rossano Schifanella, Michele Trevisiol, Alejandro Jaimes
6 Seconds of Sound and Vision: Creativity in Micro-Videos
8 pages, 1 figures, conference IEEE CVPR 2014
null
10.1109/CVPR.2014.544
null
cs.MM cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of creativity, as opposed to related concepts such as beauty or interestingness, has not been studied from the perspective of automatic analysis of multimedia content. Meanwhile, short online videos shared on social media platforms, or micro-videos, have arisen as a new medium for creative expression. In this paper we study creative micro-videos in an effort to understand the features that make a video creative, and to address the problem of automatic detection of creative content. Defining creative videos as those that are novel and have aesthetic value, we conduct a crowdsourcing experiment to create a dataset of over 3,800 micro-videos labelled as creative and non-creative. We propose a set of computational features that we map to the components of our definition of creativity, and conduct an analysis to determine which of these features correlate most with creative video. Finally, we evaluate a supervised approach to automatically detect creative video, with promising results, showing that it is necessary to model both aesthetic value and novelty to achieve optimal classification accuracy.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 23:29:18 GMT" } ]
2014-11-18T00:00:00
[ [ "Redi", "Miriam", "" ], [ "Hare", "Neil O", "" ], [ "Schifanella", "Rossano", "" ], [ "Trevisiol", "Michele", "" ], [ "Jaimes", "Alejandro", "" ] ]
TITLE: 6 Seconds of Sound and Vision: Creativity in Micro-Videos ABSTRACT: The notion of creativity, as opposed to related concepts such as beauty or interestingness, has not been studied from the perspective of automatic analysis of multimedia content. Meanwhile, short online videos shared on social media platforms, or micro-videos, have arisen as a new medium for creative expression. In this paper we study creative micro-videos in an effort to understand the features that make a video creative, and to address the problem of automatic detection of creative content. Defining creative videos as those that are novel and have aesthetic value, we conduct a crowdsourcing experiment to create a dataset of over 3,800 micro-videos labelled as creative and non-creative. We propose a set of computational features that we map to the components of our definition of creativity, and conduct an analysis to determine which of these features correlate most with creative video. Finally, we evaluate a supervised approach to automatically detect creative video, with promising results, showing that it is necessary to model both aesthetic value and novelty to achieve optimal classification accuracy.
1411.4086
Hongwei Li
Hongwei Li and Bin Yu
Error Rate Bounds and Iterative Weighted Majority Voting for Crowdsourcing
Journal Submission
null
null
null
stat.ML cs.HC cs.LG math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowdsourcing has become an effective and popular tool for human-powered computation to label large datasets. Since the workers can be unreliable, it is common in crowdsourcing to assign multiple workers to one task, and to aggregate the labels in order to obtain results of high quality. In this paper, we provide finite-sample exponential bounds on the error rate (in probability and in expectation) of general aggregation rules under the Dawid-Skene crowdsourcing model. The bounds are derived for multi-class labeling, and can be used to analyze many aggregation methods, including majority voting, weighted majority voting and the oracle Maximum A Posteriori (MAP) rule. We show that the oracle MAP rule approximately optimizes our upper bound on the mean error rate of weighted majority voting in certain setting. We propose an iterative weighted majority voting (IWMV) method that optimizes the error rate bound and approximates the oracle MAP rule. Its one step version has a provable theoretical guarantee on the error rate. The IWMV method is intuitive and computationally simple. Experimental results on simulated and real data show that IWMV performs at least on par with the state-of-the-art methods, and it has a much lower computational cost (around one hundred times faster) than the state-of-the-art methods.
[ { "version": "v1", "created": "Sat, 15 Nov 2014 00:02:34 GMT" } ]
2014-11-18T00:00:00
[ [ "Li", "Hongwei", "" ], [ "Yu", "Bin", "" ] ]
TITLE: Error Rate Bounds and Iterative Weighted Majority Voting for Crowdsourcing ABSTRACT: Crowdsourcing has become an effective and popular tool for human-powered computation to label large datasets. Since the workers can be unreliable, it is common in crowdsourcing to assign multiple workers to one task, and to aggregate the labels in order to obtain results of high quality. In this paper, we provide finite-sample exponential bounds on the error rate (in probability and in expectation) of general aggregation rules under the Dawid-Skene crowdsourcing model. The bounds are derived for multi-class labeling, and can be used to analyze many aggregation methods, including majority voting, weighted majority voting and the oracle Maximum A Posteriori (MAP) rule. We show that the oracle MAP rule approximately optimizes our upper bound on the mean error rate of weighted majority voting in certain setting. We propose an iterative weighted majority voting (IWMV) method that optimizes the error rate bound and approximates the oracle MAP rule. Its one step version has a provable theoretical guarantee on the error rate. The IWMV method is intuitive and computationally simple. Experimental results on simulated and real data show that IWMV performs at least on par with the state-of-the-art methods, and it has a much lower computational cost (around one hundred times faster) than the state-of-the-art methods.
1411.4101
Rahul Mohan Mr.
Rahul Mohan
Deep Deconvolutional Networks for Scene Parsing
null
null
null
null
stat.ML cs.CV cs.LG
http://creativecommons.org/licenses/by/3.0/
Scene parsing is an important and challenging prob- lem in computer vision. It requires labeling each pixel in an image with the category it belongs to. Tradition- ally, it has been approached with hand-engineered features from color information in images. Recently convolutional neural networks (CNNs), which automatically learn hierar- chies of features, have achieved record performance on the task. These approaches typically include a post-processing technique, such as superpixels, to produce the final label- ing. In this paper, we propose a novel network architecture that combines deep deconvolutional neural networks with CNNs. Our experiments show that deconvolutional neu- ral networks are capable of learning higher order image structure beyond edge primitives in comparison to CNNs. The new network architecture is employed for multi-patch training, introduced as part of this work. Multi-patch train- ing makes it possible to effectively learn spatial priors from scenes. The proposed approach yields state-of-the-art per- formance on four scene parsing datasets, namely Stanford Background, SIFT Flow, CamVid, and KITTI. In addition, our system has the added advantage of having a training system that can be completely automated end-to-end with- out requiring any post-processing.
[ { "version": "v1", "created": "Sat, 15 Nov 2014 02:03:14 GMT" } ]
2014-11-18T00:00:00
[ [ "Mohan", "Rahul", "" ] ]
TITLE: Deep Deconvolutional Networks for Scene Parsing ABSTRACT: Scene parsing is an important and challenging prob- lem in computer vision. It requires labeling each pixel in an image with the category it belongs to. Tradition- ally, it has been approached with hand-engineered features from color information in images. Recently convolutional neural networks (CNNs), which automatically learn hierar- chies of features, have achieved record performance on the task. These approaches typically include a post-processing technique, such as superpixels, to produce the final label- ing. In this paper, we propose a novel network architecture that combines deep deconvolutional neural networks with CNNs. Our experiments show that deconvolutional neu- ral networks are capable of learning higher order image structure beyond edge primitives in comparison to CNNs. The new network architecture is employed for multi-patch training, introduced as part of this work. Multi-patch train- ing makes it possible to effectively learn spatial priors from scenes. The proposed approach yields state-of-the-art per- formance on four scene parsing datasets, namely Stanford Background, SIFT Flow, CamVid, and KITTI. In addition, our system has the added advantage of having a training system that can be completely automated end-to-end with- out requiring any post-processing.
1411.4148
Maumita Bhattacharya
Maumita Bhattacharya
Diversity Handling In Evolutionary Landscape
In the "Proceedings of the International Workshop on Combinations of Intelligent Methods and Applications (CIMA 2014)", pp. 1-8, November'2014
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The search ability of an Evolutionary Algorithm (EA) depends on the variation among the individuals in the population. Maintaining an optimal level of diversity in the EA population is imperative to ensure that progress of the EA search is unhindered by premature convergence to suboptimal solutions. Clearer understanding of the concept of population diversity, in the context of evolutionary search and premature convergence in particular, is the key to designing efficient EAs. To this end, this paper first presents a comprehensive analysis of the EA population diversity issues. Next we present an investigation on a counter-niching EA technique that introduces and maintains constructive diversity in the population. The proposed approach uses informed genetic operations to reach promising, but un-explored or under-explored areas of the search space, while discouraging premature local convergence. Simulation runs on a number of standard benchmark test functions with Genetic Algorithm (GA) implementation shows promising results.
[ { "version": "v1", "created": "Sat, 15 Nov 2014 14:19:22 GMT" } ]
2014-11-18T00:00:00
[ [ "Bhattacharya", "Maumita", "" ] ]
TITLE: Diversity Handling In Evolutionary Landscape ABSTRACT: The search ability of an Evolutionary Algorithm (EA) depends on the variation among the individuals in the population. Maintaining an optimal level of diversity in the EA population is imperative to ensure that progress of the EA search is unhindered by premature convergence to suboptimal solutions. Clearer understanding of the concept of population diversity, in the context of evolutionary search and premature convergence in particular, is the key to designing efficient EAs. To this end, this paper first presents a comprehensive analysis of the EA population diversity issues. Next we present an investigation on a counter-niching EA technique that introduces and maintains constructive diversity in the population. The proposed approach uses informed genetic operations to reach promising, but un-explored or under-explored areas of the search space, while discouraging premature local convergence. Simulation runs on a number of standard benchmark test functions with Genetic Algorithm (GA) implementation shows promising results.
1411.4199
Ke Jiang
Ke Jiang, Qichao Que, Brian Kulis
Revisiting Kernelized Locality-Sensitive Hashing for Improved Large-Scale Image Retrieval
15 pages
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple but powerful reinterpretation of kernelized locality-sensitive hashing (KLSH), a general and popular method developed in the vision community for performing approximate nearest-neighbor searches in an arbitrary reproducing kernel Hilbert space (RKHS). Our new perspective is based on viewing the steps of the KLSH algorithm in an appropriately projected space, and has several key theoretical and practical benefits. First, it eliminates the problematic conceptual difficulties that are present in the existing motivation of KLSH. Second, it yields the first formal retrieval performance bounds for KLSH. Third, our analysis reveals two techniques for boosting the empirical performance of KLSH. We evaluate these extensions on several large-scale benchmark image retrieval data sets, and show that our analysis leads to improved recall performance of at least 12%, and sometimes much higher, over the standard KLSH method.
[ { "version": "v1", "created": "Sun, 16 Nov 2014 00:08:24 GMT" } ]
2014-11-18T00:00:00
[ [ "Jiang", "Ke", "" ], [ "Que", "Qichao", "" ], [ "Kulis", "Brian", "" ] ]
TITLE: Revisiting Kernelized Locality-Sensitive Hashing for Improved Large-Scale Image Retrieval ABSTRACT: We present a simple but powerful reinterpretation of kernelized locality-sensitive hashing (KLSH), a general and popular method developed in the vision community for performing approximate nearest-neighbor searches in an arbitrary reproducing kernel Hilbert space (RKHS). Our new perspective is based on viewing the steps of the KLSH algorithm in an appropriately projected space, and has several key theoretical and practical benefits. First, it eliminates the problematic conceptual difficulties that are present in the existing motivation of KLSH. Second, it yields the first formal retrieval performance bounds for KLSH. Third, our analysis reveals two techniques for boosting the empirical performance of KLSH. We evaluate these extensions on several large-scale benchmark image retrieval data sets, and show that our analysis leads to improved recall performance of at least 12%, and sometimes much higher, over the standard KLSH method.
1411.4246
Md Lisul Islam
Md. Lisul Islam, Swakkhar Shatabda and M. Sohel Rahman
GreMuTRRR: A Novel Genetic Algorithm to Solve Distance Geometry Problem for Protein Structures
Accepted for publication in the 8th International Conference on Electrical and Computer Engineering (ICECE 2014)
null
null
null
cs.NE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nuclear Magnetic Resonance (NMR) Spectroscopy is a widely used technique to predict the native structure of proteins. However, NMR machines are only able to report approximate and partial distances between pair of atoms. To build the protein structure one has to solve the Euclidean distance geometry problem given the incomplete interval distance data produced by NMR machines. In this paper, we propose a new genetic algorithm for solving the Euclidean distance geometry problem for protein structure prediction given sparse NMR data. Our genetic algorithm uses a greedy mutation operator to intensify the search, a twin removal technique for diversification in the population and a random restart method to recover stagnation. On a standard set of benchmark dataset, our algorithm significantly outperforms standard genetic algorithms.
[ { "version": "v1", "created": "Sun, 16 Nov 2014 11:26:06 GMT" } ]
2014-11-18T00:00:00
[ [ "Islam", "Md. Lisul", "" ], [ "Shatabda", "Swakkhar", "" ], [ "Rahman", "M. Sohel", "" ] ]
TITLE: GreMuTRRR: A Novel Genetic Algorithm to Solve Distance Geometry Problem for Protein Structures ABSTRACT: Nuclear Magnetic Resonance (NMR) Spectroscopy is a widely used technique to predict the native structure of proteins. However, NMR machines are only able to report approximate and partial distances between pair of atoms. To build the protein structure one has to solve the Euclidean distance geometry problem given the incomplete interval distance data produced by NMR machines. In this paper, we propose a new genetic algorithm for solving the Euclidean distance geometry problem for protein structure prediction given sparse NMR data. Our genetic algorithm uses a greedy mutation operator to intensify the search, a twin removal technique for diversification in the population and a random restart method to recover stagnation. On a standard set of benchmark dataset, our algorithm significantly outperforms standard genetic algorithms.
1411.4304
Rodrigo Benenson
Rodrigo Benenson, Mohamed Omran, Jan Hosang, Bernt Schiele
Ten Years of Pedestrian Detection, What Have We Learned?
To appear in ECCV 2014 CVRSUAD workshop proceedings
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paper-by-paper results make it easy to miss the forest for the trees.We analyse the remarkable progress of the last decade by discussing the main ideas explored in the 40+ detectors currently present in the Caltech pedestrian detection benchmark. We observe that there exist three families of approaches, all currently reaching similar detection quality. Based on our analysis, we study the complementarity of the most promising ideas by combining multiple published strategies. This new decision forest detector achieves the current best known performance on the challenging Caltech-USA dataset.
[ { "version": "v1", "created": "Sun, 16 Nov 2014 21:25:53 GMT" } ]
2014-11-18T00:00:00
[ [ "Benenson", "Rodrigo", "" ], [ "Omran", "Mohamed", "" ], [ "Hosang", "Jan", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: Ten Years of Pedestrian Detection, What Have We Learned? ABSTRACT: Paper-by-paper results make it easy to miss the forest for the trees.We analyse the remarkable progress of the last decade by discussing the main ideas explored in the 40+ detectors currently present in the Caltech pedestrian detection benchmark. We observe that there exist three families of approaches, all currently reaching similar detection quality. Based on our analysis, we study the complementarity of the most promising ideas by combining multiple published strategies. This new decision forest detector achieves the current best known performance on the challenging Caltech-USA dataset.
1411.4314
Nikolai Sinitsyn
Benjamin H. Sims, Nikolai Sinitsyn, and Stephan J. Eidenbenz
Hierarchical and Matrix Structures in a Large Organizational Email Network: Visualization and Modeling Approaches
15 pages, 9 figures
null
null
null
cs.SI physics.soc-ph stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents findings from a study of the email network of a large scientific research organization, focusing on methods for visualizing and modeling organizational hierarchies within large, complex network datasets. In the first part of the paper, we find that visualization and interpretation of complex organizational network data is facilitated by integration of network data with information on formal organizational divisions and levels. By aggregating and visualizing email traffic between organizational units at various levels, we derive several insights into how large subdivisions of the organization interact with each other and with outside organizations. Our analysis shows that line and program management interactions in this organization systematically deviate from the idealized pattern of interaction prescribed by "matrix management." In the second part of the paper, we propose a power law model for predicting degree distribution of organizational email traffic based on hierarchical relationships between managers and employees. This model considers the influence of global email announcements sent from managers to all employees under their supervision, and the role support staff play in generating email traffic, acting as agents for managers. We also analyze patterns in email traffic volume over the course of a work week.
[ { "version": "v1", "created": "Sun, 16 Nov 2014 22:22:54 GMT" } ]
2014-11-18T00:00:00
[ [ "Sims", "Benjamin H.", "" ], [ "Sinitsyn", "Nikolai", "" ], [ "Eidenbenz", "Stephan J.", "" ] ]
TITLE: Hierarchical and Matrix Structures in a Large Organizational Email Network: Visualization and Modeling Approaches ABSTRACT: This paper presents findings from a study of the email network of a large scientific research organization, focusing on methods for visualizing and modeling organizational hierarchies within large, complex network datasets. In the first part of the paper, we find that visualization and interpretation of complex organizational network data is facilitated by integration of network data with information on formal organizational divisions and levels. By aggregating and visualizing email traffic between organizational units at various levels, we derive several insights into how large subdivisions of the organization interact with each other and with outside organizations. Our analysis shows that line and program management interactions in this organization systematically deviate from the idealized pattern of interaction prescribed by "matrix management." In the second part of the paper, we propose a power law model for predicting degree distribution of organizational email traffic based on hierarchical relationships between managers and employees. This model considers the influence of global email announcements sent from managers to all employees under their supervision, and the role support staff play in generating email traffic, acting as agents for managers. We also analyze patterns in email traffic volume over the course of a work week.
1411.4331
Jie Shen
Weipeng Zhang, Jie Shen, Guangcan Liu, Yong Yu
A Latent Clothing Attribute Approach for Human Pose Estimation
accepted to ACCV 2014, preceding work http://arxiv.org/abs/1404.4923
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a fundamental technique that concerns several vision tasks such as image parsing, action recognition and clothing retrieval, human pose estimation (HPE) has been extensively investigated in recent years. To achieve accurate and reliable estimation of the human pose, it is well-recognized that the clothing attributes are useful and should be utilized properly. Most previous approaches, however, require to manually annotate the clothing attributes and are therefore very costly. In this paper, we shall propose and explore a \emph{latent} clothing attribute approach for HPE. Unlike previous approaches, our approach models the clothing attributes as latent variables and thus requires no explicit labeling for the clothing attributes. The inference of the latent variables are accomplished by utilizing the framework of latent structured support vector machines (LSSVM). We employ the strategy of \emph{alternating direction} to train the LSSVM model: In each iteration, one kind of variables (e.g., human pose or clothing attribute) are fixed and the others are optimized. Our extensive experiments on two real-world benchmarks show the state-of-the-art performance of our proposed approach.
[ { "version": "v1", "created": "Sun, 16 Nov 2014 23:47:59 GMT" } ]
2014-11-18T00:00:00
[ [ "Zhang", "Weipeng", "" ], [ "Shen", "Jie", "" ], [ "Liu", "Guangcan", "" ], [ "Yu", "Yong", "" ] ]
TITLE: A Latent Clothing Attribute Approach for Human Pose Estimation ABSTRACT: As a fundamental technique that concerns several vision tasks such as image parsing, action recognition and clothing retrieval, human pose estimation (HPE) has been extensively investigated in recent years. To achieve accurate and reliable estimation of the human pose, it is well-recognized that the clothing attributes are useful and should be utilized properly. Most previous approaches, however, require to manually annotate the clothing attributes and are therefore very costly. In this paper, we shall propose and explore a \emph{latent} clothing attribute approach for HPE. Unlike previous approaches, our approach models the clothing attributes as latent variables and thus requires no explicit labeling for the clothing attributes. The inference of the latent variables are accomplished by utilizing the framework of latent structured support vector machines (LSSVM). We employ the strategy of \emph{alternating direction} to train the LSSVM model: In each iteration, one kind of variables (e.g., human pose or clothing attribute) are fixed and the others are optimized. Our extensive experiments on two real-world benchmarks show the state-of-the-art performance of our proposed approach.
1411.4379
Md Lisul Islam
Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda and M Sohel Rahman
FGPGA: An Efficient Genetic Approach for Producing Feasible Graph Partitions
Accepted in the 1st International Conference on Networking Systems and Security 2015 (NSysS 2015)
null
null
null
cs.NE cs.AI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph partitioning, a well studied problem of parallel computing has many applications in diversified fields such as distributed computing, social network analysis, data mining and many other domains. In this paper, we introduce FGPGA, an efficient genetic approach for producing feasible graph partitions. Our method takes into account the heterogeneity and capacity constraints of the partitions to ensure balanced partitioning. Such approach has various applications in mobile cloud computing that include feasible deployment of software applications on the more resourceful infrastructure in the cloud instead of mobile hand set. Our proposed approach is light weight and hence suitable for use in cloud architecture. We ensure feasibility of the partitions generated by not allowing over-sized partitions to be generated during the initialization and search. Our proposed method tested on standard benchmark datasets significantly outperforms the state-of-the-art methods in terms of quality of partitions and feasibility of the solutions.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 06:51:50 GMT" } ]
2014-11-18T00:00:00
[ [ "Islam", "Md. Lisul", "" ], [ "Nurain", "Novia", "" ], [ "Shatabda", "Swakkhar", "" ], [ "Rahman", "M Sohel", "" ] ]
TITLE: FGPGA: An Efficient Genetic Approach for Producing Feasible Graph Partitions ABSTRACT: Graph partitioning, a well studied problem of parallel computing has many applications in diversified fields such as distributed computing, social network analysis, data mining and many other domains. In this paper, we introduce FGPGA, an efficient genetic approach for producing feasible graph partitions. Our method takes into account the heterogeneity and capacity constraints of the partitions to ensure balanced partitioning. Such approach has various applications in mobile cloud computing that include feasible deployment of software applications on the more resourceful infrastructure in the cloud instead of mobile hand set. Our proposed approach is light weight and hence suitable for use in cloud architecture. We ensure feasibility of the partitions generated by not allowing over-sized partitions to be generated during the initialization and search. Our proposed method tested on standard benchmark datasets significantly outperforms the state-of-the-art methods in terms of quality of partitions and feasibility of the solutions.
1411.4455
Miao Fan
Miao Fan, Deli Zhao, Qiang Zhou, Zhiyuan Liu, Thomas Fang Zheng, Edward Y. Chang
Errata: Distant Supervision for Relation Extraction with Matrix Completion
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The essence of distantly supervised relation extraction is that it is an incomplete multi-label classification problem with sparse and noisy features. To tackle the sparsity and noise challenges, we propose solving the classification problem using matrix completion on factorized matrix of minimized rank. We formulate relation classification as completing the unknown labels of testing items (entity pairs) in a sparse matrix that concatenates training and testing textual features with training labels. Our algorithmic framework is based on the assumption that the rank of item-by-feature and item-by-label joint matrix is low. We apply two optimization models to recover the underlying low-rank matrix leveraging the sparsity of feature-label matrix. The matrix completion problem is then solved by the fixed point continuation (FPC) algorithm, which can find the global optimum. Experiments on two widely used datasets with different dimensions of textual features demonstrate that our low-rank matrix completion approach significantly outperforms the baseline and the state-of-the-art methods.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 12:43:30 GMT" } ]
2014-11-18T00:00:00
[ [ "Fan", "Miao", "" ], [ "Zhao", "Deli", "" ], [ "Zhou", "Qiang", "" ], [ "Liu", "Zhiyuan", "" ], [ "Zheng", "Thomas Fang", "" ], [ "Chang", "Edward Y.", "" ] ]
TITLE: Errata: Distant Supervision for Relation Extraction with Matrix Completion ABSTRACT: The essence of distantly supervised relation extraction is that it is an incomplete multi-label classification problem with sparse and noisy features. To tackle the sparsity and noise challenges, we propose solving the classification problem using matrix completion on factorized matrix of minimized rank. We formulate relation classification as completing the unknown labels of testing items (entity pairs) in a sparse matrix that concatenates training and testing textual features with training labels. Our algorithmic framework is based on the assumption that the rank of item-by-feature and item-by-label joint matrix is low. We apply two optimization models to recover the underlying low-rank matrix leveraging the sparsity of feature-label matrix. The matrix completion problem is then solved by the fixed point continuation (FPC) algorithm, which can find the global optimum. Experiments on two widely used datasets with different dimensions of textual features demonstrate that our low-rank matrix completion approach significantly outperforms the baseline and the state-of-the-art methods.
1411.4464
Kai Kang
Kai Kang, Xiaogang Wang
Fully Convolutional Neural Networks for Crowd Segmentation
9 pages,7 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a fast fully convolutional neural network (FCNN) for crowd segmentation. By replacing the fully connected layers in CNN with 1 by 1 convolution kernels, FCNN takes whole images as inputs and directly outputs segmentation maps by one pass of forward propagation. It has the property of translation invariance like patch-by-patch scanning but with much lower computation cost. Once FCNN is learned, it can process input images of any sizes without warping them to a standard size. These attractive properties make it extendable to other general image segmentation problems. Based on FCNN, a multi-stage deep learning is proposed to integrate appearance and motion cues for crowd segmentation. Both appearance filters and motion filers are pretrained stage-by-stage and then jointly optimized. Different combination methods are investigated. The effectiveness of our approach and component-wise analysis are evaluated on two crowd segmentation datasets created by us, which include image frames from 235 and 11 scenes, respectively. They are currently the largest crowd segmentation datasets and will be released to the public.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 13:09:09 GMT" } ]
2014-11-18T00:00:00
[ [ "Kang", "Kai", "" ], [ "Wang", "Xiaogang", "" ] ]
TITLE: Fully Convolutional Neural Networks for Crowd Segmentation ABSTRACT: In this paper, we propose a fast fully convolutional neural network (FCNN) for crowd segmentation. By replacing the fully connected layers in CNN with 1 by 1 convolution kernels, FCNN takes whole images as inputs and directly outputs segmentation maps by one pass of forward propagation. It has the property of translation invariance like patch-by-patch scanning but with much lower computation cost. Once FCNN is learned, it can process input images of any sizes without warping them to a standard size. These attractive properties make it extendable to other general image segmentation problems. Based on FCNN, a multi-stage deep learning is proposed to integrate appearance and motion cues for crowd segmentation. Both appearance filters and motion filers are pretrained stage-by-stage and then jointly optimized. Different combination methods are investigated. The effectiveness of our approach and component-wise analysis are evaluated on two crowd segmentation datasets created by us, which include image frames from 235 and 11 scenes, respectively. They are currently the largest crowd segmentation datasets and will be released to the public.
1411.4472
Andrej Gajduk
Andrej Gajduk and Ljupco Kocarev
Opinion mining of text documents written in Macedonian language
In press, MASA proceedings
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to extract public opinion from web portals such as review sites, social networks and blogs will enable companies and individuals to form a view, an attitude and make decisions without having to do lengthy and costly researches and surveys. In this paper machine learning techniques are used for determining the polarity of forum posts on kajgana which are written in Macedonian language. The posts are classified as being positive, negative or neutral. We test different feature metrics and classifiers and provide detailed evaluation of their participation in improving the overall performance on a manually generated dataset. By achieving 92% accuracy, we show that the performance of systems for automated opinion mining is comparable to a human evaluator, thus making it a viable option for text data analysis. Finally, we present a few statistics derived from the forum posts using the developed system.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 13:36:49 GMT" } ]
2014-11-18T00:00:00
[ [ "Gajduk", "Andrej", "" ], [ "Kocarev", "Ljupco", "" ] ]
TITLE: Opinion mining of text documents written in Macedonian language ABSTRACT: The ability to extract public opinion from web portals such as review sites, social networks and blogs will enable companies and individuals to form a view, an attitude and make decisions without having to do lengthy and costly researches and surveys. In this paper machine learning techniques are used for determining the polarity of forum posts on kajgana which are written in Macedonian language. The posts are classified as being positive, negative or neutral. We test different feature metrics and classifiers and provide detailed evaluation of their participation in improving the overall performance on a manually generated dataset. By achieving 92% accuracy, we show that the performance of systems for automated opinion mining is comparable to a human evaluator, thus making it a viable option for text data analysis. Finally, we present a few statistics derived from the forum posts using the developed system.
1411.4510
Kian Hsiang Low
Kian Hsiang Low, Jiangbo Yu, Jie Chen, Patrick Jaillet
Parallel Gaussian Process Regression for Big Data: Low-Rank Representation Meets Markov Approximation
29th AAAI Conference on Artificial Intelligence (AAAI 2015), Extended version with proofs, 10 pages
null
null
null
stat.ML cs.DC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The expressive power of a Gaussian process (GP) model comes at a cost of poor scalability in the data size. To improve its scalability, this paper presents a low-rank-cum-Markov approximation (LMA) of the GP model that is novel in leveraging the dual computational advantages stemming from complementing a low-rank approximate representation of the full-rank GP based on a support set of inputs with a Markov approximation of the resulting residual process; the latter approximation is guaranteed to be closest in the Kullback-Leibler distance criterion subject to some constraint and is considerably more refined than that of existing sparse GP models utilizing low-rank representations due to its more relaxed conditional independence assumption (especially with larger data). As a result, our LMA method can trade off between the size of the support set and the order of the Markov property to (a) incur lower computational cost than such sparse GP models while achieving predictive performance comparable to them and (b) accurately represent features/patterns of any scale. Interestingly, varying the Markov order produces a spectrum of LMAs with PIC approximation and full-rank GP at the two extremes. An advantage of our LMA method is that it is amenable to parallelization on multiple machines/cores, thereby gaining greater scalability. Empirical evaluation on three real-world datasets in clusters of up to 32 computing nodes shows that our centralized and parallel LMA methods are significantly more time-efficient and scalable than state-of-the-art sparse and full-rank GP regression methods while achieving comparable predictive performances.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 15:31:04 GMT" } ]
2014-11-18T00:00:00
[ [ "Low", "Kian Hsiang", "" ], [ "Yu", "Jiangbo", "" ], [ "Chen", "Jie", "" ], [ "Jaillet", "Patrick", "" ] ]
TITLE: Parallel Gaussian Process Regression for Big Data: Low-Rank Representation Meets Markov Approximation ABSTRACT: The expressive power of a Gaussian process (GP) model comes at a cost of poor scalability in the data size. To improve its scalability, this paper presents a low-rank-cum-Markov approximation (LMA) of the GP model that is novel in leveraging the dual computational advantages stemming from complementing a low-rank approximate representation of the full-rank GP based on a support set of inputs with a Markov approximation of the resulting residual process; the latter approximation is guaranteed to be closest in the Kullback-Leibler distance criterion subject to some constraint and is considerably more refined than that of existing sparse GP models utilizing low-rank representations due to its more relaxed conditional independence assumption (especially with larger data). As a result, our LMA method can trade off between the size of the support set and the order of the Markov property to (a) incur lower computational cost than such sparse GP models while achieving predictive performance comparable to them and (b) accurately represent features/patterns of any scale. Interestingly, varying the Markov order produces a spectrum of LMAs with PIC approximation and full-rank GP at the two extremes. An advantage of our LMA method is that it is amenable to parallelization on multiple machines/cores, thereby gaining greater scalability. Empirical evaluation on three real-world datasets in clusters of up to 32 computing nodes shows that our centralized and parallel LMA methods are significantly more time-efficient and scalable than state-of-the-art sparse and full-rank GP regression methods while achieving comparable predictive performances.
1411.3159
Marcel Simon
Marcel Simon, Erik Rodner, Joachim Denzler
Part Detector Discovery in Deep Convolutional Neural Networks
Accepted for publication on Asian Conference on Computer Vision (ACCV) 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current fine-grained classification approaches often rely on a robust localization of object parts to extract localized feature representations suitable for discrimination. However, part localization is a challenging task due to the large variation of appearance and pose. In this paper, we show how pre-trained convolutional neural networks can be used for robust and efficient object part discovery and localization without the necessity to actually train the network on the current dataset. Our approach called "part detector discovery" (PDD) is based on analyzing the gradient maps of the network outputs and finding activation centers spatially related to annotated semantic parts or bounding boxes. This allows us not just to obtain excellent performance on the CUB200-2011 dataset, but in contrast to previous approaches also to perform detection and bird classification jointly without requiring a given bounding box annotation during testing and ground-truth parts during training. The code is available at http://www.inf-cv.uni-jena.de/part_discovery and https://github.com/cvjena/PartDetectorDisovery.
[ { "version": "v1", "created": "Wed, 12 Nov 2014 12:42:54 GMT" }, { "version": "v2", "created": "Fri, 14 Nov 2014 11:57:27 GMT" } ]
2014-11-17T00:00:00
[ [ "Simon", "Marcel", "" ], [ "Rodner", "Erik", "" ], [ "Denzler", "Joachim", "" ] ]
TITLE: Part Detector Discovery in Deep Convolutional Neural Networks ABSTRACT: Current fine-grained classification approaches often rely on a robust localization of object parts to extract localized feature representations suitable for discrimination. However, part localization is a challenging task due to the large variation of appearance and pose. In this paper, we show how pre-trained convolutional neural networks can be used for robust and efficient object part discovery and localization without the necessity to actually train the network on the current dataset. Our approach called "part detector discovery" (PDD) is based on analyzing the gradient maps of the network outputs and finding activation centers spatially related to annotated semantic parts or bounding boxes. This allows us not just to obtain excellent performance on the CUB200-2011 dataset, but in contrast to previous approaches also to perform detection and bird classification jointly without requiring a given bounding box annotation during testing and ground-truth parts during training. The code is available at http://www.inf-cv.uni-jena.de/part_discovery and https://github.com/cvjena/PartDetectorDisovery.
1411.3749
Timothy La Fond
Timothy La Fond, Jennifer Neville, Brian Gallagher
Anomaly Detection in Dynamic Networks of Varying Size
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic networks, also called network streams, are an important data representation that applies to many real-world domains. Many sets of network data such as e-mail networks, social networks, or internet traffic networks are best represented by a dynamic network due to the temporal component of the data. One important application in the domain of dynamic network analysis is anomaly detection. Here the task is to identify points in time where the network exhibits behavior radically different from a typical time, either due to some event (like the failure of machines in a computer network) or a shift in the network properties. This problem is made more difficult by the fluid nature of what is considered "normal" network behavior. The volume of traffic on a network, for example, can change over the course of a month or even vary based on the time of the day without being considered unusual. Anomaly detection tests using traditional network statistics have difficulty in these scenarios due to their Density Dependence: as the volume of edges changes the value of the statistics changes as well making it difficult to determine if the change in signal is due to the traffic volume or due to some fundamental shift in the behavior of the network. To more accurately detect anomalies in dynamic networks, we introduce the concept of Density-Consistent network statistics. On synthetically generated graphs anomaly detectors using these statistics show a a 20-400% improvement in the recall when distinguishing graphs drawn from different distributions. When applied to several real datasets Density-Consistent statistics recover multiple network events which standard statistics failed to find.
[ { "version": "v1", "created": "Thu, 13 Nov 2014 21:41:55 GMT" } ]
2014-11-17T00:00:00
[ [ "La Fond", "Timothy", "" ], [ "Neville", "Jennifer", "" ], [ "Gallagher", "Brian", "" ] ]
TITLE: Anomaly Detection in Dynamic Networks of Varying Size ABSTRACT: Dynamic networks, also called network streams, are an important data representation that applies to many real-world domains. Many sets of network data such as e-mail networks, social networks, or internet traffic networks are best represented by a dynamic network due to the temporal component of the data. One important application in the domain of dynamic network analysis is anomaly detection. Here the task is to identify points in time where the network exhibits behavior radically different from a typical time, either due to some event (like the failure of machines in a computer network) or a shift in the network properties. This problem is made more difficult by the fluid nature of what is considered "normal" network behavior. The volume of traffic on a network, for example, can change over the course of a month or even vary based on the time of the day without being considered unusual. Anomaly detection tests using traditional network statistics have difficulty in these scenarios due to their Density Dependence: as the volume of edges changes the value of the statistics changes as well making it difficult to determine if the change in signal is due to the traffic volume or due to some fundamental shift in the behavior of the network. To more accurately detect anomalies in dynamic networks, we introduce the concept of Density-Consistent network statistics. On synthetically generated graphs anomaly detectors using these statistics show a a 20-400% improvement in the recall when distinguishing graphs drawn from different distributions. When applied to several real datasets Density-Consistent statistics recover multiple network events which standard statistics failed to find.
1411.3787
Ping Li
Anshumali Shrivastava, Ping Li
Asymmetric Minwise Hashing
null
null
null
null
stat.ML cs.DB cs.DS cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minwise hashing (Minhash) is a widely popular indexing scheme in practice. Minhash is designed for estimating set resemblance and is known to be suboptimal in many applications where the desired measure is set overlap (i.e., inner product between binary vectors) or set containment. Minhash has inherent bias towards smaller sets, which adversely affects its performance in applications where such a penalization is not desirable. In this paper, we propose asymmetric minwise hashing (MH-ALSH), to provide a solution to this problem. The new scheme utilizes asymmetric transformations to cancel the bias of traditional minhash towards smaller sets, making the final "collision probability" monotonic in the inner product. Our theoretical comparisons show that for the task of retrieving with binary inner products asymmetric minhash is provably better than traditional minhash and other recently proposed hashing algorithms for general inner products. Thus, we obtain an algorithmic improvement over existing approaches in the literature. Experimental evaluations on four publicly available high-dimensional datasets validate our claims and the proposed scheme outperforms, often significantly, other hashing algorithms on the task of near neighbor retrieval with set containment. Our proposal is simple and easy to implement in practice.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 04:18:33 GMT" } ]
2014-11-17T00:00:00
[ [ "Shrivastava", "Anshumali", "" ], [ "Li", "Ping", "" ] ]
TITLE: Asymmetric Minwise Hashing ABSTRACT: Minwise hashing (Minhash) is a widely popular indexing scheme in practice. Minhash is designed for estimating set resemblance and is known to be suboptimal in many applications where the desired measure is set overlap (i.e., inner product between binary vectors) or set containment. Minhash has inherent bias towards smaller sets, which adversely affects its performance in applications where such a penalization is not desirable. In this paper, we propose asymmetric minwise hashing (MH-ALSH), to provide a solution to this problem. The new scheme utilizes asymmetric transformations to cancel the bias of traditional minhash towards smaller sets, making the final "collision probability" monotonic in the inner product. Our theoretical comparisons show that for the task of retrieving with binary inner products asymmetric minhash is provably better than traditional minhash and other recently proposed hashing algorithms for general inner products. Thus, we obtain an algorithmic improvement over existing approaches in the literature. Experimental evaluations on four publicly available high-dimensional datasets validate our claims and the proposed scheme outperforms, often significantly, other hashing algorithms on the task of near neighbor retrieval with set containment. Our proposal is simple and easy to implement in practice.
1411.3806
Sandhya Bansal
Sandhya Bansal, V. Katiyar
Integrating Fuzzy and Ant Colony System for Fuzzy Vehicle Routing Problem with Time Windows
null
null
null
null
cs.AI cs.CE cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper fuzzy VRPTW with an uncertain travel time is considered. Credibility theory is used to model the problem and specifies a preference index at which it is desired that the travel times to reach the customers fall into their time windows. We propose the integration of fuzzy and ant colony system based evolutionary algorithm to solve the problem while preserving the constraints. Computational results for certain benchmark problems having short and long time horizons are presented to show the effectiveness of the algorithm. Comparison between different preferences indexes have been obtained to help the user in making suitable decisions.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 06:11:48 GMT" } ]
2014-11-17T00:00:00
[ [ "Bansal", "Sandhya", "" ], [ "Katiyar", "V.", "" ] ]
TITLE: Integrating Fuzzy and Ant Colony System for Fuzzy Vehicle Routing Problem with Time Windows ABSTRACT: In this paper fuzzy VRPTW with an uncertain travel time is considered. Credibility theory is used to model the problem and specifies a preference index at which it is desired that the travel times to reach the customers fall into their time windows. We propose the integration of fuzzy and ant colony system based evolutionary algorithm to solve the problem while preserving the constraints. Computational results for certain benchmark problems having short and long time horizons are presented to show the effectiveness of the algorithm. Comparison between different preferences indexes have been obtained to help the user in making suitable decisions.