id
large_string
submitter
large_string
authors
large_string
title
large_string
comments
large_string
journal-ref
large_string
doi
large_string
report-no
large_string
categories
large_string
license
large_string
abstract
large_string
versions
large list
update_date
timestamp[ms]
authors_parsed
large list
prompt
large_string
1205.0192
Anthony J Cox
Anthony J. Cox, Markus J. Bauer, Tobias Jakobi and Giovanna Rosone
Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform
Version here is as submitted to Bioinformatics and is same as the previously archived version. This submission registers the fact that the advanced access version is now available at http://bioinformatics.oxfordjournals.org/content/early/2012/05/02/bioinformatics.bts173.abstract . Bioinformatics should be considered as the original place of publication of this article, please cite accordingly
null
10.1093/bioinformatics/bts173
null
cs.DS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for compression and indexing of text data, but the cost of computing the BWT of very large string collections has prevented these techniques from being widely applied to the large sets of sequences often encountered as the outcome of DNA sequencing experiments. In previous work, we presented a novel algorithm that allows the BWT of human genome scale data to be computed on very moderate hardware, thus enabling us to investigate the BWT as a tool for the compression of such datasets. Results We first used simulated reads to explore the relationship between the level of compression and the error rate, the length of the reads and the level of sampling of the underlying genome and compare choices of second-stage compression algorithm. We demonstrate that compression may be greatly improved by a particular reordering of the sequences in the collection and give a novel `implicit sorting' strategy that enables these benefits to be realised without the overhead of sorting the reads. With these techniques, a 45x coverage of real human genome sequence data compresses losslessly to under 0.5 bits per base, allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming a small proportion of low-quality bases from the reads improves the compression still further). This is more than 4 times smaller than the size achieved by a standard BWT-based compressor (bzip2) on the untrimmed reads, but an important further advantage of our approach is that it facilitates the building of compressed full text indexes such as the FM-index on large-scale DNA sequence collections.
[ { "version": "v1", "created": "Tue, 1 May 2012 15:39:50 GMT" }, { "version": "v2", "created": "Fri, 11 May 2012 11:22:55 GMT" } ]
2015-03-20T00:00:00
[ [ "Cox", "Anthony J.", "" ], [ "Bauer", "Markus J.", "" ], [ "Jakobi", "Tobias", "" ], [ "Rosone", "Giovanna", "" ] ]
TITLE: Large-scale compression of genomic sequence databases with the Burrows-Wheeler transform ABSTRACT: Motivation The Burrows-Wheeler transform (BWT) is the foundation of many algorithms for compression and indexing of text data, but the cost of computing the BWT of very large string collections has prevented these techniques from being widely applied to the large sets of sequences often encountered as the outcome of DNA sequencing experiments. In previous work, we presented a novel algorithm that allows the BWT of human genome scale data to be computed on very moderate hardware, thus enabling us to investigate the BWT as a tool for the compression of such datasets. Results We first used simulated reads to explore the relationship between the level of compression and the error rate, the length of the reads and the level of sampling of the underlying genome and compare choices of second-stage compression algorithm. We demonstrate that compression may be greatly improved by a particular reordering of the sequences in the collection and give a novel `implicit sorting' strategy that enables these benefits to be realised without the overhead of sorting the reads. With these techniques, a 45x coverage of real human genome sequence data compresses losslessly to under 0.5 bits per base, allowing the 135.3Gbp of sequence to fit into only 8.2Gbytes of space (trimming a small proportion of low-quality bases from the reads improves the compression still further). This is more than 4 times smaller than the size achieved by a standard BWT-based compressor (bzip2) on the untrimmed reads, but an important further advantage of our approach is that it facilitates the building of compressed full text indexes such as the FM-index on large-scale DNA sequence collections.
1205.2584
Anh Huy Phan
Anh Huy Phan and Petr Tichavsk\'y and Andrzej Cichocki
Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC
null
null
null
null
cs.NA cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP) decomposition can handle the challenges of collinearity of factors and different magnitudes of factors; nevertheless, for factorization of an $N$-D tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally demanding due to construction of large approximate Hessian of size $(RT \times RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast implementation of the dGN algorithm which is based on novel expressions of the inverse approximate Hessian in block form. The new implementation has lower computational complexity, besides computation of the gradient (this part is common to both methods), requiring the inversion of a matrix of size $NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if $T \gg NR$. In addition, the implementation has lower memory requirements, because neither the Hessian nor its inverse never need to be stored in their entirety. A variant of the algorithm working with complex valued data is proposed as well. Complexity and performance of the proposed algorithm is compared with those of dGN and ALS with line search on examples of difficult benchmark tensors.
[ { "version": "v1", "created": "Fri, 11 May 2012 17:26:21 GMT" }, { "version": "v2", "created": "Thu, 13 Sep 2012 03:14:12 GMT" } ]
2015-03-20T00:00:00
[ [ "Phan", "Anh Huy", "" ], [ "Tichavský", "Petr", "" ], [ "Cichocki", "Andrzej", "" ] ]
TITLE: Low Complexity Damped Gauss-Newton Algorithms for CANDECOMP/PARAFAC ABSTRACT: The damped Gauss-Newton (dGN) algorithm for CANDECOMP/PARAFAC (CP) decomposition can handle the challenges of collinearity of factors and different magnitudes of factors; nevertheless, for factorization of an $N$-D tensor of size $I_1\times I_N$ with rank $R$, the algorithm is computationally demanding due to construction of large approximate Hessian of size $(RT \times RT)$ and its inversion where $T = \sum_n I_n$. In this paper, we propose a fast implementation of the dGN algorithm which is based on novel expressions of the inverse approximate Hessian in block form. The new implementation has lower computational complexity, besides computation of the gradient (this part is common to both methods), requiring the inversion of a matrix of size $NR^2\times NR^2$, which is much smaller than the whole approximate Hessian, if $T \gg NR$. In addition, the implementation has lower memory requirements, because neither the Hessian nor its inverse never need to be stored in their entirety. A variant of the algorithm working with complex valued data is proposed as well. Complexity and performance of the proposed algorithm is compared with those of dGN and ALS with line search on examples of difficult benchmark tensors.
1205.2663
Ot\'avio Penatti
Otavio A. B. Penatti, Eduardo Valle, Ricardo da S. Torres
Are visual dictionaries generalizable?
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mid-level features based on visual dictionaries are today a cornerstone of systems for classification and retrieval of images. Those state-of-the-art representations depend crucially on the choice of a codebook (visual dictionary), which is usually derived from the dataset. In general-purpose, dynamic image collections (e.g., the Web), one cannot have the entire collection in order to extract a representative dictionary. However, based on the hypothesis that the dictionary reflects only the diversity of low-level appearances and does not capture semantics, we argue that a dictionary based on a small subset of the data, or even on an entirely different dataset, is able to produce a good representation, provided that the chosen images span a diverse enough portion of the low-level feature space. Our experiments confirm that hypothesis, opening the opportunity to greatly alleviate the burden in generating the codebook, and confirming the feasibility of employing visual dictionaries in large-scale dynamic environments.
[ { "version": "v1", "created": "Fri, 11 May 2012 18:54:12 GMT" } ]
2015-03-20T00:00:00
[ [ "Penatti", "Otavio A. B.", "" ], [ "Valle", "Eduardo", "" ], [ "Torres", "Ricardo da S.", "" ] ]
TITLE: Are visual dictionaries generalizable? ABSTRACT: Mid-level features based on visual dictionaries are today a cornerstone of systems for classification and retrieval of images. Those state-of-the-art representations depend crucially on the choice of a codebook (visual dictionary), which is usually derived from the dataset. In general-purpose, dynamic image collections (e.g., the Web), one cannot have the entire collection in order to extract a representative dictionary. However, based on the hypothesis that the dictionary reflects only the diversity of low-level appearances and does not capture semantics, we argue that a dictionary based on a small subset of the data, or even on an entirely different dataset, is able to produce a good representation, provided that the chosen images span a diverse enough portion of the low-level feature space. Our experiments confirm that hypothesis, opening the opportunity to greatly alleviate the burden in generating the codebook, and confirming the feasibility of employing visual dictionaries in large-scale dynamic environments.
1205.3109
Arthur Guez
Arthur Guez and David Silver and Peter Dayan
Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based Search
14 pages, 7 figures, includes supplementary material. Advances in Neural Information Processing Systems (NIPS) 2012
(2012) Advances in Neural Information Processing Systems 25, pages 1034-1042
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bayesian model-based reinforcement learning is a formally elegant approach to learning optimal behaviour under model uncertainty, trading off exploration and exploitation in an ideal way. Unfortunately, finding the resulting Bayes-optimal policies is notoriously taxing, since the search space becomes enormous. In this paper we introduce a tractable, sample-based method for approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our approach outperformed prior Bayesian model-based RL algorithms by a significant margin on several well-known benchmark problems -- because it avoids expensive applications of Bayes rule within the search tree by lazily sampling models from the current beliefs. We illustrate the advantages of our approach by showing it working in an infinite state space domain which is qualitatively out of reach of almost all previous work in Bayesian exploration.
[ { "version": "v1", "created": "Mon, 14 May 2012 17:20:29 GMT" }, { "version": "v2", "created": "Sat, 13 Oct 2012 15:19:09 GMT" }, { "version": "v3", "created": "Thu, 3 Jan 2013 14:44:59 GMT" }, { "version": "v4", "created": "Wed, 18 Dec 2013 11:45:49 GMT" } ]
2015-03-20T00:00:00
[ [ "Guez", "Arthur", "" ], [ "Silver", "David", "" ], [ "Dayan", "Peter", "" ] ]
TITLE: Efficient Bayes-Adaptive Reinforcement Learning using Sample-Based Search ABSTRACT: Bayesian model-based reinforcement learning is a formally elegant approach to learning optimal behaviour under model uncertainty, trading off exploration and exploitation in an ideal way. Unfortunately, finding the resulting Bayes-optimal policies is notoriously taxing, since the search space becomes enormous. In this paper we introduce a tractable, sample-based method for approximate Bayes-optimal planning which exploits Monte-Carlo tree search. Our approach outperformed prior Bayesian model-based RL algorithms by a significant margin on several well-known benchmark problems -- because it avoids expensive applications of Bayes rule within the search tree by lazily sampling models from the current beliefs. We illustrate the advantages of our approach by showing it working in an infinite state space domain which is qualitatively out of reach of almost all previous work in Bayesian exploration.
1205.4776
Ilknur Icke
Ilknur Icke and Andrew Rosenberg
Visual and semantic interpretability of projections of high dimensional data for classification tasks
Longer version of the VAST 2011 poster. http://dx.doi.org/10.1109/VAST.2011.6102474
null
10.1109/VAST.2011.6102474
null
cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of visual quality measures have been introduced in visual analytics literature in order to automatically select the best views of high dimensional data from a large number of candidate data projections. These methods generally concentrate on the interpretability of the visualization and pay little attention to the interpretability of the projection axes. In this paper, we argue that interpretability of the visualizations and the feature transformation functions are both crucial for visual exploration of high dimensional labeled data. We present a two-part user study to examine these two related but orthogonal aspects of interpretability. We first study how humans judge the quality of 2D scatterplots of various datasets with varying number of classes and provide comparisons with ten automated measures, including a number of visual quality measures and related measures from various machine learning fields. We then investigate how the user perception on interpretability of mathematical expressions relate to various automated measures of complexity that can be used to characterize data projection functions. We conclude with a discussion of how automated measures of visual and semantic interpretability of data projections can be used together for exploratory analysis in classification tasks.
[ { "version": "v1", "created": "Tue, 22 May 2012 00:10:45 GMT" } ]
2015-03-20T00:00:00
[ [ "Icke", "Ilknur", "" ], [ "Rosenberg", "Andrew", "" ] ]
TITLE: Visual and semantic interpretability of projections of high dimensional data for classification tasks ABSTRACT: A number of visual quality measures have been introduced in visual analytics literature in order to automatically select the best views of high dimensional data from a large number of candidate data projections. These methods generally concentrate on the interpretability of the visualization and pay little attention to the interpretability of the projection axes. In this paper, we argue that interpretability of the visualizations and the feature transformation functions are both crucial for visual exploration of high dimensional labeled data. We present a two-part user study to examine these two related but orthogonal aspects of interpretability. We first study how humans judge the quality of 2D scatterplots of various datasets with varying number of classes and provide comparisons with ten automated measures, including a number of visual quality measures and related measures from various machine learning fields. We then investigate how the user perception on interpretability of mathematical expressions relate to various automated measures of complexity that can be used to characterize data projection functions. We conclude with a discussion of how automated measures of visual and semantic interpretability of data projections can be used together for exploratory analysis in classification tasks.
1205.4839
Thomas Degris
Thomas Degris, Martha White, Richard S. Sutton
Off-Policy Actor-Critic
Full version of the paper, appendix and errata included; Proceedings of the 2012 International Conference on Machine Learning
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the first actor-critic algorithm for off-policy reinforcement learning. Our algorithm is online and incremental, and its per-time-step complexity scales linearly with the number of learned weights. Previous work on actor-critic algorithms is limited to the on-policy setting and does not take advantage of the recent advances in off-policy gradient temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable a target policy to be learned while following and obtaining data from another (behavior) policy. For many problems, however, actor-critic methods are more practical than action value methods (like Greedy-GQ) because they explicitly represent the policy; consequently, the policy can be stochastic and utilize a large action space. In this paper, we illustrate how to practically combine the generality and learning potential of off-policy learning with the flexibility in action selection given by actor-critic methods. We derive an incremental, linear time and space complexity algorithm that includes eligibility traces, prove convergence under assumptions similar to previous off-policy algorithms, and empirically show better or comparable performance to existing algorithms on standard reinforcement-learning benchmark problems.
[ { "version": "v1", "created": "Tue, 22 May 2012 08:36:41 GMT" }, { "version": "v2", "created": "Wed, 23 May 2012 14:36:42 GMT" }, { "version": "v3", "created": "Tue, 17 Jul 2012 20:40:47 GMT" }, { "version": "v4", "created": "Tue, 14 Aug 2012 07:08:17 GMT" }, { "version": "v5", "created": "Thu, 20 Jun 2013 10:53:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Degris", "Thomas", "" ], [ "White", "Martha", "" ], [ "Sutton", "Richard S.", "" ] ]
TITLE: Off-Policy Actor-Critic ABSTRACT: This paper presents the first actor-critic algorithm for off-policy reinforcement learning. Our algorithm is online and incremental, and its per-time-step complexity scales linearly with the number of learned weights. Previous work on actor-critic algorithms is limited to the on-policy setting and does not take advantage of the recent advances in off-policy gradient temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable a target policy to be learned while following and obtaining data from another (behavior) policy. For many problems, however, actor-critic methods are more practical than action value methods (like Greedy-GQ) because they explicitly represent the policy; consequently, the policy can be stochastic and utilize a large action space. In this paper, we illustrate how to practically combine the generality and learning potential of off-policy learning with the flexibility in action selection given by actor-critic methods. We derive an incremental, linear time and space complexity algorithm that includes eligibility traces, prove convergence under assumptions similar to previous off-policy algorithms, and empirically show better or comparable performance to existing algorithms on standard reinforcement-learning benchmark problems.
1206.4074
Fuxin Li
Fuxin Li, Guy Lebanon, Cristian Sminchisescu
A Linear Approximation to the chi^2 Kernel with Geometric Convergence
null
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new analytical approximation to the $\chi^2$ kernel that converges geometrically. The analytical approximation is derived with elementary methods and adapts to the input distribution for optimal convergence rate. Experiments show the new approximation leads to improved performance in image classification and semantic segmentation tasks using a random Fourier feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core principal component analysis (PCA) methods are introduced to reduce the dimensionality of the approximation and achieve better performance at the expense of only an additional constant factor to the time complexity. Moreover, when PCA is performed jointly on the training and unlabeled testing data, further performance improvements can be obtained. Experiments conducted on the PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show statistically significant improvements over alternative approximation methods.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 21:05:16 GMT" }, { "version": "v2", "created": "Thu, 18 Apr 2013 18:38:28 GMT" }, { "version": "v3", "created": "Wed, 12 Jun 2013 19:29:18 GMT" } ]
2015-03-20T00:00:00
[ [ "Li", "Fuxin", "" ], [ "Lebanon", "Guy", "" ], [ "Sminchisescu", "Cristian", "" ] ]
TITLE: A Linear Approximation to the chi^2 Kernel with Geometric Convergence ABSTRACT: We propose a new analytical approximation to the $\chi^2$ kernel that converges geometrically. The analytical approximation is derived with elementary methods and adapts to the input distribution for optimal convergence rate. Experiments show the new approximation leads to improved performance in image classification and semantic segmentation tasks using a random Fourier feature approximation of the $\exp-\chi^2$ kernel. Besides, out-of-core principal component analysis (PCA) methods are introduced to reduce the dimensionality of the approximation and achieve better performance at the expense of only an additional constant factor to the time complexity. Moreover, when PCA is performed jointly on the training and unlabeled testing data, further performance improvements can be obtained. Experiments conducted on the PASCAL VOC 2010 segmentation and the ImageNet ILSVRC 2010 datasets show statistically significant improvements over alternative approximation methods.
1206.4094
Jeremi K. Ochab
J. K. Ochab
Maximal-entropy random walk unifies centrality measures
7 pages, 2 figures
Phys. Rev. E 86, 066109 (2012)
10.1103/PhysRevE.86.066109
null
physics.soc-ph cond-mat.dis-nn cond-mat.stat-mech cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper analogies between different (dis)similarity matrices are derived. These matrices, which are connected to path enumeration and random walks, are used in community detection methods or in computation of centrality measures for complex networks. The focus is on a number of known centrality measures, which inherit the connections established for similarity matrices. These measures are based on the principal eigenvector of the adjacency matrix, path enumeration, as well as on the stationary state, stochastic matrix or mean first-passage times of a random walk. Particular attention is paid to the maximal-entropy random walk, which serves as a very distinct alternative to the ordinary random walk used in network analysis. The various importance measures, defined both with the use of ordinary random walk and the maximal-entropy random walk, are compared numerically on a set of benchmark graphs. It is shown that groups of centrality measures defined with the two random walks cluster into two separate families. In particular, the group of centralities for the maximal-entropy random walk, connected to the eigenvector centrality and path enumeration, is strongly distinct from all the other measures and produces largely equivalent results.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 22:39:29 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2012 11:07:23 GMT" } ]
2015-03-20T00:00:00
[ [ "Ochab", "J. K.", "" ] ]
TITLE: Maximal-entropy random walk unifies centrality measures ABSTRACT: In this paper analogies between different (dis)similarity matrices are derived. These matrices, which are connected to path enumeration and random walks, are used in community detection methods or in computation of centrality measures for complex networks. The focus is on a number of known centrality measures, which inherit the connections established for similarity matrices. These measures are based on the principal eigenvector of the adjacency matrix, path enumeration, as well as on the stationary state, stochastic matrix or mean first-passage times of a random walk. Particular attention is paid to the maximal-entropy random walk, which serves as a very distinct alternative to the ordinary random walk used in network analysis. The various importance measures, defined both with the use of ordinary random walk and the maximal-entropy random walk, are compared numerically on a set of benchmark graphs. It is shown that groups of centrality measures defined with the two random walks cluster into two separate families. In particular, the group of centralities for the maximal-entropy random walk, connected to the eigenvector centrality and path enumeration, is strongly distinct from all the other measures and produces largely equivalent results.
1206.6295
Vojtech Forejt
Vojtech Forejt, Marta Kwiatkowska and David Parker
Pareto Curves for Probabilistic Model Checking
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-objective probabilistic model checking provides a way to verify several, possibly conflicting, quantitative properties of a stochastic system. It has useful applications in controller synthesis and compositional probabilistic verification. However, existing methods are based on linear programming, which limits the scale of systems that can be analysed and makes verification of time-bounded properties very difficult. We present a novel approach that addresses both of these shortcomings, based on the generation of successive approximations of the Pareto curve for a multi-objective model checking problem. We illustrate dramatic improvements in efficiency on a large set of benchmarks and show how the ability to visualise Pareto curves significantly enhances the quality of results obtained from current probabilistic verification tools.
[ { "version": "v1", "created": "Sun, 24 Jun 2012 15:09:09 GMT" } ]
2015-03-20T00:00:00
[ [ "Forejt", "Vojtech", "" ], [ "Kwiatkowska", "Marta", "" ], [ "Parker", "David", "" ] ]
TITLE: Pareto Curves for Probabilistic Model Checking ABSTRACT: Multi-objective probabilistic model checking provides a way to verify several, possibly conflicting, quantitative properties of a stochastic system. It has useful applications in controller synthesis and compositional probabilistic verification. However, existing methods are based on linear programming, which limits the scale of systems that can be analysed and makes verification of time-bounded properties very difficult. We present a novel approach that addresses both of these shortcomings, based on the generation of successive approximations of the Pareto curve for a multi-objective model checking problem. We illustrate dramatic improvements in efficiency on a large set of benchmarks and show how the ability to visualise Pareto curves significantly enhances the quality of results obtained from current probabilistic verification tools.
1207.0141
Beng Chin Ooi
Wei Lu, Yanyan Shen, Su Chen, Beng Chin Ooi
Efficient Processing of k Nearest Neighbor Joins using MapReduce
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 10, pp. 1016-1027 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
k nearest neighbor join (kNN join), designed to find k nearest neighbors from a dataset S for every object in another dataset R, is a primitive operation widely adopted by many data mining applications. As a combination of the k nearest neighbor query and the join operation, kNN join is an expensive operation. Given the increasing volume of data, it is difficult to perform a kNN join on a centralized machine efficiently. In this paper, we investigate how to perform kNN join using MapReduce which is a well-accepted framework for data-intensive applications over clusters of computers. In brief, the mappers cluster objects into groups; the reducers perform the kNN join on each group of objects separately. We design an effective mapping mechanism that exploits pruning rules for distance filtering, and hence reduces both the shuffling and computational costs. To reduce the shuffling cost, we propose two approximate algorithms to minimize the number of replicas. Extensive experiments on our in-house cluster demonstrate that our proposed methods are efficient, robust and scalable.
[ { "version": "v1", "created": "Sat, 30 Jun 2012 20:20:31 GMT" } ]
2015-03-20T00:00:00
[ [ "Lu", "Wei", "" ], [ "Shen", "Yanyan", "" ], [ "Chen", "Su", "" ], [ "Ooi", "Beng Chin", "" ] ]
TITLE: Efficient Processing of k Nearest Neighbor Joins using MapReduce ABSTRACT: k nearest neighbor join (kNN join), designed to find k nearest neighbors from a dataset S for every object in another dataset R, is a primitive operation widely adopted by many data mining applications. As a combination of the k nearest neighbor query and the join operation, kNN join is an expensive operation. Given the increasing volume of data, it is difficult to perform a kNN join on a centralized machine efficiently. In this paper, we investigate how to perform kNN join using MapReduce which is a well-accepted framework for data-intensive applications over clusters of computers. In brief, the mappers cluster objects into groups; the reducers perform the kNN join on each group of objects separately. We design an effective mapping mechanism that exploits pruning rules for distance filtering, and hence reduces both the shuffling and computational costs. To reduce the shuffling cost, we propose two approximate algorithms to minimize the number of replicas. Extensive experiments on our in-house cluster demonstrate that our proposed methods are efficient, robust and scalable.
1207.1524
Vasanthan Raghavan
Vasanthan Raghavan and Venugopal V. Veeravalli
Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks
47 pages, 6 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ensemble properties of Random Vector Quantization (RVQ) codebooks for limited-feedback beamforming in multi-input multi-output (MIMO) systems are studied with the metrics of interest being the received SNR loss and mutual information loss, both relative to a perfect channel state information (CSI) benchmark. The simplest case of unskewed codebooks is studied in the correlated MIMO setting and these loss metrics are computed as a function of the number of bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial correlation. In particular, it is established that: i) the loss metrics are a product of two components -- a quantization component and a channel-dependent component; ii) the quantization component, which is also common to analysis of channels with independent and identically distributed (i.i.d.) fading, decays as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent component reflects the condition number of the channel. Further, the precise connection between the received SNR loss and the squared singular values of the channel is shown to be a Schur-convex majorization relationship. Finally, the ensemble properties of skewed codebooks that are generated by skewing RVQ codebooks with an appropriately designed fixed skewing matrix are studied. Based on an estimate of the loss expression for skewed codebooks, it is established that the optimal skewing matrix is critically dependent on the condition numbers of the effective channel (product of the true channel and the skewing matrix) and the skewing matrix.
[ { "version": "v1", "created": "Fri, 6 Jul 2012 05:41:00 GMT" } ]
2015-03-20T00:00:00
[ [ "Raghavan", "Vasanthan", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
TITLE: Ensemble Properties of RVQ-Based Limited-Feedback Beamforming Codebooks ABSTRACT: The ensemble properties of Random Vector Quantization (RVQ) codebooks for limited-feedback beamforming in multi-input multi-output (MIMO) systems are studied with the metrics of interest being the received SNR loss and mutual information loss, both relative to a perfect channel state information (CSI) benchmark. The simplest case of unskewed codebooks is studied in the correlated MIMO setting and these loss metrics are computed as a function of the number of bits of feedback ($B$), transmit antenna dimension ($N_t$), and spatial correlation. In particular, it is established that: i) the loss metrics are a product of two components -- a quantization component and a channel-dependent component; ii) the quantization component, which is also common to analysis of channels with independent and identically distributed (i.i.d.) fading, decays as $B$ increases at the rate $2^{-B/(N_t-1)}$; iii) the channel-dependent component reflects the condition number of the channel. Further, the precise connection between the received SNR loss and the squared singular values of the channel is shown to be a Schur-convex majorization relationship. Finally, the ensemble properties of skewed codebooks that are generated by skewing RVQ codebooks with an appropriately designed fixed skewing matrix are studied. Based on an estimate of the loss expression for skewed codebooks, it is established that the optimal skewing matrix is critically dependent on the condition numbers of the effective channel (product of the true channel and the skewing matrix) and the skewing matrix.
1207.6600
Rama Badrinath
Rama Badrinath, C. E. Veni Madhavan
Diversity in Ranking using Negative Reinforcement
null
null
null
null
cs.IR cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of diversity in ranking of the nodes in a graph. The task is to pick the top-k nodes in the graph which are both 'central' and 'diverse'. Many graph-based models of NLP like text summarization, opinion summarization involve the concept of diversity in generating the summaries. We develop a novel method which works in an iterative fashion based on random walks to achieve diversity. Specifically, we use negative reinforcement as a main tool to introduce diversity in the Personalized PageRank framework. Experiments on two benchmark datasets show that our algorithm is competitive to the existing methods.
[ { "version": "v1", "created": "Fri, 27 Jul 2012 17:16:59 GMT" } ]
2015-03-20T00:00:00
[ [ "Badrinath", "Rama", "" ], [ "Madhavan", "C. E. Veni", "" ] ]
TITLE: Diversity in Ranking using Negative Reinforcement ABSTRACT: In this paper, we consider the problem of diversity in ranking of the nodes in a graph. The task is to pick the top-k nodes in the graph which are both 'central' and 'diverse'. Many graph-based models of NLP like text summarization, opinion summarization involve the concept of diversity in generating the summaries. We develop a novel method which works in an iterative fashion based on random walks to achieve diversity. Specifically, we use negative reinforcement as a main tool to introduce diversity in the Personalized PageRank framework. Experiments on two benchmark datasets show that our algorithm is competitive to the existing methods.
1208.1231
Sebastian Michel
Foteini Alvanaki and Sebastian Michel and Aleksandar Stupar
Building and Maintaining Halls of Fame over a Database
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Halls of Fame are fascinating constructs. They represent the elite of an often very large amount of entities---persons, companies, products, countries etc. Beyond their practical use as static rankings, changes to them are particularly interesting---for decision making processes, as input to common media or novel narrative science applications, or simply consumed by users. In this work, we aim at detecting events that can be characterized by changes to a Hall of Fame ranking in an automated way. We describe how the schema and data of a database can be used to generate Halls of Fame. In this database scenario, by Hall of Fame we refer to distinguished tuples; entities, whose characteristics set them apart from the majority. We define every Hall of Fame as one specific instance of an SQL query, such that a change in its result is considered a noteworthy event. Identified changes (i.e., events) are ranked using lexicographic tradeoffs over event and query properties and presented to users or fed in higher-level applications. We have implemented a full-fledged prototype system that uses either database triggers or a Java based middleware for event identification. We report on an experimental evaluation using a real-world dataset of basketball statistics.
[ { "version": "v1", "created": "Mon, 6 Aug 2012 18:26:17 GMT" } ]
2015-03-20T00:00:00
[ [ "Alvanaki", "Foteini", "" ], [ "Michel", "Sebastian", "" ], [ "Stupar", "Aleksandar", "" ] ]
TITLE: Building and Maintaining Halls of Fame over a Database ABSTRACT: Halls of Fame are fascinating constructs. They represent the elite of an often very large amount of entities---persons, companies, products, countries etc. Beyond their practical use as static rankings, changes to them are particularly interesting---for decision making processes, as input to common media or novel narrative science applications, or simply consumed by users. In this work, we aim at detecting events that can be characterized by changes to a Hall of Fame ranking in an automated way. We describe how the schema and data of a database can be used to generate Halls of Fame. In this database scenario, by Hall of Fame we refer to distinguished tuples; entities, whose characteristics set them apart from the majority. We define every Hall of Fame as one specific instance of an SQL query, such that a change in its result is considered a noteworthy event. Identified changes (i.e., events) are ranked using lexicographic tradeoffs over event and query properties and presented to users or fed in higher-level applications. We have implemented a full-fledged prototype system that uses either database triggers or a Java based middleware for event identification. We report on an experimental evaluation using a real-world dataset of basketball statistics.
1208.1931
Michele Dallachiesa
Michele Dallachiesa, Besmira Nushi, Katsiaryna Mirylenka, Themis Palpanas
Uncertain Time-Series Similarity: Return to the Basics
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1662-1673 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution management, and others. Due to the inherent imprecision of sensor observations, many investigations have recently turned into querying, mining and storing uncertain data. Uncertainty can also be due to data aggregation, privacy-preserving transforms, and error-prone mining algorithms. In this study, we survey the techniques that have been proposed specifically for modeling and processing uncertain time series, an important model for temporal data. We provide an analytical evaluation of the alternatives that have been proposed in the literature, highlighting the advantages and disadvantages of each approach, and further compare these alternatives with two additional techniques that were carefully studied before. We conduct an extensive experimental evaluation with 17 real datasets, and discuss some surprising results, which suggest that a fruitful research direction is to take into account the temporal correlations in the time series. Based on our evaluations, we also provide guidelines useful for the practitioners in the field.
[ { "version": "v1", "created": "Thu, 9 Aug 2012 14:52:01 GMT" } ]
2015-03-20T00:00:00
[ [ "Dallachiesa", "Michele", "" ], [ "Nushi", "Besmira", "" ], [ "Mirylenka", "Katsiaryna", "" ], [ "Palpanas", "Themis", "" ] ]
TITLE: Uncertain Time-Series Similarity: Return to the Basics ABSTRACT: In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution management, and others. Due to the inherent imprecision of sensor observations, many investigations have recently turned into querying, mining and storing uncertain data. Uncertainty can also be due to data aggregation, privacy-preserving transforms, and error-prone mining algorithms. In this study, we survey the techniques that have been proposed specifically for modeling and processing uncertain time series, an important model for temporal data. We provide an analytical evaluation of the alternatives that have been proposed in the literature, highlighting the advantages and disadvantages of each approach, and further compare these alternatives with two additional techniques that were carefully studied before. We conduct an extensive experimental evaluation with 17 real datasets, and discuss some surprising results, which suggest that a fruitful research direction is to take into account the temporal correlations in the time series. Based on our evaluations, we also provide guidelines useful for the practitioners in the field.
1208.2547
Lexing Xie
Yanxiang Wang, Hari Sundaram, Lexing Xie
Social Event Detection with Interaction Graph Modeling
ACM Multimedia 2012
null
null
null
cs.SI cs.IR cs.MM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on detecting social, physical-world events from photos posted on social media sites. The problem is important: cheap media capture devices have significantly increased the number of photos shared on these sites. The main contribution of this paper is to incorporate online social interaction features in the detection of physical events. We believe that online social interaction reflect important signals among the participants on the "social affinity" of two photos, thereby helping event detection. We compute social affinity via a random-walk on a social interaction graph to determine similarity between two photos on the graph. We train a support vector machine classifier to combine the social affinity between photos and photo-centric metadata including time, location, tags and description. Incremental clustering is then used to group photos to event clusters. We have very good results on two large scale real-world datasets: Upcoming and MediaEval. We show an improvement between 0.06-0.10 in F1 on these datasets.
[ { "version": "v1", "created": "Mon, 13 Aug 2012 11:20:05 GMT" } ]
2015-03-20T00:00:00
[ [ "Wang", "Yanxiang", "" ], [ "Sundaram", "Hari", "" ], [ "Xie", "Lexing", "" ] ]
TITLE: Social Event Detection with Interaction Graph Modeling ABSTRACT: This paper focuses on detecting social, physical-world events from photos posted on social media sites. The problem is important: cheap media capture devices have significantly increased the number of photos shared on these sites. The main contribution of this paper is to incorporate online social interaction features in the detection of physical events. We believe that online social interaction reflect important signals among the participants on the "social affinity" of two photos, thereby helping event detection. We compute social affinity via a random-walk on a social interaction graph to determine similarity between two photos on the graph. We train a support vector machine classifier to combine the social affinity between photos and photo-centric metadata including time, location, tags and description. Incremental clustering is then used to group photos to event clusters. We have very good results on two large scale real-world datasets: Upcoming and MediaEval. We show an improvement between 0.06-0.10 in F1 on these datasets.
1208.3687
Qiang Qiu
Qiang Qiu, Vishal M. Patel, Rama Chellappa
Information-theoretic Dictionary Learning for Image Classification
null
null
null
null
cs.CV cs.IT math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a two-stage approach for learning dictionaries for object classification tasks based on the principle of information maximization. The proposed method seeks a dictionary that is compact, discriminative, and generative. In the first stage, dictionary atoms are selected from an initial dictionary by maximizing the mutual information measure on dictionary compactness, discrimination and reconstruction. In the second stage, the selected dictionary atoms are updated for improved reconstructive and discriminative power using a simple gradient ascent algorithm on mutual information. Experiments using real datasets demonstrate the effectiveness of our approach for image classification tasks.
[ { "version": "v1", "created": "Fri, 17 Aug 2012 20:38:56 GMT" } ]
2015-03-20T00:00:00
[ [ "Qiu", "Qiang", "" ], [ "Patel", "Vishal M.", "" ], [ "Chellappa", "Rama", "" ] ]
TITLE: Information-theoretic Dictionary Learning for Image Classification ABSTRACT: We present a two-stage approach for learning dictionaries for object classification tasks based on the principle of information maximization. The proposed method seeks a dictionary that is compact, discriminative, and generative. In the first stage, dictionary atoms are selected from an initial dictionary by maximizing the mutual information measure on dictionary compactness, discrimination and reconstruction. In the second stage, the selected dictionary atoms are updated for improved reconstructive and discriminative power using a simple gradient ascent algorithm on mutual information. Experiments using real datasets demonstrate the effectiveness of our approach for image classification tasks.
1208.4434
Roman Vetter
Roman Vetter, Norbert Stoop, Thomas Jenni, Falk K. Wittel, Hans J. Herrmann
Subdivision Shell Elements with Anisotropic Growth
20 pages, 12 figures, 1 table
Int. J. Numer. Meth. Eng. 95, 791-810 (2013)
10.1002/nme.4536
null
cs.NA cs.CE physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A thin shell finite element approach based on Loop's subdivision surfaces is proposed, capable of dealing with large deformations and anisotropic growth. To this end, the Kirchhoff-Love theory of thin shells is derived and extended to allow for arbitrary in-plane growth. The simplicity and computational efficiency of the subdivision thin shell elements is outstanding, which is demonstrated on a few standard loading benchmarks. With this powerful tool at hand, we demonstrate the broad range of possible applications by numerical solution of several growth scenarios, ranging from the uniform growth of a sphere, to boundary instabilities induced by large anisotropic growth. Finally, it is shown that the problem of a slowly and uniformly growing sheet confined in a fixed hollow sphere is equivalent to the inverse process where a sheet of fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless, quasi-static, elastic limit.
[ { "version": "v1", "created": "Wed, 22 Aug 2012 07:18:44 GMT" }, { "version": "v2", "created": "Wed, 27 Mar 2013 17:14:45 GMT" } ]
2015-03-20T00:00:00
[ [ "Vetter", "Roman", "" ], [ "Stoop", "Norbert", "" ], [ "Jenni", "Thomas", "" ], [ "Wittel", "Falk K.", "" ], [ "Herrmann", "Hans J.", "" ] ]
TITLE: Subdivision Shell Elements with Anisotropic Growth ABSTRACT: A thin shell finite element approach based on Loop's subdivision surfaces is proposed, capable of dealing with large deformations and anisotropic growth. To this end, the Kirchhoff-Love theory of thin shells is derived and extended to allow for arbitrary in-plane growth. The simplicity and computational efficiency of the subdivision thin shell elements is outstanding, which is demonstrated on a few standard loading benchmarks. With this powerful tool at hand, we demonstrate the broad range of possible applications by numerical solution of several growth scenarios, ranging from the uniform growth of a sphere, to boundary instabilities induced by large anisotropic growth. Finally, it is shown that the problem of a slowly and uniformly growing sheet confined in a fixed hollow sphere is equivalent to the inverse process where a sheet of fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless, quasi-static, elastic limit.
1208.4773
Tobias Jung
Tobias Jung, Louis Wehenkel, Damien Ernst, Francis Maes
Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree Policies and Direct Policy Search
In Submission
null
null
null
cs.SY cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Direct policy search (DPS) and look-ahead tree (LT) policies are two widely used classes of techniques to produce high performance policies for sequential decision-making problems. To make DPS approaches work well, one crucial issue is to select an appropriate space of parameterized policies with respect to the targeted problem. A fundamental issue in LT approaches is that, to take good decisions, such policies must develop very large look-ahead trees which may require excessive online computational resources. In this paper, we propose a new hybrid policy learning scheme that lies at the intersection of DPS and LT, in which the policy is an algorithm that develops a small look-ahead tree in a directed way, guided by a node scoring function that is learned through DPS. The LT-based representation is shown to be a versatile way of representing policies in a DPS scheme, while at the same time, DPS enables to significantly reduce the size of the look-ahead trees that are required to take high-quality decisions. We experimentally compare our method with two other state-of-the-art DPS techniques and four common LT policies on four benchmark domains and show that it combines the advantages of the two techniques from which it originates. In particular, we show that our method: (1) produces overall better performing policies than both pure DPS and pure LT policies, (2) requires a substantially smaller number of policy evaluations than other DPS techniques, (3) is easy to tune and (4) results in policies that are quite robust with respect to perturbations of the initial conditions.
[ { "version": "v1", "created": "Thu, 23 Aug 2012 14:48:52 GMT" } ]
2015-03-20T00:00:00
[ [ "Jung", "Tobias", "" ], [ "Wehenkel", "Louis", "" ], [ "Ernst", "Damien", "" ], [ "Maes", "Francis", "" ] ]
TITLE: Optimized Look-Ahead Tree Policies: A Bridge Between Look-Ahead Tree Policies and Direct Policy Search ABSTRACT: Direct policy search (DPS) and look-ahead tree (LT) policies are two widely used classes of techniques to produce high performance policies for sequential decision-making problems. To make DPS approaches work well, one crucial issue is to select an appropriate space of parameterized policies with respect to the targeted problem. A fundamental issue in LT approaches is that, to take good decisions, such policies must develop very large look-ahead trees which may require excessive online computational resources. In this paper, we propose a new hybrid policy learning scheme that lies at the intersection of DPS and LT, in which the policy is an algorithm that develops a small look-ahead tree in a directed way, guided by a node scoring function that is learned through DPS. The LT-based representation is shown to be a versatile way of representing policies in a DPS scheme, while at the same time, DPS enables to significantly reduce the size of the look-ahead trees that are required to take high-quality decisions. We experimentally compare our method with two other state-of-the-art DPS techniques and four common LT policies on four benchmark domains and show that it combines the advantages of the two techniques from which it originates. In particular, we show that our method: (1) produces overall better performing policies than both pure DPS and pure LT policies, (2) requires a substantially smaller number of policy evaluations than other DPS techniques, (3) is easy to tune and (4) results in policies that are quite robust with respect to perturbations of the initial conditions.
1312.1431
Miles Lubin
Miles Lubin and Iain Dunning
Computing in Operations Research using Julia
Source code included in supplement
null
10.1287/ijoc.2014.0623
null
math.OC cs.NA cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The state of numerical computing is currently characterized by a divide between highly efficient yet typically cumbersome low-level languages such as C, C++, and Fortran and highly expressive yet typically slow high-level languages such as Python and MATLAB. This paper explores how Julia, a modern programming language for numerical computing which claims to bridge this divide by incorporating recent advances in language and compiler design (such as just-in-time compilation), can be used for implementing software and algorithms fundamental to the field of operations research, with a focus on mathematical optimization. In particular, we demonstrate algebraic modeling for linear and nonlinear optimization and a partial implementation of a practical simplex code. Extensive cross-language benchmarks suggest that Julia is capable of obtaining state-of-the-art performance.
[ { "version": "v1", "created": "Thu, 5 Dec 2013 04:29:20 GMT" } ]
2015-03-20T00:00:00
[ [ "Lubin", "Miles", "" ], [ "Dunning", "Iain", "" ] ]
TITLE: Computing in Operations Research using Julia ABSTRACT: The state of numerical computing is currently characterized by a divide between highly efficient yet typically cumbersome low-level languages such as C, C++, and Fortran and highly expressive yet typically slow high-level languages such as Python and MATLAB. This paper explores how Julia, a modern programming language for numerical computing which claims to bridge this divide by incorporating recent advances in language and compiler design (such as just-in-time compilation), can be used for implementing software and algorithms fundamental to the field of operations research, with a focus on mathematical optimization. In particular, we demonstrate algebraic modeling for linear and nonlinear optimization and a partial implementation of a practical simplex code. Extensive cross-language benchmarks suggest that Julia is capable of obtaining state-of-the-art performance.
1503.05784
Alfredo Cobo
Alfredo Cobo, Denis Parra, Jaime Nav\'on
Identifying Relevant Messages in a Twitter-based Citizen Channel for Natural Disaster Situations
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During recent years the online social networks (in particular Twitter) have become an important alternative information channel to traditional media during natural disasters, but the amount and diversity of messages poses the challenge of information overload to end users. The goal of our research is to develop an automatic classifier of tweets to feed a mobile application that reduces the difficulties that citizens face to get relevant information during natural disasters. In this paper, we present in detail the process to build a classifier that filters tweets relevant and non-relevant to an earthquake. By using a dataset from the Chilean earthquake of 2010, we first build and validate a ground truth, and then we contribute by presenting in detail the effect of class imbalance and dimensionality reduction over 5 classifiers. We show how the performance of these models is affected by these variables, providing important considerations at the moment of building these systems.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 14:10:10 GMT" } ]
2015-03-20T00:00:00
[ [ "Cobo", "Alfredo", "" ], [ "Parra", "Denis", "" ], [ "Navón", "Jaime", "" ] ]
TITLE: Identifying Relevant Messages in a Twitter-based Citizen Channel for Natural Disaster Situations ABSTRACT: During recent years the online social networks (in particular Twitter) have become an important alternative information channel to traditional media during natural disasters, but the amount and diversity of messages poses the challenge of information overload to end users. The goal of our research is to develop an automatic classifier of tweets to feed a mobile application that reduces the difficulties that citizens face to get relevant information during natural disasters. In this paper, we present in detail the process to build a classifier that filters tweets relevant and non-relevant to an earthquake. By using a dataset from the Chilean earthquake of 2010, we first build and validate a ground truth, and then we contribute by presenting in detail the effect of class imbalance and dimensionality reduction over 5 classifiers. We show how the performance of these models is affected by these variables, providing important considerations at the moment of building these systems.
1102.4374
Benjamin Rubinstein
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
11 pages, 13 figures; submitted to IJCNN'2011
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anonymization and link prediction.
[ { "version": "v1", "created": "Tue, 22 Feb 2011 00:11:14 GMT" } ]
2015-03-19T00:00:00
[ [ "Narayanan", "Arvind", "" ], [ "Shi", "Elaine", "" ], [ "Rubinstein", "Benjamin I. P.", "" ] ]
TITLE: Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge ABSTRACT: This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anonymization and link prediction.
1103.1013
Qi Mao
Qi Mao, Ivor W. Tsang
A Feature Selection Method for Multivariate Performance Measures
null
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012
10.1109/TPAMI.2012.266
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature selection with specific multivariate performance measures is the key to the success of many applications, such as image retrieval and text classification. The existing feature selection methods are usually designed for classification error. In this paper, we propose a generalized sparse regularizer. Based on the proposed regularizer, we present a unified feature selection framework for general loss functions. In particular, we study the novel feature selection paradigm by optimizing multivariate performance measures. The resultant formulation is a challenging problem for high-dimensional data. Hence, a two-layer cutting plane algorithm is proposed to solve this problem, and the convergence is presented. In addition, we adapt the proposed method to optimize multivariate measures for multiple instance learning problems. The analyses by comparing with the state-of-the-art feature selection methods show that the proposed method is superior to others. Extensive experiments on large-scale and high-dimensional real world datasets show that the proposed method outperforms $l_1$-SVM and SVM-RFE when choosing a small subset of features, and achieves significantly improved performances over SVM$^{perf}$ in terms of $F_1$-score.
[ { "version": "v1", "created": "Sat, 5 Mar 2011 07:10:41 GMT" }, { "version": "v2", "created": "Sat, 4 May 2013 14:48:06 GMT" } ]
2015-03-19T00:00:00
[ [ "Mao", "Qi", "" ], [ "Tsang", "Ivor W.", "" ] ]
TITLE: A Feature Selection Method for Multivariate Performance Measures ABSTRACT: Feature selection with specific multivariate performance measures is the key to the success of many applications, such as image retrieval and text classification. The existing feature selection methods are usually designed for classification error. In this paper, we propose a generalized sparse regularizer. Based on the proposed regularizer, we present a unified feature selection framework for general loss functions. In particular, we study the novel feature selection paradigm by optimizing multivariate performance measures. The resultant formulation is a challenging problem for high-dimensional data. Hence, a two-layer cutting plane algorithm is proposed to solve this problem, and the convergence is presented. In addition, we adapt the proposed method to optimize multivariate measures for multiple instance learning problems. The analyses by comparing with the state-of-the-art feature selection methods show that the proposed method is superior to others. Extensive experiments on large-scale and high-dimensional real world datasets show that the proposed method outperforms $l_1$-SVM and SVM-RFE when choosing a small subset of features, and achieves significantly improved performances over SVM$^{perf}$ in terms of $F_1$-score.
1103.2215
Xin Liu
Xin Liu and Anwitaman Datta and Krzysztof Rzadca
Trust beyond reputation: A computational trust model based on stereotypes
null
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Models of computational trust support users in taking decisions. They are commonly used to guide users' judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical information about the past behavior of the specific agent being judged. In contrast, in real life, to anticipate and to predict a stranger's actions in absence of the knowledge of such behavioral history, we often use our "instinct"- essentially stereotypes developed from our past interactions with other "similar" persons. In this paper, we propose StereoTrust, a computational trust model inspired by stereotypes as used in real-life. A stereotype contains certain features of agents and an expected outcome of the transaction. When facing a stranger, an agent derives its trust by aggregating stereotypes matching the stranger's profile. Since stereotypes are formed locally, recommendations stem from the trustor's own personal experiences and perspective. Historical behavioral information, when available, can be used to refine the analysis. According to our experiments using Epinions.com dataset, StereoTrust compares favorably with existing trust models that use different kinds of information and more complete historical information.
[ { "version": "v1", "created": "Fri, 11 Mar 2011 08:15:07 GMT" }, { "version": "v2", "created": "Thu, 5 May 2011 03:50:46 GMT" }, { "version": "v3", "created": "Sun, 15 Jul 2012 14:07:02 GMT" } ]
2015-03-19T00:00:00
[ [ "Liu", "Xin", "" ], [ "Datta", "Anwitaman", "" ], [ "Rzadca", "Krzysztof", "" ] ]
TITLE: Trust beyond reputation: A computational trust model based on stereotypes ABSTRACT: Models of computational trust support users in taking decisions. They are commonly used to guide users' judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical information about the past behavior of the specific agent being judged. In contrast, in real life, to anticipate and to predict a stranger's actions in absence of the knowledge of such behavioral history, we often use our "instinct"- essentially stereotypes developed from our past interactions with other "similar" persons. In this paper, we propose StereoTrust, a computational trust model inspired by stereotypes as used in real-life. A stereotype contains certain features of agents and an expected outcome of the transaction. When facing a stranger, an agent derives its trust by aggregating stereotypes matching the stranger's profile. Since stereotypes are formed locally, recommendations stem from the trustor's own personal experiences and perspective. Historical behavioral information, when available, can be used to refine the analysis. According to our experiments using Epinions.com dataset, StereoTrust compares favorably with existing trust models that use different kinds of information and more complete historical information.
1103.3225
Lars Bergstrom
Lars Bergstrom
Measuring NUMA effects with the STREAM benchmark
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern high-end machines feature multiple processor packages, each of which contains multiple independent cores and integrated memory controllers connected directly to dedicated physical RAM. These packages are connected via a shared bus, creating a system with a heterogeneous memory hierarchy. Since this shared bus has less bandwidth than the sum of the links to memory, aggregate memory bandwidth is higher when parallel threads all access memory local to their processor package than when they access memory attached to a remote package. But, the impact of this heterogeneous memory architecture is not easily understood from vendor benchmarks. Even where these measurements are available, they provide only best-case memory throughput. This work presents a series of modifications to the well-known STREAM benchmark to measure the effects of NUMA on both a 48-core AMD Opteron machine and a 32-core Intel Xeon machine.
[ { "version": "v1", "created": "Wed, 16 Mar 2011 16:37:49 GMT" } ]
2015-03-19T00:00:00
[ [ "Bergstrom", "Lars", "" ] ]
TITLE: Measuring NUMA effects with the STREAM benchmark ABSTRACT: Modern high-end machines feature multiple processor packages, each of which contains multiple independent cores and integrated memory controllers connected directly to dedicated physical RAM. These packages are connected via a shared bus, creating a system with a heterogeneous memory hierarchy. Since this shared bus has less bandwidth than the sum of the links to memory, aggregate memory bandwidth is higher when parallel threads all access memory local to their processor package than when they access memory attached to a remote package. But, the impact of this heterogeneous memory architecture is not easily understood from vendor benchmarks. Even where these measurements are available, they provide only best-case memory throughput. This work presents a series of modifications to the well-known STREAM benchmark to measure the effects of NUMA on both a 48-core AMD Opteron machine and a 32-core Intel Xeon machine.
1104.1472
X.P. Xu
Xiaopeng Xu, Xiaochun Zhang
Gaussian Affine Feature Detector
A paper about two dimension image signal detection, including position, length, width, height, orentation
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new method is proposed to get image features' geometric information. Using Gaussian as an input signal, a theoretical optimal solution to calculate feature's affine shape is proposed. Based on analytic result of a feature model, the method is different from conventional iterative approaches. From the model, feature's parameters such as position, orientation, background luminance, contrast, area and aspect ratio can be extracted. Tested with synthesized and benchmark data, the method achieves or outperforms existing approaches in term of accuracy, speed and stability. The method can detect small, long or thin objects precisely, and works well under general conditions, such as for low contrast, blurred or noisy images.
[ { "version": "v1", "created": "Fri, 8 Apr 2011 03:15:43 GMT" } ]
2015-03-19T00:00:00
[ [ "Xu", "Xiaopeng", "" ], [ "Zhang", "Xiaochun", "" ] ]
TITLE: Gaussian Affine Feature Detector ABSTRACT: A new method is proposed to get image features' geometric information. Using Gaussian as an input signal, a theoretical optimal solution to calculate feature's affine shape is proposed. Based on analytic result of a feature model, the method is different from conventional iterative approaches. From the model, feature's parameters such as position, orientation, background luminance, contrast, area and aspect ratio can be extracted. Tested with synthesized and benchmark data, the method achieves or outperforms existing approaches in term of accuracy, speed and stability. The method can detect small, long or thin objects precisely, and works well under general conditions, such as for low contrast, blurred or noisy images.
1104.1493
Tetsufumi Tanamoto
Tetsufumi Tanamoto, Hideyuki Sugiyama, Tomoaki Inokuchi, Takao Marukame, Mizue Ishikawa, Kazutaka Ikegami and Yoshiaki Saito
Scalability of spin FPGA: A Reconfigurable Architecture based on spin MOSFET
3 pages, 7 figures
J. Appl. Phys. 109, 07C312 (2011)
10.1063/1.3537923
null
cond-mat.mes-hall cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scalability of Field Programmable Gate Array (FPGA) using spin MOSFET (spin FPGA) with magnetocurrent (MC) ratio in the range of 100% to 1000% is discussed for the first time. Area and speed of million-gate spin FPGA are numerically benchmarked with CMOS FPGA for 22nm, 32nm and 45nm technologies including 20% transistor size variation. We show that area is reduced and speed is increased in spin FPGA owing to the nonvolatile memory function of spin MOSFET.
[ { "version": "v1", "created": "Fri, 8 Apr 2011 06:24:47 GMT" } ]
2015-03-19T00:00:00
[ [ "Tanamoto", "Tetsufumi", "" ], [ "Sugiyama", "Hideyuki", "" ], [ "Inokuchi", "Tomoaki", "" ], [ "Marukame", "Takao", "" ], [ "Ishikawa", "Mizue", "" ], [ "Ikegami", "Kazutaka", "" ], [ "Saito", "Yoshiaki", "" ] ]
TITLE: Scalability of spin FPGA: A Reconfigurable Architecture based on spin MOSFET ABSTRACT: Scalability of Field Programmable Gate Array (FPGA) using spin MOSFET (spin FPGA) with magnetocurrent (MC) ratio in the range of 100% to 1000% is discussed for the first time. Area and speed of million-gate spin FPGA are numerically benchmarked with CMOS FPGA for 22nm, 32nm and 45nm technologies including 20% transistor size variation. We show that area is reduced and speed is increased in spin FPGA owing to the nonvolatile memory function of spin MOSFET.
1104.2079
Kim Nguyen
V\'eronique Benzaken and Giuseppe Castagna and Dario Colazzo and Kim Nguyen
Optimizing XML querying using type-based document projection
65 pages A4 format
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML data projection (or pruning) is a natural optimization for main memory query engines: given a query Q over a document D, the subtrees of D that are not necessary to evaluate Q are pruned, thus producing a smaller document D'; the query Q is then executed on D', hence avoiding to allocate and process nodes that will never be reached by Q. In this article, we propose a new approach, based on types, that greatly improves current solutions. Besides providing comparable or greater precision and far lesser pruning overhead, our solution ---unlike current approaches--- takes into account backward axes, predicates, and can be applied to multiple queries rather than just to single ones. A side contribution is a new type system for XPath able to handle backward axes. The soundness of our approach is formally proved. Furthermore, we prove that the approach is also complete (i.e., yields the best possible type-driven pruning) for a relevant class of queries and Schemas. We further validate our approach using the XMark and XPathMark benchmarks and show that pruning not only improves the main memory query engine's performances (as expected) but also those of state of the art native XML databases.
[ { "version": "v1", "created": "Mon, 11 Apr 2011 22:32:31 GMT" } ]
2015-03-19T00:00:00
[ [ "Benzaken", "Véronique", "" ], [ "Castagna", "Giuseppe", "" ], [ "Colazzo", "Dario", "" ], [ "Nguyen", "Kim", "" ] ]
TITLE: Optimizing XML querying using type-based document projection ABSTRACT: XML data projection (or pruning) is a natural optimization for main memory query engines: given a query Q over a document D, the subtrees of D that are not necessary to evaluate Q are pruned, thus producing a smaller document D'; the query Q is then executed on D', hence avoiding to allocate and process nodes that will never be reached by Q. In this article, we propose a new approach, based on types, that greatly improves current solutions. Besides providing comparable or greater precision and far lesser pruning overhead, our solution ---unlike current approaches--- takes into account backward axes, predicates, and can be applied to multiple queries rather than just to single ones. A side contribution is a new type system for XPath able to handle backward axes. The soundness of our approach is formally proved. Furthermore, we prove that the approach is also complete (i.e., yields the best possible type-driven pruning) for a relevant class of queries and Schemas. We further validate our approach using the XMark and XPathMark benchmarks and show that pruning not only improves the main memory query engine's performances (as expected) but also those of state of the art native XML databases.
1104.2086
Slav Petrov
Slav Petrov, Dipanjan Das and Ryan McDonald
A Universal Part-of-Speech Tagset
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To facilitate future research in unsupervised induction of syntactic structure and to standardize best-practices, we propose a tagset that consists of twelve universal part-of-speech categories. In addition to the tagset, we develop a mapping from 25 different treebank tagsets to this universal set. As a result, when combined with the original treebank data, this universal tagset and mapping produce a dataset consisting of common parts-of-speech for 22 different languages. We highlight the use of this resource via two experiments, including one that reports competitive accuracies for unsupervised grammar induction without gold standard part-of-speech tags.
[ { "version": "v1", "created": "Mon, 11 Apr 2011 23:06:54 GMT" } ]
2015-03-19T00:00:00
[ [ "Petrov", "Slav", "" ], [ "Das", "Dipanjan", "" ], [ "McDonald", "Ryan", "" ] ]
TITLE: A Universal Part-of-Speech Tagset ABSTRACT: To facilitate future research in unsupervised induction of syntactic structure and to standardize best-practices, we propose a tagset that consists of twelve universal part-of-speech categories. In addition to the tagset, we develop a mapping from 25 different treebank tagsets to this universal set. As a result, when combined with the original treebank data, this universal tagset and mapping produce a dataset consisting of common parts-of-speech for 22 different languages. We highlight the use of this resource via two experiments, including one that reports competitive accuracies for unsupervised grammar induction without gold standard part-of-speech tags.
1104.3590
Brian Karrer
Brian Ball, Brian Karrer, and M. E. J. Newman
An efficient and principled method for detecting communities in networks
14 pages, 5 figures, 1 table
Phys. Rev. E 84, 036103 (2011)
10.1103/PhysRevE.84.036103
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fundamental problem in the analysis of network data is the detection of network communities, groups of densely interconnected nodes, which may be overlapping or disjoint. Here we describe a method for finding overlapping communities based on a principled statistical approach using generative network models. We show how the method can be implemented using a fast, closed-form expectation-maximization algorithm that allows us to analyze networks of millions of nodes in reasonable running times. We test the method both on real-world networks and on synthetic benchmarks and find that it gives results competitive with previous methods. We also show that the same approach can be used to extract nonoverlapping community divisions via a relaxation method, and demonstrate that the algorithm is competitively fast and accurate for the nonoverlapping problem.
[ { "version": "v1", "created": "Mon, 18 Apr 2011 21:10:50 GMT" } ]
2015-03-19T00:00:00
[ [ "Ball", "Brian", "" ], [ "Karrer", "Brian", "" ], [ "Newman", "M. E. J.", "" ] ]
TITLE: An efficient and principled method for detecting communities in networks ABSTRACT: A fundamental problem in the analysis of network data is the detection of network communities, groups of densely interconnected nodes, which may be overlapping or disjoint. Here we describe a method for finding overlapping communities based on a principled statistical approach using generative network models. We show how the method can be implemented using a fast, closed-form expectation-maximization algorithm that allows us to analyze networks of millions of nodes in reasonable running times. We test the method both on real-world networks and on synthetic benchmarks and find that it gives results competitive with previous methods. We also show that the same approach can be used to extract nonoverlapping community divisions via a relaxation method, and demonstrate that the algorithm is competitively fast and accurate for the nonoverlapping problem.
1104.4617
Michael Codish
Amit Metodi and Michael Codish and Vitaly Lagoon and Peter J. Stuckey
Boolean Equi-propagation for Optimized SAT Encoding
null
null
null
null
cs.AI cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an approach to propagation based solving, Boolean equi-propagation, where constraints are modelled as propagators of information about equalities between Boolean literals. Propagation based solving applies this information as a form of partial evaluation resulting in optimized SAT encodings. We demonstrate for a variety of benchmarks that our approach results in smaller CNF encodings and leads to speed-ups in solving times.
[ { "version": "v1", "created": "Sun, 24 Apr 2011 10:39:07 GMT" } ]
2015-03-19T00:00:00
[ [ "Metodi", "Amit", "" ], [ "Codish", "Michael", "" ], [ "Lagoon", "Vitaly", "" ], [ "Stuckey", "Peter J.", "" ] ]
TITLE: Boolean Equi-propagation for Optimized SAT Encoding ABSTRACT: We present an approach to propagation based solving, Boolean equi-propagation, where constraints are modelled as propagators of information about equalities between Boolean literals. Propagation based solving applies this information as a form of partial evaluation resulting in optimized SAT encodings. We demonstrate for a variety of benchmarks that our approach results in smaller CNF encodings and leads to speed-ups in solving times.
1104.4704
Chunhua Shen
Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel
Positive Semidefinite Metric Learning Using Boosting-like Algorithms
30 pages, appearing in Journal of Machine Learning Research
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The success of many machine learning and pattern recognition methods relies heavily upon the identification of an appropriate distance metric on the input data. It is often beneficial to learn such a metric from the input training data, instead of using a default one such as the Euclidean distance. In this work, we propose a boosting-based technique, termed BoostMetric, for learning a quadratic Mahalanobis distance metric. Learning a valid Mahalanobis distance metric requires enforcing the constraint that the matrix parameter to the metric remains positive definite. Semidefinite programming is often used to enforce this constraint, but does not scale well and easy to implement. BoostMetric is instead based on the observation that any positive semidefinite matrix can be decomposed into a linear combination of trace-one rank-one matrices. BoostMetric thus uses rank-one positive semidefinite matrices as weak learners within an efficient and scalable boosting-based learning process. The resulting methods are easy to implement, efficient, and can accommodate various types of constraints. We extend traditional boosting algorithms in that its weak learner is a positive semidefinite matrix with trace and rank being one rather than a classifier or regressor. Experiments on various datasets demonstrate that the proposed algorithms compare favorably to those state-of-the-art methods in terms of classification accuracy and running time.
[ { "version": "v1", "created": "Mon, 25 Apr 2011 10:38:03 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2012 05:56:40 GMT" } ]
2015-03-19T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Kim", "Junae", "" ], [ "Wang", "Lei", "" ], [ "Hengel", "Anton van den", "" ] ]
TITLE: Positive Semidefinite Metric Learning Using Boosting-like Algorithms ABSTRACT: The success of many machine learning and pattern recognition methods relies heavily upon the identification of an appropriate distance metric on the input data. It is often beneficial to learn such a metric from the input training data, instead of using a default one such as the Euclidean distance. In this work, we propose a boosting-based technique, termed BoostMetric, for learning a quadratic Mahalanobis distance metric. Learning a valid Mahalanobis distance metric requires enforcing the constraint that the matrix parameter to the metric remains positive definite. Semidefinite programming is often used to enforce this constraint, but does not scale well and easy to implement. BoostMetric is instead based on the observation that any positive semidefinite matrix can be decomposed into a linear combination of trace-one rank-one matrices. BoostMetric thus uses rank-one positive semidefinite matrices as weak learners within an efficient and scalable boosting-based learning process. The resulting methods are easy to implement, efficient, and can accommodate various types of constraints. We extend traditional boosting algorithms in that its weak learner is a positive semidefinite matrix with trace and rank being one rather than a classifier or regressor. Experiments on various datasets demonstrate that the proposed algorithms compare favorably to those state-of-the-art methods in terms of classification accuracy and running time.
1104.4954
Michael Sagraloff
Pavel Emeliyanenko, Michael Sagraloff
On the Complexity of Solving a Bivariate Polynomial System
null
null
null
null
cs.SC cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the complexity of computing the real solutions of a bivariate polynomial system using the recently proposed algorithm BISOLVE. BISOLVE is a classical elimination method which first projects the solutions of a system onto the $x$- and $y$-axes and, then, selects the actual solutions from the so induced candidate set. However, unlike similar algorithms, BISOLVE requires no genericity assumption on the input nor it needs any change of the coordinate system. Furthermore, extensive benchmarks from \cite{bes-bisolve-2011} confirm that the algorithm outperforms state of the art approaches by a large factor. In this work, we show that, for two polynomials $f,g\in\mathbb{Z}[x,y]$ of total degree at most $n$ with integer coefficients bounded by $2^\tau$, BISOLVE computes isolating boxes for all real solutions of the system $f=g=0$ using $\Otilde(n^8\tau^{2})$ bit operations, thereby improving the previous record bound by a factor of at least $n^{2}$.
[ { "version": "v1", "created": "Tue, 26 Apr 2011 15:57:43 GMT" } ]
2015-03-19T00:00:00
[ [ "Emeliyanenko", "Pavel", "" ], [ "Sagraloff", "Michael", "" ] ]
TITLE: On the Complexity of Solving a Bivariate Polynomial System ABSTRACT: We study the complexity of computing the real solutions of a bivariate polynomial system using the recently proposed algorithm BISOLVE. BISOLVE is a classical elimination method which first projects the solutions of a system onto the $x$- and $y$-axes and, then, selects the actual solutions from the so induced candidate set. However, unlike similar algorithms, BISOLVE requires no genericity assumption on the input nor it needs any change of the coordinate system. Furthermore, extensive benchmarks from \cite{bes-bisolve-2011} confirm that the algorithm outperforms state of the art approaches by a large factor. In this work, we show that, for two polynomials $f,g\in\mathbb{Z}[x,y]$ of total degree at most $n$ with integer coefficients bounded by $2^\tau$, BISOLVE computes isolating boxes for all real solutions of the system $f=g=0$ using $\Otilde(n^8\tau^{2})$ bit operations, thereby improving the previous record bound by a factor of at least $n^{2}$.
1105.0903
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Michalis Potamias, and Georgios Zervas
A Month in the Life of Groupon
6 pages
null
10.1016/j.elerap.2012.11.006
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Groupon has become the latest Internet sensation, providing daily deals to customers in the form of discount offers for restaurants, ticketed events, appliances, services, and other items. We undertake a study of the economics of daily deals on the web, based on a dataset we compiled by monitoring Groupon over several weeks. We use our dataset to characterize Groupon deal purchases, and to glean insights about Groupon's operational strategy. Our focus is on purchase incentives. For the primary purchase incentive, price, our regression model indicates that demand for coupons is relatively inelastic, allowing room for price-based revenue optimization. More interestingly, mining our dataset, we find evidence that Groupon customers are sensitive to other, "soft", incentives, e.g., deal scheduling and duration, deal featuring, and limited inventory. Our analysis points to the importance of considering incentives other than price in optimizing deal sites and similar systems.
[ { "version": "v1", "created": "Wed, 4 May 2011 19:25:21 GMT" } ]
2015-03-19T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Potamias", "Michalis", "" ], [ "Zervas", "Georgios", "" ] ]
TITLE: A Month in the Life of Groupon ABSTRACT: Groupon has become the latest Internet sensation, providing daily deals to customers in the form of discount offers for restaurants, ticketed events, appliances, services, and other items. We undertake a study of the economics of daily deals on the web, based on a dataset we compiled by monitoring Groupon over several weeks. We use our dataset to characterize Groupon deal purchases, and to glean insights about Groupon's operational strategy. Our focus is on purchase incentives. For the primary purchase incentive, price, our regression model indicates that demand for coupons is relatively inelastic, allowing room for price-based revenue optimization. More interestingly, mining our dataset, we find evidence that Groupon customers are sensitive to other, "soft", incentives, e.g., deal scheduling and duration, deal featuring, and limited inventory. Our analysis points to the importance of considering incentives other than price in optimizing deal sites and similar systems.
1105.3232
Sokol Kosta
Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang
Unleashing the Power of Mobile Cloud Computing using ThinkAir
17 pages
null
null
null
cs.DC cs.NI cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smartphones have exploded in popularity in recent years, becoming ever more sophisticated and capable. As a result, developers worldwide are building increasingly complex applications that require ever increasing amounts of computational power and energy. In this paper we propose ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud. ThinkAir exploits the concept of smartphone virtualization in the cloud and provides method level computation offloading. Advancing on previous works, it focuses on the elasticity and scalability of the server side and enhances the power of mobile cloud computing by parallelizing method execution using multiple Virtual Machine (VM) images. We evaluate the system using a range of benchmarks starting from simple micro-benchmarks to more complex applications. First, we show that the execution time and energy consumption decrease two orders of magnitude for the N-queens puzzle and one order of magnitude for a face detection and a virus scan application, using cloud offloading. We then show that if a task is parallelizable, the user can request more than one VM to execute it, and these VMs will be provided dynamically. In fact, by exploiting parallelization, we achieve a greater reduction on the execution time and energy consumption for the previous applications. Finally, we use a memory-hungry image combiner tool to demonstrate that applications can dynamically request VMs with more computational power in order to meet their computational requirements.
[ { "version": "v1", "created": "Mon, 16 May 2011 21:45:54 GMT" } ]
2015-03-19T00:00:00
[ [ "Kosta", "Sokol", "" ], [ "Aucinas", "Andrius", "" ], [ "Hui", "Pan", "" ], [ "Mortier", "Richard", "" ], [ "Zhang", "Xinwen", "" ] ]
TITLE: Unleashing the Power of Mobile Cloud Computing using ThinkAir ABSTRACT: Smartphones have exploded in popularity in recent years, becoming ever more sophisticated and capable. As a result, developers worldwide are building increasingly complex applications that require ever increasing amounts of computational power and energy. In this paper we propose ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud. ThinkAir exploits the concept of smartphone virtualization in the cloud and provides method level computation offloading. Advancing on previous works, it focuses on the elasticity and scalability of the server side and enhances the power of mobile cloud computing by parallelizing method execution using multiple Virtual Machine (VM) images. We evaluate the system using a range of benchmarks starting from simple micro-benchmarks to more complex applications. First, we show that the execution time and energy consumption decrease two orders of magnitude for the N-queens puzzle and one order of magnitude for a face detection and a virus scan application, using cloud offloading. We then show that if a task is parallelizable, the user can request more than one VM to execute it, and these VMs will be provided dynamically. In fact, by exploiting parallelization, we achieve a greater reduction on the execution time and energy consumption for the previous applications. Finally, we use a memory-hungry image combiner tool to demonstrate that applications can dynamically request VMs with more computational power in order to meet their computational requirements.
1105.4385
Ping Li
Ping Li and Joshua Moore and Christian Konig
b-Bit Minwise Hashing for Large-Scale Linear SVM
null
null
null
null
cs.LG stat.AP stat.CO stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose to (seamlessly) integrate b-bit minwise hashing with linear SVM to substantially improve the training (and testing) efficiency using much smaller memory, with essentially no loss of accuracy. Theoretically, we prove that the resemblance matrix, the minwise hashing matrix, and the b-bit minwise hashing matrix are all positive definite matrices (kernels). Interestingly, our proof for the positive definiteness of the b-bit minwise hashing kernel naturally suggests a simple strategy to integrate b-bit hashing with linear SVM. Our technique is particularly useful when the data can not fit in memory, which is an increasingly critical issue in large-scale machine learning. Our preliminary experimental results on a publicly available webspam dataset (350K samples and 16 million dimensions) verified the effectiveness of our algorithm. For example, the training time was reduced to merely a few seconds. In addition, our technique can be easily extended to many other linear and nonlinear machine learning applications such as logistic regression.
[ { "version": "v1", "created": "Mon, 23 May 2011 01:56:24 GMT" } ]
2015-03-19T00:00:00
[ [ "Li", "Ping", "" ], [ "Moore", "Joshua", "" ], [ "Konig", "Christian", "" ] ]
TITLE: b-Bit Minwise Hashing for Large-Scale Linear SVM ABSTRACT: In this paper, we propose to (seamlessly) integrate b-bit minwise hashing with linear SVM to substantially improve the training (and testing) efficiency using much smaller memory, with essentially no loss of accuracy. Theoretically, we prove that the resemblance matrix, the minwise hashing matrix, and the b-bit minwise hashing matrix are all positive definite matrices (kernels). Interestingly, our proof for the positive definiteness of the b-bit minwise hashing kernel naturally suggests a simple strategy to integrate b-bit hashing with linear SVM. Our technique is particularly useful when the data can not fit in memory, which is an increasingly critical issue in large-scale machine learning. Our preliminary experimental results on a publicly available webspam dataset (350K samples and 16 million dimensions) verified the effectiveness of our algorithm. For example, the training time was reduced to merely a few seconds. In addition, our technique can be easily extended to many other linear and nonlinear machine learning applications such as logistic regression.
1105.5196
Jason Weston
Jason Weston, Samy Bengio, Philippe Hamel
Large-Scale Music Annotation and Retrieval: Learning to Rank in Joint Semantic Spaces
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Music prediction tasks range from predicting tags given a song or clip of audio, predicting the name of the artist, or predicting related songs given a song, clip, artist name or tag. That is, we are interested in every semantic relationship between the different musical concepts in our database. In realistically sized databases, the number of songs is measured in the hundreds of thousands or more, and the number of artists in the tens of thousands or more, providing a considerable challenge to standard machine learning techniques. In this work, we propose a method that scales to such datasets which attempts to capture the semantic similarities between the database items by modeling audio, artist names, and tags in a single low-dimensional semantic space. This choice of space is learnt by optimizing the set of prediction tasks of interest jointly using multi-task learning. Our method both outperforms baseline methods and, in comparison to them, is faster and consumes less memory. We then demonstrate how our method learns an interpretable model, where the semantic space captures well the similarities of interest.
[ { "version": "v1", "created": "Thu, 26 May 2011 03:41:47 GMT" } ]
2015-03-19T00:00:00
[ [ "Weston", "Jason", "" ], [ "Bengio", "Samy", "" ], [ "Hamel", "Philippe", "" ] ]
TITLE: Large-Scale Music Annotation and Retrieval: Learning to Rank in Joint Semantic Spaces ABSTRACT: Music prediction tasks range from predicting tags given a song or clip of audio, predicting the name of the artist, or predicting related songs given a song, clip, artist name or tag. That is, we are interested in every semantic relationship between the different musical concepts in our database. In realistically sized databases, the number of songs is measured in the hundreds of thousands or more, and the number of artists in the tens of thousands or more, providing a considerable challenge to standard machine learning techniques. In this work, we propose a method that scales to such datasets which attempts to capture the semantic similarities between the database items by modeling audio, artist names, and tags in a single low-dimensional semantic space. This choice of space is learnt by optimizing the set of prediction tasks of interest jointly using multi-task learning. Our method both outperforms baseline methods and, in comparison to them, is faster and consumes less memory. We then demonstrate how our method learns an interpretable model, where the semantic space captures well the similarities of interest.
1105.5881
Mingyu Chen
Mingyu Chen, David A. Bader
On the random access performance of Cell Broadband Engine with graph analysis application
8 pages, 10 figures
null
null
null
cs.CE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Cell Broad Engine (BE) Processor has unique memory access architecture besides its powerful computing engines. Many computing-intensive applications have been ported to Cell/BE successfully. But memory-intensive applications are rarely investigated except for several micro benchmarks. Since Cell/BE has powerful software visible DMA engine, this paper studies on whether Cell/BE is suit for applica- tions with large amount of random memory accesses. Two benchmarks, GUPS and SSCA#2, are used. The latter is a rather complex one that in representative of real world graph analysis applications. We find both benchmarks have good performance on Cell/BE based IBM QS20/22. Com- pared with 2 conventional multi-processor systems with the same core/thread number, GUPS is about 40-80% fast and SSCA#2 about 17-30% fast. The dynamic load balanc- ing and software pipeline for optimizing SSCA#2 are intro- duced. Based on the experiment, the potential of Cell/BE for random access is analyzed in detail as well as its limita- tions of memory controller, atomic engine and TLB manage- ment.Our research shows although more programming effort are needed, Cell/BE has the potencial for irregular memory access applications.
[ { "version": "v1", "created": "Mon, 30 May 2011 07:07:59 GMT" }, { "version": "v2", "created": "Sun, 5 Jun 2011 07:10:43 GMT" } ]
2015-03-19T00:00:00
[ [ "Chen", "Mingyu", "" ], [ "Bader", "David A.", "" ] ]
TITLE: On the random access performance of Cell Broadband Engine with graph analysis application ABSTRACT: The Cell Broad Engine (BE) Processor has unique memory access architecture besides its powerful computing engines. Many computing-intensive applications have been ported to Cell/BE successfully. But memory-intensive applications are rarely investigated except for several micro benchmarks. Since Cell/BE has powerful software visible DMA engine, this paper studies on whether Cell/BE is suit for applica- tions with large amount of random memory accesses. Two benchmarks, GUPS and SSCA#2, are used. The latter is a rather complex one that in representative of real world graph analysis applications. We find both benchmarks have good performance on Cell/BE based IBM QS20/22. Com- pared with 2 conventional multi-processor systems with the same core/thread number, GUPS is about 40-80% fast and SSCA#2 about 17-30% fast. The dynamic load balanc- ing and software pipeline for optimizing SSCA#2 are intro- duced. Based on the experiment, the potential of Cell/BE for random access is analyzed in detail as well as its limita- tions of memory controller, atomic engine and TLB manage- ment.Our research shows although more programming effort are needed, Cell/BE has the potencial for irregular memory access applications.
1106.0987
Junping Zhang
Junping Zhang and Ziyu Xie and Stan Z. Li
Nearest Prime Simplicial Complex for Object Recognition
16pages, 6 figures
null
null
null
cs.LG cs.AI cs.CG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The structure representation of data distribution plays an important role in understanding the underlying mechanism of generating data. In this paper, we propose nearest prime simplicial complex approaches (NSC) by utilizing persistent homology to capture such structures. Assuming that each class is represented with a prime simplicial complex, we classify unlabeled samples based on the nearest projection distances from the samples to the simplicial complexes. We also extend the extrapolation ability of these complexes with a projection constraint term. Experiments in simulated and practical datasets indicate that compared with several published algorithms, the proposed NSC approaches achieve promising performance without losing the structure representation.
[ { "version": "v1", "created": "Mon, 6 Jun 2011 08:32:16 GMT" } ]
2015-03-19T00:00:00
[ [ "Zhang", "Junping", "" ], [ "Xie", "Ziyu", "" ], [ "Li", "Stan Z.", "" ] ]
TITLE: Nearest Prime Simplicial Complex for Object Recognition ABSTRACT: The structure representation of data distribution plays an important role in understanding the underlying mechanism of generating data. In this paper, we propose nearest prime simplicial complex approaches (NSC) by utilizing persistent homology to capture such structures. Assuming that each class is represented with a prime simplicial complex, we classify unlabeled samples based on the nearest projection distances from the samples to the simplicial complexes. We also extend the extrapolation ability of these complexes with a projection constraint term. Experiments in simulated and practical datasets indicate that compared with several published algorithms, the proposed NSC approaches achieve promising performance without losing the structure representation.
1107.1697
Aiyou Chen
Aiyou Chen, Jin Cao, Larry Shepp and Tuan Nguyen
Distinct counting with a self-learning bitmap
Journal of the American Statistical Association (accepted)
null
null
null
stat.CO cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Counting the number of distinct elements (cardinality) in a dataset is a fundamental problem in database management. In recent years, due to many of its modern applications, there has been significant interest to address the distinct counting problem in a data stream setting, where each incoming data can be seen only once and cannot be stored for long periods of time. Many probabilistic approaches based on either sampling or sketching have been proposed in the computer science literature, that only require limited computing and memory resources. However, the performances of these methods are not scale-invariant, in the sense that their relative root mean square estimation errors (RRMSE) depend on the unknown cardinalities. This is not desirable in many applications where cardinalities can be very dynamic or inhomogeneous and many cardinalities need to be estimated. In this paper, we develop a novel approach, called self-learning bitmap (S-bitmap) that is scale-invariant for cardinalities in a specified range. S-bitmap uses a binary vector whose entries are updated from 0 to 1 by an adaptive sampling process for inferring the unknown cardinality, where the sampling rates are reduced sequentially as more and more entries change from 0 to 1. We prove rigorously that the S-bitmap estimate is not only unbiased but scale-invariant. We demonstrate that to achieve a small RRMSE value of $\epsilon$ or less, our approach requires significantly less memory and consumes similar or less operations than state-of-the-art methods for many common practice cardinality scales. Both simulation and experimental studies are reported.
[ { "version": "v1", "created": "Fri, 8 Jul 2011 18:50:16 GMT" } ]
2015-03-19T00:00:00
[ [ "Chen", "Aiyou", "" ], [ "Cao", "Jin", "" ], [ "Shepp", "Larry", "" ], [ "Nguyen", "Tuan", "" ] ]
TITLE: Distinct counting with a self-learning bitmap ABSTRACT: Counting the number of distinct elements (cardinality) in a dataset is a fundamental problem in database management. In recent years, due to many of its modern applications, there has been significant interest to address the distinct counting problem in a data stream setting, where each incoming data can be seen only once and cannot be stored for long periods of time. Many probabilistic approaches based on either sampling or sketching have been proposed in the computer science literature, that only require limited computing and memory resources. However, the performances of these methods are not scale-invariant, in the sense that their relative root mean square estimation errors (RRMSE) depend on the unknown cardinalities. This is not desirable in many applications where cardinalities can be very dynamic or inhomogeneous and many cardinalities need to be estimated. In this paper, we develop a novel approach, called self-learning bitmap (S-bitmap) that is scale-invariant for cardinalities in a specified range. S-bitmap uses a binary vector whose entries are updated from 0 to 1 by an adaptive sampling process for inferring the unknown cardinality, where the sampling rates are reduced sequentially as more and more entries change from 0 to 1. We prove rigorously that the S-bitmap estimate is not only unbiased but scale-invariant. We demonstrate that to achieve a small RRMSE value of $\epsilon$ or less, our approach requires significantly less memory and consumes similar or less operations than state-of-the-art methods for many common practice cardinality scales. Both simulation and experimental studies are reported.
1107.1805
Maksims Volkovs
Maksims N. Volkovs, Hugo Larochelle, Richard S. Zemel
Loss-sensitive Training of Probabilistic Conditional Random Fields
null
null
null
null
stat.ML cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of training probabilistic conditional random fields (CRFs) in the context of a task where performance is measured using a specific loss function. While maximum likelihood is the most common approach to training CRFs, it ignores the inherent structure of the task's loss function. We describe alternatives to maximum likelihood which take that loss into account. These include a novel adaptation of a loss upper bound from the structured SVMs literature to the CRF context, as well as a new loss-inspired KL divergence objective which relies on the probabilistic nature of CRFs. These loss-sensitive objectives are compared to maximum likelihood using ranking as a benchmark task. This comparison confirms the importance of incorporating loss information in the probabilistic training of CRFs, with the loss-inspired KL outperforming all other objectives.
[ { "version": "v1", "created": "Sat, 9 Jul 2011 17:58:46 GMT" } ]
2015-03-19T00:00:00
[ [ "Volkovs", "Maksims N.", "" ], [ "Larochelle", "Hugo", "" ], [ "Zemel", "Richard S.", "" ] ]
TITLE: Loss-sensitive Training of Probabilistic Conditional Random Fields ABSTRACT: We consider the problem of training probabilistic conditional random fields (CRFs) in the context of a task where performance is measured using a specific loss function. While maximum likelihood is the most common approach to training CRFs, it ignores the inherent structure of the task's loss function. We describe alternatives to maximum likelihood which take that loss into account. These include a novel adaptation of a loss upper bound from the structured SVMs literature to the CRF context, as well as a new loss-inspired KL divergence objective which relies on the probabilistic nature of CRFs. These loss-sensitive objectives are compared to maximum likelihood using ranking as a benchmark task. This comparison confirms the importance of incorporating loss information in the probabilistic training of CRFs, with the loss-inspired KL outperforming all other objectives.
1107.2031
Shishir Nagaraja
Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov
Stegobot: construction of an unobservable communication network leveraging social behavior
Information Hiding, unobservability, anonymity, botnet
null
null
null
cs.CR cs.NI cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the construction of an unobservable communications network using social networks. The communication endpoints are vertices on a social network. Probabilistically unobservable communication channels are built by leveraging image steganography and the social image sharing behavior of users. All communication takes place along the edges of a social network overlay connecting friends. We show that such a network can provide decent bandwidth even with a far from optimal routing mechanism such as restricted flooding. We show that such a network is indeed usable by constructing a botnet on top of it, called Stegobot. It is designed to spread via social malware attacks and steal information from its victims. Unlike conventional botnets, Stegobot traffic does not introduce new communication endpoints between bots. We analyzed a real-world dataset of image sharing between members of an online social network. Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful -- capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
[ { "version": "v1", "created": "Mon, 11 Jul 2011 13:56:15 GMT" } ]
2015-03-19T00:00:00
[ [ "Nagaraja", "Shishir", "" ], [ "Houmansadr", "Amir", "" ], [ "Piyawongwisal", "Pratch", "" ], [ "Singh", "Vijit", "" ], [ "Agarwal", "Pragya", "" ], [ "Borisov", "Nikita", "" ] ]
TITLE: Stegobot: construction of an unobservable communication network leveraging social behavior ABSTRACT: We propose the construction of an unobservable communications network using social networks. The communication endpoints are vertices on a social network. Probabilistically unobservable communication channels are built by leveraging image steganography and the social image sharing behavior of users. All communication takes place along the edges of a social network overlay connecting friends. We show that such a network can provide decent bandwidth even with a far from optimal routing mechanism such as restricted flooding. We show that such a network is indeed usable by constructing a botnet on top of it, called Stegobot. It is designed to spread via social malware attacks and steal information from its victims. Unlike conventional botnets, Stegobot traffic does not introduce new communication endpoints between bots. We analyzed a real-world dataset of image sharing between members of an online social network. Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful -- capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
1107.3606
Hideaki Kimura
Hideaki Kimura, Carleton Coffrin, Alexander Rasin, Stanley B. Zdonik
Optimizing Index Deployment Order for Evolving OLAP (Extended Version)
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Query workloads and database schemas in OLAP applications are becoming increasingly complex. Moreover, the queries and the schemas have to continually \textit{evolve} to address business requirements. During such repetitive transitions, the \textit{order} of index deployment has to be considered while designing the physical schemas such as indexes and MVs. An effective index deployment ordering can produce (1) a prompt query runtime improvement and (2) a reduced total deployment time. Both of these are essential qualities of design tools for quickly evolving databases, but optimizing the problem is challenging because of complex index interactions and a factorial number of possible solutions. We formulate the problem in a mathematical model and study several techniques for solving the index ordering problem. We demonstrate that Constraint Programming (CP) is a more flexible and efficient platform to solve the problem than other methods such as mixed integer programming and A* search. In addition to exact search techniques, we also studied local search algorithms to find near optimal solution very quickly. Our empirical analysis on the TPC-H dataset shows that our pruning techniques can reduce the size of the search space by tens of orders of magnitude. Using the TPC-DS dataset, we verify that our local search algorithm is a highly scalable and stable method for quickly finding a near-optimal solution.
[ { "version": "v1", "created": "Tue, 19 Jul 2011 01:52:52 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2011 00:25:35 GMT" }, { "version": "v3", "created": "Wed, 1 Feb 2012 15:46:22 GMT" } ]
2015-03-19T00:00:00
[ [ "Kimura", "Hideaki", "" ], [ "Coffrin", "Carleton", "" ], [ "Rasin", "Alexander", "" ], [ "Zdonik", "Stanley B.", "" ] ]
TITLE: Optimizing Index Deployment Order for Evolving OLAP (Extended Version) ABSTRACT: Query workloads and database schemas in OLAP applications are becoming increasingly complex. Moreover, the queries and the schemas have to continually \textit{evolve} to address business requirements. During such repetitive transitions, the \textit{order} of index deployment has to be considered while designing the physical schemas such as indexes and MVs. An effective index deployment ordering can produce (1) a prompt query runtime improvement and (2) a reduced total deployment time. Both of these are essential qualities of design tools for quickly evolving databases, but optimizing the problem is challenging because of complex index interactions and a factorial number of possible solutions. We formulate the problem in a mathematical model and study several techniques for solving the index ordering problem. We demonstrate that Constraint Programming (CP) is a more flexible and efficient platform to solve the problem than other methods such as mixed integer programming and A* search. In addition to exact search techniques, we also studied local search algorithms to find near optimal solution very quickly. Our empirical analysis on the TPC-H dataset shows that our pruning techniques can reduce the size of the search space by tens of orders of magnitude. Using the TPC-DS dataset, we verify that our local search algorithm is a highly scalable and stable method for quickly finding a near-optimal solution.
1107.4526
Dario Maggiorini
Sabrina Gaito, Dario Maggiorini, Gian Paolo Rossi
Leveraging Bus Mobility to Enable Communications in Urban Areas
14 pages, 13 figures, 4 tables
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows that the deployment of an opportunistic network on any public transportation system leads to obtain a scalable and efficient urban communication platform. We use the term Bus Switched Networks (BSNs) to indicate this urban backbone that complements the services of 3G networks and enables to meet the application level requirements for a large class of applications by ensuring high delivery ratio and acceptable delays under different conditions of packet load. We sustain these arguments by providing three contributions. The first contribution is a novel and lightweight probabilistic routing protocol for BSN which we prove to be highly effective in satisfying the loose QoS required by urban-wide delay-tolerant information services. The second contribution is the proposal of URBeS, an analysis platform that, given a specific city served by public transportation, produces real bus mobility traces and traffic analysis for any given routing protocol. The last contribution is an extensive benchmark analysis on three real cities which have been selected to explore geo and structural diversity.
[ { "version": "v1", "created": "Fri, 22 Jul 2011 14:30:19 GMT" } ]
2015-03-19T00:00:00
[ [ "Gaito", "Sabrina", "" ], [ "Maggiorini", "Dario", "" ], [ "Rossi", "Gian Paolo", "" ] ]
TITLE: Leveraging Bus Mobility to Enable Communications in Urban Areas ABSTRACT: This paper shows that the deployment of an opportunistic network on any public transportation system leads to obtain a scalable and efficient urban communication platform. We use the term Bus Switched Networks (BSNs) to indicate this urban backbone that complements the services of 3G networks and enables to meet the application level requirements for a large class of applications by ensuring high delivery ratio and acceptable delays under different conditions of packet load. We sustain these arguments by providing three contributions. The first contribution is a novel and lightweight probabilistic routing protocol for BSN which we prove to be highly effective in satisfying the loose QoS required by urban-wide delay-tolerant information services. The second contribution is the proposal of URBeS, an analysis platform that, given a specific city served by public transportation, produces real bus mobility traces and traffic analysis for any given routing protocol. The last contribution is an extensive benchmark analysis on three real cities which have been selected to explore geo and structural diversity.
1108.1122
Yaniv Taigman
Yaniv Taigman and Lior Wolf
Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition
7 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We employ the face recognition technology developed in house at face.com to a well accepted benchmark and show that without any tuning we are able to considerably surpass state of the art results. Much of the improvement is concentrated in the high-valued performance point of zero false positive matches, where the obtained recall rate almost doubles the best reported result to date. We discuss the various components and innovations of our system that enable this significant performance gap. These components include extensive utilization of an accurate 3D reconstructed shape model dealing with challenges arising from pose and illumination. In addition, discriminative models based on billions of faces are used in order to overcome aging and facial expression as well as low light and overexposure. Finally, we identify a challenging set of identification queries that might provide useful focus for future research.
[ { "version": "v1", "created": "Thu, 4 Aug 2011 15:51:19 GMT" } ]
2015-03-19T00:00:00
[ [ "Taigman", "Yaniv", "" ], [ "Wolf", "Lior", "" ] ]
TITLE: Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition ABSTRACT: We employ the face recognition technology developed in house at face.com to a well accepted benchmark and show that without any tuning we are able to considerably surpass state of the art results. Much of the improvement is concentrated in the high-valued performance point of zero false positive matches, where the obtained recall rate almost doubles the best reported result to date. We discuss the various components and innovations of our system that enable this significant performance gap. These components include extensive utilization of an accurate 3D reconstructed shape model dealing with challenges arising from pose and illumination. In addition, discriminative models based on billions of faces are used in order to overcome aging and facial expression as well as low light and overexposure. Finally, we identify a challenging set of identification queries that might provide useful focus for future research.
1108.3605
Adrian Barbu
Adrian Barbu
Hierarchical Object Parsing from Structured Noisy Point Clouds
13 pages, 16 figures
null
10.1109/TPAMI.2012.262
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object parsing and segmentation from point clouds are challenging tasks because the relevant data is available only as thin structures along object boundaries or other features, and is corrupted by large amounts of noise. To handle this kind of data, flexible shape models are desired that can accurately follow the object boundaries. Popular models such as Active Shape and Active Appearance models lack the necessary flexibility for this task, while recent approaches such as the Recursive Compositional Models make model simplifications in order to obtain computational guarantees. This paper investigates a hierarchical Bayesian model of shape and appearance in a generative setting. The input data is explained by an object parsing layer, which is a deformation of a hidden PCA shape model with Gaussian prior. The paper also introduces a novel efficient inference algorithm that uses informed data-driven proposals to initialize local searches for the hidden variables. Applied to the problem of object parsing from structured point clouds such as edge detection images, the proposed approach obtains state of the art parsing errors on two standard datasets without using any intensity information.
[ { "version": "v1", "created": "Thu, 18 Aug 2011 02:11:34 GMT" }, { "version": "v2", "created": "Sat, 15 Sep 2012 14:24:08 GMT" } ]
2015-03-19T00:00:00
[ [ "Barbu", "Adrian", "" ] ]
TITLE: Hierarchical Object Parsing from Structured Noisy Point Clouds ABSTRACT: Object parsing and segmentation from point clouds are challenging tasks because the relevant data is available only as thin structures along object boundaries or other features, and is corrupted by large amounts of noise. To handle this kind of data, flexible shape models are desired that can accurately follow the object boundaries. Popular models such as Active Shape and Active Appearance models lack the necessary flexibility for this task, while recent approaches such as the Recursive Compositional Models make model simplifications in order to obtain computational guarantees. This paper investigates a hierarchical Bayesian model of shape and appearance in a generative setting. The input data is explained by an object parsing layer, which is a deformation of a hidden PCA shape model with Gaussian prior. The paper also introduces a novel efficient inference algorithm that uses informed data-driven proposals to initialize local searches for the hidden variables. Applied to the problem of object parsing from structured point clouds such as edge detection images, the proposed approach obtains state of the art parsing errors on two standard datasets without using any intensity information.
1109.1530
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Georgios Zervas
Daily Deals: Prediction, Social Diffusion, and Reputational Ramifications
15 pages, 9 tables, 11 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Daily deal sites have become the latest Internet sensation, providing discounted offers to customers for restaurants, ticketed events, services, and other items. We begin by undertaking a study of the economics of daily deals on the web, based on a dataset we compiled by monitoring Groupon and LivingSocial sales in 20 large cities over several months. We use this dataset to characterize deal purchases; glean insights about operational strategies of these firms; and evaluate customers' sensitivity to factors such as price, deal scheduling, and limited inventory. We then marry our daily deals dataset with additional datasets we compiled from Facebook and Yelp users to study the interplay between social networks and daily deal sites. First, by studying user activity on Facebook while a deal is running, we provide evidence that daily deal sites benefit from significant word-of-mouth effects during sales events, consistent with results predicted by cascade models. Second, we consider the effects of daily deals on the longer-term reputation of merchants, based on their Yelp reviews before and after they run a daily deal. Our analysis shows that while the number of reviews increases significantly due to daily deals, average rating scores from reviewers who mention daily deals are 10% lower than scores of their peers on average.
[ { "version": "v1", "created": "Wed, 7 Sep 2011 18:29:30 GMT" } ]
2015-03-19T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Zervas", "Georgios", "" ] ]
TITLE: Daily Deals: Prediction, Social Diffusion, and Reputational Ramifications ABSTRACT: Daily deal sites have become the latest Internet sensation, providing discounted offers to customers for restaurants, ticketed events, services, and other items. We begin by undertaking a study of the economics of daily deals on the web, based on a dataset we compiled by monitoring Groupon and LivingSocial sales in 20 large cities over several months. We use this dataset to characterize deal purchases; glean insights about operational strategies of these firms; and evaluate customers' sensitivity to factors such as price, deal scheduling, and limited inventory. We then marry our daily deals dataset with additional datasets we compiled from Facebook and Yelp users to study the interplay between social networks and daily deal sites. First, by studying user activity on Facebook while a deal is running, we provide evidence that daily deal sites benefit from significant word-of-mouth effects during sales events, consistent with results predicted by cascade models. Second, we consider the effects of daily deals on the longer-term reputation of merchants, based on their Yelp reviews before and after they run a daily deal. Our analysis shows that while the number of reviews increases significantly due to daily deals, average rating scores from reviewers who mention daily deals are 10% lower than scores of their peers on average.
1109.1966
Timothy Hunter
Timothy Hunter, Pieter Abbeel, and Alexandre Bayen
The path inference filter: model-based low-latency map matching of probe vehicle data
Preprint, 23 pages and 23 figures
null
10.1016/j.trb.2013.03.008
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of reconstructing vehicle trajectories from sparse sequences of GPS points, for which the sampling interval is between 10 seconds and 2 minutes. We introduce a new class of algorithms, called altogether path inference filter (PIF), that maps GPS data in real time, for a variety of trade-offs and scenarios, and with a high throughput. Numerous prior approaches in map-matching can be shown to be special cases of the path inference filter presented in this article. We present an efficient procedure for automatically training the filter on new data, with or without ground truth observations. The framework is evaluated on a large San Francisco taxi dataset and is shown to improve upon the current state of the art. This filter also provides insights about driving patterns of drivers. The path inference filter has been deployed at an industrial scale inside the Mobile Millennium traffic information system, and is used to map fleets of data in San Francisco, Sacramento, Stockholm and Porto.
[ { "version": "v1", "created": "Fri, 9 Sep 2011 11:12:35 GMT" }, { "version": "v2", "created": "Wed, 20 Jun 2012 17:12:40 GMT" } ]
2015-03-19T00:00:00
[ [ "Hunter", "Timothy", "" ], [ "Abbeel", "Pieter", "" ], [ "Bayen", "Alexandre", "" ] ]
TITLE: The path inference filter: model-based low-latency map matching of probe vehicle data ABSTRACT: We consider the problem of reconstructing vehicle trajectories from sparse sequences of GPS points, for which the sampling interval is between 10 seconds and 2 minutes. We introduce a new class of algorithms, called altogether path inference filter (PIF), that maps GPS data in real time, for a variety of trade-offs and scenarios, and with a high throughput. Numerous prior approaches in map-matching can be shown to be special cases of the path inference filter presented in this article. We present an efficient procedure for automatically training the filter on new data, with or without ground truth observations. The framework is evaluated on a large San Francisco taxi dataset and is shown to improve upon the current state of the art. This filter also provides insights about driving patterns of drivers. The path inference filter has been deployed at an industrial scale inside the Mobile Millennium traffic information system, and is used to map fleets of data in San Francisco, Sacramento, Stockholm and Porto.
1109.3791
Fangfei Zhou
Fangfei Zhou, Liang Zhang, Eric Franco, Richard Revis, Alan Mislove, Ravi Sundaram
WebCloud: Recruiting web browsers for content distribution
This paper is withdraw by the author because we don't want to make it publicly available for now
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are at the beginning of a shift in how content is created and exchanged over the web. While content was previously created primarily by a small set of entities, today, individual users -- empowered by devices like digital cameras and services like online social networks -- are creating content that represents a significant fraction of Internet traffic. As a result, content today is increasingly generated and exchanged at the edge of the network. Unfortunately, the existing techniques and infrastructure that are still used to serve this content, such as centralized content distribution networks, are ill-suited for these new patterns of content exchange. In this paper, we take a first step towards addressing this situation by introducing WebCloud, a content distribution system for online social networking sites that works by re- purposing web browsers to help serve content. In other words, when a user browses content, WebCloud tries to fetch it from one of that user's friend's browsers, instead of from the social networking site. The result is a more direct exchange of content ; essentially, WebCloud leverages the spatial and temporal locality of interest between social network users. Because WebCloud is built using techniques already present in many web browsers, it can be applied today to many social networking sites. We demonstrate the practicality of WebCloud with microbenchmarks, simulations, and a prototype deployment.
[ { "version": "v1", "created": "Sat, 17 Sep 2011 15:28:07 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2011 21:12:24 GMT" } ]
2015-03-19T00:00:00
[ [ "Zhou", "Fangfei", "" ], [ "Zhang", "Liang", "" ], [ "Franco", "Eric", "" ], [ "Revis", "Richard", "" ], [ "Mislove", "Alan", "" ], [ "Sundaram", "Ravi", "" ] ]
TITLE: WebCloud: Recruiting web browsers for content distribution ABSTRACT: We are at the beginning of a shift in how content is created and exchanged over the web. While content was previously created primarily by a small set of entities, today, individual users -- empowered by devices like digital cameras and services like online social networks -- are creating content that represents a significant fraction of Internet traffic. As a result, content today is increasingly generated and exchanged at the edge of the network. Unfortunately, the existing techniques and infrastructure that are still used to serve this content, such as centralized content distribution networks, are ill-suited for these new patterns of content exchange. In this paper, we take a first step towards addressing this situation by introducing WebCloud, a content distribution system for online social networking sites that works by re- purposing web browsers to help serve content. In other words, when a user browses content, WebCloud tries to fetch it from one of that user's friend's browsers, instead of from the social networking site. The result is a more direct exchange of content ; essentially, WebCloud leverages the spatial and temporal locality of interest between social network users. Because WebCloud is built using techniques already present in many web browsers, it can be applied today to many social networking sites. We demonstrate the practicality of WebCloud with microbenchmarks, simulations, and a prototype deployment.
1109.4684
Zhiwu Lu
Zhiwu Lu, Horace H.S. Ip, Yuxin Peng
Exhaustive and Efficient Constraint Propagation: A Semi-Supervised Learning Perspective and Its Applications
The short version of this paper appears as oral paper in ECCV 2010
International Journal of Computer Vision (IJCV), 2012
10.1007/s11263-012-0602-z
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel pairwise constraint propagation approach by decomposing the challenging constraint propagation problem into a set of independent semi-supervised learning subproblems which can be solved in quadratic time using label propagation based on k-nearest neighbor graphs. Considering that this time cost is proportional to the number of all possible pairwise constraints, our approach actually provides an efficient solution for exhaustively propagating pairwise constraints throughout the entire dataset. The resulting exhaustive set of propagated pairwise constraints are further used to adjust the similarity matrix for constrained spectral clustering. Other than the traditional constraint propagation on single-source data, our approach is also extended to more challenging constraint propagation on multi-source data where each pairwise constraint is defined over a pair of data points from different sources. This multi-source constraint propagation has an important application to cross-modal multimedia retrieval. Extensive results have shown the superior performance of our approach.
[ { "version": "v1", "created": "Thu, 22 Sep 2011 00:56:22 GMT" } ]
2015-03-19T00:00:00
[ [ "Lu", "Zhiwu", "" ], [ "Ip", "Horace H. S.", "" ], [ "Peng", "Yuxin", "" ] ]
TITLE: Exhaustive and Efficient Constraint Propagation: A Semi-Supervised Learning Perspective and Its Applications ABSTRACT: This paper presents a novel pairwise constraint propagation approach by decomposing the challenging constraint propagation problem into a set of independent semi-supervised learning subproblems which can be solved in quadratic time using label propagation based on k-nearest neighbor graphs. Considering that this time cost is proportional to the number of all possible pairwise constraints, our approach actually provides an efficient solution for exhaustively propagating pairwise constraints throughout the entire dataset. The resulting exhaustive set of propagated pairwise constraints are further used to adjust the similarity matrix for constrained spectral clustering. Other than the traditional constraint propagation on single-source data, our approach is also extended to more challenging constraint propagation on multi-source data where each pairwise constraint is defined over a pair of data points from different sources. This multi-source constraint propagation has an important application to cross-modal multimedia retrieval. Extensive results have shown the superior performance of our approach.
1109.4979
Zhiwu Lu
Zhiwu Lu, Yuxin Peng
Latent Semantic Learning with Structured Sparse Representation for Human Action Recognition
The short version of this paper appears in ICCV 2011
null
10.1016/j.patcog.2012.09.027
null
cs.MM cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel latent semantic learning method for extracting high-level features (i.e. latent semantics) from a large vocabulary of abundant mid-level features (i.e. visual keywords) with structured sparse representation, which can help to bridge the semantic gap in the challenging task of human action recognition. To discover the manifold structure of midlevel features, we develop a spectral embedding approach to latent semantic learning based on L1-graph, without the need to tune any parameter for graph construction as a key step of manifold learning. More importantly, we construct the L1-graph with structured sparse representation, which can be obtained by structured sparse coding with its structured sparsity ensured by novel L1-norm hypergraph regularization over mid-level features. In the new embedding space, we learn latent semantics automatically from abundant mid-level features through spectral clustering. The learnt latent semantics can be readily used for human action recognition with SVM by defining a histogram intersection kernel. Different from the traditional latent semantic analysis based on topic models, our latent semantic learning method can explore the manifold structure of mid-level features in both L1-graph construction and spectral embedding, which results in compact but discriminative high-level features. The experimental results on the commonly used KTH action dataset and unconstrained YouTube action dataset show the superior performance of our method.
[ { "version": "v1", "created": "Fri, 23 Sep 2011 00:39:51 GMT" } ]
2015-03-19T00:00:00
[ [ "Lu", "Zhiwu", "" ], [ "Peng", "Yuxin", "" ] ]
TITLE: Latent Semantic Learning with Structured Sparse Representation for Human Action Recognition ABSTRACT: This paper proposes a novel latent semantic learning method for extracting high-level features (i.e. latent semantics) from a large vocabulary of abundant mid-level features (i.e. visual keywords) with structured sparse representation, which can help to bridge the semantic gap in the challenging task of human action recognition. To discover the manifold structure of midlevel features, we develop a spectral embedding approach to latent semantic learning based on L1-graph, without the need to tune any parameter for graph construction as a key step of manifold learning. More importantly, we construct the L1-graph with structured sparse representation, which can be obtained by structured sparse coding with its structured sparsity ensured by novel L1-norm hypergraph regularization over mid-level features. In the new embedding space, we learn latent semantics automatically from abundant mid-level features through spectral clustering. The learnt latent semantics can be readily used for human action recognition with SVM by defining a histogram intersection kernel. Different from the traditional latent semantic analysis based on topic models, our latent semantic learning method can explore the manifold structure of mid-level features in both L1-graph construction and spectral embedding, which results in compact but discriminative high-level features. The experimental results on the commonly used KTH action dataset and unconstrained YouTube action dataset show the superior performance of our method.
1109.6073
Julian Heinrich
Julian Heinrich, Yuan Luo, Arthur E. Kirkpatrick, Hao Zhang, Daniel Weiskopf
Evaluation of a Bundling Technique for Parallel Coordinates
null
null
null
TR-2011-08
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a technique for bundled curve representations in parallel-coordinates plots and present a controlled user study evaluating their effectiveness. Replacing the traditional C^0 polygonal lines by C^1 continuous piecewise Bezier curves makes it easier to visually trace data points through each coordinate axis. The resulting Bezier curves can then be bundled to visualize data with given cluster structures. Curve bundles are efficient to compute, provide visual separation between data clusters, reduce visual clutter, and present a clearer overview of the dataset. A controlled user study with 14 participants confirmed the effectiveness of curve bundling for parallel-coordinates visualization: 1) compared to polygonal lines, it is equally capable of revealing correlations between neighboring data attributes; 2) its geometric cues can be effective in displaying cluster information. For some datasets curve bundling allows the color perceptual channel to be applied to other data attributes, while for complex cluster patterns, bundling and color can represent clustering far more clearly than either alone.
[ { "version": "v1", "created": "Wed, 28 Sep 2011 01:44:43 GMT" } ]
2015-03-19T00:00:00
[ [ "Heinrich", "Julian", "" ], [ "Luo", "Yuan", "" ], [ "Kirkpatrick", "Arthur E.", "" ], [ "Zhang", "Hao", "" ], [ "Weiskopf", "Daniel", "" ] ]
TITLE: Evaluation of a Bundling Technique for Parallel Coordinates ABSTRACT: We describe a technique for bundled curve representations in parallel-coordinates plots and present a controlled user study evaluating their effectiveness. Replacing the traditional C^0 polygonal lines by C^1 continuous piecewise Bezier curves makes it easier to visually trace data points through each coordinate axis. The resulting Bezier curves can then be bundled to visualize data with given cluster structures. Curve bundles are efficient to compute, provide visual separation between data clusters, reduce visual clutter, and present a clearer overview of the dataset. A controlled user study with 14 participants confirmed the effectiveness of curve bundling for parallel-coordinates visualization: 1) compared to polygonal lines, it is equally capable of revealing correlations between neighboring data attributes; 2) its geometric cues can be effective in displaying cluster information. For some datasets curve bundling allows the color perceptual channel to be applied to other data attributes, while for complex cluster patterns, bundling and color can represent clustering far more clearly than either alone.
1111.0753
Sourav Dutta
Sourav Dutta, Souvik Bhattacherjee and Ankur Narang
Towards "Intelligent Compression" in Streams: A Biased Reservoir Sampling based Bloom Filter Approach
11 pages, 8 figures, 5 tables
null
null
IBM TechReport RI11015
cs.IR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the explosion of information stored world-wide,data intensive computing has become a central area of research.Efficient management and processing of this massively exponential amount of data from diverse sources,such as telecommunication call data records,online transaction records,etc.,has become a necessity.Removing redundancy from such huge(multi-billion records) datasets resulting in resource and compute efficiency for downstream processing constitutes an important area of study. "Intelligent compression" or deduplication in streaming scenarios,for precise identification and elimination of duplicates from the unbounded datastream is a greater challenge given the realtime nature of data arrival.Stable Bloom Filters(SBF) address this problem to a certain extent.However,SBF suffers from a high false negative rate(FNR) and slow convergence rate,thereby rendering it inefficient for applications with low FNR tolerance.In this paper, we present a novel Reservoir Sampling based Bloom Filter,(RSBF) data structure,based on the combined concepts of reservoir sampling and Bloom filters for approximate detection of duplicates in data streams.Using detailed theoretical analysis we prove analytical bounds on its false positive rate(FPR),false negative rate(FNR) and convergence rates with low memory requirements.We show that RSBF offers the currently lowest FN and convergence rates,and are better than those of SBF while using the same memory.Using empirical analysis on real-world datasets(3 million records) and synthetic datasets with around 1 billion records,we demonstrate upto 2x improvement in FNR with better convergence rates as compared to SBF,while exhibiting comparable FPR.To the best of our knowledge,this is the first attempt to integrate reservoir sampling method with Bloom filters for deduplication in streaming scenarios.
[ { "version": "v1", "created": "Thu, 3 Nov 2011 08:45:44 GMT" } ]
2015-03-19T00:00:00
[ [ "Dutta", "Sourav", "" ], [ "Bhattacherjee", "Souvik", "" ], [ "Narang", "Ankur", "" ] ]
TITLE: Towards "Intelligent Compression" in Streams: A Biased Reservoir Sampling based Bloom Filter Approach ABSTRACT: With the explosion of information stored world-wide,data intensive computing has become a central area of research.Efficient management and processing of this massively exponential amount of data from diverse sources,such as telecommunication call data records,online transaction records,etc.,has become a necessity.Removing redundancy from such huge(multi-billion records) datasets resulting in resource and compute efficiency for downstream processing constitutes an important area of study. "Intelligent compression" or deduplication in streaming scenarios,for precise identification and elimination of duplicates from the unbounded datastream is a greater challenge given the realtime nature of data arrival.Stable Bloom Filters(SBF) address this problem to a certain extent.However,SBF suffers from a high false negative rate(FNR) and slow convergence rate,thereby rendering it inefficient for applications with low FNR tolerance.In this paper, we present a novel Reservoir Sampling based Bloom Filter,(RSBF) data structure,based on the combined concepts of reservoir sampling and Bloom filters for approximate detection of duplicates in data streams.Using detailed theoretical analysis we prove analytical bounds on its false positive rate(FPR),false negative rate(FNR) and convergence rates with low memory requirements.We show that RSBF offers the currently lowest FN and convergence rates,and are better than those of SBF while using the same memory.Using empirical analysis on real-world datasets(3 million records) and synthetic datasets with around 1 billion records,we demonstrate upto 2x improvement in FNR with better convergence rates as compared to SBF,while exhibiting comparable FPR.To the best of our knowledge,this is the first attempt to integrate reservoir sampling method with Bloom filters for deduplication in streaming scenarios.
1111.1497
Rishiraj Saha Roy
Rishiraj Saha Roy, Niloy Ganguly, Monojit Choudhury and Srivatsan Laxman
An IR-based Evaluation Framework for Web Search Query Segmentation
null
null
null
null
cs.IR
http://creativecommons.org/licenses/by/3.0/
This paper presents the first evaluation framework for Web search query segmentation based directly on IR performance. In the past, segmentation strategies were mainly validated against manual annotations. Our work shows that the goodness of a segmentation algorithm as judged through evaluation against a handful of human annotated segmentations hardly reflects its effectiveness in an IR-based setup. In fact, state-of the-art algorithms are shown to perform as good as, and sometimes even better than human annotations -- a fact masked by previous validations. The proposed framework also provides us an objective understanding of the gap between the present best and the best possible segmentation algorithm. We draw these conclusions based on an extensive evaluation of six segmentation strategies, including three most recent algorithms, vis-a-vis segmentations from three human annotators. The evaluation framework also gives insights about which segments should be necessarily detected by an algorithm for achieving the best retrieval results. The meticulously constructed dataset used in our experiments has been made public for use by the research community.
[ { "version": "v1", "created": "Mon, 7 Nov 2011 07:26:27 GMT" }, { "version": "v2", "created": "Sun, 18 Dec 2011 17:33:28 GMT" }, { "version": "v3", "created": "Tue, 20 Dec 2011 11:22:38 GMT" }, { "version": "v4", "created": "Tue, 18 Sep 2012 03:26:22 GMT" } ]
2015-03-19T00:00:00
[ [ "Roy", "Rishiraj Saha", "" ], [ "Ganguly", "Niloy", "" ], [ "Choudhury", "Monojit", "" ], [ "Laxman", "Srivatsan", "" ] ]
TITLE: An IR-based Evaluation Framework for Web Search Query Segmentation ABSTRACT: This paper presents the first evaluation framework for Web search query segmentation based directly on IR performance. In the past, segmentation strategies were mainly validated against manual annotations. Our work shows that the goodness of a segmentation algorithm as judged through evaluation against a handful of human annotated segmentations hardly reflects its effectiveness in an IR-based setup. In fact, state-of the-art algorithms are shown to perform as good as, and sometimes even better than human annotations -- a fact masked by previous validations. The proposed framework also provides us an objective understanding of the gap between the present best and the best possible segmentation algorithm. We draw these conclusions based on an extensive evaluation of six segmentation strategies, including three most recent algorithms, vis-a-vis segmentations from three human annotators. The evaluation framework also gives insights about which segments should be necessarily detected by an algorithm for achieving the best retrieval results. The meticulously constructed dataset used in our experiments has been made public for use by the research community.
1111.2451
Ay\c{c}a \"Oz\c{c}elikkale
Ay\c{c}a \"Oz\c{c}elikkale, Serdar Y\"uksel, Haldun M. Ozaktas
Unitary Precoding and Basis Dependency of MMSE Performance for Gaussian Erasure Channels
Accepted for publication in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the transmission of a Gaussian vector source over a multi-dimensional Gaussian channel where a random or a fixed subset of the channel outputs are erased. Within the setup where the only encoding operation allowed is a linear unitary transformation on the source, we investigate the MMSE performance, both in average, and also in terms of guarantees that hold with high probability as a function of the system parameters. Under the performance criterion of average MMSE, necessary conditions that should be satisfied by the optimal unitary encoders are established and explicit solutions for a class of settings are presented. For random sampling of signals that have a low number of degrees of freedom, we present MMSE bounds that hold with high probability. Our results illustrate how the spread of the eigenvalue distribution and the unitary transformation contribute to these performance guarantees. The performance of the discrete Fourier transform (DFT) is also investigated. As a benchmark, we investigate the equidistant sampling of circularly wide-sense stationary (c.w.s.s.) signals, and present the explicit error expression that quantifies the effects of the sampling rate and the eigenvalue distribution of the covariance matrix of the signal. These findings may be useful in understanding the geometric dependence of signal uncertainty in a stochastic process. In particular, unlike information theoretic measures such as entropy, we highlight the basis dependence of uncertainty in a signal with another perspective. The unitary encoding space restriction exhibits the most and least favorable signal bases for estimation.
[ { "version": "v1", "created": "Thu, 10 Nov 2011 11:52:40 GMT" }, { "version": "v2", "created": "Fri, 16 Nov 2012 14:29:21 GMT" }, { "version": "v3", "created": "Thu, 28 Nov 2013 13:27:06 GMT" }, { "version": "v4", "created": "Sat, 13 Sep 2014 11:26:17 GMT" } ]
2015-03-19T00:00:00
[ [ "Özçelikkale", "Ayça", "" ], [ "Yüksel", "Serdar", "" ], [ "Ozaktas", "Haldun M.", "" ] ]
TITLE: Unitary Precoding and Basis Dependency of MMSE Performance for Gaussian Erasure Channels ABSTRACT: We consider the transmission of a Gaussian vector source over a multi-dimensional Gaussian channel where a random or a fixed subset of the channel outputs are erased. Within the setup where the only encoding operation allowed is a linear unitary transformation on the source, we investigate the MMSE performance, both in average, and also in terms of guarantees that hold with high probability as a function of the system parameters. Under the performance criterion of average MMSE, necessary conditions that should be satisfied by the optimal unitary encoders are established and explicit solutions for a class of settings are presented. For random sampling of signals that have a low number of degrees of freedom, we present MMSE bounds that hold with high probability. Our results illustrate how the spread of the eigenvalue distribution and the unitary transformation contribute to these performance guarantees. The performance of the discrete Fourier transform (DFT) is also investigated. As a benchmark, we investigate the equidistant sampling of circularly wide-sense stationary (c.w.s.s.) signals, and present the explicit error expression that quantifies the effects of the sampling rate and the eigenvalue distribution of the covariance matrix of the signal. These findings may be useful in understanding the geometric dependence of signal uncertainty in a stochastic process. In particular, unlike information theoretic measures such as entropy, we highlight the basis dependence of uncertainty in a signal with another perspective. The unitary encoding space restriction exhibits the most and least favorable signal bases for estimation.
1111.4297
Cheng Chen
Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang
Battling the Internet Water Army: Detection of Hidden Paid Posters
10 pages, 13 figures
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments and new threads or articles on different online communities and websites for some hidden purposes, e.g., to influence the opinion of other people towards certain social events or business markets. Though an interesting strategy in business marketing, paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy. When two competitive companies hire paid posters to post fake news or negative comments about each other, normal online users may feel overwhelmed and find it difficult to put any trust in the information they acquire from the Internet. In this paper, we thoroughly investigate the behavioral pattern of online paid posters based on real-world trace data. We design and validate a new detection mechanism, using both non-semantic analysis and semantic analysis, to identify potential online paid posters. Our test results with real-world datasets show a very promising performance.
[ { "version": "v1", "created": "Fri, 18 Nov 2011 08:21:58 GMT" } ]
2015-03-19T00:00:00
[ [ "Chen", "Cheng", "" ], [ "Wu", "Kui", "" ], [ "Srinivasan", "Venkatesh", "" ], [ "Zhang", "Xudong", "" ] ]
TITLE: Battling the Internet Water Army: Detection of Hidden Paid Posters ABSTRACT: We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments and new threads or articles on different online communities and websites for some hidden purposes, e.g., to influence the opinion of other people towards certain social events or business markets. Though an interesting strategy in business marketing, paid posters may create a significant negative effect on the online communities, since the information from paid posters is usually not trustworthy. When two competitive companies hire paid posters to post fake news or negative comments about each other, normal online users may feel overwhelmed and find it difficult to put any trust in the information they acquire from the Internet. In this paper, we thoroughly investigate the behavioral pattern of online paid posters based on real-world trace data. We design and validate a new detection mechanism, using both non-semantic analysis and semantic analysis, to identify potential online paid posters. Our test results with real-world datasets show a very promising performance.
1111.6937
Matteo Riondato
Matteo Riondato and Eli Upfal
Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees
19 pages, 7 figures. A shorter version of this paper appeared in the proceedings of ECML PKDD 2012
null
null
null
cs.DS cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association Rules (AR's) are fundamental primitives in data mining and database applications. Exact algorithms for these problems exist and are widely used, but their running time is hindered by the need of scanning the entire dataset, possibly multiple times. High quality approximations of FI's and AR's are sufficient for most practical uses, and a number of recent works explored the application of sampling for fast discovery of approximate solutions to the problems. However, these works do not provide satisfactory performance guarantees on the quality of the approximation, due to the difficulty of bounding the probability of under- or over-sampling any one of an unknown number of frequent itemsets. In this work we circumvent this issue by applying the statistical concept of \emph{Vapnik-Chervonenkis (VC) dimension} to develop a novel technique for providing tight bounds on the sample size that guarantees approximation within user-specified parameters. Our technique applies both to absolute and to relative approximations of (top-$K$) FI's and AR's. The resulting sample size is linearly dependent on the VC-dimension of a range space associated with the dataset to be mined. The main theoretical contribution of this work is a proof that the VC-dimension of this range space is upper bounded by an easy-to-compute characteristic quantity of the dataset which we call \emph{d-index}, and is the maximum integer $d$ such that the dataset contains at least $d$ transactions of length at least $d$ such that no one of them is a superset of or equal to another. We show that this bound is strict for a large class of datasets.
[ { "version": "v1", "created": "Tue, 29 Nov 2011 19:11:50 GMT" }, { "version": "v2", "created": "Wed, 30 Nov 2011 14:45:50 GMT" }, { "version": "v3", "created": "Tue, 24 Apr 2012 02:39:09 GMT" }, { "version": "v4", "created": "Thu, 21 Jun 2012 12:56:59 GMT" }, { "version": "v5", "created": "Mon, 10 Dec 2012 20:07:02 GMT" }, { "version": "v6", "created": "Fri, 22 Feb 2013 14:32:31 GMT" } ]
2015-03-19T00:00:00
[ [ "Riondato", "Matteo", "" ], [ "Upfal", "Eli", "" ] ]
TITLE: Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees ABSTRACT: The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association Rules (AR's) are fundamental primitives in data mining and database applications. Exact algorithms for these problems exist and are widely used, but their running time is hindered by the need of scanning the entire dataset, possibly multiple times. High quality approximations of FI's and AR's are sufficient for most practical uses, and a number of recent works explored the application of sampling for fast discovery of approximate solutions to the problems. However, these works do not provide satisfactory performance guarantees on the quality of the approximation, due to the difficulty of bounding the probability of under- or over-sampling any one of an unknown number of frequent itemsets. In this work we circumvent this issue by applying the statistical concept of \emph{Vapnik-Chervonenkis (VC) dimension} to develop a novel technique for providing tight bounds on the sample size that guarantees approximation within user-specified parameters. Our technique applies both to absolute and to relative approximations of (top-$K$) FI's and AR's. The resulting sample size is linearly dependent on the VC-dimension of a range space associated with the dataset to be mined. The main theoretical contribution of this work is a proof that the VC-dimension of this range space is upper bounded by an easy-to-compute characteristic quantity of the dataset which we call \emph{d-index}, and is the maximum integer $d$ such that the dataset contains at least $d$ transactions of length at least $d$ such that no one of them is a superset of or equal to another. We show that this bound is strict for a large class of datasets.
1112.0564
Ayan Chaudhury
Amlan Chakrabarti, Susmita Sur-Kolay, Ayan Chaudhury
Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph Partitioning
null
null
null
null
cs.ET quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as an important issue in terms of technological implementation for quantum computation. The objective is to obtain a LNN architecture with minimum gate cost. As achieving optimal synthesis is a hard problem, heuristic methods have been proposed in recent literature. In this work we present a graph partitioning based approach for LNN synthesis with reduction in circuit cost. In particular, the number of SWAP gates required to convert a given gate-level quantum circuit to its equivalent LNN configuration is minimized. Our algorithm determines the reordering of indices of the qubit line(s) for both single control and multiple controlled gates. Experimental results for placing the target qubits of Multiple Controlled Toffoli (MCT) library of benchmark circuits show a significant reduction in gate count and quantum gate cost compared to those of related research works.
[ { "version": "v1", "created": "Fri, 2 Dec 2011 16:30:08 GMT" }, { "version": "v2", "created": "Thu, 27 Dec 2012 03:02:39 GMT" } ]
2015-03-19T00:00:00
[ [ "Chakrabarti", "Amlan", "" ], [ "Sur-Kolay", "Susmita", "" ], [ "Chaudhury", "Ayan", "" ] ]
TITLE: Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph Partitioning ABSTRACT: Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as an important issue in terms of technological implementation for quantum computation. The objective is to obtain a LNN architecture with minimum gate cost. As achieving optimal synthesis is a hard problem, heuristic methods have been proposed in recent literature. In this work we present a graph partitioning based approach for LNN synthesis with reduction in circuit cost. In particular, the number of SWAP gates required to convert a given gate-level quantum circuit to its equivalent LNN configuration is minimized. Our algorithm determines the reordering of indices of the qubit line(s) for both single control and multiple controlled gates. Experimental results for placing the target qubits of Multiple Controlled Toffoli (MCT) library of benchmark circuits show a significant reduction in gate count and quantum gate cost compared to those of related research works.
1112.1245
Mikael Vejdemo-Johansson
David Lipsky, Primoz Skraba, Mikael Vejdemo-Johansson
A spectral sequence for parallelized persistence
15 pages, 10 figures, submitted to the ACM Symposium on Computational Geometry
null
null
null
cs.CG cs.DC math.AT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We approach the problem of the computation of persistent homology for large datasets by a divide-and-conquer strategy. Dividing the total space into separate but overlapping components, we are able to limit the total memory residency for any part of the computation, while not degrading the overall complexity much. Locally computed persistence information is then merged from the components and their intersections using a spectral sequence generalizing the Mayer-Vietoris long exact sequence. We describe the Mayer-Vietoris spectral sequence and give details on how to compute with it. This allows us to merge local homological data into the global persistent homology. Furthermore, we detail how the classical topology constructions inherent in the spectral sequence adapt to a persistence perspective, as well as describe the techniques from computational commutative algebra necessary for this extension. The resulting computational scheme suggests a parallelization scheme, and we discuss the communication steps involved in this scheme. Furthermore, the computational scheme can also serve as a guideline for which parts of the boundary matrix manipulation need to co-exist in primary memory at any given time allowing for stratified memory access in single-core computation. The spectral sequence viewpoint also provides easy proofs of a homology nerve lemma as well as a persistent homology nerve lemma. In addition, the algebraic tools we develop to approch persistent homology provide a purely algebraic formulation of kernel, image and cokernel persistence (D. Cohen-Steiner, H. Edelsbrunner, J. Harer, and D. Morozov. Persistent homology for kernels, images, and cokernels. In Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1011-1020. Society for Industrial and Applied Mathematics, 2009.)
[ { "version": "v1", "created": "Tue, 6 Dec 2011 12:01:16 GMT" } ]
2015-03-19T00:00:00
[ [ "Lipsky", "David", "" ], [ "Skraba", "Primoz", "" ], [ "Vejdemo-Johansson", "Mikael", "" ] ]
TITLE: A spectral sequence for parallelized persistence ABSTRACT: We approach the problem of the computation of persistent homology for large datasets by a divide-and-conquer strategy. Dividing the total space into separate but overlapping components, we are able to limit the total memory residency for any part of the computation, while not degrading the overall complexity much. Locally computed persistence information is then merged from the components and their intersections using a spectral sequence generalizing the Mayer-Vietoris long exact sequence. We describe the Mayer-Vietoris spectral sequence and give details on how to compute with it. This allows us to merge local homological data into the global persistent homology. Furthermore, we detail how the classical topology constructions inherent in the spectral sequence adapt to a persistence perspective, as well as describe the techniques from computational commutative algebra necessary for this extension. The resulting computational scheme suggests a parallelization scheme, and we discuss the communication steps involved in this scheme. Furthermore, the computational scheme can also serve as a guideline for which parts of the boundary matrix manipulation need to co-exist in primary memory at any given time allowing for stratified memory access in single-core computation. The spectral sequence viewpoint also provides easy proofs of a homology nerve lemma as well as a persistent homology nerve lemma. In addition, the algebraic tools we develop to approch persistent homology provide a purely algebraic formulation of kernel, image and cokernel persistence (D. Cohen-Steiner, H. Edelsbrunner, J. Harer, and D. Morozov. Persistent homology for kernels, images, and cokernels. In Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1011-1020. Society for Industrial and Applied Mathematics, 2009.)
1112.5404
Purushottam Kar
Purushottam Kar and Prateek Jain
Similarity-based Learning via Data Driven Embeddings
To appear in the proceedings of NIPS 2011, 14 pages
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of classification using similarity/distance functions over data. Specifically, we propose a framework for defining the goodness of a (dis)similarity function with respect to a given learning task and propose algorithms that have guaranteed generalization properties when working with such good functions. Our framework unifies and generalizes the frameworks proposed by [Balcan-Blum ICML 2006] and [Wang et al ICML 2007]. An attractive feature of our framework is its adaptability to data - we do not promote a fixed notion of goodness but rather let data dictate it. We show, by giving theoretical guarantees that the goodness criterion best suited to a problem can itself be learned which makes our approach applicable to a variety of domains and problems. We propose a landmarking-based approach to obtaining a classifier from such learned goodness criteria. We then provide a novel diversity based heuristic to perform task-driven selection of landmark points instead of random selection. We demonstrate the effectiveness of our goodness criteria learning method as well as the landmark selection heuristic on a variety of similarity-based learning datasets and benchmark UCI datasets on which our method consistently outperforms existing approaches by a significant margin.
[ { "version": "v1", "created": "Thu, 22 Dec 2011 18:08:27 GMT" } ]
2015-03-19T00:00:00
[ [ "Kar", "Purushottam", "" ], [ "Jain", "Prateek", "" ] ]
TITLE: Similarity-based Learning via Data Driven Embeddings ABSTRACT: We consider the problem of classification using similarity/distance functions over data. Specifically, we propose a framework for defining the goodness of a (dis)similarity function with respect to a given learning task and propose algorithms that have guaranteed generalization properties when working with such good functions. Our framework unifies and generalizes the frameworks proposed by [Balcan-Blum ICML 2006] and [Wang et al ICML 2007]. An attractive feature of our framework is its adaptability to data - we do not promote a fixed notion of goodness but rather let data dictate it. We show, by giving theoretical guarantees that the goodness criterion best suited to a problem can itself be learned which makes our approach applicable to a variety of domains and problems. We propose a landmarking-based approach to obtaining a classifier from such learned goodness criteria. We then provide a novel diversity based heuristic to perform task-driven selection of landmark points instead of random selection. We demonstrate the effectiveness of our goodness criteria learning method as well as the landmark selection heuristic on a variety of similarity-based learning datasets and benchmark UCI datasets on which our method consistently outperforms existing approaches by a significant margin.
1201.0233
Marina Barsky
Marina Barsky, Sangkyum Kim, Tim Weninger, Jiawei Han
Mining Flipping Correlations from Large Datasets with Taxonomies
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 4, pp. 370-381 (2011)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new type of pattern -- a flipping correlation pattern. The flipping patterns are obtained from contrasting the correlations between items at different levels of abstraction. They represent surprising correlations, both positive and negative, which are specific for a given abstraction level, and which "flip" from positive to negative and vice versa when items are generalized to a higher level of abstraction. We design an efficient algorithm for finding flipping correlations, the Flipper algorithm, which outperforms naive pattern mining methods by several orders of magnitude. We apply Flipper to real-life datasets and show that the discovered patterns are non-redundant, surprising and actionable. Flipper finds strong contrasting correlations in itemsets with low-to-medium support, while existing techniques cannot handle the pattern discovery in this frequency range.
[ { "version": "v1", "created": "Sat, 31 Dec 2011 05:36:29 GMT" } ]
2015-03-19T00:00:00
[ [ "Barsky", "Marina", "" ], [ "Kim", "Sangkyum", "" ], [ "Weninger", "Tim", "" ], [ "Han", "Jiawei", "" ] ]
TITLE: Mining Flipping Correlations from Large Datasets with Taxonomies ABSTRACT: In this paper we introduce a new type of pattern -- a flipping correlation pattern. The flipping patterns are obtained from contrasting the correlations between items at different levels of abstraction. They represent surprising correlations, both positive and negative, which are specific for a given abstraction level, and which "flip" from positive to negative and vice versa when items are generalized to a higher level of abstraction. We design an efficient algorithm for finding flipping correlations, the Flipper algorithm, which outperforms naive pattern mining methods by several orders of magnitude. We apply Flipper to real-life datasets and show that the discovered patterns are non-redundant, surprising and actionable. Flipper finds strong contrasting correlations in itemsets with low-to-medium support, while existing techniques cannot handle the pattern discovery in this frequency range.
1407.1425
Junhao Zhang
Junhao Zhang, Tongfei Chen, Junfeng Hu
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms
22 pages, 17 figures
J. Stat. Mech. (2015) P03009
10.1088/1742-5468/2015/03/P03009
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of community detection receives great attention in recent years. Many methods have been proposed to discover communities in networks. In this paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions to fit weight of edges in networks for non-overlapping community detection. The maximum likelihood estimation of this model has the same objective function as general label propagation with node preference. The node preference of a specific vertex turns out to be a value proportional to the intra-community eigenvector centrality (the corresponding entry in principal eigenvector of the adjacency matrix of the subgraph inside that vertex's community) under maximum likelihood estimation. Additionally, the maximum likelihood estimation of a constrained version of our model is highly related to another extension of label propagation algorithm, namely, the label propagation algorithm under constraint. Experiments show that the proposed Gaussian stochastic blockmodel performs well on various benchmark networks.
[ { "version": "v1", "created": "Sat, 5 Jul 2014 18:28:09 GMT" }, { "version": "v2", "created": "Wed, 24 Sep 2014 15:06:07 GMT" }, { "version": "v3", "created": "Wed, 24 Dec 2014 09:49:36 GMT" }, { "version": "v4", "created": "Tue, 27 Jan 2015 11:34:49 GMT" } ]
2015-03-19T00:00:00
[ [ "Zhang", "Junhao", "" ], [ "Chen", "Tongfei", "" ], [ "Hu", "Junfeng", "" ] ]
TITLE: On the relationship between Gaussian stochastic blockmodels and label propagation algorithms ABSTRACT: The problem of community detection receives great attention in recent years. Many methods have been proposed to discover communities in networks. In this paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions to fit weight of edges in networks for non-overlapping community detection. The maximum likelihood estimation of this model has the same objective function as general label propagation with node preference. The node preference of a specific vertex turns out to be a value proportional to the intra-community eigenvector centrality (the corresponding entry in principal eigenvector of the adjacency matrix of the subgraph inside that vertex's community) under maximum likelihood estimation. Additionally, the maximum likelihood estimation of a constrained version of our model is highly related to another extension of label propagation algorithm, namely, the label propagation algorithm under constraint. Experiments show that the proposed Gaussian stochastic blockmodel performs well on various benchmark networks.
1409.5021
Pengtao Xie
Pengtao Xie and Eric Xing
CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on encrypted graph to preserve the privacy of both users' graph data and the analytic results. In CryptGraph, users encrypt their graphs before uploading them to the cloud. The cloud runs graph analysis on the encrypted graphs and obtains results which are also in encrypted form that the cloud cannot decipher. During the process of computing, the encrypted graphs are never decrypted on the cloud side. The encrypted results are sent back to users and users perform the decryption to obtain the plaintext results. In this process, users' graphs and the analytics results are both encrypted and the cloud knows neither of them. Thereby, users' privacy can be strongly protected. Meanwhile, with the help of homomorphic encryption, the results analyzed from the encrypted graphs are guaranteed to be correct. In this paper, we present how to encrypt a graph using homomorphic encryption and how to query the structure of an encrypted graph by computing polynomials. To solve the problem that certain operations are not executable on encrypted graphs, we propose hard computation outsourcing to seek help from users. Using two graph algorithms as examples, we show how to apply our methods to perform analytics on encrypted graphs. Experiments on two datasets demonstrate the correctness and feasibility of our methods.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 15:11:06 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2015 16:12:46 GMT" } ]
2015-03-19T00:00:00
[ [ "Xie", "Pengtao", "" ], [ "Xing", "Eric", "" ] ]
TITLE: CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph ABSTRACT: Many graph mining and analysis services have been deployed on the cloud, which can alleviate users from the burden of implementing and maintaining graph algorithms. However, putting graph analytics on the cloud can invade users' privacy. To solve this problem, we propose CryptGraph, which runs graph analytics on encrypted graph to preserve the privacy of both users' graph data and the analytic results. In CryptGraph, users encrypt their graphs before uploading them to the cloud. The cloud runs graph analysis on the encrypted graphs and obtains results which are also in encrypted form that the cloud cannot decipher. During the process of computing, the encrypted graphs are never decrypted on the cloud side. The encrypted results are sent back to users and users perform the decryption to obtain the plaintext results. In this process, users' graphs and the analytics results are both encrypted and the cloud knows neither of them. Thereby, users' privacy can be strongly protected. Meanwhile, with the help of homomorphic encryption, the results analyzed from the encrypted graphs are guaranteed to be correct. In this paper, we present how to encrypt a graph using homomorphic encryption and how to query the structure of an encrypted graph by computing polynomials. To solve the problem that certain operations are not executable on encrypted graphs, we propose hard computation outsourcing to seek help from users. Using two graph algorithms as examples, we show how to apply our methods to perform analytics on encrypted graphs. Experiments on two datasets demonstrate the correctness and feasibility of our methods.
1411.4351
Jacob Eisenstein
Vinodh Krishnan and Jacob Eisenstein
"You're Mr. Lebowski, I'm the Dude": Inducing Address Term Formality in Signed Social Networks
In Proceedings of NAACL-HLT 2015
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an unsupervised model for inducing signed social networks from the content exchanged across network edges. Inference in this model solves three problems simultaneously: (1) identifying the sign of each edge; (2) characterizing the distribution over content for each edge type; (3) estimating weights for triadic features that map to theoretical models such as structural balance. We apply this model to the problem of inducing the social function of address terms, such as 'Madame', 'comrade', and 'dude'. On a dataset of movie scripts, our system obtains a coherent clustering of address terms, while at the same time making intuitively plausible judgments of the formality of social relations in each film. As an additional contribution, we provide a bootstrapping technique for identifying and tagging address terms in dialogue.
[ { "version": "v1", "created": "Mon, 17 Nov 2014 03:33:27 GMT" }, { "version": "v2", "created": "Tue, 17 Mar 2015 22:20:22 GMT" } ]
2015-03-19T00:00:00
[ [ "Krishnan", "Vinodh", "" ], [ "Eisenstein", "Jacob", "" ] ]
TITLE: "You're Mr. Lebowski, I'm the Dude": Inducing Address Term Formality in Signed Social Networks ABSTRACT: We present an unsupervised model for inducing signed social networks from the content exchanged across network edges. Inference in this model solves three problems simultaneously: (1) identifying the sign of each edge; (2) characterizing the distribution over content for each edge type; (3) estimating weights for triadic features that map to theoretical models such as structural balance. We apply this model to the problem of inducing the social function of address terms, such as 'Madame', 'comrade', and 'dude'. On a dataset of movie scripts, our system obtains a coherent clustering of address terms, while at the same time making intuitively plausible judgments of the formality of social relations in each film. As an additional contribution, we provide a bootstrapping technique for identifying and tagging address terms in dialogue.
1503.02675
Clemens Arth
Clemens Arth, Christian Pirchheim, Jonathan Ventura, Vincent Lepetit
Global 6DOF Pose Estimation from Untextured 2D City Models
9 pages excluding supplementary material
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
We propose a method for estimating the 3D pose for the camera of a mobile device in outdoor conditions, using only an untextured 2D model. Previous methods compute only a relative pose using a SLAM algorithm, or require many registered images, which are cumbersome to acquire. By contrast, our method returns an accurate, absolute camera pose in an absolute referential using simple 2D+height maps, which are broadly available, to refine a first estimate of the pose provided by the device's sensors. We show how to first estimate the camera absolute orientation from straight line segments, and then how to estimate the translation by aligning the 2D map with a semantic segmentation of the input image. We demonstrate the robustness and accuracy of our approach on a challenging dataset.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 20:18:19 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2015 12:11:35 GMT" } ]
2015-03-19T00:00:00
[ [ "Arth", "Clemens", "" ], [ "Pirchheim", "Christian", "" ], [ "Ventura", "Jonathan", "" ], [ "Lepetit", "Vincent", "" ] ]
TITLE: Global 6DOF Pose Estimation from Untextured 2D City Models ABSTRACT: We propose a method for estimating the 3D pose for the camera of a mobile device in outdoor conditions, using only an untextured 2D model. Previous methods compute only a relative pose using a SLAM algorithm, or require many registered images, which are cumbersome to acquire. By contrast, our method returns an accurate, absolute camera pose in an absolute referential using simple 2D+height maps, which are broadly available, to refine a first estimate of the pose provided by the device's sensors. We show how to first estimate the camera absolute orientation from straight line segments, and then how to estimate the translation by aligning the 2D map with a semantic segmentation of the input image. We demonstrate the robustness and accuracy of our approach on a challenging dataset.
1503.05187
Khaled Fawagreh
Khaled Fawagreh, Mohamad Medhat Gaber, Eyad Elyan
An Outlier Detection-based Tree Selection Approach to Extreme Pruning of Random Forests
21 pages, 4 Figures. arXiv admin note: substantial text overlap with arXiv:1503.04996
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random Forest (RF) is an ensemble classification technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still room for enhancing and improving its performance in terms of predictive accuracy. This explains why, over the past decade, there have been many extensions of RF where each extension employed a variety of techniques and strategies to improve certain aspect(s) of RF. Since it has been proven empirically that ensembles tend to yield better results when there is a significant diversity among the constituent models, the objective of this paper is twofolds. First, it investigates how an unsupervised learning technique, namely, Local Outlier Factor (LOF) can be used to identify diverse trees in the RF. Second, trees with the highest LOF scores are then used to produce an extension of RF termed LOFB-DRF that is much smaller in size than RF, and yet performs at least as good as RF, but mostly exhibits higher performance in terms of accuracy. The latter refers to a known technique called ensemble pruning. Experimental results on 10 real datasets prove the superiority of our proposed extension over the traditional RF. Unprecedented pruning levels reaching 99% have been achieved at the time of boosting the predictive accuracy of the ensemble. The notably high pruning level makes the technique a good candidate for real-time applications.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 11:05:31 GMT" } ]
2015-03-19T00:00:00
[ [ "Fawagreh", "Khaled", "" ], [ "Gaber", "Mohamad Medhat", "" ], [ "Elyan", "Eyad", "" ] ]
TITLE: An Outlier Detection-based Tree Selection Approach to Extreme Pruning of Random Forests ABSTRACT: Random Forest (RF) is an ensemble classification technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still room for enhancing and improving its performance in terms of predictive accuracy. This explains why, over the past decade, there have been many extensions of RF where each extension employed a variety of techniques and strategies to improve certain aspect(s) of RF. Since it has been proven empirically that ensembles tend to yield better results when there is a significant diversity among the constituent models, the objective of this paper is twofolds. First, it investigates how an unsupervised learning technique, namely, Local Outlier Factor (LOF) can be used to identify diverse trees in the RF. Second, trees with the highest LOF scores are then used to produce an extension of RF termed LOFB-DRF that is much smaller in size than RF, and yet performs at least as good as RF, but mostly exhibits higher performance in terms of accuracy. The latter refers to a known technique called ensemble pruning. Experimental results on 10 real datasets prove the superiority of our proposed extension over the traditional RF. Unprecedented pruning levels reaching 99% have been achieved at the time of boosting the predictive accuracy of the ensemble. The notably high pruning level makes the technique a good candidate for real-time applications.
1503.05296
Omar Al-Jarrah
O. Y. Al-Jarrah, P. D. Yoo, S Muhaidat, G. K. Karagiannidis, and K. Taha
Efficient Machine Learning for Big Data: A Review
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the emerging technologies and all associated devices, it is predicted that massive amount of data will be created in the next few years, in fact, as much as 90% of current data were created in the last couple of years,a trend that will continue for the foreseeable future. Sustainable computing studies the process by which computer engineer/scientist designs computers and associated subsystems efficiently and effectively with minimal impact on the environment. However, current intelligent machine-learning systems are performance driven, the focus is on the predictive/classification accuracy, based on known properties learned from the training samples. For instance, most machine-learning-based nonparametric models are known to require high computational cost in order to find the global optima. With the learning task in a large dataset, the number of hidden nodes within the network will therefore increase significantly, which eventually leads to an exponential rise in computational complexity. This paper thus reviews the theoretical and experimental data-modeling literature, in large-scale data-intensive fields, relating to: (1) model efficiency, including computational requirements in learning, and data-intensive areas structure and design, and introduces (2) new algorithmic approaches with the least memory requirements and processing to minimize computational cost, while maintaining/improving its predictive/classification accuracy and stability.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 07:56:12 GMT" } ]
2015-03-19T00:00:00
[ [ "Al-Jarrah", "O. Y.", "" ], [ "Yoo", "P. D.", "" ], [ "Muhaidat", "S", "" ], [ "Karagiannidis", "G. K.", "" ], [ "Taha", "K.", "" ] ]
TITLE: Efficient Machine Learning for Big Data: A Review ABSTRACT: With the emerging technologies and all associated devices, it is predicted that massive amount of data will be created in the next few years, in fact, as much as 90% of current data were created in the last couple of years,a trend that will continue for the foreseeable future. Sustainable computing studies the process by which computer engineer/scientist designs computers and associated subsystems efficiently and effectively with minimal impact on the environment. However, current intelligent machine-learning systems are performance driven, the focus is on the predictive/classification accuracy, based on known properties learned from the training samples. For instance, most machine-learning-based nonparametric models are known to require high computational cost in order to find the global optima. With the learning task in a large dataset, the number of hidden nodes within the network will therefore increase significantly, which eventually leads to an exponential rise in computational complexity. This paper thus reviews the theoretical and experimental data-modeling literature, in large-scale data-intensive fields, relating to: (1) model efficiency, including computational requirements in learning, and data-intensive areas structure and design, and introduces (2) new algorithmic approaches with the least memory requirements and processing to minimize computational cost, while maintaining/improving its predictive/classification accuracy and stability.
1503.05426
Danilo Giordano DG
Danilo Giordano, Stefano Traverso, Luigi Grimaudo, Marco Mellia, Elena Baralis, Alok Tongaonkar and Sabyasachi Saha
YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
YouTube relies on a massively distributed Content Delivery Network (CDN) to stream the billions of videos in its catalogue. Unfortunately, very little information about the design of such CDN is available. This, combined with the pervasiveness of YouTube, poses a big challenge for Internet Service Providers (ISPs), which are compelled to optimize end-users' Quality of Experience (QoE) while having no control on the CDN decisions. This paper presents YouLighter, an unsupervised technique to identify changes in the YouTube CDN. YouLighter leverages only passive measurements to cluster co-located identical caches into edge-nodes. This automatically unveils the structure of YouTube's CDN. Further, we propose a new metric, called Constellation Distance, that compares the clustering obtained from two different time snapshots, to pinpoint sudden changes. While several approaches allow comparison between the clustering results from the same dataset, no technique allows to measure the similarity of clusters from different datasets. Hence, we develop a novel methodology, based on the Constellation Distance, to solve this problem. By running YouLighter over 10-month long traces obtained from two ISPs in different countries, we pinpoint both sudden changes in edge-node allocation, and small alterations to the cache allocation policies which actually impair the QoE that the end-users perceive.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 14:30:47 GMT" } ]
2015-03-19T00:00:00
[ [ "Giordano", "Danilo", "" ], [ "Traverso", "Stefano", "" ], [ "Grimaudo", "Luigi", "" ], [ "Mellia", "Marco", "" ], [ "Baralis", "Elena", "" ], [ "Tongaonkar", "Alok", "" ], [ "Saha", "Sabyasachi", "" ] ]
TITLE: YouLighter: An Unsupervised Methodology to Unveil YouTube CDN Changes ABSTRACT: YouTube relies on a massively distributed Content Delivery Network (CDN) to stream the billions of videos in its catalogue. Unfortunately, very little information about the design of such CDN is available. This, combined with the pervasiveness of YouTube, poses a big challenge for Internet Service Providers (ISPs), which are compelled to optimize end-users' Quality of Experience (QoE) while having no control on the CDN decisions. This paper presents YouLighter, an unsupervised technique to identify changes in the YouTube CDN. YouLighter leverages only passive measurements to cluster co-located identical caches into edge-nodes. This automatically unveils the structure of YouTube's CDN. Further, we propose a new metric, called Constellation Distance, that compares the clustering obtained from two different time snapshots, to pinpoint sudden changes. While several approaches allow comparison between the clustering results from the same dataset, no technique allows to measure the similarity of clusters from different datasets. Hence, we develop a novel methodology, based on the Constellation Distance, to solve this problem. By running YouLighter over 10-month long traces obtained from two ISPs in different countries, we pinpoint both sudden changes in edge-node allocation, and small alterations to the cache allocation policies which actually impair the QoE that the end-users perceive.
1503.05471
Danila Doroshin
Danila Doroshin, Alexander Yamshinin, Nikolay Lubimov, Marina Nastasenko, Mikhail Kotov, Maxim Tkachenko
Shared latent subspace modelling within Gaussian-Binary Restricted Boltzmann Machines for NIST i-Vector Challenge 2014
5 pages, 3 figures, submitted to Interspeech 2015
null
null
null
cs.LG cs.NE cs.SD stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach to speaker subspace modelling based on Gaussian-Binary Restricted Boltzmann Machines (GRBM). The proposed model is based on the idea of shared factors as in the Probabilistic Linear Discriminant Analysis (PLDA). GRBM hidden layer is divided into speaker and channel factors, herein the speaker factor is shared over all vectors of the speaker. Then Maximum Likelihood Parameter Estimation (MLE) for proposed model is introduced. Various new scoring techniques for speaker verification using GRBM are proposed. The results for NIST i-vector Challenge 2014 dataset are presented.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 16:28:18 GMT" } ]
2015-03-19T00:00:00
[ [ "Doroshin", "Danila", "" ], [ "Yamshinin", "Alexander", "" ], [ "Lubimov", "Nikolay", "" ], [ "Nastasenko", "Marina", "" ], [ "Kotov", "Mikhail", "" ], [ "Tkachenko", "Maxim", "" ] ]
TITLE: Shared latent subspace modelling within Gaussian-Binary Restricted Boltzmann Machines for NIST i-Vector Challenge 2014 ABSTRACT: This paper presents a novel approach to speaker subspace modelling based on Gaussian-Binary Restricted Boltzmann Machines (GRBM). The proposed model is based on the idea of shared factors as in the Probabilistic Linear Discriminant Analysis (PLDA). GRBM hidden layer is divided into speaker and channel factors, herein the speaker factor is shared over all vectors of the speaker. Then Maximum Likelihood Parameter Estimation (MLE) for proposed model is introduced. Various new scoring techniques for speaker verification using GRBM are proposed. The results for NIST i-vector Challenge 2014 dataset are presented.
1503.05543
Alexander Alemi
Alexander A Alemi, Paul Ginsparg
Text Segmentation based on Semantic Word Embeddings
10 pages, 4 figures. KDD2015 submission
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the use of semantic word embeddings in text segmentation algorithms, including the C99 segmentation algorithm and new algorithms inspired by the distributed word vector representation. By developing a general framework for discussing a class of segmentation objectives, we study the effectiveness of greedy versus exact optimization approaches and suggest a new iterative refinement technique for improving the performance of greedy strategies. We compare our results to known benchmarks, using known metrics. We demonstrate state-of-the-art performance for an untrained method with our Content Vector Segmentation (CVS) on the Choi test set. Finally, we apply the segmentation procedure to an in-the-wild dataset consisting of text extracted from scholarly articles in the arXiv.org database.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 19:44:06 GMT" } ]
2015-03-19T00:00:00
[ [ "Alemi", "Alexander A", "" ], [ "Ginsparg", "Paul", "" ] ]
TITLE: Text Segmentation based on Semantic Word Embeddings ABSTRACT: We explore the use of semantic word embeddings in text segmentation algorithms, including the C99 segmentation algorithm and new algorithms inspired by the distributed word vector representation. By developing a general framework for discussing a class of segmentation objectives, we study the effectiveness of greedy versus exact optimization approaches and suggest a new iterative refinement technique for improving the performance of greedy strategies. We compare our results to known benchmarks, using known metrics. We demonstrate state-of-the-art performance for an untrained method with our Content Vector Segmentation (CVS) on the Choi test set. Finally, we apply the segmentation procedure to an in-the-wild dataset consisting of text extracted from scholarly articles in the arXiv.org database.
1101.5097
Morten M{\o}rup
Morten M{\o}rup, Mikkel N. Schmidt, Lars Kai Hansen
Infinite Multiple Membership Relational Modeling for Complex Networks
8 pages, 4 figures
null
null
null
cs.SI cs.LG physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning latent structure in complex networks has become an important problem fueled by many types of networked data originating from practically all fields of science. In this paper, we propose a new non-parametric Bayesian multiple-membership latent feature model for networks. Contrary to existing multiple-membership models that scale quadratically in the number of vertices the proposed model scales linearly in the number of links admitting multiple-membership analysis in large scale networks. We demonstrate a connection between the single membership relational model and multiple membership models and show on "real" size benchmark network data that accounting for multiple memberships improves the learning of latent structure as measured by link prediction while explicitly accounting for multiple membership result in a more compact representation of the latent structure of networks.
[ { "version": "v1", "created": "Wed, 26 Jan 2011 16:15:22 GMT" } ]
2015-03-18T00:00:00
[ [ "Mørup", "Morten", "" ], [ "Schmidt", "Mikkel N.", "" ], [ "Hansen", "Lars Kai", "" ] ]
TITLE: Infinite Multiple Membership Relational Modeling for Complex Networks ABSTRACT: Learning latent structure in complex networks has become an important problem fueled by many types of networked data originating from practically all fields of science. In this paper, we propose a new non-parametric Bayesian multiple-membership latent feature model for networks. Contrary to existing multiple-membership models that scale quadratically in the number of vertices the proposed model scales linearly in the number of links admitting multiple-membership analysis in large scale networks. We demonstrate a connection between the single membership relational model and multiple membership models and show on "real" size benchmark network data that accounting for multiple memberships improves the learning of latent structure as measured by link prediction while explicitly accounting for multiple membership result in a more compact representation of the latent structure of networks.
1102.1027
Alaa Abi Haidar
Alaa Abi-Haidar and Luis M. Rocha
Collective Classification of Textual Documents by Guided Self-Organization in T-Cell Cross-Regulation Dynamics
null
Evolutionary Intelligence. 2011. Volume 4, Number 2, 69-80
10.1007/s12065-011-0052-5
null
cs.IR cs.AI cs.LG nlin.AO q-bio.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present and study an agent-based model of T-Cell cross-regulation in the adaptive immune system, which we apply to binary classification. Our method expands an existing analytical model of T-cell cross-regulation (Carneiro et al. in Immunol Rev 216(1):48-68, 2007) that was used to study the self-organizing dynamics of a single population of T-Cells in interaction with an idealized antigen presenting cell capable of presenting a single antigen. With agent-based modeling we are able to study the self-organizing dynamics of multiple populations of distinct T-cells which interact via antigen presenting cells that present hundreds of distinct antigens. Moreover, we show that such self-organizing dynamics can be guided to produce an effective binary classification of antigens, which is competitive with existing machine learning methods when applied to biomedical text classification. More specifically, here we test our model on a dataset of publicly available full-text biomedical articles provided by the BioCreative challenge (Krallinger in The biocreative ii. 5 challenge overview, p 19, 2009). We study the robustness of our model's parameter configurations, and show that it leads to encouraging results comparable to state-of-the-art classifiers. Our results help us understand both T-cell cross-regulation as a general principle of guided self-organization, as well as its applicability to document classification. Therefore, we show that our bio-inspired algorithm is a promising novel method for biomedical article classification and for binary document classification in general.
[ { "version": "v1", "created": "Fri, 4 Feb 2011 22:10:45 GMT" } ]
2015-03-18T00:00:00
[ [ "Abi-Haidar", "Alaa", "" ], [ "Rocha", "Luis M.", "" ] ]
TITLE: Collective Classification of Textual Documents by Guided Self-Organization in T-Cell Cross-Regulation Dynamics ABSTRACT: We present and study an agent-based model of T-Cell cross-regulation in the adaptive immune system, which we apply to binary classification. Our method expands an existing analytical model of T-cell cross-regulation (Carneiro et al. in Immunol Rev 216(1):48-68, 2007) that was used to study the self-organizing dynamics of a single population of T-Cells in interaction with an idealized antigen presenting cell capable of presenting a single antigen. With agent-based modeling we are able to study the self-organizing dynamics of multiple populations of distinct T-cells which interact via antigen presenting cells that present hundreds of distinct antigens. Moreover, we show that such self-organizing dynamics can be guided to produce an effective binary classification of antigens, which is competitive with existing machine learning methods when applied to biomedical text classification. More specifically, here we test our model on a dataset of publicly available full-text biomedical articles provided by the BioCreative challenge (Krallinger in The biocreative ii. 5 challenge overview, p 19, 2009). We study the robustness of our model's parameter configurations, and show that it leads to encouraging results comparable to state-of-the-art classifiers. Our results help us understand both T-cell cross-regulation as a general principle of guided self-organization, as well as its applicability to document classification. Therefore, we show that our bio-inspired algorithm is a promising novel method for biomedical article classification and for binary document classification in general.
1102.1465
Adrian Barbu
Adrian Barbu, Nathan Lay
An Introduction to Artificial Prediction Markets for Classification
29 pages, 8 figures
Journal of Machine Learning Research, 13, 2177-2204, 2012
null
null
stat.ML cs.LG math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Prediction markets are used in real life to predict outcomes of interest such as presidential elections. This paper presents a mathematical theory of artificial prediction markets for supervised learning of conditional probability estimators. The artificial prediction market is a novel method for fusing the prediction information of features or trained classifiers, where the fusion result is the contract price on the possible outcomes. The market can be trained online by updating the participants' budgets using training examples. Inspired by the real prediction markets, the equations that govern the market are derived from simple and reasonable assumptions. Efficient numerical algorithms are presented for solving these equations. The obtained artificial prediction market is shown to be a maximum likelihood estimator. It generalizes linear aggregation, existent in boosting and random forest, as well as logistic regression and some kernel methods. Furthermore, the market mechanism allows the aggregation of specialized classifiers that participate only on specific instances. Experimental comparisons show that the artificial prediction markets often outperform random forest and implicit online learning on synthetic data and real UCI datasets. Moreover, an extensive evaluation for pelvic and abdominal lymph node detection in CT data shows that the prediction market improves adaboost's detection rate from 79.6% to 81.2% at 3 false positives/volume.
[ { "version": "v1", "created": "Mon, 7 Feb 2011 23:25:47 GMT" }, { "version": "v2", "created": "Wed, 9 Feb 2011 15:48:12 GMT" }, { "version": "v3", "created": "Mon, 14 Feb 2011 21:02:49 GMT" }, { "version": "v4", "created": "Thu, 22 Sep 2011 20:23:30 GMT" }, { "version": "v5", "created": "Sun, 26 Feb 2012 21:54:27 GMT" }, { "version": "v6", "created": "Mon, 9 Jul 2012 19:24:19 GMT" } ]
2015-03-18T00:00:00
[ [ "Barbu", "Adrian", "" ], [ "Lay", "Nathan", "" ] ]
TITLE: An Introduction to Artificial Prediction Markets for Classification ABSTRACT: Prediction markets are used in real life to predict outcomes of interest such as presidential elections. This paper presents a mathematical theory of artificial prediction markets for supervised learning of conditional probability estimators. The artificial prediction market is a novel method for fusing the prediction information of features or trained classifiers, where the fusion result is the contract price on the possible outcomes. The market can be trained online by updating the participants' budgets using training examples. Inspired by the real prediction markets, the equations that govern the market are derived from simple and reasonable assumptions. Efficient numerical algorithms are presented for solving these equations. The obtained artificial prediction market is shown to be a maximum likelihood estimator. It generalizes linear aggregation, existent in boosting and random forest, as well as logistic regression and some kernel methods. Furthermore, the market mechanism allows the aggregation of specialized classifiers that participate only on specific instances. Experimental comparisons show that the artificial prediction markets often outperform random forest and implicit online learning on synthetic data and real UCI datasets. Moreover, an extensive evaluation for pelvic and abdominal lymph node detection in CT data shows that the prediction market improves adaboost's detection rate from 79.6% to 81.2% at 3 false positives/volume.
1102.2808
Chun Wei Seah
Chun-Wei Seah, Ivor W. Tsang, Yew-Soon Ong
Transductive Ordinal Regression
null
IEEE Transactions on Neural Networks and Learning Systems, 23(7):1074 - 1086, 2012
10.1109/TNNLS.2012.2198240
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ordinal regression is commonly formulated as a multi-class problem with ordinal constraints. The challenge of designing accurate classifiers for ordinal regression generally increases with the number of classes involved, due to the large number of labeled patterns that are needed. The availability of ordinal class labels, however, is often costly to calibrate or difficult to obtain. Unlabeled patterns, on the other hand, often exist in much greater abundance and are freely available. To take benefits from the abundance of unlabeled patterns, we present a novel transductive learning paradigm for ordinal regression in this paper, namely Transductive Ordinal Regression (TOR). The key challenge of the present study lies in the precise estimation of both the ordinal class label of the unlabeled data and the decision functions of the ordinal classes, simultaneously. The core elements of the proposed TOR include an objective function that caters to several commonly used loss functions casted in transductive settings, for general ordinal regression. A label swapping scheme that facilitates a strictly monotonic decrease in the objective function value is also introduced. Extensive numerical studies on commonly used benchmark datasets including the real world sentiment prediction problem are then presented to showcase the characteristics and efficacies of the proposed transductive ordinal regression. Further, comparisons to recent state-of-the-art ordinal regression methods demonstrate the introduced transductive learning paradigm for ordinal regression led to the robust and improved performance.
[ { "version": "v1", "created": "Mon, 14 Feb 2011 15:53:06 GMT" }, { "version": "v2", "created": "Tue, 15 Feb 2011 12:46:46 GMT" }, { "version": "v3", "created": "Thu, 30 Aug 2012 02:23:16 GMT" }, { "version": "v4", "created": "Fri, 31 Aug 2012 02:54:05 GMT" }, { "version": "v5", "created": "Mon, 3 Sep 2012 02:17:30 GMT" } ]
2015-03-18T00:00:00
[ [ "Seah", "Chun-Wei", "" ], [ "Tsang", "Ivor W.", "" ], [ "Ong", "Yew-Soon", "" ] ]
TITLE: Transductive Ordinal Regression ABSTRACT: Ordinal regression is commonly formulated as a multi-class problem with ordinal constraints. The challenge of designing accurate classifiers for ordinal regression generally increases with the number of classes involved, due to the large number of labeled patterns that are needed. The availability of ordinal class labels, however, is often costly to calibrate or difficult to obtain. Unlabeled patterns, on the other hand, often exist in much greater abundance and are freely available. To take benefits from the abundance of unlabeled patterns, we present a novel transductive learning paradigm for ordinal regression in this paper, namely Transductive Ordinal Regression (TOR). The key challenge of the present study lies in the precise estimation of both the ordinal class label of the unlabeled data and the decision functions of the ordinal classes, simultaneously. The core elements of the proposed TOR include an objective function that caters to several commonly used loss functions casted in transductive settings, for general ordinal regression. A label swapping scheme that facilitates a strictly monotonic decrease in the objective function value is also introduced. Extensive numerical studies on commonly used benchmark datasets including the real world sentiment prediction problem are then presented to showcase the characteristics and efficacies of the proposed transductive ordinal regression. Further, comparisons to recent state-of-the-art ordinal regression methods demonstrate the introduced transductive learning paradigm for ordinal regression led to the robust and improved performance.
1410.7376
Nicholas Rhinehart
Nicholas Rhinehart, Jiaji Zhou, Martial Hebert, J. Andrew Bagnell
Visual Chunking: A List Prediction Framework for Region-Based Object Detection
to appear at ICRA 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider detecting objects in an image by iteratively selecting from a set of arbitrarily shaped candidate regions. Our generic approach, which we term visual chunking, reasons about the locations of multiple object instances in an image while expressively describing object boundaries. We design an optimization criterion for measuring the performance of a list of such detections as a natural extension to a common per-instance metric. We present an efficient algorithm with provable performance for building a high-quality list of detections from any candidate set of region-based proposals. We also develop a simple class-specific algorithm to generate a candidate region instance in near-linear time in the number of low-level superpixels that outperforms other region generating methods. In order to make predictions on novel images at testing time without access to ground truth, we develop learning approaches to emulate these algorithms' behaviors. We demonstrate that our new approach outperforms sophisticated baselines on benchmark datasets.
[ { "version": "v1", "created": "Mon, 27 Oct 2014 19:54:41 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2015 21:20:12 GMT" } ]
2015-03-18T00:00:00
[ [ "Rhinehart", "Nicholas", "" ], [ "Zhou", "Jiaji", "" ], [ "Hebert", "Martial", "" ], [ "Bagnell", "J. Andrew", "" ] ]
TITLE: Visual Chunking: A List Prediction Framework for Region-Based Object Detection ABSTRACT: We consider detecting objects in an image by iteratively selecting from a set of arbitrarily shaped candidate regions. Our generic approach, which we term visual chunking, reasons about the locations of multiple object instances in an image while expressively describing object boundaries. We design an optimization criterion for measuring the performance of a list of such detections as a natural extension to a common per-instance metric. We present an efficient algorithm with provable performance for building a high-quality list of detections from any candidate set of region-based proposals. We also develop a simple class-specific algorithm to generate a candidate region instance in near-linear time in the number of low-level superpixels that outperforms other region generating methods. In order to make predictions on novel images at testing time without access to ground truth, we develop learning approaches to emulate these algorithms' behaviors. We demonstrate that our new approach outperforms sophisticated baselines on benchmark datasets.
1502.07979
Anastasios Noulas Anastasios Noulas
Anastasios Noulas, Blake Shaw, Renaud Lambiotte, Cecilia Mascolo
Topological Properties and Temporal Dynamics of Place Networks in Urban Environments
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding the spatial networks formed by the trajectories of mobile users can be beneficial to applications ranging from epidemiology to local search. Despite the potential for impact in a number of fields, several aspects of human mobility networks remain largely unexplored due to the lack of large-scale data at a fine spatiotemporal resolution. Using a longitudinal dataset from the location-based service Foursquare, we perform an empirical analysis of the topological properties of place networks and note their resemblance to online social networks in terms of heavy-tailed degree distributions, triadic closure mechanisms and the small world property. Unlike social networks however, place networks present a mixture of connectivity trends in terms of assortativity that are surprisingly similar to those of the web graph. We take advantage of additional semantic information to interpret how nodes that take on functional roles such as `travel hub', or `food spot' behave in these networks. Finally, motivated by the large volume of new links appearing in place networks over time, we formulate the classic link prediction problem in this new domain. We propose a novel variant of gravity models that brings together three essential elements of inter-place connectivity in urban environments: network-level interactions, human mobility dynamics, and geographic distance. We evaluate this model and find it outperforms a number of baseline predictors and supervised learning algorithms on a task of predicting new links in a sample of one hundred popular cities.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 17:30:16 GMT" }, { "version": "v2", "created": "Tue, 17 Mar 2015 14:03:02 GMT" } ]
2015-03-18T00:00:00
[ [ "Noulas", "Anastasios", "" ], [ "Shaw", "Blake", "" ], [ "Lambiotte", "Renaud", "" ], [ "Mascolo", "Cecilia", "" ] ]
TITLE: Topological Properties and Temporal Dynamics of Place Networks in Urban Environments ABSTRACT: Understanding the spatial networks formed by the trajectories of mobile users can be beneficial to applications ranging from epidemiology to local search. Despite the potential for impact in a number of fields, several aspects of human mobility networks remain largely unexplored due to the lack of large-scale data at a fine spatiotemporal resolution. Using a longitudinal dataset from the location-based service Foursquare, we perform an empirical analysis of the topological properties of place networks and note their resemblance to online social networks in terms of heavy-tailed degree distributions, triadic closure mechanisms and the small world property. Unlike social networks however, place networks present a mixture of connectivity trends in terms of assortativity that are surprisingly similar to those of the web graph. We take advantage of additional semantic information to interpret how nodes that take on functional roles such as `travel hub', or `food spot' behave in these networks. Finally, motivated by the large volume of new links appearing in place networks over time, we formulate the classic link prediction problem in this new domain. We propose a novel variant of gravity models that brings together three essential elements of inter-place connectivity in urban environments: network-level interactions, human mobility dynamics, and geographic distance. We evaluate this model and find it outperforms a number of baseline predictors and supervised learning algorithms on a task of predicting new links in a sample of one hundred popular cities.
1503.04598
Reza Sabzevari
Reza Sabzevari, Vittori Murino, and Alessio Del Bue
PiMPeR: Piecewise Dense 3D Reconstruction from Multi-View and Multi-Illumination Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of dense 3D reconstruction from multiple view images subject to strong lighting variations. In this regard, a new piecewise framework is proposed to explicitly take into account the change of illumination across several wide-baseline images. Unlike multi-view stereo and multi-view photometric stereo methods, this pipeline deals with wide-baseline images that are uncalibrated, in terms of both camera parameters and lighting conditions. Such a scenario is meant to avoid use of any specific imaging setup and provide a tool for normal users without any expertise. To the best of our knowledge, this paper presents the first work that deals with such unconstrained setting. We propose a coarse-to-fine approach, in which a coarse mesh is first created using a set of geometric constraints and, then, fine details are recovered by exploiting photometric properties of the scene. Augmenting the fine details on the coarse mesh is done via a final optimization step. Note that the method does not provide a generic solution for multi-view photometric stereo problem but it relaxes several common assumptions of this problem. The approach scales very well in size given its piecewise nature, dealing with large scale optimization and with severe missing data. Experiments on a benchmark dataset Robot data-set show the method performance against 3D ground truth.
[ { "version": "v1", "created": "Mon, 16 Mar 2015 10:51:08 GMT" }, { "version": "v2", "created": "Tue, 17 Mar 2015 12:59:24 GMT" } ]
2015-03-18T00:00:00
[ [ "Sabzevari", "Reza", "" ], [ "Murino", "Vittori", "" ], [ "Del Bue", "Alessio", "" ] ]
TITLE: PiMPeR: Piecewise Dense 3D Reconstruction from Multi-View and Multi-Illumination Images ABSTRACT: In this paper, we address the problem of dense 3D reconstruction from multiple view images subject to strong lighting variations. In this regard, a new piecewise framework is proposed to explicitly take into account the change of illumination across several wide-baseline images. Unlike multi-view stereo and multi-view photometric stereo methods, this pipeline deals with wide-baseline images that are uncalibrated, in terms of both camera parameters and lighting conditions. Such a scenario is meant to avoid use of any specific imaging setup and provide a tool for normal users without any expertise. To the best of our knowledge, this paper presents the first work that deals with such unconstrained setting. We propose a coarse-to-fine approach, in which a coarse mesh is first created using a set of geometric constraints and, then, fine details are recovered by exploiting photometric properties of the scene. Augmenting the fine details on the coarse mesh is done via a final optimization step. Note that the method does not provide a generic solution for multi-view photometric stereo problem but it relaxes several common assumptions of this problem. The approach scales very well in size given its piecewise nature, dealing with large scale optimization and with severe missing data. Experiments on a benchmark dataset Robot data-set show the method performance against 3D ground truth.
1503.04864
Fay\c{c}al Hamdi
Fay\c{c}al Hamdi, Nathalie Abadie, B\'en\'edicte Bucher and Abdelfettah Feliachi
GeomRDF: A Geodata Converter with a Fine-Grained Structured Representation of Geometry in the Web
12 pages, 2 figures, the 1st International Workshop on Geospatial Linked Data (GeoLD 2014) - SEMANTiCS 2014
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, with the advent of the web of data, a growing number of national mapping agencies tend to publish their geospatial data as Linked Data. However, differences between traditional GIS data models and Linked Data model can make the publication process more complicated. Besides, it may require, to be done, the setting of several parameters and some expertise in the semantic web technologies. In addition, the use of standards like GeoSPARQL (or ad hoc predicates) is mandatory to perform spatial queries on published geospatial data. In this paper, we present GeomRDF, a tool that helps users to convert spatial data from traditional GIS formats to RDF model easily. It generates geometries represented as GeoSPARQL WKT literal but also as structured geometries that can be exploited by using only the RDF query language, SPARQL. GeomRDF was implemented as a module in the RDF publication platform Datalift. A validation of GeomRDF has been realized against the French administrative units dataset (provided by IGN France).
[ { "version": "v1", "created": "Mon, 16 Mar 2015 21:35:18 GMT" } ]
2015-03-18T00:00:00
[ [ "Hamdi", "Fayçal", "" ], [ "Abadie", "Nathalie", "" ], [ "Bucher", "Bénédicte", "" ], [ "Feliachi", "Abdelfettah", "" ] ]
TITLE: GeomRDF: A Geodata Converter with a Fine-Grained Structured Representation of Geometry in the Web ABSTRACT: In recent years, with the advent of the web of data, a growing number of national mapping agencies tend to publish their geospatial data as Linked Data. However, differences between traditional GIS data models and Linked Data model can make the publication process more complicated. Besides, it may require, to be done, the setting of several parameters and some expertise in the semantic web technologies. In addition, the use of standards like GeoSPARQL (or ad hoc predicates) is mandatory to perform spatial queries on published geospatial data. In this paper, we present GeomRDF, a tool that helps users to convert spatial data from traditional GIS formats to RDF model easily. It generates geometries represented as GeoSPARQL WKT literal but also as structured geometries that can be exploited by using only the RDF query language, SPARQL. GeomRDF was implemented as a module in the RDF publication platform Datalift. A validation of GeomRDF has been realized against the French administrative units dataset (provided by IGN France).
1503.04927
Qingbo Hu
Qingbo Hu and Sihong Xie and Shuyang Lin and Senzhang Wang and Philip Yu
CENI: a Hybrid Framework for Efficiently Inferring Information Networks
Full-length version of the paper with the same title published in ICWSM 2015
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, the message diffusion links among users or websites drive the development of countless innovative applications. However, in reality, it is easier for us to observe the timestamps when different nodes in the network react on a message, while the connections empowering the diffusion of the message remain hidden. This motivates recent extensive studies on the network inference problem: unveiling the edges from the records of messages disseminated through them. Existing solutions are computationally expensive, which motivates us to develop an efficient two-step general framework, Clustering Embedded Network Inference (CENI). CENI integrates clustering strategies to improve the efficiency of network inference. By clustering nodes directly on the timelines of messages, we propose two naive implementations of CENI: Infection-centric CENI and Cascade-centric CENI. Additionally, we point out the critical dimension problem of CENI: instead of one-dimensional timelines, we need to first project the nodes to an Euclidean space of certain dimension before clustering. A CENI adopting clustering method on the projected space can better preserve the structure hidden in the cascades, and generate more accurately inferred links. This insight sheds light on other related work attempting to discover or utilize the latent cluster structure in the disseminated messages. By addressing the critical dimension problem, we propose the third implementation of the CENI framework: Projection-based CENI. Through extensive experiments on two real datasets, we show that the three CENI models only need around 20% $\sim$ 50% of the running time of state-of-the-art methods. Moreover, the inferred edges of Projection-based CENI preserves or even outperforms the effectiveness of state-of-the-art methods.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 05:47:49 GMT" } ]
2015-03-18T00:00:00
[ [ "Hu", "Qingbo", "" ], [ "Xie", "Sihong", "" ], [ "Lin", "Shuyang", "" ], [ "Wang", "Senzhang", "" ], [ "Yu", "Philip", "" ] ]
TITLE: CENI: a Hybrid Framework for Efficiently Inferring Information Networks ABSTRACT: Nowadays, the message diffusion links among users or websites drive the development of countless innovative applications. However, in reality, it is easier for us to observe the timestamps when different nodes in the network react on a message, while the connections empowering the diffusion of the message remain hidden. This motivates recent extensive studies on the network inference problem: unveiling the edges from the records of messages disseminated through them. Existing solutions are computationally expensive, which motivates us to develop an efficient two-step general framework, Clustering Embedded Network Inference (CENI). CENI integrates clustering strategies to improve the efficiency of network inference. By clustering nodes directly on the timelines of messages, we propose two naive implementations of CENI: Infection-centric CENI and Cascade-centric CENI. Additionally, we point out the critical dimension problem of CENI: instead of one-dimensional timelines, we need to first project the nodes to an Euclidean space of certain dimension before clustering. A CENI adopting clustering method on the projected space can better preserve the structure hidden in the cascades, and generate more accurately inferred links. This insight sheds light on other related work attempting to discover or utilize the latent cluster structure in the disseminated messages. By addressing the critical dimension problem, we propose the third implementation of the CENI framework: Projection-based CENI. Through extensive experiments on two real datasets, we show that the three CENI models only need around 20% $\sim$ 50% of the running time of state-of-the-art methods. Moreover, the inferred edges of Projection-based CENI preserves or even outperforms the effectiveness of state-of-the-art methods.
1503.04996
Khaled Fawagreh
Khaled Fawagreh, Mohamad Medhat Gaber, Eyad Elyan
On Extreme Pruning of Random Forest Ensembles for Real-time Predictive Applications
10 pages, 4 Figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random Forest (RF) is an ensemble supervised machine learning technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still room for enhancing and improving its performance accuracy. This explains why, over the past decade, there have been many extensions of RF where each extension employed a variety of techniques and strategies to improve certain aspect(s) of RF. Since it has been proven empiricallthat ensembles tend to yield better results when there is a significant diversity among the constituent models, the objective of this paper is twofold. First, it investigates how data clustering (a well known diversity technique) can be applied to identify groups of similar decision trees in an RF in order to eliminate redundant trees by selecting a representative from each group (cluster). Second, these likely diverse representatives are then used to produce an extension of RF termed CLUB-DRF that is much smaller in size than RF, and yet performs at least as good as RF, and mostly exhibits higher performance in terms of accuracy. The latter refers to a known technique called ensemble pruning. Experimental results on 15 real datasets from the UCI repository prove the superiority of our proposed extension over the traditional RF. Most of our experiments achieved at least 95% or above pruning level while retaining or outperforming the RF accuracy.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 11:01:37 GMT" } ]
2015-03-18T00:00:00
[ [ "Fawagreh", "Khaled", "" ], [ "Gaber", "Mohamad Medhat", "" ], [ "Elyan", "Eyad", "" ] ]
TITLE: On Extreme Pruning of Random Forest Ensembles for Real-time Predictive Applications ABSTRACT: Random Forest (RF) is an ensemble supervised machine learning technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still room for enhancing and improving its performance accuracy. This explains why, over the past decade, there have been many extensions of RF where each extension employed a variety of techniques and strategies to improve certain aspect(s) of RF. Since it has been proven empiricallthat ensembles tend to yield better results when there is a significant diversity among the constituent models, the objective of this paper is twofold. First, it investigates how data clustering (a well known diversity technique) can be applied to identify groups of similar decision trees in an RF in order to eliminate redundant trees by selecting a representative from each group (cluster). Second, these likely diverse representatives are then used to produce an extension of RF termed CLUB-DRF that is much smaller in size than RF, and yet performs at least as good as RF, and mostly exhibits higher performance in terms of accuracy. The latter refers to a known technique called ensemble pruning. Experimental results on 15 real datasets from the UCI repository prove the superiority of our proposed extension over the traditional RF. Most of our experiments achieved at least 95% or above pruning level while retaining or outperforming the RF accuracy.
1503.05018
Martin Wistuba
Martin Wistuba, Josif Grabocka, Lars Schmidt-Thieme
Ultra-Fast Shapelets for Time Series Classification
Preprint submitted to Journal of Data & Knowledge Engineering January 24, 2015
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time series shapelets are discriminative subsequences and their similarity to a time series can be used for time series classification. Since the discovery of time series shapelets is costly in terms of time, the applicability on long or multivariate time series is difficult. In this work we propose Ultra-Fast Shapelets that uses a number of random shapelets. It is shown that Ultra-Fast Shapelets yield the same prediction quality as current state-of-the-art shapelet-based time series classifiers that carefully select the shapelets by being by up to three orders of magnitudes. Since this method allows a ultra-fast shapelet discovery, using shapelets for long multivariate time series classification becomes feasible. A method for using shapelets for multivariate time series is proposed and Ultra-Fast Shapelets is proven to be successful in comparison to state-of-the-art multivariate time series classifiers on 15 multivariate time series datasets from various domains. Finally, time series derivatives that have proven to be useful for other time series classifiers are investigated for the shapelet-based classifiers. It is shown that they have a positive impact and that they are easy to integrate with a simple preprocessing step, without the need of adapting the shapelet discovery algorithm.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 12:41:30 GMT" } ]
2015-03-18T00:00:00
[ [ "Wistuba", "Martin", "" ], [ "Grabocka", "Josif", "" ], [ "Schmidt-Thieme", "Lars", "" ] ]
TITLE: Ultra-Fast Shapelets for Time Series Classification ABSTRACT: Time series shapelets are discriminative subsequences and their similarity to a time series can be used for time series classification. Since the discovery of time series shapelets is costly in terms of time, the applicability on long or multivariate time series is difficult. In this work we propose Ultra-Fast Shapelets that uses a number of random shapelets. It is shown that Ultra-Fast Shapelets yield the same prediction quality as current state-of-the-art shapelet-based time series classifiers that carefully select the shapelets by being by up to three orders of magnitudes. Since this method allows a ultra-fast shapelet discovery, using shapelets for long multivariate time series classification becomes feasible. A method for using shapelets for multivariate time series is proposed and Ultra-Fast Shapelets is proven to be successful in comparison to state-of-the-art multivariate time series classifiers on 15 multivariate time series datasets from various domains. Finally, time series derivatives that have proven to be useful for other time series classifiers are investigated for the shapelet-based classifiers. It is shown that they have a positive impact and that they are easy to integrate with a simple preprocessing step, without the need of adapting the shapelet discovery algorithm.
1503.05038
Bojan Pepikj
Bojan Pepik, Michael Stark, Peter Gehler, Tobias Ritschel, Bernt Schiele
3D Object Class Detection in the Wild
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object class detection has been a synonym for 2D bounding box localization for the longest time, fueled by the success of powerful statistical learning techniques, combined with robust image representations. Only recently, there has been a growing interest in revisiting the promise of computer vision from the early days: to precisely delineate the contents of a visual scene, object by object, in 3D. In this paper, we draw from recent advances in object detection and 2D-3D object lifting in order to design an object class detector that is particularly tailored towards 3D object class detection. Our 3D object class detection method consists of several stages gradually enriching the object detection output with object viewpoint, keypoints and 3D shape estimates. Following careful design, in each stage it constantly improves the performance and achieves state-ofthe-art performance in simultaneous 2D bounding box and viewpoint estimation on the challenging Pascal3D+ dataset.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 13:34:22 GMT" } ]
2015-03-18T00:00:00
[ [ "Pepik", "Bojan", "" ], [ "Stark", "Michael", "" ], [ "Gehler", "Peter", "" ], [ "Ritschel", "Tobias", "" ], [ "Schiele", "Bernt", "" ] ]
TITLE: 3D Object Class Detection in the Wild ABSTRACT: Object class detection has been a synonym for 2D bounding box localization for the longest time, fueled by the success of powerful statistical learning techniques, combined with robust image representations. Only recently, there has been a growing interest in revisiting the promise of computer vision from the early days: to precisely delineate the contents of a visual scene, object by object, in 3D. In this paper, we draw from recent advances in object detection and 2D-3D object lifting in order to design an object class detector that is particularly tailored towards 3D object class detection. Our 3D object class detection method consists of several stages gradually enriching the object detection output with object viewpoint, keypoints and 3D shape estimates. Following careful design, in each stage it constantly improves the performance and achieves state-ofthe-art performance in simultaneous 2D bounding box and viewpoint estimation on the challenging Pascal3D+ dataset.
1503.05123
Manuel Amunategui
Manuel Amunategui, Tristan Markwell, Yelena Rozenfeld
Prediction Using Note Text: Synthetic Feature Creation with word2vec
13 pages including appendix
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
word2vec affords a simple yet powerful approach of extracting quantitative variables from unstructured textual data. Over half of healthcare data is unstructured and therefore hard to model without involved expertise in data engineering and natural language processing. word2vec can serve as a bridge to quickly gather intelligence from such data sources. In this study, we ran 650 megabytes of unstructured, medical chart notes from the Providence Health & Services electronic medical record through word2vec. We used two different approaches in creating predictive variables and tested them on the risk of readmission for patients with COPD (Chronic Obstructive Lung Disease). As a comparative benchmark, we ran the same test using the LACE risk model (a single score based on length of stay, acuity, comorbid conditions, and emergency department visits). Using only free text and mathematical might, we found word2vec comparable to LACE in predicting the risk of readmission of COPD patients.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 17:04:27 GMT" } ]
2015-03-18T00:00:00
[ [ "Amunategui", "Manuel", "" ], [ "Markwell", "Tristan", "" ], [ "Rozenfeld", "Yelena", "" ] ]
TITLE: Prediction Using Note Text: Synthetic Feature Creation with word2vec ABSTRACT: word2vec affords a simple yet powerful approach of extracting quantitative variables from unstructured textual data. Over half of healthcare data is unstructured and therefore hard to model without involved expertise in data engineering and natural language processing. word2vec can serve as a bridge to quickly gather intelligence from such data sources. In this study, we ran 650 megabytes of unstructured, medical chart notes from the Providence Health & Services electronic medical record through word2vec. We used two different approaches in creating predictive variables and tested them on the risk of readmission for patients with COPD (Chronic Obstructive Lung Disease). As a comparative benchmark, we ran the same test using the LACE risk model (a single score based on length of stay, acuity, comorbid conditions, and emergency department visits). Using only free text and mathematical might, we found word2vec comparable to LACE in predicting the risk of readmission of COPD patients.
1503.05157
Jeremy Debattista
Jeremy Debattista, Santiago Londo\~no, Christoph Lange, S\"oren Auer
Quality Assessment of Linked Datasets using Probabilistic Approximation
15 pages, 2 figures, To appear in ESWC 2015 proceedings
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing application of Linked Open Data, assessing the quality of datasets by computing quality metrics becomes an issue of crucial importance. For large and evolving datasets, an exact, deterministic computation of the quality metrics is too time consuming or expensive. We employ probabilistic techniques such as Reservoir Sampling, Bloom Filters and Clustering Coefficient estimation for implementing a broad set of data quality metrics in an approximate but sufficiently accurate way. Our implementation is integrated in the comprehensive data quality assessment framework Luzzu. We evaluated its performance and accuracy on Linked Open Datasets of broad relevance.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 18:39:22 GMT" } ]
2015-03-18T00:00:00
[ [ "Debattista", "Jeremy", "" ], [ "Londoño", "Santiago", "" ], [ "Lange", "Christoph", "" ], [ "Auer", "Sören", "" ] ]
TITLE: Quality Assessment of Linked Datasets using Probabilistic Approximation ABSTRACT: With the increasing application of Linked Open Data, assessing the quality of datasets by computing quality metrics becomes an issue of crucial importance. For large and evolving datasets, an exact, deterministic computation of the quality metrics is too time consuming or expensive. We employ probabilistic techniques such as Reservoir Sampling, Bloom Filters and Clustering Coefficient estimation for implementing a broad set of data quality metrics in an approximate but sufficiently accurate way. Our implementation is integrated in the comprehensive data quality assessment framework Luzzu. We evaluated its performance and accuracy on Linked Open Datasets of broad relevance.
1004.5168
Charles Clarke
Gordon V. Cormack, Mark D. Smucker, and Charles L. A. Clarke
Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The TREC 2009 web ad hoc and relevance feedback tasks used a new document collection, the ClueWeb09 dataset, which was crawled from the general Web in early 2009. This dataset contains 1 billion web pages, a substantial fraction of which are spam --- pages designed to deceive search engines so as to deliver an unwanted payload. We examine the effect of spam on the results of the TREC 2009 web ad hoc and relevance feedback tasks, which used the ClueWeb09 dataset. We show that a simple content-based classifier with minimal training is efficient enough to rank the "spamminess" of every page in the dataset using a standard personal computer in 48 hours, and effective enough to yield significant and substantive improvements in the fixed-cutoff precision (estP10) as well as rank measures (estR-Precision, StatMAP, MAP) of nearly all submitted runs. Moreover, using a set of "honeypot" queries the labeling of training data may be reduced to an entirely automatic process. The results of classical information retrieval methods are particularly enhanced by filtering --- from among the worst to among the best.
[ { "version": "v1", "created": "Thu, 29 Apr 2010 00:54:25 GMT" } ]
2015-03-17T00:00:00
[ [ "Cormack", "Gordon V.", "" ], [ "Smucker", "Mark D.", "" ], [ "Clarke", "Charles L. A.", "" ] ]
TITLE: Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets ABSTRACT: The TREC 2009 web ad hoc and relevance feedback tasks used a new document collection, the ClueWeb09 dataset, which was crawled from the general Web in early 2009. This dataset contains 1 billion web pages, a substantial fraction of which are spam --- pages designed to deceive search engines so as to deliver an unwanted payload. We examine the effect of spam on the results of the TREC 2009 web ad hoc and relevance feedback tasks, which used the ClueWeb09 dataset. We show that a simple content-based classifier with minimal training is efficient enough to rank the "spamminess" of every page in the dataset using a standard personal computer in 48 hours, and effective enough to yield significant and substantive improvements in the fixed-cutoff precision (estP10) as well as rank measures (estR-Precision, StatMAP, MAP) of nearly all submitted runs. Moreover, using a set of "honeypot" queries the labeling of training data may be reduced to an entirely automatic process. The results of classical information retrieval methods are particularly enhanced by filtering --- from among the worst to among the best.
1004.5437
Richard Brent
Richard P. Brent
Parallel algorithms in linear algebra
17 pages. An old Technical Report, submitted for archival purposes. For further details see http://wwwmaths.anu.edu.au/~brent/pub/pub128.html
Algorithms and Architectures: Proceedings of the Second NEC Research Symposium (edited by T. Ishiguro), SIAM, Philadelphia, 1993, 54-72
null
Technical Report TR-CS-91-06, Computer Sciences Laboratory, Australian National University, Canberra, August 1991, 17 pages
cs.DS cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report provides an introduction to algorithms for fundamental linear algebra problems on various parallel computer architectures, with the emphasis on distributed-memory MIMD machines. To illustrate the basic concepts and key issues, we consider the problem of parallel solution of a nonsingular linear system by Gaussian elimination with partial pivoting. This problem has come to be regarded as a benchmark for the performance of parallel machines. We consider its appropriateness as a benchmark, its communication requirements, and schemes for data distribution to facilitate communication and load balancing. In addition, we describe some parallel algorithms for orthogonal (QR) factorization and the singular value decomposition (SVD).
[ { "version": "v1", "created": "Fri, 30 Apr 2010 02:30:36 GMT" } ]
2015-03-17T00:00:00
[ [ "Brent", "Richard P.", "" ] ]
TITLE: Parallel algorithms in linear algebra ABSTRACT: This report provides an introduction to algorithms for fundamental linear algebra problems on various parallel computer architectures, with the emphasis on distributed-memory MIMD machines. To illustrate the basic concepts and key issues, we consider the problem of parallel solution of a nonsingular linear system by Gaussian elimination with partial pivoting. This problem has come to be regarded as a benchmark for the performance of parallel machines. We consider its appropriateness as a benchmark, its communication requirements, and schemes for data distribution to facilitate communication and load balancing. In addition, we describe some parallel algorithms for orthogonal (QR) factorization and the singular value decomposition (SVD).
1005.1860
Gavin Taylor
Marek Petrik, Gavin Taylor, Ron Parr, Shlomo Zilberstein
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes
Technical report corresponding to the ICML2010 submission of the same name
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Approximate dynamic programming has been used successfully in a large variety of domains, but it relies on a small set of provided approximation features to calculate solutions reliably. Large and rich sets of features can cause existing algorithms to overfit because of a limited number of samples. We address this shortcoming using $L_1$ regularization in approximate linear programming. Because the proposed method can automatically select the appropriate richness of features, its performance does not degrade with an increasing number of features. These results rely on new and stronger sampling bounds for regularized approximate linear programs. We also propose a computationally efficient homotopy method. The empirical evaluation of the approach shows that the proposed method performs well on simple MDPs and standard benchmark problems.
[ { "version": "v1", "created": "Tue, 11 May 2010 15:24:36 GMT" }, { "version": "v2", "created": "Thu, 20 May 2010 14:19:17 GMT" } ]
2015-03-17T00:00:00
[ [ "Petrik", "Marek", "" ], [ "Taylor", "Gavin", "" ], [ "Parr", "Ron", "" ], [ "Zilberstein", "Shlomo", "" ] ]
TITLE: Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes ABSTRACT: Approximate dynamic programming has been used successfully in a large variety of domains, but it relies on a small set of provided approximation features to calculate solutions reliably. Large and rich sets of features can cause existing algorithms to overfit because of a limited number of samples. We address this shortcoming using $L_1$ regularization in approximate linear programming. Because the proposed method can automatically select the appropriate richness of features, its performance does not degrade with an increasing number of features. These results rely on new and stronger sampling bounds for regularized approximate linear programs. We also propose a computationally efficient homotopy method. The empirical evaluation of the approach shows that the proposed method performs well on simple MDPs and standard benchmark problems.
1005.2882
Nadjib Lazaar
Nadjib Lazaar (INRIA - IRISA), Arnaud Gotlieb (INRIA - IRISA), Lebbah Yahia
On Testing Constraint Programs
null
null
null
RR-7291
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The success of several constraint-based modeling languages such as OPL, ZINC, or COMET, appeals for better software engineering practices, particularly in the testing phase. This paper introduces a testing framework enabling automated test case generation for constraint programming. We propose a general framework of constraint program development which supposes that a first declarative and simple constraint model is available from the problem specifications analysis. Then, this model is refined using classical techniques such as constraint reformulation, surrogate and global constraint addition, or symmetry-breaking to form an improved constraint model that must be thoroughly tested before being used to address real-sized problems. We think that most of the faults are introduced in this refinement step and propose a process which takes the first declarative model as an oracle for detecting non-conformities. We derive practical test purposes from this process to generate automatically test data that exhibit non-conformities. We implemented this approach in a new tool called CPTEST that was used to automatically detect non-conformities on two classical benchmark programs, namely the Golomb rulers and the car-sequencing problem.
[ { "version": "v1", "created": "Mon, 17 May 2010 11:15:17 GMT" } ]
2015-03-17T00:00:00
[ [ "Lazaar", "Nadjib", "", "INRIA - IRISA" ], [ "Gotlieb", "Arnaud", "", "INRIA - IRISA" ], [ "Yahia", "Lebbah", "" ] ]
TITLE: On Testing Constraint Programs ABSTRACT: The success of several constraint-based modeling languages such as OPL, ZINC, or COMET, appeals for better software engineering practices, particularly in the testing phase. This paper introduces a testing framework enabling automated test case generation for constraint programming. We propose a general framework of constraint program development which supposes that a first declarative and simple constraint model is available from the problem specifications analysis. Then, this model is refined using classical techniques such as constraint reformulation, surrogate and global constraint addition, or symmetry-breaking to form an improved constraint model that must be thoroughly tested before being used to address real-sized problems. We think that most of the faults are introduced in this refinement step and propose a process which takes the first declarative model as an oracle for detecting non-conformities. We derive practical test purposes from this process to generate automatically test data that exhibit non-conformities. We implemented this approach in a new tool called CPTEST that was used to automatically detect non-conformities on two classical benchmark programs, namely the Golomb rulers and the car-sequencing problem.
1005.4298
Sameer Singh
Sameer Singh and Michael Wick and Andrew McCallum
Distantly Labeling Data for Large Scale Cross-Document Coreference
16 pages, submitted to ECML 2010
null
null
null
cs.AI cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-document coreference, the problem of resolving entity mentions across multi-document collections, is crucial to automated knowledge base construction and data mining tasks. However, the scarcity of large labeled data sets has hindered supervised machine learning research for this task. In this paper we develop and demonstrate an approach based on ``distantly-labeling'' a data set from which we can train a discriminative cross-document coreference model. In particular we build a dataset of more than a million people mentions extracted from 3.5 years of New York Times articles, leverage Wikipedia for distant labeling with a generative model (and measure the reliability of such labeling); then we train and evaluate a conditional random field coreference model that has factors on cross-document entities as well as mention-pairs. This coreference model obtains high accuracy in resolving mentions and entities that are not present in the training data, indicating applicability to non-Wikipedia data. Given the large amount of data, our work is also an exercise demonstrating the scalability of our approach.
[ { "version": "v1", "created": "Mon, 24 May 2010 10:35:50 GMT" } ]
2015-03-17T00:00:00
[ [ "Singh", "Sameer", "" ], [ "Wick", "Michael", "" ], [ "McCallum", "Andrew", "" ] ]
TITLE: Distantly Labeling Data for Large Scale Cross-Document Coreference ABSTRACT: Cross-document coreference, the problem of resolving entity mentions across multi-document collections, is crucial to automated knowledge base construction and data mining tasks. However, the scarcity of large labeled data sets has hindered supervised machine learning research for this task. In this paper we develop and demonstrate an approach based on ``distantly-labeling'' a data set from which we can train a discriminative cross-document coreference model. In particular we build a dataset of more than a million people mentions extracted from 3.5 years of New York Times articles, leverage Wikipedia for distant labeling with a generative model (and measure the reliability of such labeling); then we train and evaluate a conditional random field coreference model that has factors on cross-document entities as well as mention-pairs. This coreference model obtains high accuracy in resolving mentions and entities that are not present in the training data, indicating applicability to non-Wikipedia data. Given the large amount of data, our work is also an exercise demonstrating the scalability of our approach.
1006.0234
Manuel Gomez Rodriguez
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Krause
Inferring Networks of Diffusion and Influence
Short version appeared in ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2010. Long version submitted to ACM Transactions on Knowledge Discovery from Data (TKDD)
null
null
null
cs.DS cs.SI physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information diffusion and virus propagation are fundamental processes taking place in networks. While it is often possible to directly observe when nodes become infected with a virus or adopt the information, observing individual transmissions (i.e., who infects whom, or who influences whom) is typically very difficult. Furthermore, in many applications, the underlying network over which the diffusions and propagations spread is actually unobserved. We tackle these challenges by developing a method for tracing paths of diffusion and influence through networks and inferring the networks over which contagions propagate. Given the times when nodes adopt pieces of information or become infected, we identify the optimal network that best explains the observed infection times. Since the optimization problem is NP-hard to solve exactly, we develop an efficient approximation algorithm that scales to large datasets and finds provably near-optimal networks. We demonstrate the effectiveness of our approach by tracing information diffusion in a set of 170 million blogs and news articles over a one year period to infer how information flows through the online media space. We find that the diffusion network of news for the top 1,000 media sites and blogs tends to have a core-periphery structure with a small set of core media sites that diffuse information to the rest of the Web. These sites tend to have stable circles of influence with more general news media sites acting as connectors between them.
[ { "version": "v1", "created": "Tue, 1 Jun 2010 20:02:31 GMT" }, { "version": "v2", "created": "Tue, 7 Dec 2010 20:35:08 GMT" }, { "version": "v3", "created": "Sun, 23 Oct 2011 18:56:10 GMT" } ]
2015-03-17T00:00:00
[ [ "Gomez-Rodriguez", "Manuel", "" ], [ "Leskovec", "Jure", "" ], [ "Krause", "Andreas", "" ] ]
TITLE: Inferring Networks of Diffusion and Influence ABSTRACT: Information diffusion and virus propagation are fundamental processes taking place in networks. While it is often possible to directly observe when nodes become infected with a virus or adopt the information, observing individual transmissions (i.e., who infects whom, or who influences whom) is typically very difficult. Furthermore, in many applications, the underlying network over which the diffusions and propagations spread is actually unobserved. We tackle these challenges by developing a method for tracing paths of diffusion and influence through networks and inferring the networks over which contagions propagate. Given the times when nodes adopt pieces of information or become infected, we identify the optimal network that best explains the observed infection times. Since the optimization problem is NP-hard to solve exactly, we develop an efficient approximation algorithm that scales to large datasets and finds provably near-optimal networks. We demonstrate the effectiveness of our approach by tracing information diffusion in a set of 170 million blogs and news articles over a one year period to infer how information flows through the online media space. We find that the diffusion network of news for the top 1,000 media sites and blogs tends to have a core-periphery structure with a small set of core media sites that diffuse information to the rest of the Web. These sites tend to have stable circles of influence with more general news media sites acting as connectors between them.
1010.1526
Zoltan Prekopcsak
Zolt\'an Prekopcs\'ak and Daniel Lemire
Time Series Classification by Class-Specific Mahalanobis Distance Measures
null
Advances in Data Analysis and Classification 6 (3), 2012
10.1007/s11634-012-0110-6
null
cs.LG
http://creativecommons.org/licenses/by/3.0/
To classify time series by nearest neighbors, we need to specify or learn one or several distance measures. We consider variations of the Mahalanobis distance measures which rely on the inverse covariance matrix of the data. Unfortunately --- for time series data --- the covariance matrix has often low rank. To alleviate this problem we can either use a pseudoinverse, covariance shrinking or limit the matrix to its diagonal. We review these alternatives and benchmark them against competitive methods such as the related Large Margin Nearest Neighbor Classification (LMNN) and the Dynamic Time Warping (DTW) distance. As we expected, we find that the DTW is superior, but the Mahalanobis distance measures are one to two orders of magnitude faster. To get best results with Mahalanobis distance measures, we recommend learning one distance measure per class using either covariance shrinking or the diagonal approach.
[ { "version": "v1", "created": "Thu, 7 Oct 2010 19:48:23 GMT" }, { "version": "v2", "created": "Sat, 16 Apr 2011 01:25:57 GMT" }, { "version": "v3", "created": "Mon, 27 Jun 2011 09:20:28 GMT" }, { "version": "v4", "created": "Fri, 30 Dec 2011 22:21:45 GMT" }, { "version": "v5", "created": "Tue, 22 May 2012 10:02:44 GMT" }, { "version": "v6", "created": "Mon, 2 Jul 2012 20:57:01 GMT" } ]
2015-03-17T00:00:00
[ [ "Prekopcsák", "Zoltán", "" ], [ "Lemire", "Daniel", "" ] ]
TITLE: Time Series Classification by Class-Specific Mahalanobis Distance Measures ABSTRACT: To classify time series by nearest neighbors, we need to specify or learn one or several distance measures. We consider variations of the Mahalanobis distance measures which rely on the inverse covariance matrix of the data. Unfortunately --- for time series data --- the covariance matrix has often low rank. To alleviate this problem we can either use a pseudoinverse, covariance shrinking or limit the matrix to its diagonal. We review these alternatives and benchmark them against competitive methods such as the related Large Margin Nearest Neighbor Classification (LMNN) and the Dynamic Time Warping (DTW) distance. As we expected, we find that the DTW is superior, but the Mahalanobis distance measures are one to two orders of magnitude faster. To get best results with Mahalanobis distance measures, we recommend learning one distance measure per class using either covariance shrinking or the diagonal approach.
1010.2148
Angela Bonifati
Angela Bonifati, Giansalvatore Mecca, Domenica Sileo and Gianvito Summa
Ontological Matchmaking in Recommender Systems
28 pages, 8 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The electronic marketplace offers great potential for the recommendation of supplies. In the so called recommender systems, it is crucial to apply matchmaking strategies that faithfully satisfy the predicates specified in the demand, and take into account as much as possible the user preferences. We focus on real-life ontology-driven matchmaking scenarios and identify a number of challenges, being inspired by such scenarios. A key challenge is that of presenting the results to the users in an understandable and clear-cut fashion in order to facilitate the analysis of the results. Indeed, such scenarios evoke the opportunity to rank and group the results according to specific criteria. A further challenge consists of presenting the results to the user in an asynchronous fashion, i.e. the 'push' mode, along with the 'pull' mode, in which the user explicitly issues a query, and displays the results. Moreover, an important issue to consider in real-life cases is the possibility of submitting a query to multiple providers, and collecting the various results. We have designed and implemented an ontology-based matchmaking system that suitably addresses the above challenges. We have conducted a comprehensive experimental study, in order to investigate the usability of the system, the performance and the effectiveness of the matchmaking strategies with real ontological datasets.
[ { "version": "v1", "created": "Mon, 11 Oct 2010 16:22:43 GMT" } ]
2015-03-17T00:00:00
[ [ "Bonifati", "Angela", "" ], [ "Mecca", "Giansalvatore", "" ], [ "Sileo", "Domenica", "" ], [ "Summa", "Gianvito", "" ] ]
TITLE: Ontological Matchmaking in Recommender Systems ABSTRACT: The electronic marketplace offers great potential for the recommendation of supplies. In the so called recommender systems, it is crucial to apply matchmaking strategies that faithfully satisfy the predicates specified in the demand, and take into account as much as possible the user preferences. We focus on real-life ontology-driven matchmaking scenarios and identify a number of challenges, being inspired by such scenarios. A key challenge is that of presenting the results to the users in an understandable and clear-cut fashion in order to facilitate the analysis of the results. Indeed, such scenarios evoke the opportunity to rank and group the results according to specific criteria. A further challenge consists of presenting the results to the user in an asynchronous fashion, i.e. the 'push' mode, along with the 'pull' mode, in which the user explicitly issues a query, and displays the results. Moreover, an important issue to consider in real-life cases is the possibility of submitting a query to multiple providers, and collecting the various results. We have designed and implemented an ontology-based matchmaking system that suitably addresses the above challenges. We have conducted a comprehensive experimental study, in order to investigate the usability of the system, the performance and the effectiveness of the matchmaking strategies with real ontological datasets.
1010.5511
Peter Stobbe
Peter Stobbe, Andreas Krause
Efficient Minimization of Decomposable Submodular Functions
Expanded version of paper for Neural Information Processing Systems 2010
null
null
null
cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many combinatorial problems arising in machine learning can be reduced to the problem of minimizing a submodular function. Submodular functions are a natural discrete analog of convex functions, and can be minimized in strongly polynomial time. Unfortunately, state-of-the-art algorithms for general submodular minimization are intractable for larger problems. In this paper, we introduce a novel subclass of submodular minimization problems that we call decomposable. Decomposable submodular functions are those that can be represented as sums of concave functions applied to modular functions. We develop an algorithm, SLG, that can efficiently minimize decomposable submodular functions with tens of thousands of variables. Our algorithm exploits recent results in smoothed convex minimization. We apply SLG to synthetic benchmarks and a joint classification-and-segmentation task, and show that it outperforms the state-of-the-art general purpose submodular minimization algorithms by several orders of magnitude.
[ { "version": "v1", "created": "Tue, 26 Oct 2010 20:23:39 GMT" } ]
2015-03-17T00:00:00
[ [ "Stobbe", "Peter", "" ], [ "Krause", "Andreas", "" ] ]
TITLE: Efficient Minimization of Decomposable Submodular Functions ABSTRACT: Many combinatorial problems arising in machine learning can be reduced to the problem of minimizing a submodular function. Submodular functions are a natural discrete analog of convex functions, and can be minimized in strongly polynomial time. Unfortunately, state-of-the-art algorithms for general submodular minimization are intractable for larger problems. In this paper, we introduce a novel subclass of submodular minimization problems that we call decomposable. Decomposable submodular functions are those that can be represented as sums of concave functions applied to modular functions. We develop an algorithm, SLG, that can efficiently minimize decomposable submodular functions with tens of thousands of variables. Our algorithm exploits recent results in smoothed convex minimization. We apply SLG to synthetic benchmarks and a joint classification-and-segmentation task, and show that it outperforms the state-of-the-art general purpose submodular minimization algorithms by several orders of magnitude.
1011.0686
Stephane Ross
Stephane Ross, Geoffrey J. Gordon, J. Andrew Bagnell
A Reduction of Imitation Learning and Structured Prediction to No-Regret Online Learning
Appearing in the 14th International Conference on Artificial Intelligence and Statistics (AISTATS 2011)
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequential prediction problems such as imitation learning, where future observations depend on previous predictions (actions), violate the common i.i.d. assumptions made in statistical learning. This leads to poor performance in theory and often in practice. Some recent approaches provide stronger guarantees in this setting, but remain somewhat unsatisfactory as they train either non-stationary or stochastic policies and require a large number of iterations. In this paper, we propose a new iterative algorithm, which trains a stationary deterministic policy, that can be seen as a no regret algorithm in an online learning setting. We show that any such no regret algorithm, combined with additional reduction assumptions, must find a policy with good performance under the distribution of observations it induces in such sequential settings. We demonstrate that this new approach outperforms previous approaches on two challenging imitation learning problems and a benchmark sequence labeling problem.
[ { "version": "v1", "created": "Tue, 2 Nov 2010 17:55:55 GMT" }, { "version": "v2", "created": "Wed, 3 Nov 2010 15:59:19 GMT" }, { "version": "v3", "created": "Wed, 16 Mar 2011 18:51:21 GMT" } ]
2015-03-17T00:00:00
[ [ "Ross", "Stephane", "" ], [ "Gordon", "Geoffrey J.", "" ], [ "Bagnell", "J. Andrew", "" ] ]
TITLE: A Reduction of Imitation Learning and Structured Prediction to No-Regret Online Learning ABSTRACT: Sequential prediction problems such as imitation learning, where future observations depend on previous predictions (actions), violate the common i.i.d. assumptions made in statistical learning. This leads to poor performance in theory and often in practice. Some recent approaches provide stronger guarantees in this setting, but remain somewhat unsatisfactory as they train either non-stationary or stochastic policies and require a large number of iterations. In this paper, we propose a new iterative algorithm, which trains a stationary deterministic policy, that can be seen as a no regret algorithm in an online learning setting. We show that any such no regret algorithm, combined with additional reduction assumptions, must find a policy with good performance under the distribution of observations it induces in such sequential settings. We demonstrate that this new approach outperforms previous approaches on two challenging imitation learning problems and a benchmark sequence labeling problem.
1011.3557
Kristina Lerman
Anon Plangprasopchok, Kristina Lerman, Lise Getoor
A Probabilistic Approach for Learning Folksonomies from Structured Data
In Proceedings of the 4th ACM Web Search and Data Mining Conference (WSDM)
null
null
null
cs.AI cs.CY cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach to learning complex structures is to integrate many smaller, incomplete and noisy structure fragments. In this work, we present an unsupervised probabilistic approach that extends affinity propagation to combine the small ontological fragments into a collection of integrated, consistent, and larger folksonomies. This is a challenging task because the method must aggregate similar structures while avoiding structural inconsistencies and handling noise. We validate the approach on a real-world social media dataset, comprised of shallow personal hierarchies specified by many individual users, collected from the photosharing website Flickr. Our empirical results show that our proposed approach is able to construct deeper and denser structures, compared to an approach using only the standard affinity propagation algorithm. Additionally, the approach yields better overall integration quality than a state-of-the-art approach based on incremental relational clustering.
[ { "version": "v1", "created": "Tue, 16 Nov 2010 00:46:31 GMT" } ]
2015-03-17T00:00:00
[ [ "Plangprasopchok", "Anon", "" ], [ "Lerman", "Kristina", "" ], [ "Getoor", "Lise", "" ] ]
TITLE: A Probabilistic Approach for Learning Folksonomies from Structured Data ABSTRACT: Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach to learning complex structures is to integrate many smaller, incomplete and noisy structure fragments. In this work, we present an unsupervised probabilistic approach that extends affinity propagation to combine the small ontological fragments into a collection of integrated, consistent, and larger folksonomies. This is a challenging task because the method must aggregate similar structures while avoiding structural inconsistencies and handling noise. We validate the approach on a real-world social media dataset, comprised of shallow personal hierarchies specified by many individual users, collected from the photosharing website Flickr. Our empirical results show that our proposed approach is able to construct deeper and denser structures, compared to an approach using only the standard affinity propagation algorithm. Additionally, the approach yields better overall integration quality than a state-of-the-art approach based on incremental relational clustering.
1012.0452
Umer Salim
Umer Salim and Dirk Slock
Average Minimum Transmit Power to achieve SINR Targets: Performance Comparison of Various User Selection Algorithms
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In multi-user communication from one base station (BS) to multiple users, the problem of minimizing the transmit power to achieve some target guaranteed performance (rates) at users has been well investigated in the literature. Similarly various user selection algorithms have been proposed and analyzed when the BS has to transmit to a subset of the users in the system, mostly for the objective of the sum rate maximization. We study the joint problem of minimizing the transmit power at the BS to achieve specific signal-to-interference-and-noise ratio (SINR) targets at users in conjunction with user scheduling. The general analytical results for the average transmit power required to meet guaranteed performance at the users' side are difficult to obtain even without user selection due to joint optimization required over beamforming vectors and power allocation scalars. We study the transmit power minimization problem with various user selection algorithms, namely semi-orthogonal user selection (SUS), norm-based user selection (NUS) and angle-based user selection (AUS). When the SINR targets to achieve are relatively large, the average minimum transmit power expressions are derived for NUS and SUS for any number of users. For the special case when only two users are selected, similar expressions are further derived for AUS and a performance upper bound which serves to benchmark the performance of other selection schemes. Simulation results performed under various settings indicate that SUS is by far the better user selection criterion.
[ { "version": "v1", "created": "Thu, 2 Dec 2010 15:29:28 GMT" } ]
2015-03-17T00:00:00
[ [ "Salim", "Umer", "" ], [ "Slock", "Dirk", "" ] ]
TITLE: Average Minimum Transmit Power to achieve SINR Targets: Performance Comparison of Various User Selection Algorithms ABSTRACT: In multi-user communication from one base station (BS) to multiple users, the problem of minimizing the transmit power to achieve some target guaranteed performance (rates) at users has been well investigated in the literature. Similarly various user selection algorithms have been proposed and analyzed when the BS has to transmit to a subset of the users in the system, mostly for the objective of the sum rate maximization. We study the joint problem of minimizing the transmit power at the BS to achieve specific signal-to-interference-and-noise ratio (SINR) targets at users in conjunction with user scheduling. The general analytical results for the average transmit power required to meet guaranteed performance at the users' side are difficult to obtain even without user selection due to joint optimization required over beamforming vectors and power allocation scalars. We study the transmit power minimization problem with various user selection algorithms, namely semi-orthogonal user selection (SUS), norm-based user selection (NUS) and angle-based user selection (AUS). When the SINR targets to achieve are relatively large, the average minimum transmit power expressions are derived for NUS and SUS for any number of users. For the special case when only two users are selected, similar expressions are further derived for AUS and a performance upper bound which serves to benchmark the performance of other selection schemes. Simulation results performed under various settings indicate that SUS is by far the better user selection criterion.
1012.1269
Frank Havemann
Frank Havemann, Michael Heinz, Alexander Struck and Jochen Gl\"aser
Identification of overlapping communities and their hierarchy by locally calculating community-changing resolution levels
25 pages, 10 figures
Journal of Statistical Mechanics: Theory and Experiment (2011) P01023
10.1088/1742-5468/2011/01/P01023
null
physics.data-an cs.SI physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
We propose a new local, deterministic and parameter-free algorithm that detects fuzzy and crisp overlapping communities in a weighted network and simultaneously reveals their hierarchy. Using a local fitness function, the algorithm greedily expands natural communities of seeds until the whole graph is covered. The hierarchy of communities is obtained analytically by calculating resolution levels at which communities grow rather than numerically by testing different resolution levels. This analytic procedure is not only more exact than its numerical alternatives such as LFM and GCE but also much faster. Critical resolution levels can be identified by searching for intervals in which large changes of the resolution do not lead to growth of communities. We tested our algorithm on benchmark graphs and on a network of 492 papers in information science. Combined with a specific post-processing, the algorithm gives much more precise results on LFR benchmarks with high overlap compared to other algorithms and performs very similar to GCE.
[ { "version": "v1", "created": "Mon, 6 Dec 2010 18:13:04 GMT" } ]
2015-03-17T00:00:00
[ [ "Havemann", "Frank", "" ], [ "Heinz", "Michael", "" ], [ "Struck", "Alexander", "" ], [ "Gläser", "Jochen", "" ] ]
TITLE: Identification of overlapping communities and their hierarchy by locally calculating community-changing resolution levels ABSTRACT: We propose a new local, deterministic and parameter-free algorithm that detects fuzzy and crisp overlapping communities in a weighted network and simultaneously reveals their hierarchy. Using a local fitness function, the algorithm greedily expands natural communities of seeds until the whole graph is covered. The hierarchy of communities is obtained analytically by calculating resolution levels at which communities grow rather than numerically by testing different resolution levels. This analytic procedure is not only more exact than its numerical alternatives such as LFM and GCE but also much faster. Critical resolution levels can be identified by searching for intervals in which large changes of the resolution do not lead to growth of communities. We tested our algorithm on benchmark graphs and on a network of 492 papers in information science. Combined with a specific post-processing, the algorithm gives much more precise results on LFR benchmarks with high overlap compared to other algorithms and performs very similar to GCE.
1012.4571
Yannis Sismanis
Yannis Sismanis
How I won the "Chess Ratings - Elo vs the Rest of the World" Competition
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article discusses in detail the rating system that won the kaggle competition "Chess Ratings: Elo vs the rest of the world". The competition provided a historical dataset of outcomes for chess games, and aimed to discover whether novel approaches can predict the outcomes of future games, more accurately than the well-known Elo rating system. The winning rating system, called Elo++ in the rest of the article, builds upon the Elo rating system. Like Elo, Elo++ uses a single rating per player and predicts the outcome of a game, by using a logistic curve over the difference in ratings of the players. The major component of Elo++ is a regularization technique that avoids overfitting these ratings. The dataset of chess games and outcomes is relatively small and one has to be careful not to draw "too many conclusions" out of the limited data. Many approaches tested in the competition showed signs of such an overfitting. The leader-board was dominated by attempts that did a very good job on a small test dataset, but couldn't generalize well on the private hold-out dataset. The Elo++ regularization takes into account the number of games per player, the recency of these games and the ratings of the opponents. Finally, Elo++ employs a stochastic gradient descent scheme for training the ratings, and uses only two global parameters (white's advantage and regularization constant) that are optimized using cross-validation.
[ { "version": "v1", "created": "Tue, 21 Dec 2010 09:11:53 GMT" } ]
2015-03-17T00:00:00
[ [ "Sismanis", "Yannis", "" ] ]
TITLE: How I won the "Chess Ratings - Elo vs the Rest of the World" Competition ABSTRACT: This article discusses in detail the rating system that won the kaggle competition "Chess Ratings: Elo vs the rest of the world". The competition provided a historical dataset of outcomes for chess games, and aimed to discover whether novel approaches can predict the outcomes of future games, more accurately than the well-known Elo rating system. The winning rating system, called Elo++ in the rest of the article, builds upon the Elo rating system. Like Elo, Elo++ uses a single rating per player and predicts the outcome of a game, by using a logistic curve over the difference in ratings of the players. The major component of Elo++ is a regularization technique that avoids overfitting these ratings. The dataset of chess games and outcomes is relatively small and one has to be careful not to draw "too many conclusions" out of the limited data. Many approaches tested in the competition showed signs of such an overfitting. The leader-board was dominated by attempts that did a very good job on a small test dataset, but couldn't generalize well on the private hold-out dataset. The Elo++ regularization takes into account the number of games per player, the recency of these games and the ratings of the opponents. Finally, Elo++ employs a stochastic gradient descent scheme for training the ratings, and uses only two global parameters (white's advantage and regularization constant) that are optimized using cross-validation.
1012.5379
Bram Reps
Bram Reps, Wim Vanroose and Hisham bin Zubair
GMRES-based multigrid for the complex scaled preconditoner for the indefinite Helmholtz equation
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multigrid preconditioners and solvers for the indefinite Helmholtz equation suffer from non-stability of the stationary smoothers due to the indefinite spectrum of the operator. In this paper we explore GMRES as a replacement for the stationary smoothers of the standard multigrid method. This results in a robust and efficient solver for a complex shifted or stretched Helmholtz problem that can be used as a preconditioner. Very few GMRES iterations are required on each level to build a good multigrid method. The convergence behavior is compared to a theoretically derived stable polynomial smoother. We test this method on some benchmark problems and report on the observed convergence behavior.
[ { "version": "v1", "created": "Fri, 24 Dec 2010 10:13:47 GMT" }, { "version": "v2", "created": "Wed, 8 May 2013 08:54:58 GMT" } ]
2015-03-17T00:00:00
[ [ "Reps", "Bram", "" ], [ "Vanroose", "Wim", "" ], [ "Zubair", "Hisham bin", "" ] ]
TITLE: GMRES-based multigrid for the complex scaled preconditoner for the indefinite Helmholtz equation ABSTRACT: Multigrid preconditioners and solvers for the indefinite Helmholtz equation suffer from non-stability of the stationary smoothers due to the indefinite spectrum of the operator. In this paper we explore GMRES as a replacement for the stationary smoothers of the standard multigrid method. This results in a robust and efficient solver for a complex shifted or stretched Helmholtz problem that can be used as a preconditioner. Very few GMRES iterations are required on each level to build a good multigrid method. The convergence behavior is compared to a theoretically derived stable polynomial smoother. We test this method on some benchmark problems and report on the observed convergence behavior.
1101.0080
Hiroshi Sakamoto
Naoya Kishiue, Masaya Nakahara, Shirou Maruyama, Hiroshi Sakamoto
A Searchable Compressed Edit-Sensitive Parsing
16 pages, 14 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Practical data structures for the edit-sensitive parsing (ESP) are proposed. Given a string S, its ESP tree is equivalent to a context-free grammar G generating just S, which is represented by a DAG. Using the succinct data structures for trees and permutations, G is decomposed to two LOUDS bit strings and single array in (1+\epsilon)n\log n+4n+o(n) bits for any 0<\epsilon <1 and the number n of variables in G. The time to count occurrences of P in S is in O(\frac{1}{\epsilon}(m\log n+occ_c(\log m\log u)), whereas m = |P|, u = |S|, and occ_c is the number of occurrences of a maximal common subtree in ESPs of P and S. The efficiency of the proposed index is evaluated by the experiments conducted on several benchmarks complying with the other compressed indexes.
[ { "version": "v1", "created": "Thu, 30 Dec 2010 13:04:56 GMT" }, { "version": "v2", "created": "Tue, 4 Jan 2011 16:29:59 GMT" }, { "version": "v3", "created": "Sun, 9 Jan 2011 21:41:02 GMT" } ]
2015-03-17T00:00:00
[ [ "Kishiue", "Naoya", "" ], [ "Nakahara", "Masaya", "" ], [ "Maruyama", "Shirou", "" ], [ "Sakamoto", "Hiroshi", "" ] ]
TITLE: A Searchable Compressed Edit-Sensitive Parsing ABSTRACT: Practical data structures for the edit-sensitive parsing (ESP) are proposed. Given a string S, its ESP tree is equivalent to a context-free grammar G generating just S, which is represented by a DAG. Using the succinct data structures for trees and permutations, G is decomposed to two LOUDS bit strings and single array in (1+\epsilon)n\log n+4n+o(n) bits for any 0<\epsilon <1 and the number n of variables in G. The time to count occurrences of P in S is in O(\frac{1}{\epsilon}(m\log n+occ_c(\log m\log u)), whereas m = |P|, u = |S|, and occ_c is the number of occurrences of a maximal common subtree in ESPs of P and S. The efficiency of the proposed index is evaluated by the experiments conducted on several benchmarks complying with the other compressed indexes.
1101.2604
Wahbeh Qardaji
Ninghui Li, Wahbeh Qardaji, Dong Su
On Sampling, Anonymization, and Differential Privacy: Or, k-Anonymization Meets Differential Privacy
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims at answering the following two questions in privacy-preserving data analysis and publishing: What formal privacy guarantee (if any) does $k$-anonymization provide? How to benefit from the adversary's uncertainty about the data? We have found that random sampling provides a connection that helps answer these two questions, as sampling can create uncertainty. The main result of the paper is that $k$-anonymization, when done "safely", and when preceded with a random sampling step, satisfies $(\epsilon,\delta)$-differential privacy with reasonable parameters. This result illustrates that "hiding in a crowd of $k$" indeed offers some privacy guarantees. This result also suggests an alternative approach to output perturbation for satisfying differential privacy: namely, adding a random sampling step in the beginning and pruning results that are too sensitive to change of a single tuple. Regarding the second question, we provide both positive and negative results. On the positive side, we show that adding a random-sampling pre-processing step to a differentially-private algorithm can greatly amplify the level of privacy protection. Hence, when given a dataset resulted from sampling, one can utilize a much large privacy budget. On the negative side, any privacy notion that takes advantage of the adversary's uncertainty likely does not compose. We discuss what these results imply in practice.
[ { "version": "v1", "created": "Thu, 13 Jan 2011 16:18:23 GMT" }, { "version": "v2", "created": "Tue, 21 Jun 2011 02:37:02 GMT" } ]
2015-03-17T00:00:00
[ [ "Li", "Ninghui", "" ], [ "Qardaji", "Wahbeh", "" ], [ "Su", "Dong", "" ] ]
TITLE: On Sampling, Anonymization, and Differential Privacy: Or, k-Anonymization Meets Differential Privacy ABSTRACT: This paper aims at answering the following two questions in privacy-preserving data analysis and publishing: What formal privacy guarantee (if any) does $k$-anonymization provide? How to benefit from the adversary's uncertainty about the data? We have found that random sampling provides a connection that helps answer these two questions, as sampling can create uncertainty. The main result of the paper is that $k$-anonymization, when done "safely", and when preceded with a random sampling step, satisfies $(\epsilon,\delta)$-differential privacy with reasonable parameters. This result illustrates that "hiding in a crowd of $k$" indeed offers some privacy guarantees. This result also suggests an alternative approach to output perturbation for satisfying differential privacy: namely, adding a random sampling step in the beginning and pruning results that are too sensitive to change of a single tuple. Regarding the second question, we provide both positive and negative results. On the positive side, we show that adding a random-sampling pre-processing step to a differentially-private algorithm can greatly amplify the level of privacy protection. Hence, when given a dataset resulted from sampling, one can utilize a much large privacy budget. On the negative side, any privacy notion that takes advantage of the adversary's uncertainty likely does not compose. We discuss what these results imply in practice.