id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1412.6296 | Jifeng Dai | Jifeng Dai, Yang Lu, Ying-Nian Wu | Generative Modeling of Convolutional Neural Networks | null | null | null | null | cs.CV cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The convolutional neural networks (CNNs) have proven to be a powerful tool
for discriminative learning. Recently researchers have also started to show
interest in the generative aspects of CNNs in order to gain a deeper
understanding of what they have learned and how to further improve them. This
paper investigates generative modeling of CNNs. The main contributions include:
(1) We construct a generative model for the CNN in the form of exponential
tilting of a reference distribution. (2) We propose a generative gradient for
pre-training CNNs by a non-parametric importance sampling scheme, which is
fundamentally different from the commonly used discriminative gradient, and yet
has the same computational architecture and cost as the latter. (3) We propose
a generative visualization method for the CNNs by sampling from an explicit
parametric image distribution. The proposed visualization method can directly
draw synthetic samples for any given node in a trained CNN by the Hamiltonian
Monte Carlo (HMC) algorithm, without resorting to any extra hold-out images.
Experiments on the challenging ImageNet benchmark show that the proposed
generative gradient pre-training consistently helps improve the performances of
CNNs, and the proposed generative visualization method generates meaningful and
varied samples of synthetic images from a large-scale deep CNN.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 11:34:37 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2015 15:07:06 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Dai",
"Jifeng",
""
],
[
"Lu",
"Yang",
""
],
[
"Wu",
"Ying-Nian",
""
]
] | TITLE: Generative Modeling of Convolutional Neural Networks
ABSTRACT: The convolutional neural networks (CNNs) have proven to be a powerful tool
for discriminative learning. Recently researchers have also started to show
interest in the generative aspects of CNNs in order to gain a deeper
understanding of what they have learned and how to further improve them. This
paper investigates generative modeling of CNNs. The main contributions include:
(1) We construct a generative model for the CNN in the form of exponential
tilting of a reference distribution. (2) We propose a generative gradient for
pre-training CNNs by a non-parametric importance sampling scheme, which is
fundamentally different from the commonly used discriminative gradient, and yet
has the same computational architecture and cost as the latter. (3) We propose
a generative visualization method for the CNNs by sampling from an explicit
parametric image distribution. The proposed visualization method can directly
draw synthetic samples for any given node in a trained CNN by the Hamiltonian
Monte Carlo (HMC) algorithm, without resorting to any extra hold-out images.
Experiments on the challenging ImageNet benchmark show that the proposed
generative gradient pre-training consistently helps improve the performances of
CNNs, and the proposed generative visualization method generates meaningful and
varied samples of synthetic images from a large-scale deep CNN.
| no_new_dataset | 0.711625 |
1412.7009 | Jan Rudy | Jan Rudy, Graham Taylor | Generative Class-conditional Autoencoders | null | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work by Bengio et al. (2013) proposes a sampling procedure for
denoising autoencoders which involves learning the transition operator of a
Markov chain. The transition operator is typically unimodal, which limits its
capacity to model complex data. In order to perform efficient sampling from
conditional distributions, we extend this work, both theoretically and
algorithmically, to gated autoencoders (Memisevic, 2013), The proposed model is
able to generate convincing class-conditional samples when trained on both the
MNIST and TFD datasets.
| [
{
"version": "v1",
"created": "Mon, 22 Dec 2014 14:57:05 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Feb 2015 00:16:55 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Apr 2015 01:54:33 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Rudy",
"Jan",
""
],
[
"Taylor",
"Graham",
""
]
] | TITLE: Generative Class-conditional Autoencoders
ABSTRACT: Recent work by Bengio et al. (2013) proposes a sampling procedure for
denoising autoencoders which involves learning the transition operator of a
Markov chain. The transition operator is typically unimodal, which limits its
capacity to model complex data. In order to perform efficient sampling from
conditional distributions, we extend this work, both theoretically and
algorithmically, to gated autoencoders (Memisevic, 2013), The proposed model is
able to generate convincing class-conditional samples when trained on both the
MNIST and TFD datasets.
| no_new_dataset | 0.710848 |
1502.01423 | Chen Fang | Chen Fang, Hailin Jin, Jianchao Yang, Zhe Lin | Collaborative Feature Learning from Social Media | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image feature representation plays an essential role in image recognition and
related tasks. The current state-of-the-art feature learning paradigm is
supervised learning from labeled data. However, this paradigm requires
large-scale category labels, which limits its applicability to domains where
labels are hard to obtain. In this paper, we propose a new data-driven feature
learning paradigm which does not rely on category labels. Instead, we learn
from user behavior data collected on social media. Concretely, we use the image
relationship discovered in the latent space from the user behavior data to
guide the image feature learning. We collect a large-scale image and user
behavior dataset from Behance.net. The dataset consists of 1.9 million images
and over 300 million view records from 1.9 million users. We validate our
feature learning paradigm on this dataset and find that the learned feature
significantly outperforms the state-of-the-art image features in learning
better image similarities. We also show that the learned feature performs
competitively on various recognition benchmarks.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2015 03:32:19 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Apr 2015 19:27:33 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Apr 2015 18:36:54 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Fang",
"Chen",
""
],
[
"Jin",
"Hailin",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Lin",
"Zhe",
""
]
] | TITLE: Collaborative Feature Learning from Social Media
ABSTRACT: Image feature representation plays an essential role in image recognition and
related tasks. The current state-of-the-art feature learning paradigm is
supervised learning from labeled data. However, this paradigm requires
large-scale category labels, which limits its applicability to domains where
labels are hard to obtain. In this paper, we propose a new data-driven feature
learning paradigm which does not rely on category labels. Instead, we learn
from user behavior data collected on social media. Concretely, we use the image
relationship discovered in the latent space from the user behavior data to
guide the image feature learning. We collect a large-scale image and user
behavior dataset from Behance.net. The dataset consists of 1.9 million images
and over 300 million view records from 1.9 million users. We validate our
feature learning paradigm on this dataset and find that the learned feature
significantly outperforms the state-of-the-art image features in learning
better image similarities. We also show that the learned feature performs
competitively on various recognition benchmarks.
| new_dataset | 0.694963 |
1502.03671 | R\'emi Lebret | R\'emi Lebret, Pedro O. Pinheiro, Ronan Collobert | Phrase-based Image Captioning | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generating a novel textual description of an image is an interesting problem
that connects computer vision and natural language processing. In this paper,
we present a simple model that is able to generate descriptive sentences given
a sample image. This model has a strong focus on the syntax of the
descriptions. We train a purely bilinear model that learns a metric between an
image representation (generated from a previously trained Convolutional Neural
Network) and phrases that are used to described them. The system is then able
to infer phrases from a given image sample. Based on caption syntax statistics,
we propose a simple language model that can produce relevant descriptions for a
given test image using the phrases inferred. Our approach, which is
considerably simpler than state-of-the-art models, achieves comparable results
in two popular datasets for the task: Flickr30k and the recently proposed
Microsoft COCO.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 14:17:15 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2015 09:48:52 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Lebret",
"Rémi",
""
],
[
"Pinheiro",
"Pedro O.",
""
],
[
"Collobert",
"Ronan",
""
]
] | TITLE: Phrase-based Image Captioning
ABSTRACT: Generating a novel textual description of an image is an interesting problem
that connects computer vision and natural language processing. In this paper,
we present a simple model that is able to generate descriptive sentences given
a sample image. This model has a strong focus on the syntax of the
descriptions. We train a purely bilinear model that learns a metric between an
image representation (generated from a previously trained Convolutional Neural
Network) and phrases that are used to described them. The system is then able
to infer phrases from a given image sample. Based on caption syntax statistics,
we propose a simple language model that can produce relevant descriptions for a
given test image using the phrases inferred. Our approach, which is
considerably simpler than state-of-the-art models, achieves comparable results
in two popular datasets for the task: Flickr30k and the recently proposed
Microsoft COCO.
| no_new_dataset | 0.710622 |
1504.02147 | Thomas Goldstein | Tom Goldstein, Gavin Taylor, Kawika Barabin, Kent Sayre | Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction | null | null | null | null | cs.DC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent approaches to distributed model fitting rely heavily on consensus
ADMM, where each node solves small sub-problems using only local data. We
propose iterative methods that solve {\em global} sub-problems over an entire
distributed dataset. This is possible using transpose reduction strategies that
allow a single node to solve least-squares over massive datasets without
putting all the data in one place. This results in simple iterative methods
that avoid the expensive inner loops required for consensus methods. To
demonstrate the efficiency of this approach, we fit linear classifiers and
sparse linear models to datasets over 5 Tb in size using a distributed
implementation with over 7000 cores in far less time than previous approaches.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 22:35:18 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Goldstein",
"Tom",
""
],
[
"Taylor",
"Gavin",
""
],
[
"Barabin",
"Kawika",
""
],
[
"Sayre",
"Kent",
""
]
] | TITLE: Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction
ABSTRACT: Recent approaches to distributed model fitting rely heavily on consensus
ADMM, where each node solves small sub-problems using only local data. We
propose iterative methods that solve {\em global} sub-problems over an entire
distributed dataset. This is possible using transpose reduction strategies that
allow a single node to solve least-squares over massive datasets without
putting all the data in one place. This results in simple iterative methods
that avoid the expensive inner loops required for consensus methods. To
demonstrate the efficiency of this approach, we fit linear classifiers and
sparse linear models to datasets over 5 Tb in size using a distributed
implementation with over 7000 cores in far less time than previous approaches.
| no_new_dataset | 0.709466 |
1504.02305 | Haewoon Kwak | Haewoon Kwak and Jeremy Blackburn and Seungyeop Han | Exploring Cyberbullying and Other Toxic Behavior in Team Competition
Online Games | CHI'15 | null | null | null | cs.CY cs.HC cs.MM cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we explore cyberbullying and other toxic behavior in team
competition online games. Using a dataset of over 10 million player reports on
1.46 million toxic players along with corresponding crowdsourced decisions, we
test several hypotheses drawn from theories explaining toxic behavior. Besides
providing large-scale, empirical based understanding of toxic behavior, our
work can be used as a basis for building systems to detect, prevent, and
counter-act toxic behavior.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2015 13:33:58 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Kwak",
"Haewoon",
""
],
[
"Blackburn",
"Jeremy",
""
],
[
"Han",
"Seungyeop",
""
]
] | TITLE: Exploring Cyberbullying and Other Toxic Behavior in Team Competition
Online Games
ABSTRACT: In this work we explore cyberbullying and other toxic behavior in team
competition online games. Using a dataset of over 10 million player reports on
1.46 million toxic players along with corresponding crowdsourced decisions, we
test several hypotheses drawn from theories explaining toxic behavior. Besides
providing large-scale, empirical based understanding of toxic behavior, our
work can be used as a basis for building systems to detect, prevent, and
counter-act toxic behavior.
| no_new_dataset | 0.661896 |
1504.02340 | Wongun Choi | Wongun Choi | Near-Online Multi-target Tracking with Aggregated Local Flow Descriptor | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we focus on the two key aspects of multiple target tracking
problem: 1) designing an accurate affinity measure to associate detections and
2) implementing an efficient and accurate (near) online multiple target
tracking algorithm. As the first contribution, we introduce a novel Aggregated
Local Flow Descriptor (ALFD) that encodes the relative motion pattern between a
pair of temporally distant detections using long term interest point
trajectories (IPTs). Leveraging on the IPTs, the ALFD provides a robust
affinity measure for estimating the likelihood of matching detections
regardless of the application scenarios. As another contribution, we present a
Near-Online Multi-target Tracking (NOMT) algorithm. The tracking problem is
formulated as a data-association between targets and detections in a temporal
window, that is performed repeatedly at every frame. While being efficient,
NOMT achieves robustness via integrating multiple cues including ALFD metric,
target dynamics, appearance similarity, and long term trajectory regularization
into the model. Our ablative analysis verifies the superiority of the ALFD
metric over the other conventional affinity metrics. We run a comprehensive
experimental evaluation on two challenging tracking datasets, KITTI and MOT
datasets. The NOMT method combined with ALFD metric achieves the best accuracy
in both datasets with significant margins (about 10% higher MOTA) over the
state-of-the-arts.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2015 14:57:32 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Choi",
"Wongun",
""
]
] | TITLE: Near-Online Multi-target Tracking with Aggregated Local Flow Descriptor
ABSTRACT: In this paper, we focus on the two key aspects of multiple target tracking
problem: 1) designing an accurate affinity measure to associate detections and
2) implementing an efficient and accurate (near) online multiple target
tracking algorithm. As the first contribution, we introduce a novel Aggregated
Local Flow Descriptor (ALFD) that encodes the relative motion pattern between a
pair of temporally distant detections using long term interest point
trajectories (IPTs). Leveraging on the IPTs, the ALFD provides a robust
affinity measure for estimating the likelihood of matching detections
regardless of the application scenarios. As another contribution, we present a
Near-Online Multi-target Tracking (NOMT) algorithm. The tracking problem is
formulated as a data-association between targets and detections in a temporal
window, that is performed repeatedly at every frame. While being efficient,
NOMT achieves robustness via integrating multiple cues including ALFD metric,
target dynamics, appearance similarity, and long term trajectory regularization
into the model. Our ablative analysis verifies the superiority of the ALFD
metric over the other conventional affinity metrics. We run a comprehensive
experimental evaluation on two challenging tracking datasets, KITTI and MOT
datasets. The NOMT method combined with ALFD metric achieves the best accuracy
in both datasets with significant margins (about 10% higher MOTA) over the
state-of-the-arts.
| no_new_dataset | 0.709038 |
1504.02356 | Xavier Gir\'o-i-Nieto | Eva Mohedano, Amaia Salvador, Sergi Porta, Xavier Gir\'o-i-Nieto,
Graham Healy, Kevin McGuinness, Noel O'Connor and Alan F. Smeaton | Exploring EEG for Object Detection and Retrieval | This preprint is the full version of a short paper accepted in the
ACM International Conference on Multimedia Retrieval (ICMR) 2015 (Shanghai,
China) | null | null | null | cs.HC cs.CV cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the potential for using Brain Computer Interfaces (BCI)
as a relevance feedback mechanism in content-based image retrieval. We
investigate if it is possible to capture useful EEG signals to detect if
relevant objects are present in a dataset of realistic and complex images. We
perform several experiments using a rapid serial visual presentation (RSVP) of
images at different rates (5Hz and 10Hz) on 8 users with different degrees of
familiarization with BCI and the dataset. We then use the feedback from the BCI
and mouse-based interfaces to retrieve localized objects in a subset of TRECVid
images. We show that it is indeed possible to detect such objects in complex
images and, also, that users with previous knowledge on the dataset or
experience with the RSVP outperform others. When the users have limited time to
annotate the images (100 seconds in our experiments) both interfaces are
comparable in performance. Comparing our best users in a retrieval task, we
found that EEG-based relevance feedback outperforms mouse-based feedback. The
realistic and complex image dataset differentiates our work from previous
studies on EEG for image retrieval.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2015 15:43:52 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Mohedano",
"Eva",
""
],
[
"Salvador",
"Amaia",
""
],
[
"Porta",
"Sergi",
""
],
[
"Giró-i-Nieto",
"Xavier",
""
],
[
"Healy",
"Graham",
""
],
[
"McGuinness",
"Kevin",
""
],
[
"O'Connor",
"Noel",
""
],
[
"Smeaton",
"Alan F.",
""
]
] | TITLE: Exploring EEG for Object Detection and Retrieval
ABSTRACT: This paper explores the potential for using Brain Computer Interfaces (BCI)
as a relevance feedback mechanism in content-based image retrieval. We
investigate if it is possible to capture useful EEG signals to detect if
relevant objects are present in a dataset of realistic and complex images. We
perform several experiments using a rapid serial visual presentation (RSVP) of
images at different rates (5Hz and 10Hz) on 8 users with different degrees of
familiarization with BCI and the dataset. We then use the feedback from the BCI
and mouse-based interfaces to retrieve localized objects in a subset of TRECVid
images. We show that it is indeed possible to detect such objects in complex
images and, also, that users with previous knowledge on the dataset or
experience with the RSVP outperform others. When the users have limited time to
annotate the images (100 seconds in our experiments) both interfaces are
comparable in performance. Comparing our best users in a retrieval task, we
found that EEG-based relevance feedback outperforms mouse-based feedback. The
realistic and complex image dataset differentiates our work from previous
studies on EEG for image retrieval.
| no_new_dataset | 0.706981 |
1504.02363 | Ke Zhang | Ke Zhang, Konstantinos Pelechrinis, Theodoros Lappas | Analyzing and Modeling Special Offer Campaigns in Location-based Social
Networks | in The 9th International AAAI Conference on Web and Social Media
(ICWSM 2015) | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of mobile handheld devices in combination with the
technological advancements in mobile computing has led to a number of
innovative services that make use of the location information available on such
devices. Traditional yellow pages websites have now moved to mobile platforms,
giving the opportunity to local businesses and potential, near-by, customers to
connect. These platforms can offer an affordable advertisement channel to local
businesses. One of the mechanisms offered by location-based social networks
(LBSNs) allows businesses to provide special offers to their customers that
connect through the platform. We collect a large time-series dataset from
approximately 14 million venues on Foursquare and analyze the performance of
such campaigns using randomization techniques and (non-parametric) hypothesis
testing with statistical bootstrapping. Our main finding indicates that this
type of promotions are not as effective as anecdote success stories might
suggest. Finally, we design classifiers by extracting three different types of
features that are able to provide an educated decision on whether a special
offer campaign for a local business will succeed or not both in short and long
term.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2015 16:26:40 GMT"
}
] | 2015-04-10T00:00:00 | [
[
"Zhang",
"Ke",
""
],
[
"Pelechrinis",
"Konstantinos",
""
],
[
"Lappas",
"Theodoros",
""
]
] | TITLE: Analyzing and Modeling Special Offer Campaigns in Location-based Social
Networks
ABSTRACT: The proliferation of mobile handheld devices in combination with the
technological advancements in mobile computing has led to a number of
innovative services that make use of the location information available on such
devices. Traditional yellow pages websites have now moved to mobile platforms,
giving the opportunity to local businesses and potential, near-by, customers to
connect. These platforms can offer an affordable advertisement channel to local
businesses. One of the mechanisms offered by location-based social networks
(LBSNs) allows businesses to provide special offers to their customers that
connect through the platform. We collect a large time-series dataset from
approximately 14 million venues on Foursquare and analyze the performance of
such campaigns using randomization techniques and (non-parametric) hypothesis
testing with statistical bootstrapping. Our main finding indicates that this
type of promotions are not as effective as anecdote success stories might
suggest. Finally, we design classifiers by extracting three different types of
features that are able to provide an educated decision on whether a special
offer campaign for a local business will succeed or not both in short and long
term.
| no_new_dataset | 0.70416 |
1504.00941 | Quoc Le | Quoc V. Le, Navdeep Jaitly, Geoffrey E. Hinton | A Simple Way to Initialize Recurrent Networks of Rectified Linear Units | null | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning long term dependencies in recurrent networks is difficult due to
vanishing and exploding gradients. To overcome this difficulty, researchers
have developed sophisticated optimization techniques and network architectures.
In this paper, we propose a simpler solution that use recurrent neural networks
composed of rectified linear units. Key to our solution is the use of the
identity matrix or its scaled version to initialize the recurrent weight
matrix. We find that our solution is comparable to LSTM on our four benchmarks:
two toy problems involving long-range temporal structures, a large language
modeling problem and a benchmark speech recognition problem.
| [
{
"version": "v1",
"created": "Fri, 3 Apr 2015 21:22:52 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Apr 2015 22:39:18 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Le",
"Quoc V.",
""
],
[
"Jaitly",
"Navdeep",
""
],
[
"Hinton",
"Geoffrey E.",
""
]
] | TITLE: A Simple Way to Initialize Recurrent Networks of Rectified Linear Units
ABSTRACT: Learning long term dependencies in recurrent networks is difficult due to
vanishing and exploding gradients. To overcome this difficulty, researchers
have developed sophisticated optimization techniques and network architectures.
In this paper, we propose a simpler solution that use recurrent neural networks
composed of rectified linear units. Key to our solution is the use of the
identity matrix or its scaled version to initialize the recurrent weight
matrix. We find that our solution is comparable to LSTM on our four benchmarks:
two toy problems involving long-range temporal structures, a large language
modeling problem and a benchmark speech recognition problem.
| no_new_dataset | 0.712632 |
1504.01446 | Vasil S. Denchev | Vasil S. Denchev, Nan Ding, Shin Matsushima, S.V.N. Vishwanathan,
Hartmut Neven | Totally Corrective Boosting with Cardinality Penalization | null | null | null | null | cs.LG quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a totally corrective boosting algorithm with explicit cardinality
regularization. The resulting combinatorial optimization problems are not known
to be efficiently solvable with existing classical methods, but emerging
quantum optimization technology gives hope for achieving sparser models in
practice. In order to demonstrate the utility of our algorithm, we use a
distributed classical heuristic optimizer as a stand-in for quantum hardware.
Even though this evaluation methodology incurs large time and resource costs on
classical computing machinery, it allows us to gauge the potential gains in
generalization performance and sparsity of the resulting boosted ensembles. Our
experimental results on public data sets commonly used for benchmarking of
boosting algorithms decidedly demonstrate the existence of such advantages. If
actual quantum optimization were to be used with this algorithm in the future,
we would expect equivalent or superior results at much smaller time and energy
costs during training. Moreover, studying cardinality-penalized boosting also
sheds light on why unregularized boosting algorithms with early stopping often
yield better results than their counterparts with explicit convex
regularization: Early stopping performs suboptimal cardinality regularization.
The results that we present here indicate it is beneficial to explicitly solve
the combinatorial problem still left open at early termination.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 00:50:30 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Denchev",
"Vasil S.",
""
],
[
"Ding",
"Nan",
""
],
[
"Matsushima",
"Shin",
""
],
[
"Vishwanathan",
"S. V. N.",
""
],
[
"Neven",
"Hartmut",
""
]
] | TITLE: Totally Corrective Boosting with Cardinality Penalization
ABSTRACT: We propose a totally corrective boosting algorithm with explicit cardinality
regularization. The resulting combinatorial optimization problems are not known
to be efficiently solvable with existing classical methods, but emerging
quantum optimization technology gives hope for achieving sparser models in
practice. In order to demonstrate the utility of our algorithm, we use a
distributed classical heuristic optimizer as a stand-in for quantum hardware.
Even though this evaluation methodology incurs large time and resource costs on
classical computing machinery, it allows us to gauge the potential gains in
generalization performance and sparsity of the resulting boosted ensembles. Our
experimental results on public data sets commonly used for benchmarking of
boosting algorithms decidedly demonstrate the existence of such advantages. If
actual quantum optimization were to be used with this algorithm in the future,
we would expect equivalent or superior results at much smaller time and energy
costs during training. Moreover, studying cardinality-penalized boosting also
sheds light on why unregularized boosting algorithms with early stopping often
yield better results than their counterparts with explicit convex
regularization: Early stopping performs suboptimal cardinality regularization.
The results that we present here indicate it is beneficial to explicitly solve
the combinatorial problem still left open at early termination.
| no_new_dataset | 0.707657 |
1504.01781 | Tiep Mai | Tiep Mai, Deepak Ajwani and Alessandra Sala | Profiling user activities with minimal traffic traces | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding user behavior is essential to personalize and enrich a user's
online experience. While there are significant benefits to be accrued from the
pursuit of personalized services based on a fine-grained behavioral analysis,
care must be taken to address user privacy concerns. In this paper, we consider
the use of web traces with truncated URLs - each URL is trimmed to only contain
the web domain - for this purpose. While such truncation removes the
fine-grained sensitive information, it also strips the data of many features
that are crucial to the profiling of user activity. We show how to overcome the
severe handicap of lack of crucial features for the purpose of filtering out
the URLs representing a user activity from the noisy network traffic trace
(including advertisement, spam, analytics, webscripts) with high accuracy. This
activity profiling with truncated URLs enables the network operators to provide
personalized services while mitigating privacy concerns by storing and sharing
only truncated traffic traces.
In order to offset the accuracy loss due to truncation, our statistical
methodology leverages specialized features extracted from a group of
consecutive URLs that represent a micro user action like web click, chat reply,
etc., which we call bursts. These bursts, in turn, are detected by a novel
algorithm which is based on our observed characteristics of the inter-arrival
time of HTTP records. We present an extensive experimental evaluation on a real
dataset of mobile web traces, consisting of more than 130 million records,
representing the browsing activities of 10,000 users over a period of 30 days.
Our results show that the proposed methodology achieves around 90% accuracy in
segregating URLs representing user activities from non-representative URLs.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 23:29:23 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Mai",
"Tiep",
""
],
[
"Ajwani",
"Deepak",
""
],
[
"Sala",
"Alessandra",
""
]
] | TITLE: Profiling user activities with minimal traffic traces
ABSTRACT: Understanding user behavior is essential to personalize and enrich a user's
online experience. While there are significant benefits to be accrued from the
pursuit of personalized services based on a fine-grained behavioral analysis,
care must be taken to address user privacy concerns. In this paper, we consider
the use of web traces with truncated URLs - each URL is trimmed to only contain
the web domain - for this purpose. While such truncation removes the
fine-grained sensitive information, it also strips the data of many features
that are crucial to the profiling of user activity. We show how to overcome the
severe handicap of lack of crucial features for the purpose of filtering out
the URLs representing a user activity from the noisy network traffic trace
(including advertisement, spam, analytics, webscripts) with high accuracy. This
activity profiling with truncated URLs enables the network operators to provide
personalized services while mitigating privacy concerns by storing and sharing
only truncated traffic traces.
In order to offset the accuracy loss due to truncation, our statistical
methodology leverages specialized features extracted from a group of
consecutive URLs that represent a micro user action like web click, chat reply,
etc., which we call bursts. These bursts, in turn, are detected by a novel
algorithm which is based on our observed characteristics of the inter-arrival
time of HTTP records. We present an extensive experimental evaluation on a real
dataset of mobile web traces, consisting of more than 130 million records,
representing the browsing activities of 10,000 users over a period of 30 days.
Our results show that the proposed methodology achieves around 90% accuracy in
segregating URLs representing user activities from non-representative URLs.
| new_dataset | 0.714261 |
1504.01807 | Junbin Gao Professor | Boyue Wang and Yongli Hu and Junbin Gao and Yanfeng Sun and Baocai Yin | Low Rank Representation on Grassmann Manifolds: An Extrinsic Perspective | 9 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many computer vision algorithms employ subspace models to represent data. The
Low-rank representation (LRR) has been successfully applied in subspace
clustering for which data are clustered according to their subspace structures.
The possibility of extending LRR on Grassmann manifold is explored in this
paper. Rather than directly embedding Grassmann manifold into a symmetric
matrix space, an extrinsic view is taken by building the self-representation of
LRR over the tangent space of each Grassmannian point. A new algorithm for
solving the proposed Grassmannian LRR model is designed and implemented.
Several clustering experiments are conducted on handwritten digits dataset,
dynamic texture video clips and YouTube celebrity face video data. The
experimental results show our method outperforms a number of existing methods.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 02:38:04 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Wang",
"Boyue",
""
],
[
"Hu",
"Yongli",
""
],
[
"Gao",
"Junbin",
""
],
[
"Sun",
"Yanfeng",
""
],
[
"Yin",
"Baocai",
""
]
] | TITLE: Low Rank Representation on Grassmann Manifolds: An Extrinsic Perspective
ABSTRACT: Many computer vision algorithms employ subspace models to represent data. The
Low-rank representation (LRR) has been successfully applied in subspace
clustering for which data are clustered according to their subspace structures.
The possibility of extending LRR on Grassmann manifold is explored in this
paper. Rather than directly embedding Grassmann manifold into a symmetric
matrix space, an extrinsic view is taken by building the self-representation of
LRR over the tangent space of each Grassmannian point. A new algorithm for
solving the proposed Grassmannian LRR model is designed and implemented.
Several clustering experiments are conducted on handwritten digits dataset,
dynamic texture video clips and YouTube celebrity face video data. The
experimental results show our method outperforms a number of existing methods.
| no_new_dataset | 0.709868 |
1504.01840 | Yegor Tkachenko | Yegor Tkachenko | Autonomous CRM Control via CLV Approximation with Deep Reinforcement
Learning in Discrete and Continuous Action Space | 13 pages, 8 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper outlines a framework for autonomous control of a CRM (customer
relationship management) system. First, it explores how a modified version of
the widely accepted Recency-Frequency-Monetary Value system of metrics can be
used to define the state space of clients or donors. Second, it describes a
procedure to determine the optimal direct marketing action in discrete and
continuous action space for the given individual, based on his position in the
state space. The procedure involves the use of model-free Q-learning to train a
deep neural network that relates a client's position in the state space to
rewards associated with possible marketing actions. The estimated value
function over the client state space can be interpreted as customer lifetime
value, and thus allows for a quick plug-in estimation of CLV for a given
client. Experimental results are presented, based on KDD Cup 1998 mailing
dataset of donation solicitations.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 06:22:44 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Tkachenko",
"Yegor",
""
]
] | TITLE: Autonomous CRM Control via CLV Approximation with Deep Reinforcement
Learning in Discrete and Continuous Action Space
ABSTRACT: The paper outlines a framework for autonomous control of a CRM (customer
relationship management) system. First, it explores how a modified version of
the widely accepted Recency-Frequency-Monetary Value system of metrics can be
used to define the state space of clients or donors. Second, it describes a
procedure to determine the optimal direct marketing action in discrete and
continuous action space for the given individual, based on his position in the
state space. The procedure involves the use of model-free Q-learning to train a
deep neural network that relates a client's position in the state space to
rewards associated with possible marketing actions. The estimated value
function over the client state space can be interpreted as customer lifetime
value, and thus allows for a quick plug-in estimation of CLV for a given
client. Experimental results are presented, based on KDD Cup 1998 mailing
dataset of donation solicitations.
| no_new_dataset | 0.709988 |
1504.01920 | Zuxuan Wu | Hao Ye, Zuxuan Wu, Rui-Wei Zhao, Xi Wang, Yu-Gang Jiang, Xiangyang Xue | Evaluating Two-Stream CNN for Video Classification | ACM ICMR'15 | null | 10.1145/2671188.2749406 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Videos contain very rich semantic information. Traditional hand-crafted
features are known to be inadequate in analyzing complex video semantics.
Inspired by the huge success of the deep learning methods in analyzing image,
audio and text data, significant efforts are recently being devoted to the
design of deep nets for video analytics. Among the many practical needs,
classifying videos (or video clips) based on their major semantic categories
(e.g., "skiing") is useful in many applications. In this paper, we conduct an
in-depth study to investigate important implementation options that may affect
the performance of deep nets on video classification. Our evaluations are
conducted on top of a recent two-stream convolutional neural network (CNN)
pipeline, which uses both static frames and motion optical flows, and has
demonstrated competitive performance against the state-of-the-art methods. In
order to gain insights and to arrive at a practical guideline, many important
options are studied, including network architectures, model fusion, learning
parameters and the final prediction methods. Based on the evaluations, very
competitive results are attained on two popular video classification
benchmarks. We hope that the discussions and conclusions from this work can
help researchers in related fields to quickly set up a good basis for further
investigations along this very promising direction.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 11:29:21 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Ye",
"Hao",
""
],
[
"Wu",
"Zuxuan",
""
],
[
"Zhao",
"Rui-Wei",
""
],
[
"Wang",
"Xi",
""
],
[
"Jiang",
"Yu-Gang",
""
],
[
"Xue",
"Xiangyang",
""
]
] | TITLE: Evaluating Two-Stream CNN for Video Classification
ABSTRACT: Videos contain very rich semantic information. Traditional hand-crafted
features are known to be inadequate in analyzing complex video semantics.
Inspired by the huge success of the deep learning methods in analyzing image,
audio and text data, significant efforts are recently being devoted to the
design of deep nets for video analytics. Among the many practical needs,
classifying videos (or video clips) based on their major semantic categories
(e.g., "skiing") is useful in many applications. In this paper, we conduct an
in-depth study to investigate important implementation options that may affect
the performance of deep nets on video classification. Our evaluations are
conducted on top of a recent two-stream convolutional neural network (CNN)
pipeline, which uses both static frames and motion optical flows, and has
demonstrated competitive performance against the state-of-the-art methods. In
order to gain insights and to arrive at a practical guideline, many important
options are studied, including network architectures, model fusion, learning
parameters and the final prediction methods. Based on the evaluations, very
competitive results are attained on two popular video classification
benchmarks. We hope that the discussions and conclusions from this work can
help researchers in related fields to quickly set up a good basis for further
investigations along this very promising direction.
| no_new_dataset | 0.70878 |
1504.01942 | Laura Leal Taix\'e | Laura Leal-Taix\'e and Anton Milan and Ian Reid and Stefan Roth and
Konrad Schindler | MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the recent past, the computer vision community has developed centralized
benchmarks for the performance evaluation of a variety of tasks, including
generic object and pedestrian detection, 3D reconstruction, optical flow,
single-object short-term tracking, and stereo estimation. Despite potential
pitfalls of such benchmarks, they have proved to be extremely helpful to
advance the state of the art in the respective area. Interestingly, there has
been rather limited work on the standardization of quantitative benchmarks for
multiple target tracking. One of the few exceptions is the well-known PETS
dataset, targeted primarily at surveillance applications. Despite being widely
used, it is often applied inconsistently, for example involving using different
subsets of the available data, different ways of training the models, or
differing evaluation scripts. This paper describes our work toward a novel
multiple object tracking benchmark aimed to address such issues. We discuss the
challenges of creating such a framework, collecting existing and new data,
gathering state-of-the-art methods to be tested on the datasets, and finally
creating a unified evaluation system. With MOTChallenge we aim to pave the way
toward a unified evaluation framework for a more meaningful quantification of
multi-target tracking.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 12:56:38 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Leal-Taixé",
"Laura",
""
],
[
"Milan",
"Anton",
""
],
[
"Reid",
"Ian",
""
],
[
"Roth",
"Stefan",
""
],
[
"Schindler",
"Konrad",
""
]
] | TITLE: MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking
ABSTRACT: In the recent past, the computer vision community has developed centralized
benchmarks for the performance evaluation of a variety of tasks, including
generic object and pedestrian detection, 3D reconstruction, optical flow,
single-object short-term tracking, and stereo estimation. Despite potential
pitfalls of such benchmarks, they have proved to be extremely helpful to
advance the state of the art in the respective area. Interestingly, there has
been rather limited work on the standardization of quantitative benchmarks for
multiple target tracking. One of the few exceptions is the well-known PETS
dataset, targeted primarily at surveillance applications. Despite being widely
used, it is often applied inconsistently, for example involving using different
subsets of the available data, different ways of training the models, or
differing evaluation scripts. This paper describes our work toward a novel
multiple object tracking benchmark aimed to address such issues. We discuss the
challenges of creating such a framework, collecting existing and new data,
gathering state-of-the-art methods to be tested on the datasets, and finally
creating a unified evaluation system. With MOTChallenge we aim to pave the way
toward a unified evaluation framework for a more meaningful quantification of
multi-target tracking.
| no_new_dataset | 0.682349 |
1504.01957 | Tony Tsang | Tony Tsang | Video Contents Prior Storing Server for Optical Access Network | 10 pages. in March 2015, Volume 7. Number 1 International Journal of
Computer Networks & Communications (IJCNC) March 2015, Volume 7 | null | null | null | cs.NI cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most important multimedia applications is Internet protocol TV
(IPTV) for next-generation networks. IPTV provides triple-play services that
require high-speed access networks with the functions of multicasting and
quality of service (QoS) guarantees. Among optical access networks, Ethernet
passive optical networks (EPONs) are regarded as among the best solutions to
meet higher bandwidth demands. In this paper, we propose a new architecture for
multicasting live IPTV traffic in optical access network. The proposed
mechanism involves assigning a unique logical link identifier to each IPTV
channel. To manage multicasting, a prior storing server in the optical line
terminal (OLT) and in each optical network unit (ONU) is constructed. In this
work, we propose a partial prior storing strategy that considers the changes in
the popularity of the video content segments over time and the access patterns
of the users to compute the utility of the objects in the prior storage. We
also propose to partition the prior storage to avoid the eviction of the
popular objects (those not accessed frequently) by the unpopular ones which are
accessed with higher frequency. The popularity distribution and ageing of
popularity are measured from two online datasets and use the parameters in
simulations. Simulation results show that our proposed architecture can improve
the system performance and QoS parameters in terms of packet delay, jitter and
packet loss.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2015 13:29:12 GMT"
}
] | 2015-04-09T00:00:00 | [
[
"Tsang",
"Tony",
""
]
] | TITLE: Video Contents Prior Storing Server for Optical Access Network
ABSTRACT: One of the most important multimedia applications is Internet protocol TV
(IPTV) for next-generation networks. IPTV provides triple-play services that
require high-speed access networks with the functions of multicasting and
quality of service (QoS) guarantees. Among optical access networks, Ethernet
passive optical networks (EPONs) are regarded as among the best solutions to
meet higher bandwidth demands. In this paper, we propose a new architecture for
multicasting live IPTV traffic in optical access network. The proposed
mechanism involves assigning a unique logical link identifier to each IPTV
channel. To manage multicasting, a prior storing server in the optical line
terminal (OLT) and in each optical network unit (ONU) is constructed. In this
work, we propose a partial prior storing strategy that considers the changes in
the popularity of the video content segments over time and the access patterns
of the users to compute the utility of the objects in the prior storage. We
also propose to partition the prior storage to avoid the eviction of the
popular objects (those not accessed frequently) by the unpopular ones which are
accessed with higher frequency. The popularity distribution and ageing of
popularity are measured from two online datasets and use the parameters in
simulations. Simulation results show that our proposed architecture can improve
the system performance and QoS parameters in terms of packet delay, jitter and
packet loss.
| no_new_dataset | 0.712401 |
1411.3715 | Daniele Barchiesi | Daniele Barchiesi, Dimitrios Giannoulis, Dan Stowell, Mark D. Plumbley | Acoustic Scene Classification | null | IEEE Signal Processing Magazine 32(3) (May 2015) 16-34 | 10.1109/MSP.2014.2326181 | null | cs.SD cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we present an account of the state-of-the-art in acoustic
scene classification (ASC), the task of classifying environments from the
sounds they produce. Starting from a historical review of previous research in
this area, we define a general framework for ASC and present different imple-
mentations of its components. We then describe a range of different algorithms
submitted for a data challenge that was held to provide a general and fair
benchmark for ASC techniques. The dataset recorded for this purpose is
presented, along with the performance metrics that are used to evaluate the
algorithms and statistical significance tests to compare the submitted methods.
We use a baseline method that employs MFCCS, GMMS and a maximum likelihood
criterion as a benchmark, and only find sufficient evidence to conclude that
three algorithms significantly outperform it. We also evaluate the human
classification accuracy in performing a similar classification task. The best
performing algorithm achieves a mean accuracy that matches the median accuracy
obtained by humans, and common pairs of classes are misclassified by both
computers and humans. However, all acoustic scenes are correctly classified by
at least some individuals, while there are scenes that are misclassified by all
algorithms.
| [
{
"version": "v1",
"created": "Thu, 13 Nov 2014 16:03:09 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Barchiesi",
"Daniele",
""
],
[
"Giannoulis",
"Dimitrios",
""
],
[
"Stowell",
"Dan",
""
],
[
"Plumbley",
"Mark D.",
""
]
] | TITLE: Acoustic Scene Classification
ABSTRACT: In this article we present an account of the state-of-the-art in acoustic
scene classification (ASC), the task of classifying environments from the
sounds they produce. Starting from a historical review of previous research in
this area, we define a general framework for ASC and present different imple-
mentations of its components. We then describe a range of different algorithms
submitted for a data challenge that was held to provide a general and fair
benchmark for ASC techniques. The dataset recorded for this purpose is
presented, along with the performance metrics that are used to evaluate the
algorithms and statistical significance tests to compare the submitted methods.
We use a baseline method that employs MFCCS, GMMS and a maximum likelihood
criterion as a benchmark, and only find sufficient evidence to conclude that
three algorithms significantly outperform it. We also evaluate the human
classification accuracy in performing a similar classification task. The best
performing algorithm achieves a mean accuracy that matches the median accuracy
obtained by humans, and common pairs of classes are misclassified by both
computers and humans. However, all acoustic scenes are correctly classified by
at least some individuals, while there are scenes that are misclassified by all
algorithms.
| new_dataset | 0.720353 |
1412.6615 | Levent Sagun | Levent Sagun, V. Ugur Guney, Gerard Ben Arous, Yann LeCun | Explorations on high dimensional landscapes | 11 pages, 8 figures, workshop contribution at ICLR 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding minima of a real valued non-convex function over a high dimensional
space is a major challenge in science. We provide evidence that some such
functions that are defined on high dimensional domains have a narrow band of
values whose pre-image contains the bulk of its critical points. This is in
contrast with the low dimensional picture in which this band is wide. Our
simulations agree with the previous theoretical work on spin glasses that
proves the existence of such a band when the dimension of the domain tends to
infinity. Furthermore our experiments on teacher-student networks with the
MNIST dataset establish a similar phenomenon in deep networks. We finally
observe that both the gradient descent and the stochastic gradient descent
methods can reach this level within the same number of steps.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 06:57:12 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Dec 2014 01:29:56 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Mar 2015 10:08:16 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Apr 2015 21:47:50 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Sagun",
"Levent",
""
],
[
"Guney",
"V. Ugur",
""
],
[
"Arous",
"Gerard Ben",
""
],
[
"LeCun",
"Yann",
""
]
] | TITLE: Explorations on high dimensional landscapes
ABSTRACT: Finding minima of a real valued non-convex function over a high dimensional
space is a major challenge in science. We provide evidence that some such
functions that are defined on high dimensional domains have a narrow band of
values whose pre-image contains the bulk of its critical points. This is in
contrast with the low dimensional picture in which this band is wide. Our
simulations agree with the previous theoretical work on spin glasses that
proves the existence of such a band when the dimension of the domain tends to
infinity. Furthermore our experiments on teacher-student networks with the
MNIST dataset establish a similar phenomenon in deep networks. We finally
observe that both the gradient descent and the stochastic gradient descent
methods can reach this level within the same number of steps.
| no_new_dataset | 0.711481 |
1504.01383 | Cristian Danescu-Niculescu-Mizil | Vlad Niculae, Caroline Suen, Justine Zhang, Cristian
Danescu-Niculescu-Mizil, Jure Leskovec | QUOTUS: The Structure of Political Media Coverage as Revealed by Quoting
Patterns | To appear in the Proceedings of WWW 2015. 11pp, 10 fig. Interactive
visualization, data, and other info available at
http://snap.stanford.edu/quotus/ | null | null | null | cs.CL cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given the extremely large pool of events and stories available, media outlets
need to focus on a subset of issues and aspects to convey to their audience.
Outlets are often accused of exhibiting a systematic bias in this selection
process, with different outlets portraying different versions of reality.
However, in the absence of objective measures and empirical evidence, the
direction and extent of systematicity remains widely disputed.
In this paper we propose a framework based on quoting patterns for
quantifying and characterizing the degree to which media outlets exhibit
systematic bias. We apply this framework to a massive dataset of news articles
spanning the six years of Obama's presidency and all of his speeches, and
reveal that a systematic pattern does indeed emerge from the outlet's quoting
behavior. Moreover, we show that this pattern can be successfully exploited in
an unsupervised prediction setting, to determine which new quotes an outlet
will select to broadcast. By encoding bias patterns in a low-rank space we
provide an analysis of the structure of political media coverage. This reveals
a latent media bias space that aligns surprisingly well with political ideology
and outlet type. A linguistic analysis exposes striking differences across
these latent dimensions, showing how the different types of media outlets
portray different realities even when reporting on the same events. For
example, outlets mapped to the mainstream conservative side of the latent space
focus on quotes that portray a presidential persona disproportionately
characterized by negativity.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2015 20:00:28 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Niculae",
"Vlad",
""
],
[
"Suen",
"Caroline",
""
],
[
"Zhang",
"Justine",
""
],
[
"Danescu-Niculescu-Mizil",
"Cristian",
""
],
[
"Leskovec",
"Jure",
""
]
] | TITLE: QUOTUS: The Structure of Political Media Coverage as Revealed by Quoting
Patterns
ABSTRACT: Given the extremely large pool of events and stories available, media outlets
need to focus on a subset of issues and aspects to convey to their audience.
Outlets are often accused of exhibiting a systematic bias in this selection
process, with different outlets portraying different versions of reality.
However, in the absence of objective measures and empirical evidence, the
direction and extent of systematicity remains widely disputed.
In this paper we propose a framework based on quoting patterns for
quantifying and characterizing the degree to which media outlets exhibit
systematic bias. We apply this framework to a massive dataset of news articles
spanning the six years of Obama's presidency and all of his speeches, and
reveal that a systematic pattern does indeed emerge from the outlet's quoting
behavior. Moreover, we show that this pattern can be successfully exploited in
an unsupervised prediction setting, to determine which new quotes an outlet
will select to broadcast. By encoding bias patterns in a low-rank space we
provide an analysis of the structure of political media coverage. This reveals
a latent media bias space that aligns surprisingly well with political ideology
and outlet type. A linguistic analysis exposes striking differences across
these latent dimensions, showing how the different types of media outlets
portray different realities even when reporting on the same events. For
example, outlets mapped to the mainstream conservative side of the latent space
focus on quotes that portray a presidential persona disproportionately
characterized by negativity.
| no_new_dataset | 0.709069 |
1504.01561 | Zuxuan Wu | Zuxuan Wu, Xi Wang, Yu-Gang Jiang, Hao Ye, Xiangyang Xue | Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for
Video Classification | null | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classifying videos according to content semantics is an important problem
with a wide range of applications. In this paper, we propose a hybrid deep
learning framework for video classification, which is able to model static
spatial information, short-term motion, as well as long-term temporal clues in
the videos. Specifically, the spatial and the short-term motion features are
extracted separately by two Convolutional Neural Networks (CNN). These two
types of CNN-based features are then combined in a regularized feature fusion
network for classification, which is able to learn and utilize feature
relationships for improved performance. In addition, Long Short Term Memory
(LSTM) networks are applied on top of the two features to further model
longer-term temporal clues. The main contribution of this work is the hybrid
learning framework that can model several important aspects of the video data.
We also show that (1) combining the spatial and the short-term motion features
in the regularized fusion network is better than direct classification and
fusion using the CNN with a softmax layer, and (2) the sequence-based LSTM is
highly complementary to the traditional classification strategy without
considering the temporal frame orders. Extensive experiments are conducted on
two popular and challenging benchmarks, the UCF-101 Human Actions and the
Columbia Consumer Videos (CCV). On both benchmarks, our framework achieves
to-date the best reported performance: $91.3\%$ on the UCF-101 and $83.5\%$ on
the CCV.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 11:53:46 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Wu",
"Zuxuan",
""
],
[
"Wang",
"Xi",
""
],
[
"Jiang",
"Yu-Gang",
""
],
[
"Ye",
"Hao",
""
],
[
"Xue",
"Xiangyang",
""
]
] | TITLE: Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for
Video Classification
ABSTRACT: Classifying videos according to content semantics is an important problem
with a wide range of applications. In this paper, we propose a hybrid deep
learning framework for video classification, which is able to model static
spatial information, short-term motion, as well as long-term temporal clues in
the videos. Specifically, the spatial and the short-term motion features are
extracted separately by two Convolutional Neural Networks (CNN). These two
types of CNN-based features are then combined in a regularized feature fusion
network for classification, which is able to learn and utilize feature
relationships for improved performance. In addition, Long Short Term Memory
(LSTM) networks are applied on top of the two features to further model
longer-term temporal clues. The main contribution of this work is the hybrid
learning framework that can model several important aspects of the video data.
We also show that (1) combining the spatial and the short-term motion features
in the regularized fusion network is better than direct classification and
fusion using the CNN with a softmax layer, and (2) the sequence-based LSTM is
highly complementary to the traditional classification strategy without
considering the temporal frame orders. Extensive experiments are conducted on
two popular and challenging benchmarks, the UCF-101 Human Actions and the
Columbia Consumer Videos (CCV). On both benchmarks, our framework achieves
to-date the best reported performance: $91.3\%$ on the UCF-101 and $83.5\%$ on
the CCV.
| no_new_dataset | 0.711049 |
1504.01650 | Adam Strzelecki | Piotr Bialas and Adam Strzelecki | Benchmarking the cost of thread divergence in CUDA | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | All modern processors include a set of vector instructions. While this gives
a tremendous boost to the performance, it requires a vectorized code that can
take advantage of such instructions. As an ideal vectorization is hard to
achieve in practice, one has to decide when different instructions may be
applied to different elements of the vector operand. This is especially
important in implicit vectorization as in NVIDIA CUDA Single Instruction
Multiple Threads (SIMT) model, where the vectorization details are hidden from
the programmer. In order to assess the costs incurred by incompletely
vectorized code, we have developed a micro-benchmark that measures the
characteristics of the CUDA thread divergence model on different architectures
focusing on the loops performance.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 15:53:48 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Bialas",
"Piotr",
""
],
[
"Strzelecki",
"Adam",
""
]
] | TITLE: Benchmarking the cost of thread divergence in CUDA
ABSTRACT: All modern processors include a set of vector instructions. While this gives
a tremendous boost to the performance, it requires a vectorized code that can
take advantage of such instructions. As an ideal vectorization is hard to
achieve in practice, one has to decide when different instructions may be
applied to different elements of the vector operand. This is especially
important in implicit vectorization as in NVIDIA CUDA Single Instruction
Multiple Threads (SIMT) model, where the vectorization details are hidden from
the programmer. In order to assess the costs incurred by incompletely
vectorized code, we have developed a micro-benchmark that measures the
characteristics of the CUDA thread divergence model on different architectures
focusing on the loops performance.
| no_new_dataset | 0.679205 |
1504.01684 | Miao Fan | Miao Fan, Qiang Zhou, Thomas Fang Zheng and Ralph Grishman | Large Margin Nearest Neighbor Embedding for Knowledge Representation | arXiv admin note: text overlap with arXiv:1503.08155 | null | null | null | cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional way of storing facts in triplets ({\it head\_entity, relation,
tail\_entity}), abbreviated as ({\it h, r, t}), makes the knowledge intuitively
displayed and easily acquired by mankind, but hardly computed or even reasoned
by AI machines. Inspired by the success in applying {\it Distributed
Representations} to AI-related fields, recent studies expect to represent each
entity and relation with a unique low-dimensional embedding, which is different
from the symbolic and atomic framework of displaying knowledge in triplets. In
this way, the knowledge computing and reasoning can be essentially facilitated
by means of a simple {\it vector calculation}, i.e. ${\bf h} + {\bf r} \approx
{\bf t}$. We thus contribute an effective model to learn better embeddings
satisfying the formula by pulling the positive tail entities ${\bf t^{+}}$ to
get together and close to {\bf h} + {\bf r} ({\it Nearest Neighbor}), and
simultaneously pushing the negatives ${\bf t^{-}}$ away from the positives
${\bf t^{+}}$ via keeping a {\it Large Margin}. We also design a corresponding
learning algorithm to efficiently find the optimal solution based on {\it
Stochastic Gradient Descent} in iterative fashion. Quantitative experiments
illustrate that our approach can achieve the state-of-the-art performance,
compared with several latest methods on some benchmark datasets for two
classical applications, i.e. {\it Link prediction} and {\it Triplet
classification}. Moreover, we analyze the parameter complexities among all the
evaluated models, and analytical results indicate that our model needs fewer
computational resources on outperforming the other methods.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 17:50:31 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Fan",
"Miao",
""
],
[
"Zhou",
"Qiang",
""
],
[
"Zheng",
"Thomas Fang",
""
],
[
"Grishman",
"Ralph",
""
]
] | TITLE: Large Margin Nearest Neighbor Embedding for Knowledge Representation
ABSTRACT: Traditional way of storing facts in triplets ({\it head\_entity, relation,
tail\_entity}), abbreviated as ({\it h, r, t}), makes the knowledge intuitively
displayed and easily acquired by mankind, but hardly computed or even reasoned
by AI machines. Inspired by the success in applying {\it Distributed
Representations} to AI-related fields, recent studies expect to represent each
entity and relation with a unique low-dimensional embedding, which is different
from the symbolic and atomic framework of displaying knowledge in triplets. In
this way, the knowledge computing and reasoning can be essentially facilitated
by means of a simple {\it vector calculation}, i.e. ${\bf h} + {\bf r} \approx
{\bf t}$. We thus contribute an effective model to learn better embeddings
satisfying the formula by pulling the positive tail entities ${\bf t^{+}}$ to
get together and close to {\bf h} + {\bf r} ({\it Nearest Neighbor}), and
simultaneously pushing the negatives ${\bf t^{-}}$ away from the positives
${\bf t^{+}}$ via keeping a {\it Large Margin}. We also design a corresponding
learning algorithm to efficiently find the optimal solution based on {\it
Stochastic Gradient Descent} in iterative fashion. Quantitative experiments
illustrate that our approach can achieve the state-of-the-art performance,
compared with several latest methods on some benchmark datasets for two
classical applications, i.e. {\it Link prediction} and {\it Triplet
classification}. Moreover, we analyze the parameter complexities among all the
evaluated models, and analytical results indicate that our model needs fewer
computational resources on outperforming the other methods.
| no_new_dataset | 0.71081 |
1504.01697 | Alex Gittens | Jiyan Yang and Alex Gittens | Tensor machines for learning target-specific polynomial features | 19 pages, 4 color figures, 2 tables. Submitted to ECML 2015 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have demonstrated that using random feature maps can
significantly decrease the training and testing times of kernel-based
algorithms without significantly lowering their accuracy. Regrettably, because
random features are target-agnostic, typically thousands of such features are
necessary to achieve acceptable accuracies. In this work, we consider the
problem of learning a small number of explicit polynomial features. Our
approach, named Tensor Machines, finds a parsimonious set of features by
optimizing over the hypothesis class introduced by Kar and Karnick for random
feature maps in a target-specific manner. Exploiting a natural connection
between polynomials and tensors, we provide bounds on the generalization error
of Tensor Machines. Empirically, Tensor Machines behave favorably on several
real-world datasets compared to other state-of-the-art techniques for learning
polynomial features, and deliver significantly more parsimonious models.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2015 18:21:37 GMT"
}
] | 2015-04-08T00:00:00 | [
[
"Yang",
"Jiyan",
""
],
[
"Gittens",
"Alex",
""
]
] | TITLE: Tensor machines for learning target-specific polynomial features
ABSTRACT: Recent years have demonstrated that using random feature maps can
significantly decrease the training and testing times of kernel-based
algorithms without significantly lowering their accuracy. Regrettably, because
random features are target-agnostic, typically thousands of such features are
necessary to achieve acceptable accuracies. In this work, we consider the
problem of learning a small number of explicit polynomial features. Our
approach, named Tensor Machines, finds a parsimonious set of features by
optimizing over the hypothesis class introduced by Kar and Karnick for random
feature maps in a target-specific manner. Exploiting a natural connection
between polynomials and tensors, we provide bounds on the generalization error
of Tensor Machines. Empirically, Tensor Machines behave favorably on several
real-world datasets compared to other state-of-the-art techniques for learning
polynomial features, and deliver significantly more parsimonious models.
| no_new_dataset | 0.709849 |
1411.1455 | Saravanan Thirumuruganathan | Md Farhadur Rahman, Weimo Liu, Saravanan Thirumuruganathan, Nan Zhang,
Gautam Das | Rank-Based Inference over Web Databases | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, there has been much research in Ranked Retrieval model in
structured databases, especially those in web databases. With this model, a
search query returns top-k tuples according to not just exact matches of
selection conditions, but a suitable ranking function. This paper studies a
novel problem on the privacy implications of database ranking. The motivation
is a novel yet serious privacy leakage we found on real-world web databases
which is caused by the ranking function design. Many such databases feature
private attributes - e.g., a social network allows users to specify certain
attributes as only visible to him/herself, but not to others. While these
websites generally respect the privacy settings by not directly displaying
private attribute values in search query answers, many of them nevertheless
take into account such private attributes in the ranking function design. The
conventional belief might be that tuple ranks alone are not enough to reveal
the private attribute values. Our investigation, however, shows that this is
not the case in reality.
To address the problem, we introduce a taxonomy of the problem space with two
dimensions, (1) the type of query interface and (2) the capability of
adversaries. For each subspace, we develop a novel technique which either
guarantees the successful inference of private attributes, or does so for a
significant portion of real-world tuples. We demonstrate the effectiveness and
efficiency of our techniques through theoretical analysis, extensive
experiments over real-world datasets, as well as successful online attacks over
websites with tens to hundreds of millions of users - e.g., Amazon Goodreads
and Renren.com.
| [
{
"version": "v1",
"created": "Thu, 6 Nov 2014 00:06:44 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2014 00:36:10 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Feb 2015 07:37:56 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Apr 2015 02:03:27 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Rahman",
"Md Farhadur",
""
],
[
"Liu",
"Weimo",
""
],
[
"Thirumuruganathan",
"Saravanan",
""
],
[
"Zhang",
"Nan",
""
],
[
"Das",
"Gautam",
""
]
] | TITLE: Rank-Based Inference over Web Databases
ABSTRACT: In recent years, there has been much research in Ranked Retrieval model in
structured databases, especially those in web databases. With this model, a
search query returns top-k tuples according to not just exact matches of
selection conditions, but a suitable ranking function. This paper studies a
novel problem on the privacy implications of database ranking. The motivation
is a novel yet serious privacy leakage we found on real-world web databases
which is caused by the ranking function design. Many such databases feature
private attributes - e.g., a social network allows users to specify certain
attributes as only visible to him/herself, but not to others. While these
websites generally respect the privacy settings by not directly displaying
private attribute values in search query answers, many of them nevertheless
take into account such private attributes in the ranking function design. The
conventional belief might be that tuple ranks alone are not enough to reveal
the private attribute values. Our investigation, however, shows that this is
not the case in reality.
To address the problem, we introduce a taxonomy of the problem space with two
dimensions, (1) the type of query interface and (2) the capability of
adversaries. For each subspace, we develop a novel technique which either
guarantees the successful inference of private attributes, or does so for a
significant portion of real-world tuples. We demonstrate the effectiveness and
efficiency of our techniques through theoretical analysis, extensive
experiments over real-world datasets, as well as successful online attacks over
websites with tens to hundreds of millions of users - e.g., Amazon Goodreads
and Renren.com.
| no_new_dataset | 0.709384 |
1504.00325 | C. Lawrence Zitnick | Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh
Gupta, Piotr Dollar, C. Lawrence Zitnick | Microsoft COCO Captions: Data Collection and Evaluation Server | arXiv admin note: text overlap with arXiv:1411.4952 | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe the Microsoft COCO Caption dataset and evaluation
server. When completed, the dataset will contain over one and a half million
captions describing over 330,000 images. For the training and validation
images, five independent human generated captions will be provided. To ensure
consistency in evaluation of automatic caption generation algorithms, an
evaluation server is used. The evaluation server receives candidate captions
and scores them using several popular metrics, including BLEU, METEOR, ROUGE
and CIDEr. Instructions for using the evaluation server are provided.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 18:13:43 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2015 20:21:16 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Chen",
"Xinlei",
""
],
[
"Fang",
"Hao",
""
],
[
"Lin",
"Tsung-Yi",
""
],
[
"Vedantam",
"Ramakrishna",
""
],
[
"Gupta",
"Saurabh",
""
],
[
"Dollar",
"Piotr",
""
],
[
"Zitnick",
"C. Lawrence",
""
]
] | TITLE: Microsoft COCO Captions: Data Collection and Evaluation Server
ABSTRACT: In this paper we describe the Microsoft COCO Caption dataset and evaluation
server. When completed, the dataset will contain over one and a half million
captions describing over 330,000 images. For the training and validation
images, five independent human generated captions will be provided. To ensure
consistency in evaluation of automatic caption generation algorithms, an
evaluation server is used. The evaluation server receives candidate captions
and scores them using several popular metrics, including BLEU, METEOR, ROUGE
and CIDEr. Instructions for using the evaluation server are provided.
| no_new_dataset | 0.706621 |
1504.01020 | Arupratan Ray | Arupratan Ray (1), Debmalya Mandal (2), Y. Narahari (1) ((1)
Department of Computer Science and Automation, Indian Institute of Science,
Bangalore, India, (2) Harvard School of Engineering and Applied Sciences,
Cambridge, MA) | Profit Maximizing Prior-free Multi-unit Procurement Auctions with
Capacitated Sellers | 16 pages, short version of the paper to be published in the
Proceedings of International Conference on Autonomous Agents and Multiagent
Systems 2015 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we derive bounds for profit maximizing prior-free procurement
auctions where a buyer wishes to procure multiple units of a homogeneous item
from n sellers who are strategic about their per unit valuation. The buyer
earns the profit by reselling these units in an external consumer market. The
paper looks at three scenarios of increasing complexity. First, we look at unit
capacity sellers where per unit valuation is private information of each seller
and the revenue curve is concave. For this setting, we define two benchmarks.
We show that no randomized prior free auction can be constant competitive
against any of these two benchmarks. However, for a lightly constrained
benchmark we design a prior-free auction PEPA (Profit Extracting Procurement
Auction) which is 4-competitive and we show this bound is tight. Second, we
study a setting where the sellers have non-unit capacities that are common
knowledge and derive similar results. In particular, we propose a prior free
auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is
truthful for any concave revenue curve. Third, we obtain results in the
inherently harder bi-dimensional case where per unit valuation as well as
capacities are private information of the sellers. We show that PEPAC is
truthful and constant competitive for the specific case of linear revenue
curves. We believe that this paper represents the first set of results on
single dimensional and bi-dimensional profit maximizing prior-free multi-unit
procurement auctions.
| [
{
"version": "v1",
"created": "Sat, 4 Apr 2015 16:48:13 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Ray",
"Arupratan",
""
],
[
"Mandal",
"Debmalya",
""
],
[
"Narahari",
"Y.",
""
]
] | TITLE: Profit Maximizing Prior-free Multi-unit Procurement Auctions with
Capacitated Sellers
ABSTRACT: In this paper, we derive bounds for profit maximizing prior-free procurement
auctions where a buyer wishes to procure multiple units of a homogeneous item
from n sellers who are strategic about their per unit valuation. The buyer
earns the profit by reselling these units in an external consumer market. The
paper looks at three scenarios of increasing complexity. First, we look at unit
capacity sellers where per unit valuation is private information of each seller
and the revenue curve is concave. For this setting, we define two benchmarks.
We show that no randomized prior free auction can be constant competitive
against any of these two benchmarks. However, for a lightly constrained
benchmark we design a prior-free auction PEPA (Profit Extracting Procurement
Auction) which is 4-competitive and we show this bound is tight. Second, we
study a setting where the sellers have non-unit capacities that are common
knowledge and derive similar results. In particular, we propose a prior free
auction PEPAC (Profit Extracting Procurement Auction with Capacity) which is
truthful for any concave revenue curve. Third, we obtain results in the
inherently harder bi-dimensional case where per unit valuation as well as
capacities are private information of the sellers. We show that PEPAC is
truthful and constant competitive for the specific case of linear revenue
curves. We believe that this paper represents the first set of results on
single dimensional and bi-dimensional profit maximizing prior-free multi-unit
procurement auctions.
| no_new_dataset | 0.707613 |
1504.01142 | Nam-phuong Nguyen | Nam-phuong Nguyen, Siavash Mirarab, Keerthana Kumar, Tandy Warnow | Ultra-large alignments using Phylogeny-aware Profiles | Online supplemental materials and data are available at
http://www.cs.utexas.edu/users/phylo/software/upp/ | null | null | null | q-bio.GN cs.CE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many biological questions, including the estimation of deep evolutionary
histories and the detection of remote homology between protein sequences, rely
upon multiple sequence alignments (MSAs) and phylogenetic trees of large
datasets. However, accurate large-scale multiple sequence alignment is very
difficult, especially when the dataset contains fragmentary sequences. We
present UPP, an MSA method that uses a new machine learning technique - the
Ensemble of Hidden Markov Models - that we propose here. UPP produces highly
accurate alignments for both nucleotide and amino acid sequences, even on
ultra-large datasets or datasets containing fragmentary sequences. UPP is
available at https://github.com/smirarab/sepp.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2015 17:15:38 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Nguyen",
"Nam-phuong",
""
],
[
"Mirarab",
"Siavash",
""
],
[
"Kumar",
"Keerthana",
""
],
[
"Warnow",
"Tandy",
""
]
] | TITLE: Ultra-large alignments using Phylogeny-aware Profiles
ABSTRACT: Many biological questions, including the estimation of deep evolutionary
histories and the detection of remote homology between protein sequences, rely
upon multiple sequence alignments (MSAs) and phylogenetic trees of large
datasets. However, accurate large-scale multiple sequence alignment is very
difficult, especially when the dataset contains fragmentary sequences. We
present UPP, an MSA method that uses a new machine learning technique - the
Ensemble of Hidden Markov Models - that we propose here. UPP produces highly
accurate alignments for both nucleotide and amino acid sequences, even on
ultra-large datasets or datasets containing fragmentary sequences. UPP is
available at https://github.com/smirarab/sepp.
| no_new_dataset | 0.7118 |
1504.01220 | Xiaodan Liang | Si Liu and Xiaodan Liang and Luoqi Liu and Xiaohui Shen and Jianchao
Yang and Changsheng Xu and Liang Lin and Xiaochun Cao and Shuicheng Yan | Matching-CNN Meets KNN: Quasi-Parametric Human Parsing | This manuscript is the accepted version for CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Both parametric and non-parametric approaches have demonstrated encouraging
performances in the human parsing task, namely segmenting a human image into
several semantic regions (e.g., hat, bag, left arm, face). In this work, we aim
to develop a new solution with the advantages of both methodologies, namely
supervision from annotated data and the flexibility to use newly annotated
(possibly uncommon) images, and present a quasi-parametric human parsing model.
Under the classic K Nearest Neighbor (KNN)-based nonparametric framework, the
parametric Matching Convolutional Neural Network (M-CNN) is proposed to predict
the matching confidence and displacements of the best matched region in the
testing image for a particular semantic region in one KNN image. Given a
testing image, we first retrieve its KNN images from the
annotated/manually-parsed human image corpus. Then each semantic region in each
KNN image is matched with confidence to the testing image using M-CNN, and the
matched regions from all KNN images are further fused, followed by a superpixel
smoothing procedure to obtain the ultimate human parsing result. The M-CNN
differs from the classic CNN in that the tailored cross image matching filters
are introduced to characterize the matching between the testing image and the
semantic region of a KNN image. The cross image matching filters are defined at
different convolutional layers, each aiming to capture a particular range of
displacements. Comprehensive evaluations over a large dataset with 7,700
annotated human images well demonstrate the significant performance gain from
the quasi-parametric model over the state-of-the-arts, for the human parsing
task.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2015 07:20:02 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Liu",
"Si",
""
],
[
"Liang",
"Xiaodan",
""
],
[
"Liu",
"Luoqi",
""
],
[
"Shen",
"Xiaohui",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Xu",
"Changsheng",
""
],
[
"Lin",
"Liang",
""
],
[
"Cao",
"Xiaochun",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Matching-CNN Meets KNN: Quasi-Parametric Human Parsing
ABSTRACT: Both parametric and non-parametric approaches have demonstrated encouraging
performances in the human parsing task, namely segmenting a human image into
several semantic regions (e.g., hat, bag, left arm, face). In this work, we aim
to develop a new solution with the advantages of both methodologies, namely
supervision from annotated data and the flexibility to use newly annotated
(possibly uncommon) images, and present a quasi-parametric human parsing model.
Under the classic K Nearest Neighbor (KNN)-based nonparametric framework, the
parametric Matching Convolutional Neural Network (M-CNN) is proposed to predict
the matching confidence and displacements of the best matched region in the
testing image for a particular semantic region in one KNN image. Given a
testing image, we first retrieve its KNN images from the
annotated/manually-parsed human image corpus. Then each semantic region in each
KNN image is matched with confidence to the testing image using M-CNN, and the
matched regions from all KNN images are further fused, followed by a superpixel
smoothing procedure to obtain the ultimate human parsing result. The M-CNN
differs from the classic CNN in that the tailored cross image matching filters
are introduced to characterize the matching between the testing image and the
semantic region of a KNN image. The cross image matching filters are defined at
different convolutional layers, each aiming to capture a particular range of
displacements. Comprehensive evaluations over a large dataset with 7,700
annotated human images well demonstrate the significant performance gain from
the quasi-parametric model over the state-of-the-arts, for the human parsing
task.
| no_new_dataset | 0.711418 |
1504.01304 | Yuzhen Ye | Yuzhen Ye and Haixu Tang | Utilizing de Bruijn graph of metagenome assembly for metatranscriptome
analysis | 8 pages, 4 figures, accepted in RECOMB-Seq 2015, under consideration
in Bioinformatics (a special issue for RECOMB-Seq/CBB) | null | null | null | q-bio.GN cs.CE cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metagenomics research has accelerated the studies of microbial organisms,
providing insights into the composition and potential functionality of various
microbial communities. Metatranscriptomics (studies of the transcripts from a
mixture of microbial species) and other meta-omics approaches hold even greater
promise for providing additional insights into functional and regulatory
characteristics of the microbial communities. Current metatranscriptomics
projects are often carried out without matched metagenomic datasets (of the
same microbial communities). For the projects that produce both
metatranscriptomic and metagenomic datasets, their analyses are often not
integrated. Metagenome assemblies are far from perfect, partially explaining
why metagenome assemblies are not used for the analysis of metatranscriptomic
datasets. Here we report a reads mapping algorithm for mapping of short reads
onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers
spanning branching structures in the de Bruijn graph) is used to facilitate
fast mapping of reads to the graph. We developed an application of this mapping
algorithm: a reference based approach to metatranscriptome assembly using
graphs of metagenome assembly as the reference. Our results show that this new
approach (called TAG) helps to assemble substantially more transcripts that
otherwise would have been missed or truncated because of the fragmented nature
of the reference metagenome. TAG was implemented in C++ and has been tested
extensively on the linux platform. It is available for download as open source
at http://omics.informatics.indiana.edu/TAG.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2015 15:17:29 GMT"
}
] | 2015-04-07T00:00:00 | [
[
"Ye",
"Yuzhen",
""
],
[
"Tang",
"Haixu",
""
]
] | TITLE: Utilizing de Bruijn graph of metagenome assembly for metatranscriptome
analysis
ABSTRACT: Metagenomics research has accelerated the studies of microbial organisms,
providing insights into the composition and potential functionality of various
microbial communities. Metatranscriptomics (studies of the transcripts from a
mixture of microbial species) and other meta-omics approaches hold even greater
promise for providing additional insights into functional and regulatory
characteristics of the microbial communities. Current metatranscriptomics
projects are often carried out without matched metagenomic datasets (of the
same microbial communities). For the projects that produce both
metatranscriptomic and metagenomic datasets, their analyses are often not
integrated. Metagenome assemblies are far from perfect, partially explaining
why metagenome assemblies are not used for the analysis of metatranscriptomic
datasets. Here we report a reads mapping algorithm for mapping of short reads
onto a de Bruijn graph of assemblies. A hash table of junction k-mers (k-mers
spanning branching structures in the de Bruijn graph) is used to facilitate
fast mapping of reads to the graph. We developed an application of this mapping
algorithm: a reference based approach to metatranscriptome assembly using
graphs of metagenome assembly as the reference. Our results show that this new
approach (called TAG) helps to assemble substantially more transcripts that
otherwise would have been missed or truncated because of the fragmented nature
of the reference metagenome. TAG was implemented in C++ and has been tested
extensively on the linux platform. It is available for download as open source
at http://omics.informatics.indiana.edu/TAG.
| no_new_dataset | 0.708629 |
1412.1897 | Anh Nguyen | Anh Nguyen, Jason Yosinski, Jeff Clune | Deep Neural Networks are Easily Fooled: High Confidence Predictions for
Unrecognizable Images | To appear at CVPR 2015 | null | null | null | cs.CV cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep neural networks (DNNs) have recently been achieving state-of-the-art
performance on a variety of pattern-recognition tasks, most notably visual
classification problems. Given that DNNs are now able to classify objects in
images with near-human-level performance, questions naturally arise as to what
differences remain between computer and human vision. A recent study revealed
that changing an image (e.g. of a lion) in a way imperceptible to humans can
cause a DNN to label the image as something else entirely (e.g. mislabeling a
lion a library). Here we show a related result: it is easy to produce images
that are completely unrecognizable to humans, but that state-of-the-art DNNs
believe to be recognizable objects with 99.99% confidence (e.g. labeling with
certainty that white noise static is a lion). Specifically, we take
convolutional neural networks trained to perform well on either the ImageNet or
MNIST datasets and then find images with evolutionary algorithms or gradient
ascent that DNNs label with high confidence as belonging to each dataset class.
It is possible to produce images totally unrecognizable to human eyes that DNNs
believe with near certainty are familiar objects, which we call "fooling
images" (more generally, fooling examples). Our results shed light on
interesting differences between human vision and current DNNs, and raise
questions about the generality of DNN computer vision.
| [
{
"version": "v1",
"created": "Fri, 5 Dec 2014 05:29:43 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 22:27:00 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Mar 2015 16:41:04 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Apr 2015 23:12:56 GMT"
}
] | 2015-04-06T00:00:00 | [
[
"Nguyen",
"Anh",
""
],
[
"Yosinski",
"Jason",
""
],
[
"Clune",
"Jeff",
""
]
] | TITLE: Deep Neural Networks are Easily Fooled: High Confidence Predictions for
Unrecognizable Images
ABSTRACT: Deep neural networks (DNNs) have recently been achieving state-of-the-art
performance on a variety of pattern-recognition tasks, most notably visual
classification problems. Given that DNNs are now able to classify objects in
images with near-human-level performance, questions naturally arise as to what
differences remain between computer and human vision. A recent study revealed
that changing an image (e.g. of a lion) in a way imperceptible to humans can
cause a DNN to label the image as something else entirely (e.g. mislabeling a
lion a library). Here we show a related result: it is easy to produce images
that are completely unrecognizable to humans, but that state-of-the-art DNNs
believe to be recognizable objects with 99.99% confidence (e.g. labeling with
certainty that white noise static is a lion). Specifically, we take
convolutional neural networks trained to perform well on either the ImageNet or
MNIST datasets and then find images with evolutionary algorithms or gradient
ascent that DNNs label with high confidence as belonging to each dataset class.
It is possible to produce images totally unrecognizable to human eyes that DNNs
believe with near certainty are familiar objects, which we call "fooling
images" (more generally, fooling examples). Our results shed light on
interesting differences between human vision and current DNNs, and raise
questions about the generality of DNN computer vision.
| no_new_dataset | 0.706646 |
1504.00736 | Liang Du | Liang Du, Yi-Dong Shen | Unsupervised Feature Selection with Adaptive Structure Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of feature selection has raised considerable interests in the
past decade. Traditional unsupervised methods select the features which can
faithfully preserve the intrinsic structures of data, where the intrinsic
structures are estimated using all the input features of data. However, the
estimated intrinsic structures are unreliable/inaccurate when the redundant and
noisy features are not removed. Therefore, we face a dilemma here: one need the
true structures of data to identify the informative features, and one need the
informative features to accurately estimate the true structures of data. To
address this, we propose a unified learning framework which performs structure
learning and feature selection simultaneously. The structures are adaptively
learned from the results of feature selection, and the informative features are
reselected to preserve the refined structures of data. By leveraging the
interactions between these two essential tasks, we are able to capture accurate
structures and select more informative features. Experimental results on many
benchmark data sets demonstrate that the proposed method outperforms many state
of the art unsupervised feature selection methods.
| [
{
"version": "v1",
"created": "Fri, 3 Apr 2015 03:21:15 GMT"
}
] | 2015-04-06T00:00:00 | [
[
"Du",
"Liang",
""
],
[
"Shen",
"Yi-Dong",
""
]
] | TITLE: Unsupervised Feature Selection with Adaptive Structure Learning
ABSTRACT: The problem of feature selection has raised considerable interests in the
past decade. Traditional unsupervised methods select the features which can
faithfully preserve the intrinsic structures of data, where the intrinsic
structures are estimated using all the input features of data. However, the
estimated intrinsic structures are unreliable/inaccurate when the redundant and
noisy features are not removed. Therefore, we face a dilemma here: one need the
true structures of data to identify the informative features, and one need the
informative features to accurately estimate the true structures of data. To
address this, we propose a unified learning framework which performs structure
learning and feature selection simultaneously. The structures are adaptively
learned from the results of feature selection, and the informative features are
reselected to preserve the refined structures of data. By leveraging the
interactions between these two essential tasks, we are able to capture accurate
structures and select more informative features. Experimental results on many
benchmark data sets demonstrate that the proposed method outperforms many state
of the art unsupervised feature selection methods.
| no_new_dataset | 0.707777 |
1412.5758 | Zhangyang Wang | Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem
Agarwala, Jonathan Brandt, Thomas S. Huang | Decomposition-Based Domain Adaptation for Real-World Font Recognition | This paper has been withdrawn by the author due to project concerns | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a domain adaption framework to address a domain mismatch between
synthetic training and real-world testing data. We demonstrate our method on a
challenging fine-grain classification problem: recognizing a font style from an
image of text. In this task, it is very easy to generate lots of rendered font
examples but very hard to obtain real-world labeled images. This
real-to-synthetic domain gap caused poor generalization to new real data in
previous font recognition methods (Chen et al. (2014)). In this paper, we
introduce a Convolutional Neural Network decomposition approach, leveraging a
large training corpus of synthetic data to obtain effective features for
classification. This is done using an adaptation technique based on a Stacked
Convolutional Auto-Encoder that exploits a large collection of unlabeled
real-world text images combined with synthetic data preprocessed in a specific
way. The proposed DeepFont method achieves an accuracy of higher than 80%
(top-5) on a new large labeled real-world dataset we collected.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 08:51:15 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 02:45:35 GMT"
},
{
"version": "v3",
"created": "Sun, 25 Jan 2015 22:41:40 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Apr 2015 22:02:59 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Wang",
"Zhangyang",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Jin",
"Hailin",
""
],
[
"Shechtman",
"Eli",
""
],
[
"Agarwala",
"Aseem",
""
],
[
"Brandt",
"Jonathan",
""
],
[
"Huang",
"Thomas S.",
""
]
] | TITLE: Decomposition-Based Domain Adaptation for Real-World Font Recognition
ABSTRACT: We present a domain adaption framework to address a domain mismatch between
synthetic training and real-world testing data. We demonstrate our method on a
challenging fine-grain classification problem: recognizing a font style from an
image of text. In this task, it is very easy to generate lots of rendered font
examples but very hard to obtain real-world labeled images. This
real-to-synthetic domain gap caused poor generalization to new real data in
previous font recognition methods (Chen et al. (2014)). In this paper, we
introduce a Convolutional Neural Network decomposition approach, leveraging a
large training corpus of synthetic data to obtain effective features for
classification. This is done using an adaptation technique based on a Stacked
Convolutional Auto-Encoder that exploits a large collection of unlabeled
real-world text images combined with synthetic data preprocessed in a specific
way. The proposed DeepFont method achieves an accuracy of higher than 80%
(top-5) on a new large labeled real-world dataset we collected.
| new_dataset | 0.71123 |
1502.06306 | Jinseok Kim | Jinseok Kim and Jana Diesner | Distortive Effects of Initial-Based Name Disambiguation on Measurements
of Large-Scale Coauthorship Networks | This is a preprint of an article accepted for publication in Journal
of the Association for Information Science and Technology | null | 10.1002/asi.23489 | null | cs.DL cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scholars have often relied on name initials to resolve name ambiguities in
large-scale coauthorship network research. This approach bears the risk of
incorrectly merging or splitting author identities. The use of initial-based
disambiguation has been justified by the assumption that such errors would not
affect research findings too much. This paper tests this assumption by
analyzing coauthorship networks from five academic fields - biology, computer
science, nanoscience, neuroscience, and physics - and an interdisciplinary
journal, PNAS. Name instances in datasets of this study were disambiguated
based on heuristics gained from previous algorithmic disambiguation solutions.
We use disambiguated data as a proxy of ground-truth to test the performance of
three types of initial-based disambiguation. Our results show that
initial-based disambiguation can misrepresent statistical properties of
coauthorship networks: it deflates the number of unique authors, number of
component, average shortest paths, clustering coefficient, and assortativity,
while it inflates average productivity, density, average coauthor number per
author, and largest component size. Also, on average, more than half of top 10
productive or collaborative authors drop off the lists. Asian names were found
to account for the majority of misidentification by initial-based
disambiguation due to their common surname and given name initials.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2015 02:56:05 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Kim",
"Jinseok",
""
],
[
"Diesner",
"Jana",
""
]
] | TITLE: Distortive Effects of Initial-Based Name Disambiguation on Measurements
of Large-Scale Coauthorship Networks
ABSTRACT: Scholars have often relied on name initials to resolve name ambiguities in
large-scale coauthorship network research. This approach bears the risk of
incorrectly merging or splitting author identities. The use of initial-based
disambiguation has been justified by the assumption that such errors would not
affect research findings too much. This paper tests this assumption by
analyzing coauthorship networks from five academic fields - biology, computer
science, nanoscience, neuroscience, and physics - and an interdisciplinary
journal, PNAS. Name instances in datasets of this study were disambiguated
based on heuristics gained from previous algorithmic disambiguation solutions.
We use disambiguated data as a proxy of ground-truth to test the performance of
three types of initial-based disambiguation. Our results show that
initial-based disambiguation can misrepresent statistical properties of
coauthorship networks: it deflates the number of unique authors, number of
component, average shortest paths, clustering coefficient, and assortativity,
while it inflates average productivity, density, average coauthor number per
author, and largest component size. Also, on average, more than half of top 10
productive or collaborative authors drop off the lists. Asian names were found
to account for the majority of misidentification by initial-based
disambiguation due to their common surname and given name initials.
| no_new_dataset | 0.711036 |
1503.09062 | Emilio Coppa | Emilio Coppa, Irene Finocchi | On data skewness, stragglers, and MapReduce progress indicators | null | null | null | null | cs.DC cs.PF cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We tackle the problem of predicting the performance of MapReduce
applications, designing accurate progress indicators that keep programmers
informed on the percentage of completed computation time during the execution
of a job. Through extensive experiments, we show that state-of-the-art progress
indicators (including the one provided by Hadoop) can be seriously harmed by
data skewness, load unbalancing, and straggling tasks. This is mainly due to
their implicit assumption that the running time depends linearly on the input
size. We thus design a novel profile-guided progress indicator, called
NearestFit, that operates without the linear hypothesis assumption and exploits
a careful combination of nearest neighbor regression and statistical curve
fitting techniques. Our theoretical progress model requires fine-grained
profile data, that can be very difficult to manage in practice. To overcome
this issue, we resort to computing accurate approximations for some of the
quantities used in our model through space- and time-efficient data streaming
algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive
empirical assessment over the Amazon EC2 platform on a variety of real-world
benchmarks shows that NearestFit is practical w.r.t. space and time overheads
and that its accuracy is generally very good, even in scenarios where
competitors incur non-negligible errors and wide prediction fluctuations.
Overall, NearestFit significantly improves the current state-of-art on progress
analysis for MapReduce.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 14:29:13 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Apr 2015 15:55:15 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Coppa",
"Emilio",
""
],
[
"Finocchi",
"Irene",
""
]
] | TITLE: On data skewness, stragglers, and MapReduce progress indicators
ABSTRACT: We tackle the problem of predicting the performance of MapReduce
applications, designing accurate progress indicators that keep programmers
informed on the percentage of completed computation time during the execution
of a job. Through extensive experiments, we show that state-of-the-art progress
indicators (including the one provided by Hadoop) can be seriously harmed by
data skewness, load unbalancing, and straggling tasks. This is mainly due to
their implicit assumption that the running time depends linearly on the input
size. We thus design a novel profile-guided progress indicator, called
NearestFit, that operates without the linear hypothesis assumption and exploits
a careful combination of nearest neighbor regression and statistical curve
fitting techniques. Our theoretical progress model requires fine-grained
profile data, that can be very difficult to manage in practice. To overcome
this issue, we resort to computing accurate approximations for some of the
quantities used in our model through space- and time-efficient data streaming
algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive
empirical assessment over the Amazon EC2 platform on a variety of real-world
benchmarks shows that NearestFit is practical w.r.t. space and time overheads
and that its accuracy is generally very good, even in scenarios where
competitors incur non-negligible errors and wide prediction fluctuations.
Overall, NearestFit significantly improves the current state-of-art on progress
analysis for MapReduce.
| no_new_dataset | 0.709416 |
1504.00430 | Hanyang Peng | Hanyang Peng, Yong Fan | Direct l_(2,p)-Norm Learning for Feature Selection | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel sparse learning based feature selection
method that directly optimizes a large margin linear classification model
sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints,
rather than using the sparsity as a regularization term. To solve the direct
sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we
provide an efficient iterative algorithm with proved convergence by converting
it to a convex and smooth optimization problem at every iteration step. The
proposed algorithm has been evaluated based on publicly available datasets, and
extensive comparison experiments have demonstrated that our algorithm could
achieve feature selection performance competitive to state-of-the-art
algorithms.
| [
{
"version": "v1",
"created": "Thu, 2 Apr 2015 02:16:39 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Peng",
"Hanyang",
""
],
[
"Fan",
"Yong",
""
]
] | TITLE: Direct l_(2,p)-Norm Learning for Feature Selection
ABSTRACT: In this paper, we propose a novel sparse learning based feature selection
method that directly optimizes a large margin linear classification model
sparsity with l_(2,p)-norm (0 < p < 1)subject to data-fitting constraints,
rather than using the sparsity as a regularization term. To solve the direct
sparsity optimization problem that is non-smooth and non-convex when 0<p<1, we
provide an efficient iterative algorithm with proved convergence by converting
it to a convex and smooth optimization problem at every iteration step. The
proposed algorithm has been evaluated based on publicly available datasets, and
extensive comparison experiments have demonstrated that our algorithm could
achieve feature selection performance competitive to state-of-the-art
algorithms.
| no_new_dataset | 0.710848 |
1504.00545 | Timo Bingmann | Timo Bingmann, Thomas Keh, Peter Sanders | A Bulk-Parallel Priority Queue in External Memory with STXXL | extended version of SEA'15 conference paper | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the design and an implementation of a bulk-parallel external
memory priority queue to take advantage of both shared-memory parallelism and
high external memory transfer speeds to parallel disks. To achieve higher
performance by decoupling item insertions and extractions, we offer two
parallelization interfaces: one using "bulk" sequences, the other by defining
"limit" items. In the design, we discuss how to parallelize insertions using
multiple heaps, and how to calculate a dynamic prediction sequence to prefetch
blocks and apply parallel multiway merge for extraction. Our experimental
results show that in the selected benchmarks the priority queue reaches 75% of
the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the
speed of sorting in external memory when bounded by computation.
| [
{
"version": "v1",
"created": "Thu, 2 Apr 2015 13:23:20 GMT"
}
] | 2015-04-03T00:00:00 | [
[
"Bingmann",
"Timo",
""
],
[
"Keh",
"Thomas",
""
],
[
"Sanders",
"Peter",
""
]
] | TITLE: A Bulk-Parallel Priority Queue in External Memory with STXXL
ABSTRACT: We propose the design and an implementation of a bulk-parallel external
memory priority queue to take advantage of both shared-memory parallelism and
high external memory transfer speeds to parallel disks. To achieve higher
performance by decoupling item insertions and extractions, we offer two
parallelization interfaces: one using "bulk" sequences, the other by defining
"limit" items. In the design, we discuss how to parallelize insertions using
multiple heaps, and how to calculate a dynamic prediction sequence to prefetch
blocks and apply parallel multiway merge for extraction. Our experimental
results show that in the selected benchmarks the priority queue reaches 75% of
the full parallel I/O bandwidth of rotational disks and and 65% of SSDs, or the
speed of sorting in external memory when bounded by computation.
| no_new_dataset | 0.709435 |
1302.5374 | Quan Yuan | Quan Yuan, Zhixin Yang | A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack
Problem | Submitted to Applied Mathematics and Computation on April 8, 2014 | null | null | null | cs.NE math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving
multidimensional knapsack problems. This RWCEA uses a new decoding method and
incorporates a heuristic method in initialization. Computational results show
that the RWCEA performs better than a weight-coded evolutionary algorithm
proposed by Raidl (1999) and to some existing benchmarks, it can yield better
results than the ones reported in the OR-library.
| [
{
"version": "v1",
"created": "Thu, 21 Feb 2013 18:57:09 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2014 00:09:36 GMT"
},
{
"version": "v3",
"created": "Sun, 28 Dec 2014 19:40:20 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Apr 2015 05:59:58 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Yuan",
"Quan",
""
],
[
"Yang",
"Zhixin",
""
]
] | TITLE: A Weight-coded Evolutionary Algorithm for the Multidimensional Knapsack
Problem
ABSTRACT: A revised weight-coded evolutionary algorithm (RWCEA) is proposed for solving
multidimensional knapsack problems. This RWCEA uses a new decoding method and
incorporates a heuristic method in initialization. Computational results show
that the RWCEA performs better than a weight-coded evolutionary algorithm
proposed by Raidl (1999) and to some existing benchmarks, it can yield better
results than the ones reported in the OR-library.
| no_new_dataset | 0.709265 |
1404.0284 | Jack Kelly | Jack Kelly and William Knottenbelt | The UK-DALE dataset, domestic appliance-level electricity demand and
whole-house demand from five UK homes | null | Scientific Data 2 (2015) Article number: 150007 (2015) | 10.1038/sdata.2015.7 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many countries are rolling out smart electricity meters. These measure a
home's total power demand. However, research into consumer behaviour suggests
that consumers are best able to improve their energy efficiency when provided
with itemised, appliance-by-appliance consumption information. Energy
disaggregation is a computational technique for estimating
appliance-by-appliance energy consumption from a whole-house meter signal.
To conduct research on disaggregation algorithms, researchers require data
describing not just the aggregate demand per building but also the `ground
truth' demand of individual appliances. In this context, we present UK-DALE: an
open-access dataset from the UK recording Domestic Appliance-Level Electricity
at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual
appliances. This is the first open access UK dataset at this temporal
resolution. We recorded from five houses, one of which was recorded for 655
days, the longest duration we are aware of for any energy dataset at this
sample rate. We also describe the low-cost, open-source, wireless system we
built for collecting our dataset.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2014 15:49:00 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2015 14:29:00 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2015 10:45:57 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Kelly",
"Jack",
""
],
[
"Knottenbelt",
"William",
""
]
] | TITLE: The UK-DALE dataset, domestic appliance-level electricity demand and
whole-house demand from five UK homes
ABSTRACT: Many countries are rolling out smart electricity meters. These measure a
home's total power demand. However, research into consumer behaviour suggests
that consumers are best able to improve their energy efficiency when provided
with itemised, appliance-by-appliance consumption information. Energy
disaggregation is a computational technique for estimating
appliance-by-appliance energy consumption from a whole-house meter signal.
To conduct research on disaggregation algorithms, researchers require data
describing not just the aggregate demand per building but also the `ground
truth' demand of individual appliances. In this context, we present UK-DALE: an
open-access dataset from the UK recording Domestic Appliance-Level Electricity
at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual
appliances. This is the first open access UK dataset at this temporal
resolution. We recorded from five houses, one of which was recorded for 655
days, the longest duration we are aware of for any energy dataset at this
sample rate. We also describe the low-cost, open-source, wireless system we
built for collecting our dataset.
| new_dataset | 0.716572 |
1503.02445 | Muhammad Uzair | Muhammad Uzair, Faisal Shafait, Bernard Ghanem, Ajmal Mian | Representation Learning with Deep Extreme Learning Machines for
Efficient Image Set Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient and accurate joint representation of a collection of images, that
belong to the same class, is a major research challenge for practical image set
classification. Existing methods either make prior assumptions about the data
structure, or perform heavy computations to learn structure from the data
itself. In this paper, we propose an efficient image set representation that
does not make any prior assumptions about the structure of the underlying data.
We learn the non-linear structure of image sets with Deep Extreme Learning
Machines (DELM) that are very efficient and generalize well even on a limited
number of training samples. Extensive experiments on a broad range of public
datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube
Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm
consistently outperforms state-of-the-art image set classification methods both
in terms of speed and accuracy.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 12:14:42 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2015 05:29:31 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Apr 2015 10:29:09 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Uzair",
"Muhammad",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Ghanem",
"Bernard",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Representation Learning with Deep Extreme Learning Machines for
Efficient Image Set Classification
ABSTRACT: Efficient and accurate joint representation of a collection of images, that
belong to the same class, is a major research challenge for practical image set
classification. Existing methods either make prior assumptions about the data
structure, or perform heavy computations to learn structure from the data
itself. In this paper, we propose an efficient image set representation that
does not make any prior assumptions about the structure of the underlying data.
We learn the non-linear structure of image sets with Deep Extreme Learning
Machines (DELM) that are very efficient and generalize well even on a limited
number of training samples. Extensive experiments on a broad range of public
datasets for image set classification (Honda/UCSD, CMU Mobo, YouTube
Celebrities, Celebrity-1000, ETH-80) show that the proposed algorithm
consistently outperforms state-of-the-art image set classification methods both
in terms of speed and accuracy.
| no_new_dataset | 0.711281 |
1504.00028 | Zhangyang Wang | Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem
Agarwala, Jonathan Brandt, Thomas S. Huang | Real-World Font Recognition Using Deep Network and Domain Adaptation | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address a challenging fine-grain classification problem: recognizing a
font style from an image of text. In this task, it is very easy to generate
lots of rendered font examples but very hard to obtain real-world labeled
images. This real-to-synthetic domain gap caused poor generalization to new
real data in previous methods (Chen et al. (2014)). In this paper, we refer to
Convolutional Neural Networks, and use an adaptation technique based on a
Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images
combined with synthetic data. The proposed method achieves an accuracy of
higher than 80% (top-5) on a real-world dataset.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 20:30:00 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Wang",
"Zhangyang",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Jin",
"Hailin",
""
],
[
"Shechtman",
"Eli",
""
],
[
"Agarwala",
"Aseem",
""
],
[
"Brandt",
"Jonathan",
""
],
[
"Huang",
"Thomas S.",
""
]
] | TITLE: Real-World Font Recognition Using Deep Network and Domain Adaptation
ABSTRACT: We address a challenging fine-grain classification problem: recognizing a
font style from an image of text. In this task, it is very easy to generate
lots of rendered font examples but very hard to obtain real-world labeled
images. This real-to-synthetic domain gap caused poor generalization to new
real data in previous methods (Chen et al. (2014)). In this paper, we refer to
Convolutional Neural Networks, and use an adaptation technique based on a
Stacked Convolutional Auto-Encoder that exploits unlabeled real-world images
combined with synthetic data. The proposed method achieves an accuracy of
higher than 80% (top-5) on a real-world dataset.
| no_new_dataset | 0.71287 |
1504.00045 | Yongxin Yang | Zhiyuan Shi, Yongxin Yang, Timothy M. Hospedales and Tao Xiang | Weakly Supervised Learning of Objects, Attributes and their Associations | 14 pages, Accepted to ECCV 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When humans describe images they tend to use combinations of nouns and
adjectives, corresponding to objects and their associated attributes
respectively. To generate such a description automatically, one needs to model
objects, attributes and their associations. Conventional methods require strong
annotation of object and attribute locations, making them less scalable. In
this paper, we model object-attribute associations from weakly labelled images,
such as those widely available on media sharing sites (e.g. Flickr), where only
image-level labels (either object or attributes) are given, without their
locations and associations. This is achieved by introducing a novel weakly
supervised non-parametric Bayesian model. Once learned, given a new image, our
model can describe the image, including objects, attributes and their
associations, as well as their locations and segmentation. Extensive
experiments on benchmark datasets demonstrate that our weakly supervised model
performs at par with strongly supervised models on tasks such as image
description and retrieval based on object-attribute associations.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 21:18:18 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Shi",
"Zhiyuan",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Timothy M.",
""
],
[
"Xiang",
"Tao",
""
]
] | TITLE: Weakly Supervised Learning of Objects, Attributes and their Associations
ABSTRACT: When humans describe images they tend to use combinations of nouns and
adjectives, corresponding to objects and their associated attributes
respectively. To generate such a description automatically, one needs to model
objects, attributes and their associations. Conventional methods require strong
annotation of object and attribute locations, making them less scalable. In
this paper, we model object-attribute associations from weakly labelled images,
such as those widely available on media sharing sites (e.g. Flickr), where only
image-level labels (either object or attributes) are given, without their
locations and associations. This is achieved by introducing a novel weakly
supervised non-parametric Bayesian model. Once learned, given a new image, our
model can describe the image, including objects, attributes and their
associations, as well as their locations and segmentation. Extensive
experiments on benchmark datasets demonstrate that our weakly supervised model
performs at par with strongly supervised models on tasks such as image
description and retrieval based on object-attribute associations.
| no_new_dataset | 0.712245 |
1504.00154 | Wenji Li | Zhun Fan, Wenji Li, Xinye Cai, Huibiao Lin, Shuxiang Xie, Erik Goodman | A New Repair Operator for Multi-objective Evolutionary Algorithm in
Constrained Optimization Problems | 8 pages | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we design a set of multi-objective constrained optimization
problems (MCOPs) and propose a new repair operator to address them. The
proposed repair operator is used to fix the solutions that violate the box
constraints. More specifically, it employs a reversed correction strategy that
can effectively avoid the population falling into local optimum. In addition,
we integrate the proposed repair operator into two classical multi-objective
evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is
compared with other two kinds of commonly used repair operators on benchmark
problems CTPs and MCOPs. The experiment results demonstrate that our proposed
approach is very effective in terms of convergence and diversity.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 09:07:13 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Fan",
"Zhun",
""
],
[
"Li",
"Wenji",
""
],
[
"Cai",
"Xinye",
""
],
[
"Lin",
"Huibiao",
""
],
[
"Xie",
"Shuxiang",
""
],
[
"Goodman",
"Erik",
""
]
] | TITLE: A New Repair Operator for Multi-objective Evolutionary Algorithm in
Constrained Optimization Problems
ABSTRACT: In this paper, we design a set of multi-objective constrained optimization
problems (MCOPs) and propose a new repair operator to address them. The
proposed repair operator is used to fix the solutions that violate the box
constraints. More specifically, it employs a reversed correction strategy that
can effectively avoid the population falling into local optimum. In addition,
we integrate the proposed repair operator into two classical multi-objective
evolutionary algorithms MOEA/D and NSGA-II. The proposed repair operator is
compared with other two kinds of commonly used repair operators on benchmark
problems CTPs and MCOPs. The experiment results demonstrate that our proposed
approach is very effective in terms of convergence and diversity.
| no_new_dataset | 0.709636 |
1504.00191 | Sanjay Sahay | Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay | Automated Document Indexing via Intelligent Hierarchical Clustering: A
Novel Approach | 6 Pages, 3 Figures. IEEE Xplore, ICHPCA-2014 | null | 10.1109/ICHPCA.2014.7045347 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rising quantity of textual data available in electronic format, the
need to organize it become a highly challenging task. In the present paper, we
explore a document organization framework that exploits an intelligent
hierarchical clustering algorithm to generate an index over a set of documents.
The framework has been designed to be scalable and accurate even with large
corpora. The advantage of the proposed algorithm lies in the need for minimal
inputs, with much of the hierarchy attributes being decided in an automated
manner using statistical methods. The use of topic modeling in a pre-processing
stage ensures robustness to a range of variations in the input data. For
experimental work 20-Newsgroups dataset has been used. The F- measure of the
proposed approach has been compared with the traditional K-Means and K-Medoids
clustering algorithms. Test results demonstrate the applicability, efficiency
and effectiveness of our proposed approach. After extensive experimentation, we
conclude that the framework shows promise for further research and specialized
commercial applications.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 12:08:36 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Roul",
"Rajendra Kumar",
""
],
[
"Asthana",
"Shubham Rohan",
""
],
[
"Sahay",
"Sanjay Kumar",
""
]
] | TITLE: Automated Document Indexing via Intelligent Hierarchical Clustering: A
Novel Approach
ABSTRACT: With the rising quantity of textual data available in electronic format, the
need to organize it become a highly challenging task. In the present paper, we
explore a document organization framework that exploits an intelligent
hierarchical clustering algorithm to generate an index over a set of documents.
The framework has been designed to be scalable and accurate even with large
corpora. The advantage of the proposed algorithm lies in the need for minimal
inputs, with much of the hierarchy attributes being decided in an automated
manner using statistical methods. The use of topic modeling in a pre-processing
stage ensures robustness to a range of variations in the input data. For
experimental work 20-Newsgroups dataset has been used. The F- measure of the
proposed approach has been compared with the traditional K-Means and K-Medoids
clustering algorithms. Test results demonstrate the applicability, efficiency
and effectiveness of our proposed approach. After extensive experimentation, we
conclude that the framework shows promise for further research and specialized
commercial applications.
| no_new_dataset | 0.710672 |
1504.00331 | Eldon Carman Jr | E. Preston Carman Jr. (1), Till Westmann (2), Vinayak R. Borkar (3),
Michael J. Carey (3) and Vassilis J. Tsotras (1) ((1) UC Riverside, (2)
Oracle Labs, (3) UC Irvine) | Apache VXQuery: A Scalable XQuery Implementation | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The wide use of XML for document management and data exchange has created the
need to query large repositories of XML data. To efficiently query such large
data collections and take advantage of parallelism, we have implemented Apache
VXQuery, an open-source scalable XQuery processor. The system builds upon two
other open-source frameworks -- Hyracks, a parallel execution engine, and
Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these
two frameworks and provides an implementation of the XQuery specifics (data
model, data-model dependent functions and optimizations, and a parser). We
describe the architecture of Apache VXQuery, its integration with Hyracks and
Algebricks, and the XQuery optimization rules applied to the query plan to
improve path expression efficiency and to enable query parallelism. An
experimental evaluation using a real 500GB dataset with various selection,
aggregation and join XML queries shows that Apache VXQuery performs well both
in terms of scale-up and speed-up. Our experiments show that it is about 3x
faster than Saxon (an open-source and commercial XQuery processor) on a 4-core,
single node implementation, and around 2.5x faster than Apache MRQL (a
MapReduce-based parallel query processor) on an eight (4-core) node cluster.
| [
{
"version": "v1",
"created": "Wed, 1 Apr 2015 18:27:23 GMT"
}
] | 2015-04-02T00:00:00 | [
[
"Carman",
"E. Preston",
"Jr."
],
[
"Westmann",
"Till",
""
],
[
"Borkar",
"Vinayak R.",
""
],
[
"Carey",
"Michael J.",
""
],
[
"Tsotras",
"Vassilis J.",
""
]
] | TITLE: Apache VXQuery: A Scalable XQuery Implementation
ABSTRACT: The wide use of XML for document management and data exchange has created the
need to query large repositories of XML data. To efficiently query such large
data collections and take advantage of parallelism, we have implemented Apache
VXQuery, an open-source scalable XQuery processor. The system builds upon two
other open-source frameworks -- Hyracks, a parallel execution engine, and
Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these
two frameworks and provides an implementation of the XQuery specifics (data
model, data-model dependent functions and optimizations, and a parser). We
describe the architecture of Apache VXQuery, its integration with Hyracks and
Algebricks, and the XQuery optimization rules applied to the query plan to
improve path expression efficiency and to enable query parallelism. An
experimental evaluation using a real 500GB dataset with various selection,
aggregation and join XML queries shows that Apache VXQuery performs well both
in terms of scale-up and speed-up. Our experiments show that it is about 3x
faster than Saxon (an open-source and commercial XQuery processor) on a 4-core,
single node implementation, and around 2.5x faster than Apache MRQL (a
MapReduce-based parallel query processor) on an eight (4-core) node cluster.
| no_new_dataset | 0.707582 |
1306.6802 | Aris Kosmopoulos | Aris Kosmopoulos, Ioannis Partalas, Eric Gaussier, Georgios Paliouras,
Ion Androutsopoulos | Evaluation Measures for Hierarchical Classification: a unified view and
novel approaches | Submitted to journal | null | 10.1007/s10618-014-0382-x | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hierarchical classification addresses the problem of classifying items into a
hierarchy of classes. An important issue in hierarchical classification is the
evaluation of different classification algorithms, which is complicated by the
hierarchical relations among the classes. Several evaluation measures have been
proposed for hierarchical classification using the hierarchy in different ways.
This paper studies the problem of evaluation in hierarchical classification by
analyzing and abstracting the key components of the existing performance
measures. It also proposes two alternative generic views of hierarchical
evaluation and introduces two corresponding novel measures. The proposed
measures, along with the state-of-the art ones, are empirically tested on three
large datasets from the domain of text classification. The empirical results
illustrate the undesirable behavior of existing approaches and how the proposed
methods overcome most of these methods across a range of cases.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2013 11:49:53 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jul 2013 17:33:58 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Kosmopoulos",
"Aris",
""
],
[
"Partalas",
"Ioannis",
""
],
[
"Gaussier",
"Eric",
""
],
[
"Paliouras",
"Georgios",
""
],
[
"Androutsopoulos",
"Ion",
""
]
] | TITLE: Evaluation Measures for Hierarchical Classification: a unified view and
novel approaches
ABSTRACT: Hierarchical classification addresses the problem of classifying items into a
hierarchy of classes. An important issue in hierarchical classification is the
evaluation of different classification algorithms, which is complicated by the
hierarchical relations among the classes. Several evaluation measures have been
proposed for hierarchical classification using the hierarchy in different ways.
This paper studies the problem of evaluation in hierarchical classification by
analyzing and abstracting the key components of the existing performance
measures. It also proposes two alternative generic views of hierarchical
evaluation and introduces two corresponding novel measures. The proposed
measures, along with the state-of-the art ones, are empirically tested on three
large datasets from the domain of text classification. The empirical results
illustrate the undesirable behavior of existing approaches and how the proposed
methods overcome most of these methods across a range of cases.
| no_new_dataset | 0.71 |
1503.02725 | Abhishek Sharma | Abhishek Sharma and Oncel Tuzel and David W. Jacobs | Deep Hierarchical Parsing for Semantic Segmentation | IEEE CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a learning-based approach to scene parsing inspired by
the deep Recursive Context Propagation Network (RCPN). RCPN is a deep
feed-forward neural network that utilizes the contextual information from the
entire image, through bottom-up followed by top-down context propagation via
random binary parse trees. This improves the feature representation of every
super-pixel in the image for better classification into semantic categories. We
analyze RCPN and propose two novel contributions to further improve the model.
We first analyze the learning of RCPN parameters and discover the presence of
bypass error paths in the computation graph of RCPN that can hinder contextual
propagation. We propose to tackle this problem by including the classification
loss of the internal nodes of the random parse trees in the original RCPN loss
function. Secondly, we use an MRF on the parse tree nodes to model the
hierarchical dependency present in the output. Both modifications provide
performance boosts over the original RCPN and the new system achieves
state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler
urban datasets.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2015 23:05:26 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2015 20:03:01 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Sharma",
"Abhishek",
""
],
[
"Tuzel",
"Oncel",
""
],
[
"Jacobs",
"David W.",
""
]
] | TITLE: Deep Hierarchical Parsing for Semantic Segmentation
ABSTRACT: This paper proposes a learning-based approach to scene parsing inspired by
the deep Recursive Context Propagation Network (RCPN). RCPN is a deep
feed-forward neural network that utilizes the contextual information from the
entire image, through bottom-up followed by top-down context propagation via
random binary parse trees. This improves the feature representation of every
super-pixel in the image for better classification into semantic categories. We
analyze RCPN and propose two novel contributions to further improve the model.
We first analyze the learning of RCPN parameters and discover the presence of
bypass error paths in the computation graph of RCPN that can hinder contextual
propagation. We propose to tackle this problem by including the classification
loss of the internal nodes of the random parse trees in the original RCPN loss
function. Secondly, we use an MRF on the parse tree nodes to model the
hierarchical dependency present in the output. Both modifications provide
performance boosts over the original RCPN and the new system achieves
state-of-the-art performance on Stanford Background, SIFT-Flow and Daimler
urban datasets.
| no_new_dataset | 0.710377 |
1503.08843 | Peng Sun | Peng Sun, James K. Min, Guanglei Xiong | Globally Tuned Cascade Pose Regression via Back Propagation with
Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, a successful pose estimation algorithm, called Cascade Pose
Regression (CPR), was proposed in the literature. Trained over Pose Index
Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper
we show how CPR can be represented as a Neural Network. Specifically, we adopt
a Graph Transformer Network (GTN) representation and accordingly train CPR with
Back Propagation (BP) that permits globally tuning. In contrast, previous CPR
literature only took a layer wise training without any post fine tuning. We
empirically show that global training with BP outperforms layer-wise
(pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor,
which utilized sparse connection to learn local image feature representation.
We tested the proposed CPR-GTN on 2D face pose estimation problem as in
previous CPR literature. Besides, we also investigated the possibility of
extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed
Tomography dataset for heart segmentation.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 20:17:23 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Sun",
"Peng",
""
],
[
"Min",
"James K.",
""
],
[
"Xiong",
"Guanglei",
""
]
] | TITLE: Globally Tuned Cascade Pose Regression via Back Propagation with
Application in 2D Face Pose Estimation and Heart Segmentation in 3D CT Images
ABSTRACT: Recently, a successful pose estimation algorithm, called Cascade Pose
Regression (CPR), was proposed in the literature. Trained over Pose Index
Feature, CPR is a regressor ensemble that is similar to Boosting. In this paper
we show how CPR can be represented as a Neural Network. Specifically, we adopt
a Graph Transformer Network (GTN) representation and accordingly train CPR with
Back Propagation (BP) that permits globally tuning. In contrast, previous CPR
literature only took a layer wise training without any post fine tuning. We
empirically show that global training with BP outperforms layer-wise
(pre-)training. Our CPR-GTN adopts a Multi Layer Percetron as the regressor,
which utilized sparse connection to learn local image feature representation.
We tested the proposed CPR-GTN on 2D face pose estimation problem as in
previous CPR literature. Besides, we also investigated the possibility of
extending CPR-GTN to 3D pose estimation by doing experiments using 3D Computed
Tomography dataset for heart segmentation.
| no_new_dataset | 0.71 |
1503.08853 | Ali Borji | Ali Borji and James Tanner | Reconciling saliency and object center-bias hypotheses in explaining
free-viewing fixations | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting where people look in natural scenes has attracted a lot of
interest in computer vision and computational neuroscience over the past two
decades. Two seemingly contrasting categories of cues have been proposed to
influence where people look: \textit{low-level image saliency} and
\textit{high-level semantic information}. Our first contribution is to take a
detailed look at these cues to confirm the hypothesis proposed by
Henderson~\cite{henderson1993eye} and Nuthmann \&
Henderson~\cite{nuthmann2010object} that observers tend to look at the center
of objects. We analyzed fixation data for scene free-viewing over 17 observers
on 60 fully annotated images with various types of objects. Images contained
different types of scenes, such as natural scenes, line drawings, and 3D
rendered scenes. Our second contribution is to propose a simple combined model
of low-level saliency and object center-bias that outperforms each individual
component significantly over our data, as well as on the OSIE dataset by Xu et
al.~\cite{xu2014predicting}. The results reconcile saliency with object
center-bias hypotheses and highlight that both types of cues are important in
guiding fixations. Our work opens new directions to understand strategies that
humans use in observing scenes and objects, and demonstrates the construction
of combined models of low-level saliency and high-level object-based
information.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 21:07:53 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Borji",
"Ali",
""
],
[
"Tanner",
"James",
""
]
] | TITLE: Reconciling saliency and object center-bias hypotheses in explaining
free-viewing fixations
ABSTRACT: Predicting where people look in natural scenes has attracted a lot of
interest in computer vision and computational neuroscience over the past two
decades. Two seemingly contrasting categories of cues have been proposed to
influence where people look: \textit{low-level image saliency} and
\textit{high-level semantic information}. Our first contribution is to take a
detailed look at these cues to confirm the hypothesis proposed by
Henderson~\cite{henderson1993eye} and Nuthmann \&
Henderson~\cite{nuthmann2010object} that observers tend to look at the center
of objects. We analyzed fixation data for scene free-viewing over 17 observers
on 60 fully annotated images with various types of objects. Images contained
different types of scenes, such as natural scenes, line drawings, and 3D
rendered scenes. Our second contribution is to propose a simple combined model
of low-level saliency and object center-bias that outperforms each individual
component significantly over our data, as well as on the OSIE dataset by Xu et
al.~\cite{xu2014predicting}. The results reconcile saliency with object
center-bias hypotheses and highlight that both types of cues are important in
guiding fixations. Our work opens new directions to understand strategies that
humans use in observing scenes and objects, and demonstrates the construction
of combined models of low-level saliency and high-level object-based
information.
| no_new_dataset | 0.712426 |
1503.08873 | Paul Mineiro | Paul Mineiro and Nikos Karampatziakis | Fast Label Embeddings for Extremely Large Output Spaces | Accepted as a workshop contribution at ICLR 2015 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many modern multiclass and multilabel problems are characterized by
increasingly large output spaces. For these problems, label embeddings have
been shown to be a useful primitive that can improve computational and
statistical efficiency. In this work we utilize a correspondence between rank
constrained estimation and low dimensional label embeddings that uncovers a
fast label embedding algorithm which works in both the multiclass and
multilabel settings. The result is a randomized algorithm for partial least
squares, whose running time is exponentially faster than naive algorithms. We
demonstrate our techniques on two large-scale public datasets, from the Large
Scale Hierarchical Text Challenge and the Open Directory Project, where we
obtain state of the art results.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 23:29:46 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Mineiro",
"Paul",
""
],
[
"Karampatziakis",
"Nikos",
""
]
] | TITLE: Fast Label Embeddings for Extremely Large Output Spaces
ABSTRACT: Many modern multiclass and multilabel problems are characterized by
increasingly large output spaces. For these problems, label embeddings have
been shown to be a useful primitive that can improve computational and
statistical efficiency. In this work we utilize a correspondence between rank
constrained estimation and low dimensional label embeddings that uncovers a
fast label embedding algorithm which works in both the multiclass and
multilabel settings. The result is a randomized algorithm for partial least
squares, whose running time is exponentially faster than naive algorithms. We
demonstrate our techniques on two large-scale public datasets, from the Large
Scale Hierarchical Text Challenge and the Open Directory Project, where we
obtain state of the art results.
| no_new_dataset | 0.71039 |
1503.08913 | Chris Winstead | Tasnuva Tithi, Chris Winstead, Gopalakrishnan Sundararajan | Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with
Re-Decoding | 4 pages, 8 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the performance of the Noisy Gradient Descent Bit
Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a
recent algorithm that uses a non-deterministic gradient descent search to
decode low-density parity check (LDPC) codes. The proposed re-decode procedure
obtains improved performance because the perturbations are independent at each
re-decoding phase, therefore increasing the likelihood of successful decoding.
We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an
standard, and find that only a small fraction of re-decoded frames are needed
to obtain significant performance benefits. When re-decoding is used, the NGDBF
performance is very close to a benchmark offset min-sum decoder for the 802.3an
code.
| [
{
"version": "v1",
"created": "Tue, 31 Mar 2015 04:44:32 GMT"
}
] | 2015-04-01T00:00:00 | [
[
"Tithi",
"Tasnuva",
""
],
[
"Winstead",
"Chris",
""
],
[
"Sundararajan",
"Gopalakrishnan",
""
]
] | TITLE: Decoding LDPC codes via Noisy Gradient Descent Bit-Flipping with
Re-Decoding
ABSTRACT: In this paper, we consider the performance of the Noisy Gradient Descent Bit
Flipping (NGDBF) algorithm under re-decoding of failed frames. NGDBF is a
recent algorithm that uses a non-deterministic gradient descent search to
decode low-density parity check (LDPC) codes. The proposed re-decode procedure
obtains improved performance because the perturbations are independent at each
re-decoding phase, therefore increasing the likelihood of successful decoding.
We examine the benefits of re-decoding for an LDPC code from the IEEE 802.3an
standard, and find that only a small fraction of re-decoded frames are needed
to obtain significant performance benefits. When re-decoding is used, the NGDBF
performance is very close to a benchmark offset min-sum decoder for the 802.3an
code.
| no_new_dataset | 0.711425 |
1407.7556 | Lorenzo Livi | Lorenzo Livi, Alireza Sadeghian, Witold Pedrycz | Entropic one-class classifiers | To appear in IEEE-TNNLS | null | 10.1109/TNNLS.2015.2418332 | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The one-class classification problem is a well-known research endeavor in
pattern recognition. The problem is also known under different names, such as
outlier and novelty/anomaly detection. The core of the problem consists in
modeling and recognizing patterns belonging only to a so-called target class.
All other patterns are termed non-target, and therefore they should be
recognized as such. In this paper, we propose a novel one-class classification
system that is based on an interplay of different techniques. Primarily, we
follow a dissimilarity representation based approach; we embed the input data
into the dissimilarity space by means of an appropriate parametric
dissimilarity measure. This step allows us to process virtually any type of
data. The dissimilarity vectors are then represented through a weighted
Euclidean graphs, which we use to (i) determine the entropy of the data
distribution in the dissimilarity space, and at the same time (ii) derive
effective decision regions that are modeled as clusters of vertices. Since the
dissimilarity measure for the input data is parametric, we optimize its
parameters by means of a global optimization scheme, which considers both
mesoscopic and structural characteristics of the data represented through the
graphs. The proposed one-class classifier is designed to provide both hard
(Boolean) and soft decisions about the recognition of test patterns, allowing
an accurate description of the classification process. We evaluate the
performance of the system on different benchmarking datasets, containing either
feature-based or structured patterns. Experimental results demonstrate the
effectiveness of the proposed technique.
| [
{
"version": "v1",
"created": "Mon, 28 Jul 2014 20:26:24 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2014 20:46:21 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Jan 2015 16:27:23 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Livi",
"Lorenzo",
""
],
[
"Sadeghian",
"Alireza",
""
],
[
"Pedrycz",
"Witold",
""
]
] | TITLE: Entropic one-class classifiers
ABSTRACT: The one-class classification problem is a well-known research endeavor in
pattern recognition. The problem is also known under different names, such as
outlier and novelty/anomaly detection. The core of the problem consists in
modeling and recognizing patterns belonging only to a so-called target class.
All other patterns are termed non-target, and therefore they should be
recognized as such. In this paper, we propose a novel one-class classification
system that is based on an interplay of different techniques. Primarily, we
follow a dissimilarity representation based approach; we embed the input data
into the dissimilarity space by means of an appropriate parametric
dissimilarity measure. This step allows us to process virtually any type of
data. The dissimilarity vectors are then represented through a weighted
Euclidean graphs, which we use to (i) determine the entropy of the data
distribution in the dissimilarity space, and at the same time (ii) derive
effective decision regions that are modeled as clusters of vertices. Since the
dissimilarity measure for the input data is parametric, we optimize its
parameters by means of a global optimization scheme, which considers both
mesoscopic and structural characteristics of the data represented through the
graphs. The proposed one-class classifier is designed to provide both hard
(Boolean) and soft decisions about the recognition of test patterns, allowing
an accurate description of the classification process. We evaluate the
performance of the system on different benchmarking datasets, containing either
feature-based or structured patterns. Experimental results demonstrate the
effectiveness of the proposed technique.
| no_new_dataset | 0.709466 |
1410.0760 | Chih-Hang Wang | Chih-Hang Wang, De-Nian Yang, Wen-Tsuen Chen | Scheduling for Multi-Camera Surveillance in LTE Networks | 9 pages, 10 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless surveillance in cellular networks has become increasingly important,
while commercial LTE surveillance cameras are also available nowadays.
Nevertheless, most scheduling algorithms in the literature are throughput,
fairness, or profit-based approaches, which are not suitable for wireless
surveillance. In this paper, therefore, we explore the resource allocation
problem for a multi-camera surveillance system in 3GPP Long Term Evolution
(LTE) uplink (UL) networks. We minimize the number of allocated resource blocks
(RBs) while guaranteeing the coverage requirement for surveillance systems in
LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation
Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an
Integer Linear Programming formulation for general cases to find the optimal
solution. Moreover, we present a baseline algorithm and devise an approximation
algorithm to solve the problem. Simulation results based on a real surveillance
map and synthetic datasets manifest that the number of allocated RBs can be
effectively reduced compared to the existing approach for LTE networks.
| [
{
"version": "v1",
"created": "Fri, 3 Oct 2014 06:17:20 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2014 08:33:46 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Oct 2014 04:24:11 GMT"
},
{
"version": "v4",
"created": "Sat, 28 Mar 2015 13:58:08 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Wang",
"Chih-Hang",
""
],
[
"Yang",
"De-Nian",
""
],
[
"Chen",
"Wen-Tsuen",
""
]
] | TITLE: Scheduling for Multi-Camera Surveillance in LTE Networks
ABSTRACT: Wireless surveillance in cellular networks has become increasingly important,
while commercial LTE surveillance cameras are also available nowadays.
Nevertheless, most scheduling algorithms in the literature are throughput,
fairness, or profit-based approaches, which are not suitable for wireless
surveillance. In this paper, therefore, we explore the resource allocation
problem for a multi-camera surveillance system in 3GPP Long Term Evolution
(LTE) uplink (UL) networks. We minimize the number of allocated resource blocks
(RBs) while guaranteeing the coverage requirement for surveillance systems in
LTE UL networks. Specifically, we formulate the Camera Set Resource Allocation
Problem (CSRAP) and prove that the problem is NP-Hard. We then propose an
Integer Linear Programming formulation for general cases to find the optimal
solution. Moreover, we present a baseline algorithm and devise an approximation
algorithm to solve the problem. Simulation results based on a real surveillance
map and synthetic datasets manifest that the number of allocated RBs can be
effectively reduced compared to the existing approach for LTE networks.
| no_new_dataset | 0.712188 |
1410.4985 | Danesh Tarapore | Danesh Tarapore and Jean-Baptiste Mouret | Evolvability signatures of generative encodings: beyond standard
performance benchmarks | 24 pages with 12 figures in the main text, and 4 supplementary
figures. Accepted at Information Sciences journal (in press). Supplemental
videos are available online at, see http://goo.gl/uyY1RX | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evolutionary robotics is a promising approach to autonomously synthesize
machines with abilities that resemble those of animals, but the field suffers
from a lack of strong foundations. In particular, evolutionary systems are
currently assessed solely by the fitness score their evolved artifacts can
achieve for a specific task, whereas such fitness-based comparisons provide
limited insights about how the same system would evaluate on different tasks,
and its adaptive capabilities to respond to changes in fitness (e.g., from
damages to the machine, or in new situations). To counter these limitations, we
introduce the concept of "evolvability signatures", which picture the
post-mutation statistical distribution of both behavior diversity (how
different are the robot behaviors after a mutation?) and fitness values (how
different is the fitness after a mutation?). We tested the relevance of this
concept by evolving controllers for hexapod robot locomotion using five
different genotype-to-phenotype mappings (direct encoding, generative encoding
of open-loop and closed-loop central pattern generators, generative encoding of
neural networks, and single-unit pattern generators (SUPG)). We observed a
predictive relationship between the evolvability signature of each encoding and
the number of generations required by hexapods to adapt from incurred damages.
Our study also reveals that, across the five investigated encodings, the SUPG
scheme achieved the best evolvability signature, and was always foremost in
recovering an effective gait following robot damages. Overall, our evolvability
signatures neatly complement existing task-performance benchmarks, and pave the
way for stronger foundations for research in evolutionary robotics.
| [
{
"version": "v1",
"created": "Sat, 18 Oct 2014 18:16:26 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Mar 2015 13:16:20 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Tarapore",
"Danesh",
""
],
[
"Mouret",
"Jean-Baptiste",
""
]
] | TITLE: Evolvability signatures of generative encodings: beyond standard
performance benchmarks
ABSTRACT: Evolutionary robotics is a promising approach to autonomously synthesize
machines with abilities that resemble those of animals, but the field suffers
from a lack of strong foundations. In particular, evolutionary systems are
currently assessed solely by the fitness score their evolved artifacts can
achieve for a specific task, whereas such fitness-based comparisons provide
limited insights about how the same system would evaluate on different tasks,
and its adaptive capabilities to respond to changes in fitness (e.g., from
damages to the machine, or in new situations). To counter these limitations, we
introduce the concept of "evolvability signatures", which picture the
post-mutation statistical distribution of both behavior diversity (how
different are the robot behaviors after a mutation?) and fitness values (how
different is the fitness after a mutation?). We tested the relevance of this
concept by evolving controllers for hexapod robot locomotion using five
different genotype-to-phenotype mappings (direct encoding, generative encoding
of open-loop and closed-loop central pattern generators, generative encoding of
neural networks, and single-unit pattern generators (SUPG)). We observed a
predictive relationship between the evolvability signature of each encoding and
the number of generations required by hexapods to adapt from incurred damages.
Our study also reveals that, across the five investigated encodings, the SUPG
scheme achieved the best evolvability signature, and was always foremost in
recovering an effective gait following robot damages. Overall, our evolvability
signatures neatly complement existing task-performance benchmarks, and pave the
way for stronger foundations for research in evolutionary robotics.
| no_new_dataset | 0.709025 |
1411.6400 | Min Wei | Min Wei, Tommy W. S. Chow, Rosa H. M. Chan | Mutual Information-Based Unsupervised Feature Transformation for
Heterogeneous Feature Subset Selection | This paper has been withdrawn by the author due to the number of
datasets and classifiers are not sufficient to support the claim. Need more
simulation work | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional mutual information (MI) based feature selection (FS) methods are
unable to handle heterogeneous feature subset selection properly because of
data format differences or estimation methods of MI between feature subset and
class label. A way to solve this problem is feature transformation (FT). In
this study, a novel unsupervised feature transformation (UFT) which can
transform non-numerical features into numerical features is developed and
tested. The UFT process is MI-based and independent of class label. MI-based FS
algorithms, such as Parzen window feature selector (PWFS), minimum redundancy
maximum relevance feature selection (mRMR), and normalized MI feature selection
(NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike
traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to
its full advantage. Simulations and analyses of large-scale datasets showed
that feature subset selected by the integrated method, UFT-PWFS, outperformed
other FT-FS integrated methods in classification accuracy.
| [
{
"version": "v1",
"created": "Mon, 24 Nov 2014 10:15:17 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2015 05:32:50 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Wei",
"Min",
""
],
[
"Chow",
"Tommy W. S.",
""
],
[
"Chan",
"Rosa H. M.",
""
]
] | TITLE: Mutual Information-Based Unsupervised Feature Transformation for
Heterogeneous Feature Subset Selection
ABSTRACT: Conventional mutual information (MI) based feature selection (FS) methods are
unable to handle heterogeneous feature subset selection properly because of
data format differences or estimation methods of MI between feature subset and
class label. A way to solve this problem is feature transformation (FT). In
this study, a novel unsupervised feature transformation (UFT) which can
transform non-numerical features into numerical features is developed and
tested. The UFT process is MI-based and independent of class label. MI-based FS
algorithms, such as Parzen window feature selector (PWFS), minimum redundancy
maximum relevance feature selection (mRMR), and normalized MI feature selection
(NMIFS), can all adopt UFT for pre-processing of non-numerical features. Unlike
traditional FT methods, the proposed UFT is unbiased while PWFS is utilized to
its full advantage. Simulations and analyses of large-scale datasets showed
that feature subset selected by the integrated method, UFT-PWFS, outperformed
other FT-FS integrated methods in classification accuracy.
| no_new_dataset | 0.710434 |
1412.6286 | Wendelin B\"ohmer | Wendelin B\"ohmer and Klaus Obermayer | Regression with Linear Factored Functions | Under review as conference paper at ECML/PKDD 2015 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many applications that use empirically estimated functions face a curse of
dimensionality, because the integrals over most function classes must be
approximated by sampling. This paper introduces a novel regression-algorithm
that learns linear factored functions (LFF). This class of functions has
structural properties that allow to analytically solve certain integrals and to
calculate point-wise products. Applications like belief propagation and
reinforcement learning can exploit these properties to break the curse and
speed up computation. We derive a regularized greedy optimization scheme, that
learns factored basis functions during training. The novel regression algorithm
performs competitively to Gaussian processes on benchmark tasks, and the
learned LFF functions are with 4-9 factored basis functions on average very
compact.
| [
{
"version": "v1",
"created": "Fri, 19 Dec 2014 11:01:21 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2015 14:53:35 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Mar 2015 15:14:20 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Böhmer",
"Wendelin",
""
],
[
"Obermayer",
"Klaus",
""
]
] | TITLE: Regression with Linear Factored Functions
ABSTRACT: Many applications that use empirically estimated functions face a curse of
dimensionality, because the integrals over most function classes must be
approximated by sampling. This paper introduces a novel regression-algorithm
that learns linear factored functions (LFF). This class of functions has
structural properties that allow to analytically solve certain integrals and to
calculate point-wise products. Applications like belief propagation and
reinforcement learning can exploit these properties to break the curse and
speed up computation. We derive a regularized greedy optimization scheme, that
learns factored basis functions during training. The novel regression algorithm
performs competitively to Gaussian processes on benchmark tasks, and the
learned LFF functions are with 4-9 factored basis functions on average very
compact.
| no_new_dataset | 0.710057 |
1503.01800 | Samira Ebrahimi Kahou | Samira Ebrahimi Kahou, Xavier Bouthillier, Pascal Lamblin, Caglar
Gulcehre, Vincent Michalski, Kishore Konda, S\'ebastien Jean, Pierre
Froumenty, Yann Dauphin, Nicolas Boulanger-Lewandowski, Raul Chandias
Ferrari, Mehdi Mirza, David Warde-Farley, Aaron Courville, Pascal Vincent,
Roland Memisevic, Christopher Pal, Yoshua Bengio | EmoNets: Multimodal deep learning approaches for emotion recognition in
video | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of the emotion recognition in the wild (EmotiW) Challenge is to
assign one of seven emotions to short video clips extracted from Hollywood
style movies. The videos depict acted-out emotions under realistic conditions
with a large degree of variation in attributes such as pose and illumination,
making it worthwhile to explore approaches which consider combinations of
features from multiple modalities for label assignment. In this paper we
present our approach to learning several specialist models using deep learning
techniques, each focusing on one modality. Among these are a convolutional
neural network, focusing on capturing visual information in detected faces, a
deep belief net focusing on the representation of the audio stream, a K-Means
based "bag-of-mouths" model, which extracts visual features around the mouth
region and a relational autoencoder, which addresses spatio-temporal aspects of
videos. We explore multiple methods for the combination of cues from these
modalities into one common classifier. This achieves a considerably greater
accuracy than predictions from our strongest single-modality classifier. Our
method was the winning submission in the 2013 EmotiW challenge and achieved a
test set accuracy of 47.67% on the 2014 dataset.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2015 22:03:26 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2015 00:55:02 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Kahou",
"Samira Ebrahimi",
""
],
[
"Bouthillier",
"Xavier",
""
],
[
"Lamblin",
"Pascal",
""
],
[
"Gulcehre",
"Caglar",
""
],
[
"Michalski",
"Vincent",
""
],
[
"Konda",
"Kishore",
""
],
[
"Jean",
"Sébastien",
""
],
[
"Froumenty",
"Pierre",
""
],
[
"Dauphin",
"Yann",
""
],
[
"Boulanger-Lewandowski",
"Nicolas",
""
],
[
"Ferrari",
"Raul Chandias",
""
],
[
"Mirza",
"Mehdi",
""
],
[
"Warde-Farley",
"David",
""
],
[
"Courville",
"Aaron",
""
],
[
"Vincent",
"Pascal",
""
],
[
"Memisevic",
"Roland",
""
],
[
"Pal",
"Christopher",
""
],
[
"Bengio",
"Yoshua",
""
]
] | TITLE: EmoNets: Multimodal deep learning approaches for emotion recognition in
video
ABSTRACT: The task of the emotion recognition in the wild (EmotiW) Challenge is to
assign one of seven emotions to short video clips extracted from Hollywood
style movies. The videos depict acted-out emotions under realistic conditions
with a large degree of variation in attributes such as pose and illumination,
making it worthwhile to explore approaches which consider combinations of
features from multiple modalities for label assignment. In this paper we
present our approach to learning several specialist models using deep learning
techniques, each focusing on one modality. Among these are a convolutional
neural network, focusing on capturing visual information in detected faces, a
deep belief net focusing on the representation of the audio stream, a K-Means
based "bag-of-mouths" model, which extracts visual features around the mouth
region and a relational autoencoder, which addresses spatio-temporal aspects of
videos. We explore multiple methods for the combination of cues from these
modalities into one common classifier. This achieves a considerably greater
accuracy than predictions from our strongest single-modality classifier. Our
method was the winning submission in the 2013 EmotiW challenge and achieved a
test set accuracy of 47.67% on the 2014 dataset.
| no_new_dataset | 0.710396 |
1503.08263 | Chunhua Shen | Fayao Liu, Guosheng Lin, Chunhua Shen | CRF Learning with CNN Features for Image Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conditional Random Rields (CRF) have been widely applied in image
segmentations. While most studies rely on hand-crafted features, we here
propose to exploit a pre-trained large convolutional neural network (CNN) to
generate deep features for CRF learning. The deep CNN is trained on the
ImageNet dataset and transferred to image segmentations here for constructing
potentials of superpixels. Then the CRF parameters are learnt using a
structured support vector machine (SSVM). To fully exploit context information
in inference, we construct spatially related co-occurrence pairwise potentials
and incorporate them into the energy function. This prefers labelling of object
pairs that frequently co-occur in a certain spatial layout and at the same time
avoids implausible labellings during the inference. Extensive experiments on
binary and multi-class segmentation benchmarks demonstrate the promise of the
proposed method. We thus provide new baselines for the segmentation performance
on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC
2011 datasets.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 04:05:09 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Liu",
"Fayao",
""
],
[
"Lin",
"Guosheng",
""
],
[
"Shen",
"Chunhua",
""
]
] | TITLE: CRF Learning with CNN Features for Image Segmentation
ABSTRACT: Conditional Random Rields (CRF) have been widely applied in image
segmentations. While most studies rely on hand-crafted features, we here
propose to exploit a pre-trained large convolutional neural network (CNN) to
generate deep features for CRF learning. The deep CNN is trained on the
ImageNet dataset and transferred to image segmentations here for constructing
potentials of superpixels. Then the CRF parameters are learnt using a
structured support vector machine (SSVM). To fully exploit context information
in inference, we construct spatially related co-occurrence pairwise potentials
and incorporate them into the energy function. This prefers labelling of object
pairs that frequently co-occur in a certain spatial layout and at the same time
avoids implausible labellings during the inference. Extensive experiments on
binary and multi-class segmentation benchmarks demonstrate the promise of the
proposed method. We thus provide new baselines for the segmentation performance
on the Weizmann horse, Graz-02, MSRC-21, Stanford Background and PASCAL VOC
2011 datasets.
| no_new_dataset | 0.710597 |
1503.08275 | Rosemarie Velik | Rosemarie Velik, Pascal Nicolay | Energy Management in Storage-Augmented, Grid-Connected Prosumer
Buildings and Neighbourhoods Using a Modified Simulated Annealing
Optimization | Computers & Operations Research, 2015 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article introduces a modified simulated annealing optimization approach
for automatically determining optimal energy management strategies in
grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings
and neighbourhoods based on user-specific goals. For evaluating the modified
simulated annealing optimizer, a number of test scenarios in the field of
energy self-consumption maximization are defined and results are compared to a
gradient descent and a total state space search approach. The benchmarking
against these two reference methods demonstrates that the modified simulated
annealing approach is able to find significantly better solutions than the
gradient descent algorithm - being equal or very close to the global optimum -
with significantly less computational effort and processing time than the total
state space search approach.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 07:16:22 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Velik",
"Rosemarie",
""
],
[
"Nicolay",
"Pascal",
""
]
] | TITLE: Energy Management in Storage-Augmented, Grid-Connected Prosumer
Buildings and Neighbourhoods Using a Modified Simulated Annealing
Optimization
ABSTRACT: This article introduces a modified simulated annealing optimization approach
for automatically determining optimal energy management strategies in
grid-connected, storage-augmented, photovoltaics-supplied prosumer buildings
and neighbourhoods based on user-specific goals. For evaluating the modified
simulated annealing optimizer, a number of test scenarios in the field of
energy self-consumption maximization are defined and results are compared to a
gradient descent and a total state space search approach. The benchmarking
against these two reference methods demonstrates that the modified simulated
annealing approach is able to find significantly better solutions than the
gradient descent algorithm - being equal or very close to the global optimum -
with significantly less computational effort and processing time than the total
state space search approach.
| no_new_dataset | 0.711074 |
1503.08348 | Ravi Ganti | Ravi Ganti and Rebecca M. Willett | Sparse Linear Regression With Missing Data | 14 pages, 7 figures | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a fast and accurate method for sparse regression in the
presence of missing data. The underlying statistical model encapsulates the
low-dimensional structure of the incomplete data matrix and the sparsity of the
regression coefficients, and the proposed algorithm jointly learns the
low-dimensional structure of the data and a linear regressor with sparse
coefficients. The proposed stochastic optimization method, Sparse Linear
Regression with Missing Data (SLRM), performs an alternating minimization
procedure and scales well with the problem size. Large deviation inequalities
shed light on the impact of the various problem-dependent parameters on the
expected squared loss of the learned regressor. Extensive simulations on both
synthetic and real datasets show that SLRM performs better than competing
algorithms in a variety of contexts.
| [
{
"version": "v1",
"created": "Sat, 28 Mar 2015 21:03:32 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Ganti",
"Ravi",
""
],
[
"Willett",
"Rebecca M.",
""
]
] | TITLE: Sparse Linear Regression With Missing Data
ABSTRACT: This paper proposes a fast and accurate method for sparse regression in the
presence of missing data. The underlying statistical model encapsulates the
low-dimensional structure of the incomplete data matrix and the sparsity of the
regression coefficients, and the proposed algorithm jointly learns the
low-dimensional structure of the data and a linear regressor with sparse
coefficients. The proposed stochastic optimization method, Sparse Linear
Regression with Missing Data (SLRM), performs an alternating minimization
procedure and scales well with the problem size. Large deviation inequalities
shed light on the impact of the various problem-dependent parameters on the
expected squared loss of the learned regressor. Extensive simulations on both
synthetic and real datasets show that SLRM performs better than competing
algorithms in a variety of contexts.
| no_new_dataset | 0.709982 |
1503.08407 | Zimu Yuan | Zimu Yuan, Zhiwei Xu | CIUV: Collaborating Information Against Unreliable Views | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many real world applications, the information of an object can be obtained
from multiple sources. The sources may provide different point of views based
on their own origin. As a consequence, conflicting pieces of information are
inevitable, which gives rise to a crucial problem: how to find the truth from
these conflicts. Many truth-finding methods have been proposed to resolve
conflicts based on information trustworthy (i.e. more appearance means more
trustworthy) as well as source reliability. However, the factor of men's
involvement, i.e., information may be falsified by men with malicious
intension, is more or less ignored in existing methods. Collaborating the
possible relationship between information's origins and men's participation are
still not studied in research. To deal with this challenge, we propose a method
-- Collaborating Information against Unreliable Views (CIUV) --- in dealing
with men's involvement for finding the truth. CIUV contains 3 stages for
interactively mitigating the impact of unreliable views, and calculate the
truth by weighting possible biases between sources. We theoretically analyze
the error bound of CIUV, and conduct intensive experiments on real dataset for
evaluation. The experimental results show that CIUV is feasible and has the
smallest error compared with other methods.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 09:30:58 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Yuan",
"Zimu",
""
],
[
"Xu",
"Zhiwei",
""
]
] | TITLE: CIUV: Collaborating Information Against Unreliable Views
ABSTRACT: In many real world applications, the information of an object can be obtained
from multiple sources. The sources may provide different point of views based
on their own origin. As a consequence, conflicting pieces of information are
inevitable, which gives rise to a crucial problem: how to find the truth from
these conflicts. Many truth-finding methods have been proposed to resolve
conflicts based on information trustworthy (i.e. more appearance means more
trustworthy) as well as source reliability. However, the factor of men's
involvement, i.e., information may be falsified by men with malicious
intension, is more or less ignored in existing methods. Collaborating the
possible relationship between information's origins and men's participation are
still not studied in research. To deal with this challenge, we propose a method
-- Collaborating Information against Unreliable Views (CIUV) --- in dealing
with men's involvement for finding the truth. CIUV contains 3 stages for
interactively mitigating the impact of unreliable views, and calculate the
truth by weighting possible biases between sources. We theoretically analyze
the error bound of CIUV, and conduct intensive experiments on real dataset for
evaluation. The experimental results show that CIUV is feasible and has the
smallest error compared with other methods.
| no_new_dataset | 0.709435 |
1503.08463 | S. K. Sahay | Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay | A Novel Modified Apriori Approach for Web Document Clustering | 11 Pages, 5 Figures | Springer, Smart Innovation Systems and Technologies, Vol. 33,
2015, p. 159-171; Proceedings of the ICCIDM, Dec. 2014 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The traditional apriori algorithm can be used for clustering the web
documents based on the association technique of data mining. But this algorithm
has several limitations due to repeated database scans and its weak association
rule analysis. In modern world of large databases, efficiency of traditional
apriori algorithm would reduce manifolds. In this paper, we proposed a new
modified apriori approach by cutting down the repeated database scans and
improving association analysis of traditional apriori algorithm to cluster the
web documents. Further we improve those clusters by applying Fuzzy C-Means
(FCM), K-Means and Vector Space Model (VSM) techniques separately. For
experimental purpose, we use Classic3 and Classic4 datasets of Cornell
University having more than 10,000 documents and run both traditional apriori
and our modified apriori approach on it. Experimental results show that our
approach outperforms the traditional apriori algorithm in terms of database
scan and improvement on association of analysis. We found out that FCM is
better than K-Means and VSM in terms of F-measure of clusters of different
sizes.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 17:40:18 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Roul",
"Rajendra Kumar",
""
],
[
"Varshneya",
"Saransh",
""
],
[
"Kalra",
"Ashu",
""
],
[
"Sahay",
"Sanjay Kumar",
""
]
] | TITLE: A Novel Modified Apriori Approach for Web Document Clustering
ABSTRACT: The traditional apriori algorithm can be used for clustering the web
documents based on the association technique of data mining. But this algorithm
has several limitations due to repeated database scans and its weak association
rule analysis. In modern world of large databases, efficiency of traditional
apriori algorithm would reduce manifolds. In this paper, we proposed a new
modified apriori approach by cutting down the repeated database scans and
improving association analysis of traditional apriori algorithm to cluster the
web documents. Further we improve those clusters by applying Fuzzy C-Means
(FCM), K-Means and Vector Space Model (VSM) techniques separately. For
experimental purpose, we use Classic3 and Classic4 datasets of Cornell
University having more than 10,000 documents and run both traditional apriori
and our modified apriori approach on it. Experimental results show that our
approach outperforms the traditional apriori algorithm in terms of database
scan and improvement on association of analysis. We found out that FCM is
better than K-Means and VSM in terms of F-measure of clusters of different
sizes.
| no_new_dataset | 0.710446 |
1503.08482 | Spyros Blanas | Spyros Blanas and Surendra Byna | Towards Exascale Scientific Metadata Management | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advances in technology and computing hardware are enabling scientists from
all areas of science to produce massive amounts of data using large-scale
simulations or observational facilities. In this era of data deluge, effective
coordination between the data production and the analysis phases hinges on the
availability of metadata that describe the scientific datasets. Existing
workflow engines have been capturing a limited form of metadata to provide
provenance information about the identity and lineage of the data. However,
much of the data produced by simulations, experiments, and analyses still need
to be annotated manually in an ad hoc manner by domain scientists. Systematic
and transparent acquisition of rich metadata becomes a crucial prerequisite to
sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and
domain-agnostic metadata management infrastructure that can meet the demands of
extreme-scale science is notable by its absence.
To address this gap in scientific data management research and practice, we
present our vision for an integrated approach that (1) automatically captures
and manipulates information-rich metadata while the data is being produced or
analyzed and (2) stores metadata within each dataset to permeate
metadata-oblivious processes and to query metadata through established and
standardized data access interfaces. We motivate the need for the proposed
integrated approach using applications from plasma physics, climate modeling
and neuroscience, and then discuss research challenges and possible solutions.
| [
{
"version": "v1",
"created": "Sun, 29 Mar 2015 19:13:18 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Blanas",
"Spyros",
""
],
[
"Byna",
"Surendra",
""
]
] | TITLE: Towards Exascale Scientific Metadata Management
ABSTRACT: Advances in technology and computing hardware are enabling scientists from
all areas of science to produce massive amounts of data using large-scale
simulations or observational facilities. In this era of data deluge, effective
coordination between the data production and the analysis phases hinges on the
availability of metadata that describe the scientific datasets. Existing
workflow engines have been capturing a limited form of metadata to provide
provenance information about the identity and lineage of the data. However,
much of the data produced by simulations, experiments, and analyses still need
to be annotated manually in an ad hoc manner by domain scientists. Systematic
and transparent acquisition of rich metadata becomes a crucial prerequisite to
sustain and accelerate the pace of scientific innovation. Yet, ubiquitous and
domain-agnostic metadata management infrastructure that can meet the demands of
extreme-scale science is notable by its absence.
To address this gap in scientific data management research and practice, we
present our vision for an integrated approach that (1) automatically captures
and manipulates information-rich metadata while the data is being produced or
analyzed and (2) stores metadata within each dataset to permeate
metadata-oblivious processes and to query metadata through established and
standardized data access interfaces. We motivate the need for the proposed
integrated approach using applications from plasma physics, climate modeling
and neuroscience, and then discuss research challenges and possible solutions.
| no_new_dataset | 0.709453 |
1503.08535 | Junyu Xuan | Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo | Infinite Author Topic Model based on Mixed Gamma-Negative Binomial
Process | 10 pages, 5 figures, submitted to KDD conference | null | null | null | stat.ML cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Incorporating the side information of text corpus, i.e., authors, time
stamps, and emotional tags, into the traditional text mining models has gained
significant interests in the area of information retrieval, statistical natural
language processing, and machine learning. One branch of these works is the
so-called Author Topic Model (ATM), which incorporates the authors's interests
as side information into the classical topic model. However, the existing ATM
needs to predefine the number of topics, which is difficult and inappropriate
in many real-world settings. In this paper, we propose an Infinite Author Topic
(IAT) model to resolve this issue. Instead of assigning a discrete probability
on fixed number of topics, we use a stochastic process to determine the number
of topics from the data itself. To be specific, we extend a gamma-negative
binomial process to three levels in order to capture the
author-document-keyword hierarchical structure. Furthermore, each document is
assigned a mixed gamma process that accounts for the multi-author's
contribution towards this document. An efficient Gibbs sampling inference
algorithm with each conditional distribution being closed-form is developed for
the IAT model. Experiments on several real-world datasets show the capabilities
of our IAT model to learn the hidden topics, authors' interests on these topics
and the number of topics simultaneously.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 05:03:37 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Xuan",
"Junyu",
""
],
[
"Lu",
"Jie",
""
],
[
"Zhang",
"Guangquan",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Luo",
"Xiangfeng",
""
]
] | TITLE: Infinite Author Topic Model based on Mixed Gamma-Negative Binomial
Process
ABSTRACT: Incorporating the side information of text corpus, i.e., authors, time
stamps, and emotional tags, into the traditional text mining models has gained
significant interests in the area of information retrieval, statistical natural
language processing, and machine learning. One branch of these works is the
so-called Author Topic Model (ATM), which incorporates the authors's interests
as side information into the classical topic model. However, the existing ATM
needs to predefine the number of topics, which is difficult and inappropriate
in many real-world settings. In this paper, we propose an Infinite Author Topic
(IAT) model to resolve this issue. Instead of assigning a discrete probability
on fixed number of topics, we use a stochastic process to determine the number
of topics from the data itself. To be specific, we extend a gamma-negative
binomial process to three levels in order to capture the
author-document-keyword hierarchical structure. Furthermore, each document is
assigned a mixed gamma process that accounts for the multi-author's
contribution towards this document. An efficient Gibbs sampling inference
algorithm with each conditional distribution being closed-form is developed for
the IAT model. Experiments on several real-world datasets show the capabilities
of our IAT model to learn the hidden topics, authors' interests on these topics
and the number of topics simultaneously.
| no_new_dataset | 0.711443 |
1503.08542 | Junyu Xuan | Junyu Xuan, Jie Lu, Guangquan Zhang, Richard Yi Da Xu, Xiangfeng Luo | Nonparametric Relational Topic Models through Dependent Gamma Processes | null | null | null | null | stat.ML cs.CL cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional Relational Topic Models provide a way to discover the hidden
topics from a document network. Many theoretical and practical tasks, such as
dimensional reduction, document clustering, link prediction, benefit from this
revealed knowledge. However, existing relational topic models are based on an
assumption that the number of hidden topics is known in advance, and this is
impractical in many real-world applications. Therefore, in order to relax this
assumption, we propose a nonparametric relational topic model in this paper.
Instead of using fixed-dimensional probability distributions in its generative
model, we use stochastic processes. Specifically, a gamma process is assigned
to each document, which represents the topic interest of this document.
Although this method provides an elegant solution, it brings additional
challenges when mathematically modeling the inherent network structure of
typical document network, i.e., two spatially closer documents tend to have
more similar topics. Furthermore, we require that the topics are shared by all
the documents. In order to resolve these challenges, we use a subsampling
strategy to assign each document a different gamma process from the global
gamma process, and the subsampling probabilities of documents are assigned with
a Markov Random Field constraint that inherits the document network structure.
Through the designed posterior inference algorithm, we can discover the hidden
topics and its number simultaneously. Experimental results on both synthetic
and real-world network datasets demonstrate the capabilities of learning the
hidden topics and, more importantly, the number of topics.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 05:40:41 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Xuan",
"Junyu",
""
],
[
"Lu",
"Jie",
""
],
[
"Zhang",
"Guangquan",
""
],
[
"Da Xu",
"Richard Yi",
""
],
[
"Luo",
"Xiangfeng",
""
]
] | TITLE: Nonparametric Relational Topic Models through Dependent Gamma Processes
ABSTRACT: Traditional Relational Topic Models provide a way to discover the hidden
topics from a document network. Many theoretical and practical tasks, such as
dimensional reduction, document clustering, link prediction, benefit from this
revealed knowledge. However, existing relational topic models are based on an
assumption that the number of hidden topics is known in advance, and this is
impractical in many real-world applications. Therefore, in order to relax this
assumption, we propose a nonparametric relational topic model in this paper.
Instead of using fixed-dimensional probability distributions in its generative
model, we use stochastic processes. Specifically, a gamma process is assigned
to each document, which represents the topic interest of this document.
Although this method provides an elegant solution, it brings additional
challenges when mathematically modeling the inherent network structure of
typical document network, i.e., two spatially closer documents tend to have
more similar topics. Furthermore, we require that the topics are shared by all
the documents. In order to resolve these challenges, we use a subsampling
strategy to assign each document a different gamma process from the global
gamma process, and the subsampling probabilities of documents are assigned with
a Markov Random Field constraint that inherits the document network structure.
Through the designed posterior inference algorithm, we can discover the hidden
topics and its number simultaneously. Experimental results on both synthetic
and real-world network datasets demonstrate the capabilities of learning the
hidden topics and, more importantly, the number of topics.
| no_new_dataset | 0.711794 |
1503.08581 | Ioannis Partalas | Ioannis Partalas, Aris Kosmopoulos, Nicolas Baskiotis, Thierry
Artieres, George Paliouras, Eric Gaussier, Ion Androutsopoulos, Massih-Reza
Amini, Patrick Galinari | LSHTC: A Benchmark for Large-Scale Text Classification | null | null | null | null | cs.IR cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LSHTC is a series of challenges which aims to assess the performance of
classification systems in large-scale classification in a a large number of
classes (up to hundreds of thousands). This paper describes the dataset that
have been released along the LSHTC series. The paper details the construction
of the datsets and the design of the tracks as well as the evaluation measures
that we implemented and a quick overview of the results. All of these datasets
are available online and runs may still be submitted on the online server of
the challenges.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 08:03:47 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Partalas",
"Ioannis",
""
],
[
"Kosmopoulos",
"Aris",
""
],
[
"Baskiotis",
"Nicolas",
""
],
[
"Artieres",
"Thierry",
""
],
[
"Paliouras",
"George",
""
],
[
"Gaussier",
"Eric",
""
],
[
"Androutsopoulos",
"Ion",
""
],
[
"Amini",
"Massih-Reza",
""
],
[
"Galinari",
"Patrick",
""
]
] | TITLE: LSHTC: A Benchmark for Large-Scale Text Classification
ABSTRACT: LSHTC is a series of challenges which aims to assess the performance of
classification systems in large-scale classification in a a large number of
classes (up to hundreds of thousands). This paper describes the dataset that
have been released along the LSHTC series. The paper details the construction
of the datsets and the design of the tracks as well as the evaluation measures
that we implemented and a quick overview of the results. All of these datasets
are available online and runs may still be submitted on the online server of
the challenges.
| no_new_dataset | 0.667825 |
1503.08639 | Rapha\"el Li\'egeois | Rapha\"el Li\'egeois, Bamdev Mishra, Mattia Zorzi, Rodolphe Sepulchre | Sparse plus low-rank autoregressive identification in neuroimaging time
series | 6 pages paper submitted to CDC 2015 | null | null | null | cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of identifying multivariate autoregressive
(AR) sparse plus low-rank graphical models. Based on the corresponding problem
formulation recently presented, we use the alternating direction method of
multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in
neuroimaging applications. We apply this decomposition on synthetic and real
neuroimaging datasets with a specific focus on the information encoded in the
low-rank structure of our model. In particular, we illustrate that this
information captures the spatio-temporal structure of the original data,
generalizing classical component analysis approaches.
| [
{
"version": "v1",
"created": "Mon, 30 Mar 2015 11:11:57 GMT"
}
] | 2015-03-31T00:00:00 | [
[
"Liégeois",
"Raphaël",
""
],
[
"Mishra",
"Bamdev",
""
],
[
"Zorzi",
"Mattia",
""
],
[
"Sepulchre",
"Rodolphe",
""
]
] | TITLE: Sparse plus low-rank autoregressive identification in neuroimaging time
series
ABSTRACT: This paper considers the problem of identifying multivariate autoregressive
(AR) sparse plus low-rank graphical models. Based on the corresponding problem
formulation recently presented, we use the alternating direction method of
multipliers (ADMM) to efficiently solve it and scale it to sizes encountered in
neuroimaging applications. We apply this decomposition on synthetic and real
neuroimaging datasets with a specific focus on the information encoded in the
low-rank structure of our model. In particular, we illustrate that this
information captures the spatio-temporal structure of the original data,
generalizing classical component analysis approaches.
| no_new_dataset | 0.710409 |
1406.0288 | Radu Horaud P | Kaustubh Kulkarni, Georgios Evangelidis, Jan Cech and Radu Horaud | Continuous Action Recognition Based on Sequence Alignment | null | International Journal of Computer Vision 112(1), 90-114, 2015 | 10.1007/s11263-014-0758-9 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Continuous action recognition is more challenging than isolated recognition
because classification and segmentation must be simultaneously carried out. We
build on the well known dynamic time warping (DTW) framework and devise a novel
visual alignment technique, namely dynamic frame warping (DFW), which performs
isolated recognition based on per-frame representation of videos, and on
aligning a test sequence with a model sequence. Moreover, we propose two
extensions which enable to perform recognition concomitant with segmentation,
namely one-pass DFW and two-pass DFW. These two methods have their roots in the
domain of continuous recognition of speech and, to the best of our knowledge,
their extension to continuous visual action recognition has been overlooked. We
test and illustrate the proposed techniques with a recently released dataset
(RAVEL) and with two public-domain datasets widely used in action recognition
(Hollywood-1 and Hollywood-2). We also compare the performances of the proposed
isolated and continuous recognition algorithms with several recently published
methods.
| [
{
"version": "v1",
"created": "Mon, 2 Jun 2014 08:21:27 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Kulkarni",
"Kaustubh",
""
],
[
"Evangelidis",
"Georgios",
""
],
[
"Cech",
"Jan",
""
],
[
"Horaud",
"Radu",
""
]
] | TITLE: Continuous Action Recognition Based on Sequence Alignment
ABSTRACT: Continuous action recognition is more challenging than isolated recognition
because classification and segmentation must be simultaneously carried out. We
build on the well known dynamic time warping (DTW) framework and devise a novel
visual alignment technique, namely dynamic frame warping (DFW), which performs
isolated recognition based on per-frame representation of videos, and on
aligning a test sequence with a model sequence. Moreover, we propose two
extensions which enable to perform recognition concomitant with segmentation,
namely one-pass DFW and two-pass DFW. These two methods have their roots in the
domain of continuous recognition of speech and, to the best of our knowledge,
their extension to continuous visual action recognition has been overlooked. We
test and illustrate the proposed techniques with a recently released dataset
(RAVEL) and with two public-domain datasets widely used in action recognition
(Hollywood-1 and Hollywood-2). We also compare the performances of the proposed
isolated and continuous recognition algorithms with several recently published
methods.
| new_dataset | 0.717012 |
1503.07884 | Yongxin Yang | Yanwei Fu, Yongxin Yang, Timothy M. Hospedales, Tao Xiang and Shaogang
Gong | Transductive Multi-class and Multi-label Zero-shot Learning | 4 pages, 4 figures, ECCV 2014 Workshop on Parts and Attributes | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, zero-shot learning (ZSL) has received increasing interest. The key
idea underpinning existing ZSL approaches is to exploit knowledge transfer via
an intermediate-level semantic representation which is assumed to be shared
between the auxiliary and target datasets, and is used to bridge between these
domains for knowledge transfer. The semantic representation used in existing
approaches varies from visual attributes to semantic word vectors and semantic
relatedness. However, the overall pipeline is similar: a projection mapping
low-level features to the semantic representation is learned from the auxiliary
dataset by either classification or regression models and applied directly to
map each instance into the same semantic representation space where a zero-shot
classifier is used to recognise the unseen target class instances with a single
known 'prototype' of each target class. In this paper we discuss two related
lines of work improving the conventional approach: exploiting transductive
learning ZSL, and generalising ZSL to the multi-label case.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 20:07:37 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Fu",
"Yanwei",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Timothy M.",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Transductive Multi-class and Multi-label Zero-shot Learning
ABSTRACT: Recently, zero-shot learning (ZSL) has received increasing interest. The key
idea underpinning existing ZSL approaches is to exploit knowledge transfer via
an intermediate-level semantic representation which is assumed to be shared
between the auxiliary and target datasets, and is used to bridge between these
domains for knowledge transfer. The semantic representation used in existing
approaches varies from visual attributes to semantic word vectors and semantic
relatedness. However, the overall pipeline is similar: a projection mapping
low-level features to the semantic representation is learned from the auxiliary
dataset by either classification or regression models and applied directly to
map each instance into the same semantic representation space where a zero-shot
classifier is used to recognise the unseen target class instances with a single
known 'prototype' of each target class. In this paper we discuss two related
lines of work improving the conventional approach: exploiting transductive
learning ZSL, and generalising ZSL to the multi-label case.
| no_new_dataset | 0.707645 |
1503.07939 | Raktim Bhattacharya | Raktim Bhattacharya | Robust State Feedback Control Design with Probabilistic System
Parameters | Published in CDC 2014 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new polynomial chaos based framework for analyzing linear
systems with probabilistic parameters is presented. Stability analysis and
synthesis of optimal quadratically stabilizing controllers for such systems are
presented as convex optimization problems, with exponential mean square
stability guarantees. A Monte-Carlo approach for analysis and synthesis is also
presented, which is used to benchmark the polynomial chaos based approach. The
computational advantage of the polynomial chaos approach is shown with an
example based on the design of an optimal EMS-stabilizing controller, for an
F-16 aircraft model.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 01:40:36 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Bhattacharya",
"Raktim",
""
]
] | TITLE: Robust State Feedback Control Design with Probabilistic System
Parameters
ABSTRACT: In this paper, a new polynomial chaos based framework for analyzing linear
systems with probabilistic parameters is presented. Stability analysis and
synthesis of optimal quadratically stabilizing controllers for such systems are
presented as convex optimization problems, with exponential mean square
stability guarantees. A Monte-Carlo approach for analysis and synthesis is also
presented, which is used to benchmark the polynomial chaos based approach. The
computational advantage of the polynomial chaos approach is shown with an
example based on the design of an optimal EMS-stabilizing controller, for an
F-16 aircraft model.
| no_new_dataset | 0.710176 |
1503.07989 | Naveed Akhtar Mr. | Naveed Akhtar, Faisal Shafait, Ajmal Mian | Discriminative Bayesian Dictionary Learning for Classification | 15 pages | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a Bayesian approach to learn discriminative dictionaries for
sparse representation of data. The proposed approach infers probability
distributions over the atoms of a discriminative dictionary using a Beta
Process. It also computes sets of Bernoulli distributions that associate class
labels to the learned dictionary atoms. This association signifies the
selection probabilities of the dictionary atoms in the expansion of
class-specific data. Furthermore, the non-parametric character of the proposed
approach allows it to infer the correct size of the dictionary. We exploit the
aforementioned Bernoulli distributions in separately learning a linear
classifier. The classifier uses the same hierarchical Bayesian model as the
dictionary, which we present along the analytical inference solution for Gibbs
sampling. For classification, a test instance is first sparsely encoded over
the learned dictionary and the codes are fed to the classifier. We performed
experiments for face and action recognition; and object and scene-category
classification using five public datasets and compared the results with
state-of-the-art discriminative sparse representation approaches. Experiments
show that the proposed Bayesian approach consistently outperforms the existing
approaches.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 08:36:15 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Akhtar",
"Naveed",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: Discriminative Bayesian Dictionary Learning for Classification
ABSTRACT: We propose a Bayesian approach to learn discriminative dictionaries for
sparse representation of data. The proposed approach infers probability
distributions over the atoms of a discriminative dictionary using a Beta
Process. It also computes sets of Bernoulli distributions that associate class
labels to the learned dictionary atoms. This association signifies the
selection probabilities of the dictionary atoms in the expansion of
class-specific data. Furthermore, the non-parametric character of the proposed
approach allows it to infer the correct size of the dictionary. We exploit the
aforementioned Bernoulli distributions in separately learning a linear
classifier. The classifier uses the same hierarchical Bayesian model as the
dictionary, which we present along the analytical inference solution for Gibbs
sampling. For classification, a test instance is first sparsely encoded over
the learned dictionary and the codes are fed to the classifier. We performed
experiments for face and action recognition; and object and scene-category
classification using five public datasets and compared the results with
state-of-the-art discriminative sparse representation approaches. Experiments
show that the proposed Bayesian approach consistently outperforms the existing
approaches.
| no_new_dataset | 0.709818 |
1503.08081 | Manfred Poechacker DI | Manfred P\"ochacker, Dominik Egarter, Wilfried Elmenreich | Proficiency of Power Values for Load Disaggregation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Load disaggregation techniques infer the operation of different power
consuming devices from a single measurement point that records the total power
draw over time. Thus, a device consuming power at the moment can be understood
as information encoded in the power draw. However, similar power draws or
similar combinations of power draws limit the ability to detect the currently
active device set. We present an information coding perspective of load
disaggregation to enable a better understanding of this process and to support
its future improvement. In typical cases of quantity and type of devices and
their respective power consumption, not all possible device configurations can
be mapped to distinguishable power values. We introduce the term of proficiency
to describe the suitability of a device set for load disaggregation. We provide
the notion and calculation of entropy of initial device states, mutual
information of power values and the resulting uncertainty coefficient or
proficiency. We show that the proficiency is highly dependent from the device
running probability especially for devices with multiple states of power
consumption. The application of the concept is demonstrated by exemplary
artificial data as well as with actual power consumption data from real-world
power draw datasets.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2015 14:01:07 GMT"
}
] | 2015-03-30T00:00:00 | [
[
"Pöchacker",
"Manfred",
""
],
[
"Egarter",
"Dominik",
""
],
[
"Elmenreich",
"Wilfried",
""
]
] | TITLE: Proficiency of Power Values for Load Disaggregation
ABSTRACT: Load disaggregation techniques infer the operation of different power
consuming devices from a single measurement point that records the total power
draw over time. Thus, a device consuming power at the moment can be understood
as information encoded in the power draw. However, similar power draws or
similar combinations of power draws limit the ability to detect the currently
active device set. We present an information coding perspective of load
disaggregation to enable a better understanding of this process and to support
its future improvement. In typical cases of quantity and type of devices and
their respective power consumption, not all possible device configurations can
be mapped to distinguishable power values. We introduce the term of proficiency
to describe the suitability of a device set for load disaggregation. We provide
the notion and calculation of entropy of initial device states, mutual
information of power values and the resulting uncertainty coefficient or
proficiency. We show that the proficiency is highly dependent from the device
running probability especially for devices with multiple states of power
consumption. The application of the concept is demonstrated by exemplary
artificial data as well as with actual power consumption data from real-world
power draw datasets.
| no_new_dataset | 0.709598 |
1503.05571 | Guillaume Alain | Guillaume Alain, Yoshua Bengio, Li Yao, Jason Yosinski, Eric
Thibodeau-Laufer, Saizheng Zhang, Pascal Vincent | GSNs : Generative Stochastic Networks | arXiv admin note: substantial text overlap with arXiv:1306.1091 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a novel training principle for probabilistic models that is an
alternative to maximum likelihood. The proposed Generative Stochastic Networks
(GSN) framework is based on learning the transition operator of a Markov chain
whose stationary distribution estimates the data distribution. Because the
transition distribution is a conditional distribution generally involving a
small move, it has fewer dominant modes, being unimodal in the limit of small
moves. Thus, it is easier to learn, more like learning to perform supervised
function approximation, with gradients that can be obtained by
back-propagation. The theorems provided here generalize recent work on the
probabilistic interpretation of denoising auto-encoders and provide an
interesting justification for dependency networks and generalized
pseudolikelihood (along with defining an appropriate joint distribution and
sampling mechanism, even when the conditionals are not consistent). We study
how GSNs can be used with missing inputs and can be used to sample subsets of
variables given the rest. Successful experiments are conducted, validating
these theoretical results, on two image datasets and with a particular
architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows
training to proceed with backprop, without the need for layerwise pretraining.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2015 20:06:07 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2015 16:44:52 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"Alain",
"Guillaume",
""
],
[
"Bengio",
"Yoshua",
""
],
[
"Yao",
"Li",
""
],
[
"Yosinski",
"Jason",
""
],
[
"Thibodeau-Laufer",
"Eric",
""
],
[
"Zhang",
"Saizheng",
""
],
[
"Vincent",
"Pascal",
""
]
] | TITLE: GSNs : Generative Stochastic Networks
ABSTRACT: We introduce a novel training principle for probabilistic models that is an
alternative to maximum likelihood. The proposed Generative Stochastic Networks
(GSN) framework is based on learning the transition operator of a Markov chain
whose stationary distribution estimates the data distribution. Because the
transition distribution is a conditional distribution generally involving a
small move, it has fewer dominant modes, being unimodal in the limit of small
moves. Thus, it is easier to learn, more like learning to perform supervised
function approximation, with gradients that can be obtained by
back-propagation. The theorems provided here generalize recent work on the
probabilistic interpretation of denoising auto-encoders and provide an
interesting justification for dependency networks and generalized
pseudolikelihood (along with defining an appropriate joint distribution and
sampling mechanism, even when the conditionals are not consistent). We study
how GSNs can be used with missing inputs and can be used to sample subsets of
variables given the rest. Successful experiments are conducted, validating
these theoretical results, on two image datasets and with a particular
architecture that mimics the Deep Boltzmann Machine Gibbs sampler but allows
training to proceed with backprop, without the need for layerwise pretraining.
| no_new_dataset | 0.71022 |
1503.06268 | Tanmoy Chakraborty | Tanmoy Chakraborty, Suhansanu Kumar, Pawan Goyal, Niloy Ganguly,
Animesh Mukherjee | On the categorization of scientific citation profiles in computer
sciences | 11 pages, 10 figures, Accepted in Communications of the ACM (CACM),
2015. arXiv admin note: text overlap with arXiv:1206.0108 by other authors | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common consensus in the literature is that the citation profile of
published articles in general follows a universal pattern - an initial growth
in the number of citations within the first two to three years after
publication followed by a steady peak of one to two years and then a final
decline over the rest of the lifetime of the article. This observation has long
been the underlying heuristic in determining major bibliometric factors such as
the quality of a publication, the growth of scientific communities, impact
factor of publication venues etc. In this paper, we gather and analyze a
massive dataset of scientific papers from the computer science domain and
notice that the citation count of the articles over the years follows a
remarkably diverse set of patterns - a profile with an initial peak (PeakInit),
with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate),
that is monotonically decreasing (MonDec), that is monotonically increasing
(MonIncr) and that can not be categorized into any of the above (Oth). We
conduct a thorough experiment to investigate several important characteristics
of these categories such as how individual categories attract citations, how
the categorization is influenced by the year and the venue of publication of
papers, how each category is affected by self-citations, the stability of the
categories over time, and how much each of these categories contribute to the
core of the network. Further, we show that the traditional preferential
attachment models fail to explain these citation profiles. Therefore, we
propose a novel dynamic growth model that takes both the preferential
attachment and the aging factor into account in order to replicate the
real-world behavior of various citation profiles. We believe that this paper
opens the scope for a serious re-investigation of the existing bibliometric
indices for scientific research.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 06:03:44 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"Chakraborty",
"Tanmoy",
""
],
[
"Kumar",
"Suhansanu",
""
],
[
"Goyal",
"Pawan",
""
],
[
"Ganguly",
"Niloy",
""
],
[
"Mukherjee",
"Animesh",
""
]
] | TITLE: On the categorization of scientific citation profiles in computer
sciences
ABSTRACT: A common consensus in the literature is that the citation profile of
published articles in general follows a universal pattern - an initial growth
in the number of citations within the first two to three years after
publication followed by a steady peak of one to two years and then a final
decline over the rest of the lifetime of the article. This observation has long
been the underlying heuristic in determining major bibliometric factors such as
the quality of a publication, the growth of scientific communities, impact
factor of publication venues etc. In this paper, we gather and analyze a
massive dataset of scientific papers from the computer science domain and
notice that the citation count of the articles over the years follows a
remarkably diverse set of patterns - a profile with an initial peak (PeakInit),
with distinct multiple peaks (PeakMul), with a peak late in time (PeakLate),
that is monotonically decreasing (MonDec), that is monotonically increasing
(MonIncr) and that can not be categorized into any of the above (Oth). We
conduct a thorough experiment to investigate several important characteristics
of these categories such as how individual categories attract citations, how
the categorization is influenced by the year and the venue of publication of
papers, how each category is affected by self-citations, the stability of the
categories over time, and how much each of these categories contribute to the
core of the network. Further, we show that the traditional preferential
attachment models fail to explain these citation profiles. Therefore, we
propose a novel dynamic growth model that takes both the preferential
attachment and the aging factor into account in order to replicate the
real-world behavior of various citation profiles. We believe that this paper
opens the scope for a serious re-investigation of the existing bibliometric
indices for scientific research.
| no_new_dataset | 0.708767 |
1503.06608 | Lakshmi Devasena C | Lakshmi Devasena C | Proficiency Comparison of LADTree and REPTree Classifiers for Credit
Risk Forecast | arXiv admin note: text overlap with arXiv:1310.5963 by other authors | International Journal on Computational Sciences & Applications
(IJCSA) Vol.5, No.1, February 2015, pp. 39 - 50 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicting the Credit Defaulter is a perilous task of Financial Industries
like Banks. Ascertaining non-payer before giving loan is a significant and
conflict-ridden task of the Banker. Classification techniques are the better
choice for predictive analysis like finding the claimant, whether he/she is an
unpretentious customer or a cheat. Defining the outstanding classifier is a
risky assignment for any industrialist like a banker. This allow computer
science researchers to drill down efficient research works through evaluating
different classifiers and finding out the best classifier for such predictive
problems. This research work investigates the productivity of LADTree
Classifier and REPTree Classifier for the credit risk prediction and compares
their fitness through various measures. German credit dataset has been taken
and used to predict the credit risk with a help of open source machine learning
tool.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 11:47:05 GMT"
}
] | 2015-03-29T00:00:00 | [
[
"C",
"Lakshmi Devasena",
""
]
] | TITLE: Proficiency Comparison of LADTree and REPTree Classifiers for Credit
Risk Forecast
ABSTRACT: Predicting the Credit Defaulter is a perilous task of Financial Industries
like Banks. Ascertaining non-payer before giving loan is a significant and
conflict-ridden task of the Banker. Classification techniques are the better
choice for predictive analysis like finding the claimant, whether he/she is an
unpretentious customer or a cheat. Defining the outstanding classifier is a
risky assignment for any industrialist like a banker. This allow computer
science researchers to drill down efficient research works through evaluating
different classifiers and finding out the best classifier for such predictive
problems. This research work investigates the productivity of LADTree
Classifier and REPTree Classifier for the credit risk prediction and compares
their fitness through various measures. German credit dataset has been taken
and used to predict the credit risk with a help of open source machine learning
tool.
| no_new_dataset | 0.710434 |
1403.4597 | Zheng Nan | Zheng Nan, Tianyi Chen, Xin Wang, and Wei Ni | Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data
Arrivals under Non-Ideal Circuit Power Consumption | 30 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a novel approach to obtaining energy-efficient
transmission schedules for delay-limited bursty data arrivals under non-ideal
circuit power consumption. Assuming a-prior knowledge of packet arrivals,
deadlines and channel realizations, we show that the problem can be formulated
as a convex program. For both time-invariant and time-varying fading channels,
it is revealed that the optimal transmission between any two consecutive
channel or data state changing instants, termed epoch, can only take one of the
three strategies: (i) no transmission, (ii) transmission with an
energy-efficiency (EE) maximizing rate over part of the epoch, or (iii)
transmission with a rate greater than the EE-maximizing rate over the whole
epoch. Based on this specific structure, efficient algorithms are then
developed to find the optimal policies that minimize the total energy
consumption with a low computational complexity. The proposed approach can
provide the optimal benchmarks for practical schemes designed for transmissions
of delay-limited data arrivals, and can be employed to develop efficient online
scheduling schemes which require only causal knowledge of data arrivals and
deadline requirements.
| [
{
"version": "v1",
"created": "Tue, 18 Mar 2014 02:28:59 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Mar 2015 01:51:42 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Nan",
"Zheng",
""
],
[
"Chen",
"Tianyi",
""
],
[
"Wang",
"Xin",
""
],
[
"Ni",
"Wei",
""
]
] | TITLE: Energy-Efficient Transmission Schedule for Delay-Limited Bursty Data
Arrivals under Non-Ideal Circuit Power Consumption
ABSTRACT: This paper develops a novel approach to obtaining energy-efficient
transmission schedules for delay-limited bursty data arrivals under non-ideal
circuit power consumption. Assuming a-prior knowledge of packet arrivals,
deadlines and channel realizations, we show that the problem can be formulated
as a convex program. For both time-invariant and time-varying fading channels,
it is revealed that the optimal transmission between any two consecutive
channel or data state changing instants, termed epoch, can only take one of the
three strategies: (i) no transmission, (ii) transmission with an
energy-efficiency (EE) maximizing rate over part of the epoch, or (iii)
transmission with a rate greater than the EE-maximizing rate over the whole
epoch. Based on this specific structure, efficient algorithms are then
developed to find the optimal policies that minimize the total energy
consumption with a low computational complexity. The proposed approach can
provide the optimal benchmarks for practical schemes designed for transmissions
of delay-limited data arrivals, and can be employed to develop efficient online
scheduling schemes which require only causal knowledge of data arrivals and
deadline requirements.
| no_new_dataset | 0.71103 |
1503.07783 | Faraz Saeedan | Faraz Saeedan, Barbara Caputo | Towards Learning free Naive Bayes Nearest Neighbor-based Domain
Adaptation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As of today, object categorization algorithms are not able to achieve the
level of robustness and generality necessary to work reliably in the real
world. Even the most powerful convolutional neural network we can train fails
to perform satisfactorily when trained and tested on data from different
databases. This issue, known as domain adaptation and/or dataset bias in the
literature, is due to a distribution mismatch between data collections. Methods
addressing it go from max-margin classifiers to learning how to modify the
features and obtain a more robust representation. Recent work showed that by
casting the problem into the image-to-class recognition framework, the domain
adaptation problem is significantly alleviated \cite{danbnn}. Here we follow
this approach, and show how a very simple, learning free Naive Bayes Nearest
Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate
the distribution mismatch among source and target data, especially when the
number of classes and the number of sources grow. Experiments on standard
benchmarks used in the literature show that our approach (a) is competitive
with the current state of the art on small scale problems, and (b) achieves the
current state of the art as the number of classes and sources grows, with
minimal computational requirements.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 16:55:19 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Saeedan",
"Faraz",
""
],
[
"Caputo",
"Barbara",
""
]
] | TITLE: Towards Learning free Naive Bayes Nearest Neighbor-based Domain
Adaptation
ABSTRACT: As of today, object categorization algorithms are not able to achieve the
level of robustness and generality necessary to work reliably in the real
world. Even the most powerful convolutional neural network we can train fails
to perform satisfactorily when trained and tested on data from different
databases. This issue, known as domain adaptation and/or dataset bias in the
literature, is due to a distribution mismatch between data collections. Methods
addressing it go from max-margin classifiers to learning how to modify the
features and obtain a more robust representation. Recent work showed that by
casting the problem into the image-to-class recognition framework, the domain
adaptation problem is significantly alleviated \cite{danbnn}. Here we follow
this approach, and show how a very simple, learning free Naive Bayes Nearest
Neighbor (NBNN)-based domain adaptation algorithm can significantly alleviate
the distribution mismatch among source and target data, especially when the
number of classes and the number of sources grow. Experiments on standard
benchmarks used in the literature show that our approach (a) is competitive
with the current state of the art on small scale problems, and (b) achieves the
current state of the art as the number of classes and sources grows, with
minimal computational requirements.
| no_new_dataset | 0.710879 |
1503.07790 | Yongxin Yang | Yanwei Fu, Yongxin Yang, Tim Hospedales, Tao Xiang and Shaogang Gong | Transductive Multi-label Zero-shot Learning | 12 pages, 6 figures, Accepted to BMVC 2014 (oral) | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zero-shot learning has received increasing interest as a means to alleviate
the often prohibitive expense of annotating training data for large scale
recognition problems. These methods have achieved great success via learning
intermediate semantic representations in the form of attributes and more
recently, semantic word vectors. However, they have thus far been constrained
to the single-label case, in contrast to the growing popularity and importance
of more realistic multi-label data. In this paper, for the first time, we
investigate and formalise a general framework for multi-label zero-shot
learning, addressing the unique challenge therein: how to exploit multi-label
correlation at test time with no training data for those classes? In
particular, we propose (1) a multi-output deep regression model to project an
image into a semantic word space, which explicitly exploits the correlations in
the intermediate semantic layer of word vectors; (2) a novel zero-shot learning
algorithm for multi-label data that exploits the unique compositionality
property of semantic word vector representations; and (3) a transductive
learning strategy to enable the regression model learned from seen classes to
generalise well to unseen classes. Our zero-shot learning experiments on a
number of standard multi-label datasets demonstrate that our method outperforms
a variety of baselines.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2015 17:12:34 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Fu",
"Yanwei",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Hospedales",
"Tim",
""
],
[
"Xiang",
"Tao",
""
],
[
"Gong",
"Shaogang",
""
]
] | TITLE: Transductive Multi-label Zero-shot Learning
ABSTRACT: Zero-shot learning has received increasing interest as a means to alleviate
the often prohibitive expense of annotating training data for large scale
recognition problems. These methods have achieved great success via learning
intermediate semantic representations in the form of attributes and more
recently, semantic word vectors. However, they have thus far been constrained
to the single-label case, in contrast to the growing popularity and importance
of more realistic multi-label data. In this paper, for the first time, we
investigate and formalise a general framework for multi-label zero-shot
learning, addressing the unique challenge therein: how to exploit multi-label
correlation at test time with no training data for those classes? In
particular, we propose (1) a multi-output deep regression model to project an
image into a semantic word space, which explicitly exploits the correlations in
the intermediate semantic layer of word vectors; (2) a novel zero-shot learning
algorithm for multi-label data that exploits the unique compositionality
property of semantic word vector representations; and (3) a transductive
learning strategy to enable the regression model learned from seen classes to
generalise well to unseen classes. Our zero-shot learning experiments on a
number of standard multi-label datasets demonstrate that our method outperforms
a variety of baselines.
| no_new_dataset | 0.709585 |
1503.07828 | Graham Pulford | Graham W. Pulford | A Survey of Manoeuvring Target Tracking Methods | 38 pages, 6 figures. Original manuscript dated 23/12/1998. Submitted
to IEEE Transactions on Aerospace & Electronic Systems. Withdrawn following a
review process lasting 3 years. By the end of this period, this survey paper
was out of date | null | 10.13140/2.1.4994.3846 | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A comprehensive review of the literature on manoeuvring target tracking for
both uncluttered and cluttered measurements is presented. Various discrete-time
dynamical models including non-random input, random-input and switching or
hybrid system manoeuvre models are presented. The problem of manoeuvre
detection is covered. Classical and current filtering methods for manoeuvre
tracking are presented including multi-level process noise, input estimation,
variable dimension filtering, two-stage filter, the interacting multiple model
algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of
these algorithms to the case of cluttered measurements are also described and
these include: joint manoeuvre and measurement association, probabilistic data
association and multi-hypothesis tracking. Smoothing schemes, including IMM
smoothing and batch expectation-maximisation using the Viterbi algorithm, are
also described. The use of amplitude information for target measurement
discrimination is discussed. It is noted that although many manoeuvre tacking
techniques exist, the literature contains surprisingly few performance
comparisons to guide the design engineer although a performance benchmark has
recently been introduced.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2015 01:35:12 GMT"
}
] | 2015-03-27T00:00:00 | [
[
"Pulford",
"Graham W.",
""
]
] | TITLE: A Survey of Manoeuvring Target Tracking Methods
ABSTRACT: A comprehensive review of the literature on manoeuvring target tracking for
both uncluttered and cluttered measurements is presented. Various discrete-time
dynamical models including non-random input, random-input and switching or
hybrid system manoeuvre models are presented. The problem of manoeuvre
detection is covered. Classical and current filtering methods for manoeuvre
tracking are presented including multi-level process noise, input estimation,
variable dimension filtering, two-stage filter, the interacting multiple model
algorithm, and generalised pseudo-Bayesian algorithms. Various extensions of
these algorithms to the case of cluttered measurements are also described and
these include: joint manoeuvre and measurement association, probabilistic data
association and multi-hypothesis tracking. Smoothing schemes, including IMM
smoothing and batch expectation-maximisation using the Viterbi algorithm, are
also described. The use of amplitude information for target measurement
discrimination is discussed. It is noted that although many manoeuvre tacking
techniques exist, the literature contains surprisingly few performance
comparisons to guide the design engineer although a performance benchmark has
recently been introduced.
| no_new_dataset | 0.709057 |
1503.05768 | Yunjin Chen | Yunjin Chen, Wei Yu, Thomas Pock | On learning optimized reaction diffusion processes for effective image
restoration | 9 pages, 3 figures, 3 tables. CVPR2015 oral presentation together
with the supplemental material of 13 pages, 8 pages (Notes on diffusion
networks) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For several decades, image restoration remains an active research topic in
low-level computer vision and hence new approaches are constantly emerging.
However, many recently proposed algorithms achieve state-of-the-art performance
only at the expense of very high computation time, which clearly limits their
practical relevance. In this work, we propose a simple but effective approach
with both high computational efficiency and high restoration quality. We extend
conventional nonlinear reaction diffusion models by several parametrized linear
filters as well as several parametrized influence functions. We propose to
train the parameters of the filters and the influence functions through a loss
based approach. Experiments show that our trained nonlinear reaction diffusion
models largely benefit from the training of the parameters and finally lead to
the best reported performance on common test datasets for image restoration.
Due to their structural simplicity, our trained models are highly efficient and
are also well-suited for parallel computation on GPUs.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2015 14:01:42 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Mar 2015 19:59:44 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Chen",
"Yunjin",
""
],
[
"Yu",
"Wei",
""
],
[
"Pock",
"Thomas",
""
]
] | TITLE: On learning optimized reaction diffusion processes for effective image
restoration
ABSTRACT: For several decades, image restoration remains an active research topic in
low-level computer vision and hence new approaches are constantly emerging.
However, many recently proposed algorithms achieve state-of-the-art performance
only at the expense of very high computation time, which clearly limits their
practical relevance. In this work, we propose a simple but effective approach
with both high computational efficiency and high restoration quality. We extend
conventional nonlinear reaction diffusion models by several parametrized linear
filters as well as several parametrized influence functions. We propose to
train the parameters of the filters and the influence functions through a loss
based approach. Experiments show that our trained nonlinear reaction diffusion
models largely benefit from the training of the parameters and finally lead to
the best reported performance on common test datasets for image restoration.
Due to their structural simplicity, our trained models are highly efficient and
are also well-suited for parallel computation on GPUs.
| no_new_dataset | 0.711469 |
1503.07240 | Dengyong Zhou | Dengyong Zhou, Qiang Liu, John C. Platt, Christopher Meek, Nihar B.
Shah | Regularized Minimax Conditional Entropy for Crowdsourcing | 31 pages | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a rapidly increasing interest in crowdsourcing for data labeling. By
crowdsourcing, a large number of labels can be often quickly gathered at low
cost. However, the labels provided by the crowdsourcing workers are usually not
of high quality. In this paper, we propose a minimax conditional entropy
principle to infer ground truth from noisy crowdsourced labels. Under this
principle, we derive a unique probabilistic labeling model jointly
parameterized by worker ability and item difficulty. We also propose an
objective measurement principle, and show that our method is the only method
which satisfies this objective measurement principle. We validate our method
through a variety of real crowdsourcing datasets with binary, multiclass or
ordinal labels.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 00:10:11 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Zhou",
"Dengyong",
""
],
[
"Liu",
"Qiang",
""
],
[
"Platt",
"John C.",
""
],
[
"Meek",
"Christopher",
""
],
[
"Shah",
"Nihar B.",
""
]
] | TITLE: Regularized Minimax Conditional Entropy for Crowdsourcing
ABSTRACT: There is a rapidly increasing interest in crowdsourcing for data labeling. By
crowdsourcing, a large number of labels can be often quickly gathered at low
cost. However, the labels provided by the crowdsourcing workers are usually not
of high quality. In this paper, we propose a minimax conditional entropy
principle to infer ground truth from noisy crowdsourced labels. Under this
principle, we derive a unique probabilistic labeling model jointly
parameterized by worker ability and item difficulty. We also propose an
objective measurement principle, and show that our method is the only method
which satisfies this objective measurement principle. We validate our method
through a variety of real crowdsourcing datasets with binary, multiclass or
ordinal labels.
| no_new_dataset | 0.713076 |
1503.07274 | Elman Mansimov | Elman Mansimov, Nitish Srivastava, Ruslan Salakhutdinov | Initialization Strategies of Spatio-Temporal Convolutional Neural
Networks | Technical Report | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new way of incorporating temporal information present in videos
into Spatial Convolutional Neural Networks (ConvNets) trained on images, that
avoids training Spatio-Temporal ConvNets from scratch. We describe several
initializations of weights in 3D Convolutional Layers of Spatio-Temporal
ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it
is important to initialize 3D Convolutional Weights judiciously in order to
learn temporal representations of videos. We evaluate our methods on the
UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 03:41:47 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Mansimov",
"Elman",
""
],
[
"Srivastava",
"Nitish",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] | TITLE: Initialization Strategies of Spatio-Temporal Convolutional Neural
Networks
ABSTRACT: We propose a new way of incorporating temporal information present in videos
into Spatial Convolutional Neural Networks (ConvNets) trained on images, that
avoids training Spatio-Temporal ConvNets from scratch. We describe several
initializations of weights in 3D Convolutional Layers of Spatio-Temporal
ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it
is important to initialize 3D Convolutional Weights judiciously in order to
learn temporal representations of videos. We evaluate our methods on the
UCF-101 dataset and demonstrate improvement over Spatial ConvNets.
| no_new_dataset | 0.711268 |
1503.07405 | Arkaitz Zubiaga | Bo Wang, Arkaitz Zubiaga, Maria Liakata, Rob Procter | Making the Most of Tweet-Inherent Features for Social Spam Detection on
Twitter | null | null | null | null | cs.IR cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social spam produces a great amount of noise on social media services such as
Twitter, which reduces the signal-to-noise ratio that both end users and data
mining applications observe. Existing techniques on social spam detection have
focused primarily on the identification of spam accounts by using extensive
historical and network-based data. In this paper we focus on the detection of
spam tweets, which optimises the amount of data that needs to be gathered by
relying only on tweet-inherent features. This enables the application of the
spam detection system to a large set of tweets in a timely fashion, potentially
applicable in a real-time or near real-time setting. Using two large
hand-labelled datasets of tweets containing spam, we study the suitability of
five classification algorithms and four different feature sets to the social
spam detection task. Our results show that, by using the limited set of
features readily available in a tweet, we can achieve encouraging results which
are competitive when compared against existing spammer detection systems that
make use of additional, costly user features. Our study is the first that
attempts at generalising conclusions on the optimal classifiers and sets of
features for social spam detection over different datasets.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 14:58:59 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Wang",
"Bo",
""
],
[
"Zubiaga",
"Arkaitz",
""
],
[
"Liakata",
"Maria",
""
],
[
"Procter",
"Rob",
""
]
] | TITLE: Making the Most of Tweet-Inherent Features for Social Spam Detection on
Twitter
ABSTRACT: Social spam produces a great amount of noise on social media services such as
Twitter, which reduces the signal-to-noise ratio that both end users and data
mining applications observe. Existing techniques on social spam detection have
focused primarily on the identification of spam accounts by using extensive
historical and network-based data. In this paper we focus on the detection of
spam tweets, which optimises the amount of data that needs to be gathered by
relying only on tweet-inherent features. This enables the application of the
spam detection system to a large set of tweets in a timely fashion, potentially
applicable in a real-time or near real-time setting. Using two large
hand-labelled datasets of tweets containing spam, we study the suitability of
five classification algorithms and four different feature sets to the social
spam detection task. Our results show that, by using the limited set of
features readily available in a tweet, we can achieve encouraging results which
are competitive when compared against existing spammer detection systems that
make use of additional, costly user features. Our study is the first that
attempts at generalising conclusions on the optimal classifiers and sets of
features for social spam detection over different datasets.
| no_new_dataset | 0.70883 |
1503.07477 | Debajyoti Mukhopadhyay Prof. | Praful Koturwar, Sheetal Girase, Debajyoti Mukhopadhyay | A Survey of Classification Techniques in the Area of Big Data | 7 pages, 3 figures, 2 tables in IJAFRC, Vol.1, Issue 11, November
2014, ISSN: 2348-4853 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big Data concern large-volume, growing data sets that are complex and have
multiple autonomous sources. Earlier technologies were not able to handle
storage and processing of huge data thus Big Data concept comes into existence.
This is a tedious job for users unstructured data. So, there should be some
mechanism which classify unstructured data into organized form which helps user
to easily access required data. Classification techniques over big
transactional database provide required data to the users from large datasets
more simple way. There are two main classification techniques, supervised and
unsupervised. In this paper we focused on to study of different supervised
classification techniques. Further this paper shows a advantages and
limitations.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2015 17:56:19 GMT"
}
] | 2015-03-26T00:00:00 | [
[
"Koturwar",
"Praful",
""
],
[
"Girase",
"Sheetal",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] | TITLE: A Survey of Classification Techniques in the Area of Big Data
ABSTRACT: Big Data concern large-volume, growing data sets that are complex and have
multiple autonomous sources. Earlier technologies were not able to handle
storage and processing of huge data thus Big Data concept comes into existence.
This is a tedious job for users unstructured data. So, there should be some
mechanism which classify unstructured data into organized form which helps user
to easily access required data. Classification techniques over big
transactional database provide required data to the users from large datasets
more simple way. There are two main classification techniques, supervised and
unsupervised. In this paper we focused on to study of different supervised
classification techniques. Further this paper shows a advantages and
limitations.
| no_new_dataset | 0.707379 |
1410.3469 | Daniel Whiteson | Pierre Baldi, Peter Sadowski, Daniel Whiteson | Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning | For submission to PRL | Phys. Rev. Lett. 114, 111801 (2015) | 10.1103/PhysRevLett.114.111801 | null | hep-ph cs.LG hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Higgs boson is thought to provide the interaction that imparts mass to
the fundamental fermions, but while measurements at the Large Hadron Collider
(LHC) are consistent with this hypothesis, current analysis techniques lack the
statistical power to cross the traditional 5$\sigma$ significance barrier
without more data. \emph{Deep learning} techniques have the potential to
increase the statistical power of this analysis by \emph{automatically}
learning complex, high-level data representations. In this work, deep neural
networks are used to detect the decay of the Higgs to a pair of tau leptons. A
Bayesian optimization algorithm is used to tune the network architecture and
training algorithm hyperparameters, resulting in a deep network of eight
non-linear processing layers that improves upon the performance of shallow
classifiers even without the use of features specifically engineered by
physicists for this application. The improvement in discovery significance is
equivalent to an increase in the accumulated dataset of 25\%.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2014 20:00:03 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Baldi",
"Pierre",
""
],
[
"Sadowski",
"Peter",
""
],
[
"Whiteson",
"Daniel",
""
]
] | TITLE: Enhanced Higgs to $\tau^+\tau^-$ Searches with Deep Learning
ABSTRACT: The Higgs boson is thought to provide the interaction that imparts mass to
the fundamental fermions, but while measurements at the Large Hadron Collider
(LHC) are consistent with this hypothesis, current analysis techniques lack the
statistical power to cross the traditional 5$\sigma$ significance barrier
without more data. \emph{Deep learning} techniques have the potential to
increase the statistical power of this analysis by \emph{automatically}
learning complex, high-level data representations. In this work, deep neural
networks are used to detect the decay of the Higgs to a pair of tau leptons. A
Bayesian optimization algorithm is used to tune the network architecture and
training algorithm hyperparameters, resulting in a deep network of eight
non-linear processing layers that improves upon the performance of shallow
classifiers even without the use of features specifically engineered by
physicists for this application. The improvement in discovery significance is
equivalent to an increase in the accumulated dataset of 25\%.
| no_new_dataset | 0.711055 |
1502.08040 | Mayank Kumar | Mayank Kumar, Ashok Veeraraghavan, Ashutosh Sabharval | DistancePPG: Robust non-contact vital signs monitoring using a camera | 24 pages, 11 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vital signs such as pulse rate and breathing rate are currently measured
using contact probes. But, non-contact methods for measuring vital signs are
desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ
health tracking (e.g. on mobile phone and computers with webcams). Recently,
camera-based non-contact vital sign monitoring have been shown to be feasible.
However, camera-based vital sign monitoring is challenging for people with
darker skin tone, under low lighting conditions, and/or during movement of an
individual in front of the camera. In this paper, we propose distancePPG, a new
camera-based vital sign estimation algorithm which addresses these challenges.
DistancePPG proposes a new method of combining skin-color change signals from
different tracked regions of the face using a weighted average, where the
weights depend on the blood perfusion and incident light intensity in the
region, to improve the signal-to-noise ratio (SNR) of camera-based estimate.
One of our key contributions is a new automatic method for determining the
weights based only on the video recording of the subject. The gains in SNR of
camera-based PPG estimated using distancePPG translate into reduction of the
error in vital sign estimation, and thus expand the scope of camera-based vital
sign monitoring to potentially challenging scenarios. Further, a dataset will
be released, comprising of synchronized video recordings of face and pulse
oximeter based ground truth recordings from the earlobe for people with
different skin tones, under different lighting conditions and for various
motion scenarios.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:03:06 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Mar 2015 02:31:18 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Kumar",
"Mayank",
""
],
[
"Veeraraghavan",
"Ashok",
""
],
[
"Sabharval",
"Ashutosh",
""
]
] | TITLE: DistancePPG: Robust non-contact vital signs monitoring using a camera
ABSTRACT: Vital signs such as pulse rate and breathing rate are currently measured
using contact probes. But, non-contact methods for measuring vital signs are
desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ
health tracking (e.g. on mobile phone and computers with webcams). Recently,
camera-based non-contact vital sign monitoring have been shown to be feasible.
However, camera-based vital sign monitoring is challenging for people with
darker skin tone, under low lighting conditions, and/or during movement of an
individual in front of the camera. In this paper, we propose distancePPG, a new
camera-based vital sign estimation algorithm which addresses these challenges.
DistancePPG proposes a new method of combining skin-color change signals from
different tracked regions of the face using a weighted average, where the
weights depend on the blood perfusion and incident light intensity in the
region, to improve the signal-to-noise ratio (SNR) of camera-based estimate.
One of our key contributions is a new automatic method for determining the
weights based only on the video recording of the subject. The gains in SNR of
camera-based PPG estimated using distancePPG translate into reduction of the
error in vital sign estimation, and thus expand the scope of camera-based vital
sign monitoring to potentially challenging scenarios. Further, a dataset will
be released, comprising of synchronized video recordings of face and pulse
oximeter based ground truth recordings from the earlobe for people with
different skin tones, under different lighting conditions and for various
motion scenarios.
| new_dataset | 0.71882 |
1503.06917 | Yilin Wang | Qiang Zhang, Yilin Wang, Baoxin Li | Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector | 21 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual saliency, which predicts regions in the field of view that draw the
most visual attention, has attracted a lot of interest from researchers. It has
already been used in several vision tasks, e.g., image classification, object
detection, foreground segmentation. Recently, the spectrum analysis based
visual saliency approach has attracted a lot of interest due to its simplicity
and good performance, where the phase information of the image is used to
construct the saliency map. In this paper, we propose a new approach for
detecting spatiotemporal visual saliency based on the phase spectrum of the
videos, which is easy to implement and computationally efficient. With the
proposed algorithm, we also study how the spatiotemporal saliency can be used
in two important vision task, abnormality detection and spatiotemporal interest
point detection. The proposed algorithm is evaluated on several commonly used
datasets with comparison to the state-of-art methods from the literature. The
experiments demonstrate the effectiveness of the proposed approach to
spatiotemporal visual saliency detection and its application to the above
vision tasks
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 05:25:45 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Zhang",
"Qiang",
""
],
[
"Wang",
"Yilin",
""
],
[
"Li",
"Baoxin",
""
]
] | TITLE: Unsupervised Video Analysis Based on a Spatiotemporal Saliency Detector
ABSTRACT: Visual saliency, which predicts regions in the field of view that draw the
most visual attention, has attracted a lot of interest from researchers. It has
already been used in several vision tasks, e.g., image classification, object
detection, foreground segmentation. Recently, the spectrum analysis based
visual saliency approach has attracted a lot of interest due to its simplicity
and good performance, where the phase information of the image is used to
construct the saliency map. In this paper, we propose a new approach for
detecting spatiotemporal visual saliency based on the phase spectrum of the
videos, which is easy to implement and computationally efficient. With the
proposed algorithm, we also study how the spatiotemporal saliency can be used
in two important vision task, abnormality detection and spatiotemporal interest
point detection. The proposed algorithm is evaluated on several commonly used
datasets with comparison to the state-of-art methods from the literature. The
experiments demonstrate the effectiveness of the proposed approach to
spatiotemporal visual saliency detection and its application to the above
vision tasks
| no_new_dataset | 0.712432 |
1503.06952 | Maria-Carolina Monard MC | Jean Metz and Newton Spola\^or and Everton A. Cherman and Maria C.
Monard | Comparing published multi-label classifier performance measures to the
ones obtained by a simple multi-label baseline classifier | 19 pages, 8 figures, 7 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In supervised learning, simple baseline classifiers can be constructed by
only looking at the class, i.e., ignoring any other information from the
dataset. The single-label learning community frequently uses as a reference the
one which always predicts the majority class. Although a classifier might
perform worse than this simple baseline classifier, this behaviour requires a
special explanation. Aiming to motivate the community to compare experimental
results with the ones provided by a multi-label baseline classifier, calling
the attention about the need of special explanations related to classifiers
which perform worse than the baseline, in this work we propose the use of
General_B, a multi-label baseline classifier. General_B was evaluated in
contrast to results published in the literature which were carefully selected
using a systematic review process. It was found that a considerable number of
published results on 10 frequently used datasets are worse than or equal to the
ones obtained by General_B, and for one dataset it reaches up to 43% of the
dataset published results. Moreover, although a simple baseline classifier was
not considered in these publications, it was observed that even for very poor
results no special explanations were provided in most of them. We hope that the
findings of this work would encourage the multi-label community to consider the
idea of using a simple baseline classifier, such that further explanations are
provided when a classifiers performs worse than a baseline.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 08:57:25 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Metz",
"Jean",
""
],
[
"Spolaôr",
"Newton",
""
],
[
"Cherman",
"Everton A.",
""
],
[
"Monard",
"Maria C.",
""
]
] | TITLE: Comparing published multi-label classifier performance measures to the
ones obtained by a simple multi-label baseline classifier
ABSTRACT: In supervised learning, simple baseline classifiers can be constructed by
only looking at the class, i.e., ignoring any other information from the
dataset. The single-label learning community frequently uses as a reference the
one which always predicts the majority class. Although a classifier might
perform worse than this simple baseline classifier, this behaviour requires a
special explanation. Aiming to motivate the community to compare experimental
results with the ones provided by a multi-label baseline classifier, calling
the attention about the need of special explanations related to classifiers
which perform worse than the baseline, in this work we propose the use of
General_B, a multi-label baseline classifier. General_B was evaluated in
contrast to results published in the literature which were carefully selected
using a systematic review process. It was found that a considerable number of
published results on 10 frequently used datasets are worse than or equal to the
ones obtained by General_B, and for one dataset it reaches up to 43% of the
dataset published results. Moreover, although a simple baseline classifier was
not considered in these publications, it was observed that even for very poor
results no special explanations were provided in most of them. We hope that the
findings of this work would encourage the multi-label community to consider the
idea of using a simple baseline classifier, such that further explanations are
provided when a classifiers performs worse than a baseline.
| no_new_dataset | 0.710785 |
1503.06962 | Andrew Simpson | Andrew J.R. Simpson | Probabilistic Binary-Mask Cocktail-Party Source Separation in a
Convolutional Deep Neural Network | null | null | null | null | cs.SD cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Separation of competing speech is a key challenge in signal processing and a
feat routinely performed by the human auditory brain. A long standing benchmark
of the spectrogram approach to source separation is known as the ideal binary
mask. Here, we train a convolutional deep neural network, on a two-speaker
cocktail party problem, to make probabilistic predictions about binary masks.
Our results approach ideal binary mask performance, illustrating that
relatively simple deep neural networks are capable of robust binary mask
prediction. We also illustrate the trade-off between prediction statistics and
separation quality.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2015 09:34:51 GMT"
}
] | 2015-03-25T00:00:00 | [
[
"Simpson",
"Andrew J. R.",
""
]
] | TITLE: Probabilistic Binary-Mask Cocktail-Party Source Separation in a
Convolutional Deep Neural Network
ABSTRACT: Separation of competing speech is a key challenge in signal processing and a
feat routinely performed by the human auditory brain. A long standing benchmark
of the spectrogram approach to source separation is known as the ideal binary
mask. Here, we train a convolutional deep neural network, on a two-speaker
cocktail party problem, to make probabilistic predictions about binary masks.
Our results approach ideal binary mask performance, illustrating that
relatively simple deep neural networks are capable of robust binary mask
prediction. We also illustrate the trade-off between prediction statistics and
separation quality.
| no_new_dataset | 0.708994 |
1308.4568 | Cem Tekin | Cem Tekin and Mihaela van der Schaar | Distributed Online Learning via Cooperative Contextual Bandits | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a novel framework for decentralized, online learning
by many learners. At each moment of time, an instance characterized by a
certain context may arrive to each learner; based on the context, the learner
can select one of its own actions (which gives a reward and provides
information) or request assistance from another learner. In the latter case,
the requester pays a cost and receives the reward but the provider learns the
information. In our framework, learners are modeled as cooperative contextual
bandits. Each learner seeks to maximize the expected reward from its arrivals,
which involves trading off the reward received from its own actions, the
information learned from its own actions, the reward received from the actions
requested of others and the cost paid for these actions - taking into account
what it has learned about the value of assistance from each other learner. We
develop distributed online learning algorithms and provide analytic bounds to
compare the efficiency of these with algorithms with the complete knowledge
(oracle) benchmark (in which the expected reward of every action in every
context is known by every learner). Our estimates show that regret - the loss
incurred by the algorithm - is sublinear in time. Our theoretical framework can
be used in many practical applications including Big Data mining, event
detection in surveillance sensor networks and distributed online recommendation
systems.
| [
{
"version": "v1",
"created": "Wed, 21 Aug 2013 13:28:43 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Aug 2013 14:19:28 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2014 09:40:06 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Mar 2015 14:06:27 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Tekin",
"Cem",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | TITLE: Distributed Online Learning via Cooperative Contextual Bandits
ABSTRACT: In this paper we propose a novel framework for decentralized, online learning
by many learners. At each moment of time, an instance characterized by a
certain context may arrive to each learner; based on the context, the learner
can select one of its own actions (which gives a reward and provides
information) or request assistance from another learner. In the latter case,
the requester pays a cost and receives the reward but the provider learns the
information. In our framework, learners are modeled as cooperative contextual
bandits. Each learner seeks to maximize the expected reward from its arrivals,
which involves trading off the reward received from its own actions, the
information learned from its own actions, the reward received from the actions
requested of others and the cost paid for these actions - taking into account
what it has learned about the value of assistance from each other learner. We
develop distributed online learning algorithms and provide analytic bounds to
compare the efficiency of these with algorithms with the complete knowledge
(oracle) benchmark (in which the expected reward of every action in every
context is known by every learner). Our estimates show that regret - the loss
incurred by the algorithm - is sublinear in time. Our theoretical framework can
be used in many practical applications including Big Data mining, event
detection in surveillance sensor networks and distributed online recommendation
systems.
| no_new_dataset | 0.710446 |
1406.4877 | David Martins de Matos | Francisco Raposo, Ricardo Ribeiro, David Martins de Matos | On the Application of Generic Summarization Algorithms to Music | 12 pages, 1 table; Submitted to IEEE Signal Processing Letters | IEEE Signal Processing Letters, IEEE, vol. 22, n. 1, January 2015 | 10.1109/LSP.2014.2347582 | null | cs.IR cs.LG cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several generic summarization algorithms were developed in the past and
successfully applied in fields such as text and speech summarization. In this
paper, we review and apply these algorithms to music. To evaluate this
summarization's performance, we adopt an extrinsic approach: we compare a Fado
Genre Classifier's performance using truncated contiguous clips against the
summaries extracted with those algorithms on 2 different datasets. We show that
Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA)
all improve classification performance in both datasets used for testing.
| [
{
"version": "v1",
"created": "Wed, 18 Jun 2014 20:10:22 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Raposo",
"Francisco",
""
],
[
"Ribeiro",
"Ricardo",
""
],
[
"de Matos",
"David Martins",
""
]
] | TITLE: On the Application of Generic Summarization Algorithms to Music
ABSTRACT: Several generic summarization algorithms were developed in the past and
successfully applied in fields such as text and speech summarization. In this
paper, we review and apply these algorithms to music. To evaluate this
summarization's performance, we adopt an extrinsic approach: we compare a Fado
Genre Classifier's performance using truncated contiguous clips against the
summaries extracted with those algorithms on 2 different datasets. We show that
Maximal Marginal Relevance (MMR), LexRank and Latent Semantic Analysis (LSA)
all improve classification performance in both datasets used for testing.
| no_new_dataset | 0.711262 |
1412.6572 | Ian Goodfellow | Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy | Explaining and Harnessing Adversarial Examples | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several machine learning models, including neural networks, consistently
misclassify adversarial examples---inputs formed by applying small but
intentionally worst-case perturbations to examples from the dataset, such that
the perturbed input results in the model outputting an incorrect answer with
high confidence. Early attempts at explaining this phenomenon focused on
nonlinearity and overfitting. We argue instead that the primary cause of neural
networks' vulnerability to adversarial perturbation is their linear nature.
This explanation is supported by new quantitative results while giving the
first explanation of the most intriguing fact about them: their generalization
across architectures and training sets. Moreover, this view yields a simple and
fast method of generating adversarial examples. Using this approach to provide
examples for adversarial training, we reduce the test set error of a maxout
network on the MNIST dataset.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2014 01:17:12 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2015 17:25:05 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Mar 2015 20:19:16 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Goodfellow",
"Ian J.",
""
],
[
"Shlens",
"Jonathon",
""
],
[
"Szegedy",
"Christian",
""
]
] | TITLE: Explaining and Harnessing Adversarial Examples
ABSTRACT: Several machine learning models, including neural networks, consistently
misclassify adversarial examples---inputs formed by applying small but
intentionally worst-case perturbations to examples from the dataset, such that
the perturbed input results in the model outputting an incorrect answer with
high confidence. Early attempts at explaining this phenomenon focused on
nonlinearity and overfitting. We argue instead that the primary cause of neural
networks' vulnerability to adversarial perturbation is their linear nature.
This explanation is supported by new quantitative results while giving the
first explanation of the most intriguing fact about them: their generalization
across architectures and training sets. Moreover, this view yields a simple and
fast method of generating adversarial examples. Using this approach to provide
examples for adversarial training, we reduce the test set error of a maxout
network on the MNIST dataset.
| no_new_dataset | 0.71145 |
1503.03562 | Zhiyong Cheng | Zhiyong Cheng, Daniel Soudry, Zexi Mao, Zhenzhong Lan | Training Binary Multilayer Neural Networks for Image Classification
using Expectation Backpropagation | 8 pages with 1 figures and 4 tables | null | null | null | cs.NE cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compared to Multilayer Neural Networks with real weights, Binary Multilayer
Neural Networks (BMNNs) can be implemented more efficiently on dedicated
hardware. BMNNs have been demonstrated to be effective on binary classification
tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text
datasets. In this paper, we investigate the capability of BMNNs using the EBP
algorithm on multiclass image classification tasks. The performances of binary
neural networks with multiple hidden layers and different numbers of hidden
units are examined on MNIST. We also explore the effectiveness of image spatial
filters and the dropout technique in BMNNs. Experimental results on MNIST
dataset show that EBP can obtain 2.12% test error with binary weights and 1.66%
test error with real weights, which is comparable to the results of standard
BackPropagation algorithm on fully connected MNNs.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2015 02:24:31 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2015 01:32:15 GMT"
},
{
"version": "v3",
"created": "Sun, 22 Mar 2015 21:47:56 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Cheng",
"Zhiyong",
""
],
[
"Soudry",
"Daniel",
""
],
[
"Mao",
"Zexi",
""
],
[
"Lan",
"Zhenzhong",
""
]
] | TITLE: Training Binary Multilayer Neural Networks for Image Classification
using Expectation Backpropagation
ABSTRACT: Compared to Multilayer Neural Networks with real weights, Binary Multilayer
Neural Networks (BMNNs) can be implemented more efficiently on dedicated
hardware. BMNNs have been demonstrated to be effective on binary classification
tasks with Expectation BackPropagation (EBP) algorithm on high dimensional text
datasets. In this paper, we investigate the capability of BMNNs using the EBP
algorithm on multiclass image classification tasks. The performances of binary
neural networks with multiple hidden layers and different numbers of hidden
units are examined on MNIST. We also explore the effectiveness of image spatial
filters and the dropout technique in BMNNs. Experimental results on MNIST
dataset show that EBP can obtain 2.12% test error with binary weights and 1.66%
test error with real weights, which is comparable to the results of standard
BackPropagation algorithm on fully connected MNNs.
| no_new_dataset | 0.711212 |
1503.06239 | Jinye Zhang | Jinye Zhang, Zhijian Ou | Block-Wise MAP Inference for Determinantal Point Processes with
Application to Change-Point Detection | null | null | null | null | cs.LG cs.AI stat.ME stat.ML | http://creativecommons.org/licenses/by/3.0/ | Existing MAP inference algorithms for determinantal point processes (DPPs)
need to calculate determinants or conduct eigenvalue decomposition generally at
the scale of the full kernel, which presents a great challenge for real-world
applications. In this paper, we introduce a class of DPPs, called BwDPPs, that
are characterized by an almost block diagonal kernel matrix and thus can allow
efficient block-wise MAP inference. Furthermore, BwDPPs are successfully
applied to address the difficulty of selecting change-points in the problem of
change-point detection (CPD), which results in a new BwDPP-based CPD method,
named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is
first created based on existing well-studied metrics. Then, these change-point
candidates are treated as DPP items, and DPP-based subset selection is
conducted to give the final estimate of the change-points that favours both
quality and diversity. The effectiveness of BwDppCpd is demonstrated through
extensive experiments on five real-world datasets.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2015 22:01:45 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Zhang",
"Jinye",
""
],
[
"Ou",
"Zhijian",
""
]
] | TITLE: Block-Wise MAP Inference for Determinantal Point Processes with
Application to Change-Point Detection
ABSTRACT: Existing MAP inference algorithms for determinantal point processes (DPPs)
need to calculate determinants or conduct eigenvalue decomposition generally at
the scale of the full kernel, which presents a great challenge for real-world
applications. In this paper, we introduce a class of DPPs, called BwDPPs, that
are characterized by an almost block diagonal kernel matrix and thus can allow
efficient block-wise MAP inference. Furthermore, BwDPPs are successfully
applied to address the difficulty of selecting change-points in the problem of
change-point detection (CPD), which results in a new BwDPP-based CPD method,
named BwDppCpd. In BwDppCpd, a preliminary set of change-point candidates is
first created based on existing well-studied metrics. Then, these change-point
candidates are treated as DPP items, and DPP-based subset selection is
conducted to give the final estimate of the change-points that favours both
quality and diversity. The effectiveness of BwDppCpd is demonstrated through
extensive experiments on five real-world datasets.
| no_new_dataset | 0.707398 |
1503.06250 | Ilya Safro | Talayeh Razzaghi and Oleg Roderick and Ilya Safro and Nick Marko | Fast Imbalanced Classification of Healthcare Data with Missing Values | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In medical domain, data features often contain missing values. This can
create serious bias in the predictive modeling. Typical standard data mining
methods often produce poor performance measures. In this paper, we propose a
new method to simultaneously classify large datasets and reduce the effects of
missing values. The proposed method is based on a multilevel framework of the
cost-sensitive SVM and the expected maximization imputation method for missing
values, which relies on iterated regression analyses. We compare classification
results of multilevel SVM-based algorithms on public benchmark datasets with
imbalanced classes and missing values as well as real data in health
applications, and show that our multilevel SVM-based method produces fast, and
more accurate and robust classification results.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 00:13:54 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Razzaghi",
"Talayeh",
""
],
[
"Roderick",
"Oleg",
""
],
[
"Safro",
"Ilya",
""
],
[
"Marko",
"Nick",
""
]
] | TITLE: Fast Imbalanced Classification of Healthcare Data with Missing Values
ABSTRACT: In medical domain, data features often contain missing values. This can
create serious bias in the predictive modeling. Typical standard data mining
methods often produce poor performance measures. In this paper, we propose a
new method to simultaneously classify large datasets and reduce the effects of
missing values. The proposed method is based on a multilevel framework of the
cost-sensitive SVM and the expected maximization imputation method for missing
values, which relies on iterated regression analyses. We compare classification
results of multilevel SVM-based algorithms on public benchmark datasets with
imbalanced classes and missing values as well as real data in health
applications, and show that our multilevel SVM-based method produces fast, and
more accurate and robust classification results.
| no_new_dataset | 0.711224 |
1503.06271 | Mina Ghashami | Mina Ghashami and Amirali Abdullah | Binary Coding in Stream | 5 figures, 9 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Big data is becoming ever more ubiquitous, ranging over massive video
repositories, document corpuses, image sets and Internet routing history.
Proximity search and clustering are two algorithmic primitives fundamental to
data analysis, but suffer from the "curse of dimensionality" on these gigantic
datasets. A popular attack for this problem is to convert object
representations into short binary codewords, while approximately preserving
near neighbor structure. However, there has been limited research on
constructing codewords in the "streaming" or "online" settings often applicable
to this scale of data, where one may only make a single pass over data too
massive to fit in local memory.
In this paper, we apply recent advances in matrix sketching techniques to
construct binary codewords in both streaming and online setting. Our
experimental results compete outperform several of the most popularly used
algorithms, and we prove theoretical guarantees on performance in the streaming
setting under mild assumptions on the data and randomness of the training set.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 06:25:02 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Ghashami",
"Mina",
""
],
[
"Abdullah",
"Amirali",
""
]
] | TITLE: Binary Coding in Stream
ABSTRACT: Big data is becoming ever more ubiquitous, ranging over massive video
repositories, document corpuses, image sets and Internet routing history.
Proximity search and clustering are two algorithmic primitives fundamental to
data analysis, but suffer from the "curse of dimensionality" on these gigantic
datasets. A popular attack for this problem is to convert object
representations into short binary codewords, while approximately preserving
near neighbor structure. However, there has been limited research on
constructing codewords in the "streaming" or "online" settings often applicable
to this scale of data, where one may only make a single pass over data too
massive to fit in local memory.
In this paper, we apply recent advances in matrix sketching techniques to
construct binary codewords in both streaming and online setting. Our
experimental results compete outperform several of the most popularly used
algorithms, and we prove theoretical guarantees on performance in the streaming
setting under mild assumptions on the data and randomness of the training set.
| no_new_dataset | 0.708244 |
1503.06301 | Kamalakar Karlapalem | Yash Gupta and Kamalakar Karlapalem | Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing
Applications | Paper covering main contributions from MS Thesis of Yash Gupta
http://web2py.iiit.ac.in/research_centres/publications/view_publication/mastersthesis/247
- presented in ACM format | null | null | MS Thesis Number IIIT/TH/2014/7 | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A queue is required when a service provider is not able to handle jobs
arriving over the time. In a highly flexible and dynamic environment, some jobs
might demand for faster execution at run-time especially when the resources are
limited and the jobs are competing for acquiring resources. A user might demand
for speed up (reduced wait time) for some of the jobs present in the queue at
run time. In such cases, it is required to accelerate (directly sending the job
to the server) urgent jobs (requesting for speed up) ahead of other jobs
present in the queue for an earlier completion of urgent jobs. Under the
assumption of no additional resources, such acceleration of jobs would result
in slowing down of other jobs present in the queue. In this paper, we formulate
the problem of Speed Up Scheduling without acquiring any additional resources
for the scheduling of on-line speed up requests posed by a user at run-time and
present algorithms for the same. We apply the idea of Speed Up Scheduling to
two different domains -Web Scheduling and CPU Scheduling. We demonstrate our
results with a simulation based model using trace driven workload and synthetic
datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new
way of addressing urgent jobs, provides a different evaluation criteria for
comparing scheduling algorithms and has practical applications.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 13:51:48 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Gupta",
"Yash",
""
],
[
"Karlapalem",
"Kamalakar",
""
]
] | TITLE: Effective Handling of Urgent Jobs - Speed Up Scheduling for Computing
Applications
ABSTRACT: A queue is required when a service provider is not able to handle jobs
arriving over the time. In a highly flexible and dynamic environment, some jobs
might demand for faster execution at run-time especially when the resources are
limited and the jobs are competing for acquiring resources. A user might demand
for speed up (reduced wait time) for some of the jobs present in the queue at
run time. In such cases, it is required to accelerate (directly sending the job
to the server) urgent jobs (requesting for speed up) ahead of other jobs
present in the queue for an earlier completion of urgent jobs. Under the
assumption of no additional resources, such acceleration of jobs would result
in slowing down of other jobs present in the queue. In this paper, we formulate
the problem of Speed Up Scheduling without acquiring any additional resources
for the scheduling of on-line speed up requests posed by a user at run-time and
present algorithms for the same. We apply the idea of Speed Up Scheduling to
two different domains -Web Scheduling and CPU Scheduling. We demonstrate our
results with a simulation based model using trace driven workload and synthetic
datasets to show the usefulness of Speed Up scheduling. Speed Up provides a new
way of addressing urgent jobs, provides a different evaluation criteria for
comparing scheduling algorithms and has practical applications.
| no_new_dataset | 0.71081 |
1503.06350 | Nikolaos Karianakis | Nikolaos Karianakis, Thomas J. Fuchs and Stefano Soatto | Boosting Convolutional Features for Robust Object Proposals | 9 pages, 4 figures, 2 tables, 42 references | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep Convolutional Neural Networks (CNNs) have demonstrated excellent
performance in image classification, but still show room for improvement in
object-detection tasks with many categories, in particular for cluttered scenes
and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et
al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions
which with high probability represent objects, where in turn CNNs are deployed
for classification. Selective Search represents a family of sophisticated
algorithms that are engineered with multiple segmentation, appearance and
saliency cues, typically coming with a significant run-time overhead.
Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low
reproducibility due to unstable superpixels, even for slight image
perturbations. Although CNNs are subsequently used for classification in
top-performing object-detection pipelines, current proposal methods are
agnostic to how these models parse objects and their rich learned
representations. As a result they may propose regions which may not resemble
high-level objects or totally miss some of them. To overcome these drawbacks we
propose a boosting approach which directly takes advantage of hierarchical CNN
features for detecting regions of interest fast. We demonstrate its performance
on ImageNet 2013 detection benchmark and compare it with state-of-the-art
methods.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2015 20:54:39 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Karianakis",
"Nikolaos",
""
],
[
"Fuchs",
"Thomas J.",
""
],
[
"Soatto",
"Stefano",
""
]
] | TITLE: Boosting Convolutional Features for Robust Object Proposals
ABSTRACT: Deep Convolutional Neural Networks (CNNs) have demonstrated excellent
performance in image classification, but still show room for improvement in
object-detection tasks with many categories, in particular for cluttered scenes
and occlusion. Modern detection algorithms like Regions with CNNs (Girshick et
al., 2014) rely on Selective Search (Uijlings et al., 2013) to propose regions
which with high probability represent objects, where in turn CNNs are deployed
for classification. Selective Search represents a family of sophisticated
algorithms that are engineered with multiple segmentation, appearance and
saliency cues, typically coming with a significant run-time overhead.
Furthermore, (Hosang et al., 2014) have shown that most methods suffer from low
reproducibility due to unstable superpixels, even for slight image
perturbations. Although CNNs are subsequently used for classification in
top-performing object-detection pipelines, current proposal methods are
agnostic to how these models parse objects and their rich learned
representations. As a result they may propose regions which may not resemble
high-level objects or totally miss some of them. To overcome these drawbacks we
propose a boosting approach which directly takes advantage of hierarchical CNN
features for detecting regions of interest fast. We demonstrate its performance
on ImageNet 2013 detection benchmark and compare it with state-of-the-art
methods.
| no_new_dataset | 0.708843 |
1503.06424 | Juan Juli\'an Merelo-Guerv\'os Pr. | Juan Juli\'an Merelo-Guerv\'os, Pablo Garc\'ia-S\'anchez | Modeling browser-based distributed evolutionary computation systems | Technical report | null | null | null | cs.DC cs.NE cs.NI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | From the era of big science we are back to the "do it yourself", where you do
not have any money to buy clusters or subscribe to grids but still have
algorithms that crave many computing nodes and need them to measure
scalability. Fortunately, this coincides with the era of big data, cloud
computing, and browsers that include JavaScript virtual machines. Those are the
reasons why this paper will focus on two different aspects of volunteer or
freeriding computing: first, the pragmatic: where to find those resources,
which ones can be used, what kind of support you have to give them; and then,
the theoretical: how evolutionary algorithms can be adapted to an environment
in which nodes come and go, have different computing capabilities and operate
in complete asynchrony of each other. We will examine the setup needed to
create a very simple distributed evolutionary algorithm using JavaScript and
then find a model of how users react to it by collecting data from several
experiments featuring different classical benchmark functions.
| [
{
"version": "v1",
"created": "Sun, 22 Mar 2015 13:20:57 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Merelo-Guervós",
"Juan Julián",
""
],
[
"García-Sánchez",
"Pablo",
""
]
] | TITLE: Modeling browser-based distributed evolutionary computation systems
ABSTRACT: From the era of big science we are back to the "do it yourself", where you do
not have any money to buy clusters or subscribe to grids but still have
algorithms that crave many computing nodes and need them to measure
scalability. Fortunately, this coincides with the era of big data, cloud
computing, and browsers that include JavaScript virtual machines. Those are the
reasons why this paper will focus on two different aspects of volunteer or
freeriding computing: first, the pragmatic: where to find those resources,
which ones can be used, what kind of support you have to give them; and then,
the theoretical: how evolutionary algorithms can be adapted to an environment
in which nodes come and go, have different computing capabilities and operate
in complete asynchrony of each other. We will examine the setup needed to
create a very simple distributed evolutionary algorithm using JavaScript and
then find a model of how users react to it by collecting data from several
experiments featuring different classical benchmark functions.
| no_new_dataset | 0.706437 |
1503.06549 | Lydia Fischer | Lydia Fischer, Barbara Hammer and Heiko Wersing | Optimum Reject Options for Prototype-based Classification | 19 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse optimum reject strategies for prototype-based classifiers and
real-valued rejection measures, using the distance of a data point to the
closest prototype or probabilistic counterparts. We compare reject schemes with
global thresholds, and local thresholds for the Voronoi cells of the
classifier. For the latter, we develop a polynomial-time algorithm to compute
optimum thresholds based on a dynamic programming scheme, and we propose an
intuitive linear time, memory efficient approximation thereof with competitive
accuracy. Evaluating the performance in various benchmarks, we conclude that
local reject options are beneficial in particular for simple prototype-based
classifiers, while the improvement is less pronounced for advanced models. For
the latter, an accuracy-reject curve which is comparable to support vector
machine classifiers with state of the art reject options can be reached.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2015 08:19:17 GMT"
}
] | 2015-03-24T00:00:00 | [
[
"Fischer",
"Lydia",
""
],
[
"Hammer",
"Barbara",
""
],
[
"Wersing",
"Heiko",
""
]
] | TITLE: Optimum Reject Options for Prototype-based Classification
ABSTRACT: We analyse optimum reject strategies for prototype-based classifiers and
real-valued rejection measures, using the distance of a data point to the
closest prototype or probabilistic counterparts. We compare reject schemes with
global thresholds, and local thresholds for the Voronoi cells of the
classifier. For the latter, we develop a polynomial-time algorithm to compute
optimum thresholds based on a dynamic programming scheme, and we propose an
intuitive linear time, memory efficient approximation thereof with competitive
accuracy. Evaluating the performance in various benchmarks, we conclude that
local reject options are beneficial in particular for simple prototype-based
classifiers, while the improvement is less pronounced for advanced models. For
the latter, an accuracy-reject curve which is comparable to support vector
machine classifiers with state of the art reject options can be reached.
| no_new_dataset | 0.710842 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.