id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1409.7495 | Yaroslav Ganin | Yaroslav Ganin, Victor Lempitsky | Unsupervised Domain Adaptation by Backpropagation | null | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Top-performing deep architectures are trained on massive amounts of labeled
data. In the absence of labeled data for a certain task, domain adaptation
often provides an attractive option given that labeled data of similar nature
but from a different domain (e.g. synthetic images) are available. Here, we
propose a new approach to domain adaptation in deep architectures that can be
trained on large amount of labeled data from the source domain and large amount
of unlabeled data from the target domain (no labeled target-domain data is
necessary).
As the training progresses, the approach promotes the emergence of "deep"
features that are (i) discriminative for the main learning task on the source
domain and (ii) invariant with respect to the shift between the domains. We
show that this adaptation behaviour can be achieved in almost any feed-forward
model by augmenting it with few standard layers and a simple new gradient
reversal layer. The resulting augmented architecture can be trained using
standard backpropagation.
Overall, the approach can be implemented with little effort using any of the
deep-learning packages. The method performs very well in a series of image
classification experiments, achieving adaptation effect in the presence of big
domain shifts and outperforming previous state-of-the-art on Office datasets.
| [
{
"version": "v1",
"created": "Fri, 26 Sep 2014 08:22:21 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2015 14:54:37 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Ganin",
"Yaroslav",
""
],
[
"Lempitsky",
"Victor",
""
]
] | TITLE: Unsupervised Domain Adaptation by Backpropagation
ABSTRACT: Top-performing deep architectures are trained on massive amounts of labeled
data. In the absence of labeled data for a certain task, domain adaptation
often provides an attractive option given that labeled data of similar nature
but from a different domain (e.g. synthetic images) are available. Here, we
propose a new approach to domain adaptation in deep architectures that can be
trained on large amount of labeled data from the source domain and large amount
of unlabeled data from the target domain (no labeled target-domain data is
necessary).
As the training progresses, the approach promotes the emergence of "deep"
features that are (i) discriminative for the main learning task on the source
domain and (ii) invariant with respect to the shift between the domains. We
show that this adaptation behaviour can be achieved in almost any feed-forward
model by augmenting it with few standard layers and a simple new gradient
reversal layer. The resulting augmented architecture can be trained using
standard backpropagation.
Overall, the approach can be implemented with little effort using any of the
deep-learning packages. The method performs very well in a series of image
classification experiments, achieving adaptation effect in the presence of big
domain shifts and outperforming previous state-of-the-art on Office datasets.
| no_new_dataset | 0.710038 |
1502.07802 | Zongyuan Ge | ZongYuan Ge, Chris McCool, Conrad Sanderson, Peter Corke | Modelling Local Deep Convolutional Neural Network Features to Improve
Fine-Grained Image Classification | 5 pages, three figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a local modelling approach using deep convolutional neural
networks (CNNs) for fine-grained image classification. Recently, deep CNNs
trained from large datasets have considerably improved the performance of
object recognition. However, to date there has been limited work using these
deep CNNs as local feature extractors. This partly stems from CNNs having
internal representations which are high dimensional, thereby making such
representations difficult to model using stochastic models. To overcome this
issue, we propose to reduce the dimensionality of one of the internal fully
connected layers, in conjunction with layer-restricted retraining to avoid
retraining the entire network. The distribution of low-dimensional features
obtained from the modified layer is then modelled using a Gaussian mixture
model. Comparative experiments show that considerable performance improvements
can be achieved on the challenging Fish and UEC FOOD-100 datasets.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 02:04:57 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Ge",
"ZongYuan",
""
],
[
"McCool",
"Chris",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"Corke",
"Peter",
""
]
] | TITLE: Modelling Local Deep Convolutional Neural Network Features to Improve
Fine-Grained Image Classification
ABSTRACT: We propose a local modelling approach using deep convolutional neural
networks (CNNs) for fine-grained image classification. Recently, deep CNNs
trained from large datasets have considerably improved the performance of
object recognition. However, to date there has been limited work using these
deep CNNs as local feature extractors. This partly stems from CNNs having
internal representations which are high dimensional, thereby making such
representations difficult to model using stochastic models. To overcome this
issue, we propose to reduce the dimensionality of one of the internal fully
connected layers, in conjunction with layer-restricted retraining to avoid
retraining the entire network. The distribution of low-dimensional features
obtained from the modified layer is then modelled using a Gaussian mixture
model. Comparative experiments show that considerable performance improvements
can be achieved on the challenging Fish and UEC FOOD-100 datasets.
| no_new_dataset | 0.710597 |
1502.07812 | Kwangsu Lee | Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee | Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order
Groups | 31 pages, 1 figure | Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb.
2015 | 10.1007/s10623-013-9868-6 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of
Identity-Based Encryption (IBE), and it provides not only a message hiding
property but also an identity hiding property. Anonymous HIBE schemes can be
applicable to anonymous communication systems and public key encryption systems
with keyword searching. However, previous anonymous HIBE schemes have some
disadvantages that the security was proven in the weaker model, the size of
ciphertexts is not short, or the construction was based on composite order
bilinear groups. In this paper, we propose the first efficient anonymous HIBE
scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and
prove its security in the full model with an efficient reduction. To achieve
this, we use the dual system encryption methodology of Waters. We also present
the benchmark results of our scheme by measuring the performance of our
implementation.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 03:31:04 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Lee",
"Kwangsu",
""
],
[
"Park",
"Jong Hwan",
""
],
[
"Lee",
"Dong Hoon",
""
]
] | TITLE: Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order
Groups
ABSTRACT: Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of
Identity-Based Encryption (IBE), and it provides not only a message hiding
property but also an identity hiding property. Anonymous HIBE schemes can be
applicable to anonymous communication systems and public key encryption systems
with keyword searching. However, previous anonymous HIBE schemes have some
disadvantages that the security was proven in the weaker model, the size of
ciphertexts is not short, or the construction was based on composite order
bilinear groups. In this paper, we propose the first efficient anonymous HIBE
scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and
prove its security in the full model with an efficient reduction. To achieve
this, we use the dual system encryption methodology of Waters. We also present
the benchmark results of our scheme by measuring the performance of our
implementation.
| no_new_dataset | 0.708988 |
1502.08039 | Jihun Hamm | Jihun Hamm, Mikhail Belkin | Probabilistic Zero-shot Classification with Semantic Rankings | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a non-metric ranking-based representation of
semantic similarity that allows natural aggregation of semantic information
from multiple heterogeneous sources. We apply the ranking-based representation
to zero-shot learning problems, and present deterministic and probabilistic
zero-shot classifiers which can be built from pre-trained classifiers without
retraining. We demonstrate their the advantages on two large real-world image
datasets. In particular, we show that aggregating different sources of semantic
information, including crowd-sourcing, leads to more accurate classification.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:00:53 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Hamm",
"Jihun",
""
],
[
"Belkin",
"Mikhail",
""
]
] | TITLE: Probabilistic Zero-shot Classification with Semantic Rankings
ABSTRACT: In this paper we propose a non-metric ranking-based representation of
semantic similarity that allows natural aggregation of semantic information
from multiple heterogeneous sources. We apply the ranking-based representation
to zero-shot learning problems, and present deterministic and probabilistic
zero-shot classifiers which can be built from pre-trained classifiers without
retraining. We demonstrate their the advantages on two large real-world image
datasets. In particular, we show that aggregating different sources of semantic
information, including crowd-sourcing, leads to more accurate classification.
| no_new_dataset | 0.710465 |
1502.08046 | Piotr Plonski | Piotr P{\l}o\'nski, Dorota Stefan, Robert Sulej, Krzysztof Zaremba | Image Segmentation in Liquid Argon Time Projection Chamber Detector | 10 pages, 4 figures, 2 tables | null | null | null | cs.CV hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide
excellent imaging and particle identification ability for studying neutrinos.
An efficient and automatic reconstruction procedures are required to exploit
potential of this imaging technology. Herein, a novel method for segmentation
of images from LAr-TPC detectors is presented. The proposed approach computes a
feature descriptor for each pixel in the image, which characterizes amplitude
distribution in pixel and its neighbourhood. The supervised classifier is
employed to distinguish between pixels representing particle's track and noise.
The classifier is trained and evaluated on the hand-labeled dataset. The
proposed approach can be a preprocessing step for reconstructing algorithms
working directly on detector images.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:32:35 GMT"
}
] | 2015-03-02T00:00:00 | [
[
"Płoński",
"Piotr",
""
],
[
"Stefan",
"Dorota",
""
],
[
"Sulej",
"Robert",
""
],
[
"Zaremba",
"Krzysztof",
""
]
] | TITLE: Image Segmentation in Liquid Argon Time Projection Chamber Detector
ABSTRACT: The Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide
excellent imaging and particle identification ability for studying neutrinos.
An efficient and automatic reconstruction procedures are required to exploit
potential of this imaging technology. Herein, a novel method for segmentation
of images from LAr-TPC detectors is presented. The proposed approach computes a
feature descriptor for each pixel in the image, which characterizes amplitude
distribution in pixel and its neighbourhood. The supervised classifier is
employed to distinguish between pixels representing particle's track and noise.
The classifier is trained and evaluated on the hand-labeled dataset. The
proposed approach can be a preprocessing step for reconstructing algorithms
working directly on detector images.
| no_new_dataset | 0.71365 |
1502.04981 | Mete Ozay | Mete Ozay | Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images | A version of the manuscript was published in ICPR 2014 | Proc. 22nd International Conference on Pattern Recognition, pp.
3839-3844, Stockholm, 2014 | 10.1109/ICPR.2014.659 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Semi-supervised Segmentation Fusion algorithm is proposed using consensus
and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is
to achieve a consensus among different segmentation outputs obtained from
different segmentation algorithms by computing an approximate solution to the
NP problem with less computational complexity. Semi-supervision is incorporated
in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF).
In SSSF, side information about the co-occurrence of pixels in the same or
different segments is formulated as the constraints of a convex optimization
problem. The results of the experiments employed on artificial and real-world
benchmark multi-spectral and aerial images show that the proposed algorithms
perform better than the individual state-of-the art segmentation algorithms.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 18:01:13 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2015 00:11:44 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Ozay",
"Mete",
""
]
] | TITLE: Semi-supervised Segmentation Fusion of Multi-spectral and Aerial Images
ABSTRACT: A Semi-supervised Segmentation Fusion algorithm is proposed using consensus
and distributed learning. The aim of Unsupervised Segmentation Fusion (USF) is
to achieve a consensus among different segmentation outputs obtained from
different segmentation algorithms by computing an approximate solution to the
NP problem with less computational complexity. Semi-supervision is incorporated
in USF using a new algorithm called Semi-supervised Segmentation Fusion (SSSF).
In SSSF, side information about the co-occurrence of pixels in the same or
different segments is formulated as the constraints of a convex optimization
problem. The results of the experiments employed on artificial and real-world
benchmark multi-spectral and aerial images show that the proposed algorithms
perform better than the individual state-of-the art segmentation algorithms.
| no_new_dataset | 0.711406 |
1502.06682 | Chih-Ya Shen | Chih-Ya Shen, De-Nian Yang, Wang-Chien Lee, Ming-Syan Chen | Maximizing Friend-Making Likelihood for Social Activity Organization | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The social presence theory in social psychology suggests that
computer-mediated online interactions are inferior to face-to-face, in-person
interactions. In this paper, we consider the scenarios of organizing in person
friend-making social activities via online social networks (OSNs) and formulate
a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by
modeling both existing friendships and the likelihood of new friend making. To
find a set of attendees for socialization activities, HMGF is unique and
challenging due to the interplay of the group size, the constraint on existing
friendships and the objective function on the likelihood of friend making. We
prove that HMGF is NP-Hard, and no approximation algorithm exists unless P =
NP. We then propose an error-bounded approximation algorithm to efficiently
obtain the solutions very close to the optimal solutions. We conduct a user
study to validate our problem formulation and per- form extensive experiments
on real datasets to demonstrate the efficiency and effectiveness of our
proposed algorithm.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 03:16:33 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2015 15:31:34 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Shen",
"Chih-Ya",
""
],
[
"Yang",
"De-Nian",
""
],
[
"Lee",
"Wang-Chien",
""
],
[
"Chen",
"Ming-Syan",
""
]
] | TITLE: Maximizing Friend-Making Likelihood for Social Activity Organization
ABSTRACT: The social presence theory in social psychology suggests that
computer-mediated online interactions are inferior to face-to-face, in-person
interactions. In this paper, we consider the scenarios of organizing in person
friend-making social activities via online social networks (OSNs) and formulate
a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by
modeling both existing friendships and the likelihood of new friend making. To
find a set of attendees for socialization activities, HMGF is unique and
challenging due to the interplay of the group size, the constraint on existing
friendships and the objective function on the likelihood of friend making. We
prove that HMGF is NP-Hard, and no approximation algorithm exists unless P =
NP. We then propose an error-bounded approximation algorithm to efficiently
obtain the solutions very close to the optimal solutions. We conduct a user
study to validate our problem formulation and per- form extensive experiments
on real datasets to demonstrate the efficiency and effectiveness of our
proposed algorithm.
| no_new_dataset | 0.70939 |
1502.07447 | Mehmet Ali Arslan | Mehmet Ali Arslan, Flavius Gruian, Krzysztof Kuchcinski | A Comparative Study of Scheduling Techniques for Multimedia Applications
on SIMD Pipelines | Presented at DATE Friday Workshop on Heterogeneous Architectures and
Design Methods for Embedded Image Systems (HIS 2015) (arXiv:1502.07241) | null | null | DATEHIS/2015/02 | cs.DC cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Parallel architectures are essential in order to take advantage of the
parallelism inherent in streaming applications. One particular branch of these
employ hardware SIMD pipelines. In this paper, we analyse several scheduling
techniques, namely ad hoc overlapped execution, modulo scheduling and modulo
scheduling with unrolling, all of which aim to efficiently utilize the special
architecture design. Our investigation focuses on improving throughput while
analysing other metrics that are important for streaming applications, such as
register pressure, buffer sizes and code size. Through experiments conducted on
several media benchmarks, we present and discuss trade-offs involved when
selecting any one of these scheduling techniques.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2015 06:15:23 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Arslan",
"Mehmet Ali",
""
],
[
"Gruian",
"Flavius",
""
],
[
"Kuchcinski",
"Krzysztof",
""
]
] | TITLE: A Comparative Study of Scheduling Techniques for Multimedia Applications
on SIMD Pipelines
ABSTRACT: Parallel architectures are essential in order to take advantage of the
parallelism inherent in streaming applications. One particular branch of these
employ hardware SIMD pipelines. In this paper, we analyse several scheduling
techniques, namely ad hoc overlapped execution, modulo scheduling and modulo
scheduling with unrolling, all of which aim to efficiently utilize the special
architecture design. Our investigation focuses on improving throughput while
analysing other metrics that are important for streaming applications, such as
register pressure, buffer sizes and code size. Through experiments conducted on
several media benchmarks, we present and discuss trade-offs involved when
selecting any one of these scheduling techniques.
| no_new_dataset | 0.711005 |
1502.07504 | Attia Nehar | Attia Nehar and Djelloul Ziadi and Hadda Cherroun | Rational Kernels for Arabic Stemming and Text Classification | 12 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the problems of Arabic Text Classification and
stemming using Transducers and Rational Kernels. We introduce a new stemming
technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns
are modelled using transducers and stemming is done without depending on any
dictionary. Using transducers for stemming, documents are transformed into
finite state transducers. This document representation allows us to use and
explore rational kernels as a framework for Arabic Text Classification.
Stemming experiments are conducted on three word collections and classification
experiments are done on the Saudi Press Agency dataset. Results show that our
approach, when compared with other approaches, is promising specially in terms
of Accuracy, Recall and F1.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2015 11:09:59 GMT"
}
] | 2015-02-27T00:00:00 | [
[
"Nehar",
"Attia",
""
],
[
"Ziadi",
"Djelloul",
""
],
[
"Cherroun",
"Hadda",
""
]
] | TITLE: Rational Kernels for Arabic Stemming and Text Classification
ABSTRACT: In this paper, we address the problems of Arabic Text Classification and
stemming using Transducers and Rational Kernels. We introduce a new stemming
technique based on the use of Arabic patterns (Pattern Based Stemmer). Patterns
are modelled using transducers and stemming is done without depending on any
dictionary. Using transducers for stemming, documents are transformed into
finite state transducers. This document representation allows us to use and
explore rational kernels as a framework for Arabic Text Classification.
Stemming experiments are conducted on three word collections and classification
experiments are done on the Saudi Press Agency dataset. Results show that our
approach, when compared with other approaches, is promising specially in terms
of Accuracy, Recall and F1.
| no_new_dataset | 0.712263 |
1502.05224 | Yun Gu | Yun Gu, Haoyang Xue, Jie Yang | Cross-Modality Hashing with Partial Correspondence | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning a hashing function for cross-media search is very desirable due to
its low storage cost and fast query speed. However, the data crawled from
Internet cannot always guarantee good correspondence among different modalities
which affects the learning for hashing function. In this paper, we focus on
cross-modal hashing with partially corresponded data. The data without full
correspondence are made in use to enhance the hashing performance. The
experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method
outperforms some state-of-the-art hashing approaches with fewer correspondence
information.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 13:41:23 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2015 12:13:47 GMT"
}
] | 2015-02-26T00:00:00 | [
[
"Gu",
"Yun",
""
],
[
"Xue",
"Haoyang",
""
],
[
"Yang",
"Jie",
""
]
] | TITLE: Cross-Modality Hashing with Partial Correspondence
ABSTRACT: Learning a hashing function for cross-media search is very desirable due to
its low storage cost and fast query speed. However, the data crawled from
Internet cannot always guarantee good correspondence among different modalities
which affects the learning for hashing function. In this paper, we focus on
cross-modal hashing with partially corresponded data. The data without full
correspondence are made in use to enhance the hashing performance. The
experiments on Wiki and NUS-WIDE datasets demonstrates that the proposed method
outperforms some state-of-the-art hashing approaches with fewer correspondence
information.
| no_new_dataset | 0.711875 |
1402.3163 | Xiaohao Yang | Xiaohao Yang and Pavol Juhas and Christopher L. Farrow and Simon J. L.
Billinge | xPDFsuite: an end-to-end software solution for high throughput pair
distribution function transformation, visualization and analysis | 3 pages, 2 figures | null | null | null | cond-mat.mtrl-sci cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The xPDFsuite software program is described. It is for processing and
analyzing atomic pair distribution functions (PDF) from X-ray powder
diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3,
allowing the users to easily obtain 1D diffraction pattern from raw 2D
diffraction images and then transform them to PDFs. It also bundles PDFgui
which allows the users to create structure models and fit to the experiment
data. It is specially useful for working with large numbers of datasets such as
from high throughout measurements. Some of the key features are: real time PDF
transformation and plotting; 2D waterfall, false color heatmap, and 3D contour
plotting for multiple datasets; static and dynamic mask editing; geometric
calibration of powder diffraction image; configurations and project saving and
loading; Pearson correlation analysis on selected datasets; written in Python
and support multiple platforms.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 14:55:14 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Feb 2014 04:01:14 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Feb 2015 21:13:21 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Yang",
"Xiaohao",
""
],
[
"Juhas",
"Pavol",
""
],
[
"Farrow",
"Christopher L.",
""
],
[
"Billinge",
"Simon J. L.",
""
]
] | TITLE: xPDFsuite: an end-to-end software solution for high throughput pair
distribution function transformation, visualization and analysis
ABSTRACT: The xPDFsuite software program is described. It is for processing and
analyzing atomic pair distribution functions (PDF) from X-ray powder
diffraction data. It provides a convenient GUI for SrXplanr and PDFgetX3,
allowing the users to easily obtain 1D diffraction pattern from raw 2D
diffraction images and then transform them to PDFs. It also bundles PDFgui
which allows the users to create structure models and fit to the experiment
data. It is specially useful for working with large numbers of datasets such as
from high throughout measurements. Some of the key features are: real time PDF
transformation and plotting; 2D waterfall, false color heatmap, and 3D contour
plotting for multiple datasets; static and dynamic mask editing; geometric
calibration of powder diffraction image; configurations and project saving and
loading; Pearson correlation analysis on selected datasets; written in Python
and support multiple platforms.
| no_new_dataset | 0.710051 |
1502.06657 | Sahin Geyik | Sahin Cem Geyik, Abhishek Saxena, Ali Dasdan | Multi-Touch Attribution Based Budget Allocation in Online Advertising | This paper has been published in ADKDD 2014, August 24, New York
City, New York, U.S.A | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Budget allocation in online advertising deals with distributing the campaign
(insertion order) level budgets to different sub-campaigns which employ
different targeting criteria and may perform differently in terms of
return-on-investment (ROI). In this paper, we present the efforts at Turn on
how to best allocate campaign budget so that the advertiser or campaign-level
ROI is maximized. To do this, it is crucial to be able to correctly determine
the performance of sub-campaigns. This determination is highly related to the
action-attribution problem, i.e. to be able to find out the set of ads, and
hence the sub-campaigns that provided them to a user, that an action should be
attributed to. For this purpose, we employ both last-touch (last ad gets all
credit) and multi-touch (many ads share the credit) attribution methodologies.
We present the algorithms deployed at Turn for the attribution problem, as well
as their parallel implementation on the large advertiser performance datasets.
We conclude the paper with our empirical comparison of last-touch and
multi-touch attribution-based budget allocation in a real online advertising
setting.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 00:09:05 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Geyik",
"Sahin Cem",
""
],
[
"Saxena",
"Abhishek",
""
],
[
"Dasdan",
"Ali",
""
]
] | TITLE: Multi-Touch Attribution Based Budget Allocation in Online Advertising
ABSTRACT: Budget allocation in online advertising deals with distributing the campaign
(insertion order) level budgets to different sub-campaigns which employ
different targeting criteria and may perform differently in terms of
return-on-investment (ROI). In this paper, we present the efforts at Turn on
how to best allocate campaign budget so that the advertiser or campaign-level
ROI is maximized. To do this, it is crucial to be able to correctly determine
the performance of sub-campaigns. This determination is highly related to the
action-attribution problem, i.e. to be able to find out the set of ads, and
hence the sub-campaigns that provided them to a user, that an action should be
attributed to. For this purpose, we employ both last-touch (last ad gets all
credit) and multi-touch (many ads share the credit) attribution methodologies.
We present the algorithms deployed at Turn for the attribution problem, as well
as their parallel implementation on the large advertiser performance datasets.
We conclude the paper with our empirical comparison of last-touch and
multi-touch attribution-based budget allocation in a real online advertising
setting.
| no_new_dataset | 0.709233 |
1502.06671 | Pinghui Wang Dr. | Pinghui Wang and John C.S. Lui and Don Towsley | Minfer: Inferring Motif Statistics From Sampled Edges | null | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Characterizing motif (i.e., locally connected subgraph patterns) statistics
is important for understanding complex networks such as online social networks
and communication networks. Previous work made the strong assumption that the
graph topology of interest is known, and that the dataset either fits into main
memory or stored on disks such that it is not expensive to obtain all neighbors
of any given node. In practice, researchers have to deal with the situation
where the graph topology is unknown, either because the graph is dynamic, or
because it is expensive to collect and store all topological and meta
information on disk. Hence, what is available to researchers is only a snapshot
of the graph generated by sampling edges from the graph at random, which we
called a "RESampled graph". Clearly, a RESampled graph's motif statistics may
be quite different from the underlying original graph. To solve this challenge,
we propose a framework and implement a system called Minfer, which can take the
given RESampled graph and accurately infer the underlying graph's motif
statistics. We also use Fisher information to bound the error of our estimates.
Experiments using large scale datasets show that our method to be accurate.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 01:43:59 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Wang",
"Pinghui",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Towsley",
"Don",
""
]
] | TITLE: Minfer: Inferring Motif Statistics From Sampled Edges
ABSTRACT: Characterizing motif (i.e., locally connected subgraph patterns) statistics
is important for understanding complex networks such as online social networks
and communication networks. Previous work made the strong assumption that the
graph topology of interest is known, and that the dataset either fits into main
memory or stored on disks such that it is not expensive to obtain all neighbors
of any given node. In practice, researchers have to deal with the situation
where the graph topology is unknown, either because the graph is dynamic, or
because it is expensive to collect and store all topological and meta
information on disk. Hence, what is available to researchers is only a snapshot
of the graph generated by sampling edges from the graph at random, which we
called a "RESampled graph". Clearly, a RESampled graph's motif statistics may
be quite different from the underlying original graph. To solve this challenge,
we propose a framework and implement a system called Minfer, which can take the
given RESampled graph and accurately infer the underlying graph's motif
statistics. We also use Fisher information to bound the error of our estimates.
Experiments using large scale datasets show that our method to be accurate.
| no_new_dataset | 0.709019 |
1502.06703 | Smitha M.L. | B.H. Shekar, Smitha M.L., P. Shivakumara | Discrete Wavelet Transform and Gradient Difference based approach for
text localization in videos | Fifth International Conference on Signals and Image Processing, IEEE,
DOI 10.1109/ICSIP.2014.50, pp. 280-284, held at BNMIT, Bangalore in January
2014 | null | 10.1109/ICSIP.2014.50 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The text detection and localization is important for video analysis and
understanding. The scene text in video contains semantic information and thus
can contribute significantly to video retrieval and understanding. However,
most of the approaches detect scene text in still images or single video frame.
Videos differ from images in temporal redundancy. This paper proposes a novel
hybrid method to robustly localize the texts in natural scene images and videos
based on fusion of discrete wavelet transform and gradient difference. A set of
rules and geometric properties have been devised to localize the actual text
regions. Then, morphological operation is performed to generate the text
regions and finally the connected component analysis is employed to localize
the text in a video frame. The experimental results obtained on publicly
available standard ICDAR 2003 and Hua dataset illustrate that the proposed
method can accurately detect and localize texts of various sizes, fonts and
colors. The experimentation on huge collection of video databases reveal the
suitability of the proposed method to video databases.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 07:46:34 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L.",
"Smitha M.",
""
],
[
"Shivakumara",
"P.",
""
]
] | TITLE: Discrete Wavelet Transform and Gradient Difference based approach for
text localization in videos
ABSTRACT: The text detection and localization is important for video analysis and
understanding. The scene text in video contains semantic information and thus
can contribute significantly to video retrieval and understanding. However,
most of the approaches detect scene text in still images or single video frame.
Videos differ from images in temporal redundancy. This paper proposes a novel
hybrid method to robustly localize the texts in natural scene images and videos
based on fusion of discrete wavelet transform and gradient difference. A set of
rules and geometric properties have been devised to localize the actual text
regions. Then, morphological operation is performed to generate the text
regions and finally the connected component analysis is employed to localize
the text in a video frame. The experimental results obtained on publicly
available standard ICDAR 2003 and Hua dataset illustrate that the proposed
method can accurately detect and localize texts of various sizes, fonts and
colors. The experimentation on huge collection of video databases reveal the
suitability of the proposed method to video databases.
| no_new_dataset | 0.71227 |
1502.06757 | Lse Lse | Mart\'in Dias (INRIA Lille - Nord Europe), Alberto Bacchelli, Georgios
Gousios, Damien Cassou (INRIA Lille - Nord Europe), St\'ephane Ducasse (INRIA
Lille - Nord Europe) | Untangling Fine-Grained Code Changes | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After working for some time, developers commit their code changes to a
version control system. When doing so, they often bundle unrelated changes
(e.g., bug fix and refactoring) in a single commit, thus creating a so-called
tangled commit. Sharing tangled commits is problematic because it makes review,
reversion, and integration of these commits harder and historical analyses of
the project less reliable. Researchers have worked at untangling existing
commits, i.e., finding which part of a commit relates to which task. In this
paper, we contribute to this line of work in two ways: (1) A publicly available
dataset of untangled code changes, created with the help of two developers who
accurately split their code changes into self contained tasks over a period of
four months; (2) a novel approach, EpiceaUntangler, to help developers share
untangled commits (aka. atomic commits) by using fine-grained code change
information. EpiceaUntangler is based and tested on the publicly available
dataset, and further evaluated by deploying it to 7 developers, who used it for
2 weeks. We recorded a median success rate of 91% and average one of 75%, in
automatically creating clusters of untangled fine-grained code changes.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 10:50:13 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Dias",
"Martín",
"",
"INRIA Lille - Nord Europe"
],
[
"Bacchelli",
"Alberto",
"",
"INRIA Lille - Nord Europe"
],
[
"Gousios",
"Georgios",
"",
"INRIA Lille - Nord Europe"
],
[
"Cassou",
"Damien",
"",
"INRIA Lille - Nord Europe"
],
[
"Ducasse",
"Stéphane",
"",
"INRIA\n Lille - Nord Europe"
]
] | TITLE: Untangling Fine-Grained Code Changes
ABSTRACT: After working for some time, developers commit their code changes to a
version control system. When doing so, they often bundle unrelated changes
(e.g., bug fix and refactoring) in a single commit, thus creating a so-called
tangled commit. Sharing tangled commits is problematic because it makes review,
reversion, and integration of these commits harder and historical analyses of
the project less reliable. Researchers have worked at untangling existing
commits, i.e., finding which part of a commit relates to which task. In this
paper, we contribute to this line of work in two ways: (1) A publicly available
dataset of untangled code changes, created with the help of two developers who
accurately split their code changes into self contained tasks over a period of
four months; (2) a novel approach, EpiceaUntangler, to help developers share
untangled commits (aka. atomic commits) by using fine-grained code change
information. EpiceaUntangler is based and tested on the publicly available
dataset, and further evaluated by deploying it to 7 developers, who used it for
2 weeks. We recorded a median success rate of 91% and average one of 75%, in
automatically creating clusters of untangled fine-grained code changes.
| no_new_dataset | 0.531209 |
1502.06796 | Seunghoon Hong | Seunghoon Hong, Tackgeun You, Suha Kwak, Bohyung Han | Online Tracking by Learning Discriminative Saliency Map with
Convolutional Neural Network | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an online visual tracking algorithm by learning discriminative
saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained
on a large-scale image repository in offline, our algorithm takes outputs from
hidden layers of the network as feature descriptors since they show excellent
representation performance in various general visual recognition problems. The
features are used to learn discriminative target appearance models using an
online Support Vector Machine (SVM). In addition, we construct target-specific
saliency map by backpropagating CNN features with guidance of the SVM, and
obtain the final tracking result in each frame based on the appearance model
generatively constructed with the saliency map. Since the saliency map
visualizes spatial configuration of target effectively, it improves target
localization accuracy and enable us to achieve pixel-level target segmentation.
We verify the effectiveness of our tracking algorithm through extensive
experiment on a challenging benchmark, where our method illustrates outstanding
performance compared to the state-of-the-art tracking algorithms.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 13:10:32 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Hong",
"Seunghoon",
""
],
[
"You",
"Tackgeun",
""
],
[
"Kwak",
"Suha",
""
],
[
"Han",
"Bohyung",
""
]
] | TITLE: Online Tracking by Learning Discriminative Saliency Map with
Convolutional Neural Network
ABSTRACT: We propose an online visual tracking algorithm by learning discriminative
saliency map using Convolutional Neural Network (CNN). Given a CNN pre-trained
on a large-scale image repository in offline, our algorithm takes outputs from
hidden layers of the network as feature descriptors since they show excellent
representation performance in various general visual recognition problems. The
features are used to learn discriminative target appearance models using an
online Support Vector Machine (SVM). In addition, we construct target-specific
saliency map by backpropagating CNN features with guidance of the SVM, and
obtain the final tracking result in each frame based on the appearance model
generatively constructed with the saliency map. Since the saliency map
visualizes spatial configuration of target effectively, it improves target
localization accuracy and enable us to achieve pixel-level target segmentation.
We verify the effectiveness of our tracking algorithm through extensive
experiment on a challenging benchmark, where our method illustrates outstanding
performance compared to the state-of-the-art tracking algorithms.
| no_new_dataset | 0.711625 |
1502.06823 | Theodoros Rekatsinas | Theodoros Rekatsinas, Amol Deshpande and Aditya Parameswaran | CrowdGather: Entity Extraction over Structured Domains | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourced entity extraction is often used to acquire data for many
applications, including recommendation systems, construction of aggregated
listings and directories, and knowledge base construction. Current solutions
focus on entity extraction using a single query, e.g., only using "give me
another restaurant", when assembling a list of all restaurants. Due to the cost
of human labor, solutions that focus on a single query can be highly
impractical.
In this paper, we leverage the fact that entity extraction often focuses on
{\em structured domains}, i.e., domains that are described by a collection of
attributes, each potentially exhibiting hierarchical structure. Given such a
domain, we enable a richer space of queries, e.g., "give me another Moroccan
restaurant in Manhattan that does takeout". Naturally, enabling a richer space
of queries comes with a host of issues, especially since many queries return
empty answers. We develop new statistical tools that enable us to reason about
the gain of issuing {\em additional queries} given little to no information,
and show how we can exploit the overlaps across the results of queries for
different points of the data domain to obtain accurate estimates of the gain.
We cast the problem of {\em budgeted entity extraction} over large domains as
an adaptive optimization problem that seeks to maximize the number of extracted
entities, while minimizing the overall extraction costs. We evaluate our
techniques with experiments on both synthetic and real-world datasets,
demonstrating a yield of up to 4X over competing approaches for the same
budget.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2015 14:41:15 GMT"
}
] | 2015-02-25T00:00:00 | [
[
"Rekatsinas",
"Theodoros",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Parameswaran",
"Aditya",
""
]
] | TITLE: CrowdGather: Entity Extraction over Structured Domains
ABSTRACT: Crowdsourced entity extraction is often used to acquire data for many
applications, including recommendation systems, construction of aggregated
listings and directories, and knowledge base construction. Current solutions
focus on entity extraction using a single query, e.g., only using "give me
another restaurant", when assembling a list of all restaurants. Due to the cost
of human labor, solutions that focus on a single query can be highly
impractical.
In this paper, we leverage the fact that entity extraction often focuses on
{\em structured domains}, i.e., domains that are described by a collection of
attributes, each potentially exhibiting hierarchical structure. Given such a
domain, we enable a richer space of queries, e.g., "give me another Moroccan
restaurant in Manhattan that does takeout". Naturally, enabling a richer space
of queries comes with a host of issues, especially since many queries return
empty answers. We develop new statistical tools that enable us to reason about
the gain of issuing {\em additional queries} given little to no information,
and show how we can exploit the overlaps across the results of queries for
different points of the data domain to obtain accurate estimates of the gain.
We cast the problem of {\em budgeted entity extraction} over large domains as
an adaptive optimization problem that seeks to maximize the number of extracted
entities, while minimizing the overall extraction costs. We evaluate our
techniques with experiments on both synthetic and real-world datasets,
demonstrating a yield of up to 4X over competing approaches for the same
budget.
| no_new_dataset | 0.707424 |
1306.0239 | Yichuan Tang | Yichuan Tang | Deep Learning using Linear Support Vector Machines | Contribution to the ICML 2013 Challenges in Representation Learning
Workshop | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, fully-connected and convolutional neural networks have been trained
to achieve state-of-the-art performance on a wide variety of tasks such as
speech recognition, image classification, natural language processing, and
bioinformatics. For classification tasks, most of these "deep learning" models
employ the softmax activation function for prediction and minimize
cross-entropy loss. In this paper, we demonstrate a small but consistent
advantage of replacing the softmax layer with a linear support vector machine.
Learning minimizes a margin-based loss instead of the cross-entropy loss. While
there have been various combinations of neural nets and SVMs in prior art, our
results using L2-SVMs show that by simply replacing softmax with linear SVMs
gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and
the ICML 2013 Representation Learning Workshop's face expression recognition
challenge.
| [
{
"version": "v1",
"created": "Sun, 2 Jun 2013 18:46:58 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jul 2013 21:30:59 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Dec 2013 21:16:45 GMT"
},
{
"version": "v4",
"created": "Sat, 21 Feb 2015 16:58:39 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Tang",
"Yichuan",
""
]
] | TITLE: Deep Learning using Linear Support Vector Machines
ABSTRACT: Recently, fully-connected and convolutional neural networks have been trained
to achieve state-of-the-art performance on a wide variety of tasks such as
speech recognition, image classification, natural language processing, and
bioinformatics. For classification tasks, most of these "deep learning" models
employ the softmax activation function for prediction and minimize
cross-entropy loss. In this paper, we demonstrate a small but consistent
advantage of replacing the softmax layer with a linear support vector machine.
Learning minimizes a margin-based loss instead of the cross-entropy loss. While
there have been various combinations of neural nets and SVMs in prior art, our
results using L2-SVMs show that by simply replacing softmax with linear SVMs
gives significant gains on popular deep learning datasets MNIST, CIFAR-10, and
the ICML 2013 Representation Learning Workshop's face expression recognition
challenge.
| no_new_dataset | 0.711055 |
1312.6110 | Yichuan Tang | Yichuan Tang, Nitish Srivastava, Ruslan Salakhutdinov | Learning Generative Models with Visual Attention | In the proceedings of Neural Information Processing Systems, 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Attention has long been proposed by psychologists as important for
effectively dealing with the enormous sensory stimulus available in the
neocortex. Inspired by the visual attention models in computational
neuroscience and the need of object-centric data for generative models, we
describe for generative learning framework using attentional mechanisms.
Attentional mechanisms can propagate signals from region of interest in a scene
to an aligned canonical representation, where generative modeling takes place.
By ignoring background clutter, generative models can concentrate their
resources on the object of interest. Our model is a proper graphical model
where the 2D Similarity transformation is a part of the top-down process. A
ConvNet is employed to provide good initializations during posterior inference
which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our
model can robustly attend to face regions of novel test subjects. More
importantly, our model can learn generative models of new faces from a novel
dataset of large images where the face locations are not known.
| [
{
"version": "v1",
"created": "Fri, 20 Dec 2013 20:50:43 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Dec 2013 16:49:43 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Feb 2015 22:21:15 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Tang",
"Yichuan",
""
],
[
"Srivastava",
"Nitish",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] | TITLE: Learning Generative Models with Visual Attention
ABSTRACT: Attention has long been proposed by psychologists as important for
effectively dealing with the enormous sensory stimulus available in the
neocortex. Inspired by the visual attention models in computational
neuroscience and the need of object-centric data for generative models, we
describe for generative learning framework using attentional mechanisms.
Attentional mechanisms can propagate signals from region of interest in a scene
to an aligned canonical representation, where generative modeling takes place.
By ignoring background clutter, generative models can concentrate their
resources on the object of interest. Our model is a proper graphical model
where the 2D Similarity transformation is a part of the top-down process. A
ConvNet is employed to provide good initializations during posterior inference
which is based on Hamiltonian Monte Carlo. Upon learning images of faces, our
model can robustly attend to face regions of novel test subjects. More
importantly, our model can learn generative models of new faces from a novel
dataset of large images where the face locations are not known.
| no_new_dataset | 0.694678 |
1405.0312 | Piotr Doll\'ar | Tsung-Yi Lin, Michael Maire, Serge Belongie, Lubomir Bourdev, Ross
Girshick, James Hays, Pietro Perona, Deva Ramanan, C. Lawrence Zitnick, Piotr
Doll\'ar | Microsoft COCO: Common Objects in Context | 1) updated annotation pipeline description and figures; 2) added new
section describing datasets splits; 3) updated author list | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new dataset with the goal of advancing the state-of-the-art in
object recognition by placing the question of object recognition in the context
of the broader question of scene understanding. This is achieved by gathering
images of complex everyday scenes containing common objects in their natural
context. Objects are labeled using per-instance segmentations to aid in precise
object localization. Our dataset contains photos of 91 objects types that would
be easily recognizable by a 4 year old. With a total of 2.5 million labeled
instances in 328k images, the creation of our dataset drew upon extensive crowd
worker involvement via novel user interfaces for category detection, instance
spotting and instance segmentation. We present a detailed statistical analysis
of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide
baseline performance analysis for bounding box and segmentation detection
results using a Deformable Parts Model.
| [
{
"version": "v1",
"created": "Thu, 1 May 2014 21:43:32 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2014 18:39:56 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Feb 2015 01:48:49 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Lin",
"Tsung-Yi",
""
],
[
"Maire",
"Michael",
""
],
[
"Belongie",
"Serge",
""
],
[
"Bourdev",
"Lubomir",
""
],
[
"Girshick",
"Ross",
""
],
[
"Hays",
"James",
""
],
[
"Perona",
"Pietro",
""
],
[
"Ramanan",
"Deva",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Dollár",
"Piotr",
""
]
] | TITLE: Microsoft COCO: Common Objects in Context
ABSTRACT: We present a new dataset with the goal of advancing the state-of-the-art in
object recognition by placing the question of object recognition in the context
of the broader question of scene understanding. This is achieved by gathering
images of complex everyday scenes containing common objects in their natural
context. Objects are labeled using per-instance segmentations to aid in precise
object localization. Our dataset contains photos of 91 objects types that would
be easily recognizable by a 4 year old. With a total of 2.5 million labeled
instances in 328k images, the creation of our dataset drew upon extensive crowd
worker involvement via novel user interfaces for category detection, instance
spotting and instance segmentation. We present a detailed statistical analysis
of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide
baseline performance analysis for bounding box and segmentation detection
results using a Deformable Parts Model.
| new_dataset | 0.713444 |
1412.6039 | Xin Yuan | Yunchen Pu, Xin Yuan and Lawrence Carin | Generative Deep Deconvolutional Learning | 21 pages, 9 figures, revised version for ICLR 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generative Bayesian model is developed for deep (multi-layer) convolutional
dictionary learning. A novel probabilistic pooling operation is integrated into
the deep model, yielding efficient bottom-up and top-down probabilistic
learning. After learning the deep convolutional dictionary, testing is
implemented via deconvolutional inference. To speed up this inference, a new
statistical approach is proposed to project the top-layer dictionary elements
to the data level. Following this, only one layer of deconvolution is required
during testing. Experimental results demonstrate powerful capabilities of the
model to learn multi-layer features from images. Excellent classification
results are obtained on both the MNIST and Caltech 101 datasets.
| [
{
"version": "v1",
"created": "Thu, 18 Dec 2014 20:01:38 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 17:21:36 GMT"
},
{
"version": "v3",
"created": "Sun, 22 Feb 2015 18:13:29 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Pu",
"Yunchen",
""
],
[
"Yuan",
"Xin",
""
],
[
"Carin",
"Lawrence",
""
]
] | TITLE: Generative Deep Deconvolutional Learning
ABSTRACT: A generative Bayesian model is developed for deep (multi-layer) convolutional
dictionary learning. A novel probabilistic pooling operation is integrated into
the deep model, yielding efficient bottom-up and top-down probabilistic
learning. After learning the deep convolutional dictionary, testing is
implemented via deconvolutional inference. To speed up this inference, a new
statistical approach is proposed to project the top-layer dictionary elements
to the data level. Following this, only one layer of deconvolution is required
during testing. Experimental results demonstrate powerful capabilities of the
model to learn multi-layer features from images. Excellent classification
results are obtained on both the MNIST and Caltech 101 datasets.
| no_new_dataset | 0.711443 |
1502.06064 | Ken Miura | Ken Miura, Tetsuaki Mano, Atsushi Kanehira, Yuichiro Tsuchiya and
Tatsuya Harada | MILJS : Brand New JavaScript Libraries for Matrix Calculation and
Machine Learning | null | null | null | null | stat.ML cs.LG cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | MILJS is a collection of state-of-the-art, platform-independent, scalable,
fast JavaScript libraries for matrix calculation and machine learning. Our core
library offering a matrix calculation is called Sushi, which exhibits far
better performance than any other leading machine learning libraries written in
JavaScript. Especially, our matrix multiplication is 177 times faster than the
fastest JavaScript benchmark. Based on Sushi, a machine learning library called
Tempura is provided, which supports various algorithms widely used in machine
learning research. We also provide Soba as a visualization library. The
implementations of our libraries are clearly written, properly documented and
thus can are easy to get started with, as long as there is a web browser. These
libraries are available from http://mil-tokyo.github.io/ under the MIT license.
| [
{
"version": "v1",
"created": "Sat, 21 Feb 2015 04:29:41 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Miura",
"Ken",
""
],
[
"Mano",
"Tetsuaki",
""
],
[
"Kanehira",
"Atsushi",
""
],
[
"Tsuchiya",
"Yuichiro",
""
],
[
"Harada",
"Tatsuya",
""
]
] | TITLE: MILJS : Brand New JavaScript Libraries for Matrix Calculation and
Machine Learning
ABSTRACT: MILJS is a collection of state-of-the-art, platform-independent, scalable,
fast JavaScript libraries for matrix calculation and machine learning. Our core
library offering a matrix calculation is called Sushi, which exhibits far
better performance than any other leading machine learning libraries written in
JavaScript. Especially, our matrix multiplication is 177 times faster than the
fastest JavaScript benchmark. Based on Sushi, a machine learning library called
Tempura is provided, which supports various algorithms widely used in machine
learning research. We also provide Soba as a visualization library. The
implementations of our libraries are clearly written, properly documented and
thus can are easy to get started with, as long as there is a web browser. These
libraries are available from http://mil-tokyo.github.io/ under the MIT license.
| no_new_dataset | 0.706406 |
1502.06086 | Suyash Gupta | Suyash Gupta, Rahul Shrivastava and V. Krishna Nandivada | DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish
Elimination for Recursive Task Parallel Programs | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present two symbiotic optimizations to optimize recursive
task parallel (RTP) programs by reducing the task creation and termination
overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps
reduce the redundant join operations to a large extent. The second optimization
Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop
chunking to decide on the number of parallel tasks based on the number of
available worker threads, at runtime. Further, we discuss the impact of
exceptions on our optimizations and extend them to handle RTP programs that may
throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and
tested it over a set of benchmark kernels on two different hardwares (a 16-core
Intel system and a 64-core AMD system). With respect to the base X10 compiler
extended with loop-chunking of Nandivada et al [Nandivada et
al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric
mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We
also present an evaluation with respect to the energy consumption on the Intel
system and show that on average, compared to the LC versions, the DCAFE
versions consume 71.2% less energy.
| [
{
"version": "v1",
"created": "Sat, 21 Feb 2015 08:18:43 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Gupta",
"Suyash",
""
],
[
"Shrivastava",
"Rahul",
""
],
[
"Nandivada",
"V. Krishna",
""
]
] | TITLE: DCAFE: Dynamic load-balanced loop Chunking & Aggressive Finish
Elimination for Recursive Task Parallel Programs
ABSTRACT: In this paper, we present two symbiotic optimizations to optimize recursive
task parallel (RTP) programs by reducing the task creation and termination
overheads. Our first optimization Aggressive Finish-Elimination (AFE) helps
reduce the redundant join operations to a large extent. The second optimization
Dynamic Load-Balanced loop Chunking (DLBC) extends the prior work on loop
chunking to decide on the number of parallel tasks based on the number of
available worker threads, at runtime. Further, we discuss the impact of
exceptions on our optimizations and extend them to handle RTP programs that may
throw exceptions. We implemented DCAFE (= DLBC+AFE) in the X10v2.3 compiler and
tested it over a set of benchmark kernels on two different hardwares (a 16-core
Intel system and a 64-core AMD system). With respect to the base X10 compiler
extended with loop-chunking of Nandivada et al [Nandivada et
al.(2013)Nandivada, Shirako, Zhao, and Sarkar](LC), DCAFE achieved a geometric
mean speed up of 5.75x and 4.16x on the Intel and AMD system, respectively. We
also present an evaluation with respect to the energy consumption on the Intel
system and show that on average, compared to the LC versions, the DCAFE
versions consume 71.2% less energy.
| no_new_dataset | 0.707998 |
1502.06219 | Smitha M.L. | B.H. Shekar, Smitha M.L. | Video Text Localization with an emphasis on Edge Features | 8 pages, Eighth International Conference on Image and Signal
Processing, Elsevier Publications, ISBN: 9789351072522, pp: 324-330, held at
UVCE, Bangalore in July 2014. arXiv admin note: text overlap with
arXiv:1502.03913 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The text detection and localization plays a major role in video analysis and
understanding. The scene text embedded in video consist of high-level semantics
and hence contributes significantly to visual content analysis and retrieval.
This paper proposes a novel method to robustly localize the texts in natural
scene images and videos based on sobel edge emphasizing approach. The input
image is preprocessed and edge emphasis is done to detect the text clusters.
Further, a set of rules have been devised using morphological operators for
false positive elimination and connected component analysis is performed to
detect the text regions and hence text localization is performed. The
experimental results obtained on publicly available standard datasets
illustrate that the proposed method can detect and localize the texts of
various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Sun, 22 Feb 2015 12:32:18 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L.",
"Smitha M.",
""
]
] | TITLE: Video Text Localization with an emphasis on Edge Features
ABSTRACT: The text detection and localization plays a major role in video analysis and
understanding. The scene text embedded in video consist of high-level semantics
and hence contributes significantly to visual content analysis and retrieval.
This paper proposes a novel method to robustly localize the texts in natural
scene images and videos based on sobel edge emphasizing approach. The input
image is preprocessed and edge emphasis is done to detect the text clusters.
Further, a set of rules have been devised using morphological operators for
false positive elimination and connected component analysis is performed to
detect the text regions and hence text localization is performed. The
experimental results obtained on publicly available standard datasets
illustrate that the proposed method can detect and localize the texts of
various sizes, fonts and colors.
| no_new_dataset | 0.712464 |
1502.06235 | Borislav Antic | Borislav Anti\'c and Bj\"orn Ommer | Spatio-temporal Video Parsing for Abnormality Detection | 15 pages, 12 figures, 3 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Abnormality detection in video poses particular challenges due to the
infinite size of the class of all irregular objects and behaviors. Thus no (or
by far not enough) abnormal training samples are available and we need to find
abnormalities in test data without actually knowing what they are.
Nevertheless, the prevailing concept of the field is to directly search for
individual abnormal local patches or image regions independent of another. To
address this problem, we propose a method for joint detection of abnormalities
in videos by spatio-temporal video parsing. The goal of video parsing is to
find a set of indispensable normal spatio-temporal object hypotheses that
jointly explain all the foreground of a video, while, at the same time, being
supported by normal training samples. Consequently, we avoid a direct detection
of abnormalities and discover them indirectly as those hypotheses which are
needed for covering the foreground without finding an explanation for
themselves by normal samples. Abnormalities are localized by MAP inference in a
graphical model and we solve it efficiently by formulating it as a convex
optimization problem. We experimentally evaluate our approach on several
challenging benchmark sets, improving over the state-of-the-art on all standard
benchmarks both in terms of abnormality classification and localization.
| [
{
"version": "v1",
"created": "Sun, 22 Feb 2015 14:54:02 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Antić",
"Borislav",
""
],
[
"Ommer",
"Björn",
""
]
] | TITLE: Spatio-temporal Video Parsing for Abnormality Detection
ABSTRACT: Abnormality detection in video poses particular challenges due to the
infinite size of the class of all irregular objects and behaviors. Thus no (or
by far not enough) abnormal training samples are available and we need to find
abnormalities in test data without actually knowing what they are.
Nevertheless, the prevailing concept of the field is to directly search for
individual abnormal local patches or image regions independent of another. To
address this problem, we propose a method for joint detection of abnormalities
in videos by spatio-temporal video parsing. The goal of video parsing is to
find a set of indispensable normal spatio-temporal object hypotheses that
jointly explain all the foreground of a video, while, at the same time, being
supported by normal training samples. Consequently, we avoid a direct detection
of abnormalities and discover them indirectly as those hypotheses which are
needed for covering the foreground without finding an explanation for
themselves by normal samples. Abnormalities are localized by MAP inference in a
graphical model and we solve it efficiently by formulating it as a convex
optimization problem. We experimentally evaluate our approach on several
challenging benchmark sets, improving over the state-of-the-art on all standard
benchmarks both in terms of abnormality classification and localization.
| no_new_dataset | 0.711462 |
1502.06344 | Erik Rodner | Clemens-Alexander Brust, Sven Sickert, Marcel Simon, Erik Rodner,
Joachim Denzler | Convolutional Patch Networks with Spatial Prior for Road Detection and
Urban Scene Understanding | VISAPP 2015 paper | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classifying single image patches is important in many different applications,
such as road detection or scene understanding. In this paper, we present
convolutional patch networks, which are convolutional networks learned to
distinguish different image patches and which can be used for pixel-wise
labeling. We also show how to incorporate spatial information of the patch as
an input to the network, which allows for learning spatial priors for certain
categories jointly with an appearance model. In particular, we focus on road
detection and urban scene understanding, two application areas where we are
able to achieve state-of-the-art results on the KITTI as well as on the
LabelMeFacade dataset.
Furthermore, our paper offers a guideline for people working in the area and
desperately wandering through all the painstaking details that render training
CNs on image patches extremely difficult.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2015 08:47:37 GMT"
}
] | 2015-02-24T00:00:00 | [
[
"Brust",
"Clemens-Alexander",
""
],
[
"Sickert",
"Sven",
""
],
[
"Simon",
"Marcel",
""
],
[
"Rodner",
"Erik",
""
],
[
"Denzler",
"Joachim",
""
]
] | TITLE: Convolutional Patch Networks with Spatial Prior for Road Detection and
Urban Scene Understanding
ABSTRACT: Classifying single image patches is important in many different applications,
such as road detection or scene understanding. In this paper, we present
convolutional patch networks, which are convolutional networks learned to
distinguish different image patches and which can be used for pixel-wise
labeling. We also show how to incorporate spatial information of the patch as
an input to the network, which allows for learning spatial priors for certain
categories jointly with an appearance model. In particular, we focus on road
detection and urban scene understanding, two application areas where we are
able to achieve state-of-the-art results on the KITTI as well as on the
LabelMeFacade dataset.
Furthermore, our paper offers a guideline for people working in the area and
desperately wandering through all the painstaking details that render training
CNs on image patches extremely difficult.
| no_new_dataset | 0.710653 |
1502.03913 | Smitha M.L. | B.H. Shekar, Smitha M.L | Skeleton Matching based approach for Text Localization in Scene Images | 10 pages, 8 figures, Eighth International Conference on Image and
Signal Processing,Elsevier Publications,pp: 145-153, held at UVCE, Bangalore
in July 2014. ISBN: 9789351072522 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a skeleton matching based approach which aids in
text localization in scene images. The input image is preprocessed and
segmented into blocks using connected component analysis. We obtain the
skeleton of the segmented block using morphology based approach. The
skeletonized images are compared with the trained templates in the database to
categorize into text and non-text blocks. Further, the newly designed
geometrical rules and morphological operations are employed on the detected
text blocks for scene text localization. The experimental results obtained on
publicly available standard datasets illustrate that the proposed method can
detect and localize the texts of various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 08:42:00 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L",
"Smitha M.",
""
]
] | TITLE: Skeleton Matching based approach for Text Localization in Scene Images
ABSTRACT: In this paper, we propose a skeleton matching based approach which aids in
text localization in scene images. The input image is preprocessed and
segmented into blocks using connected component analysis. We obtain the
skeleton of the segmented block using morphology based approach. The
skeletonized images are compared with the trained templates in the database to
categorize into text and non-text blocks. Further, the newly designed
geometrical rules and morphological operations are employed on the detected
text blocks for scene text localization. The experimental results obtained on
publicly available standard datasets illustrate that the proposed method can
detect and localize the texts of various sizes, fonts and colors.
| no_new_dataset | 0.713806 |
1502.03918 | Smitha M.L. | B.H. Shekar, Smitha M.L | Gradient Difference based approach for Text Localization in Compressed
domain | 11 pages, Second International Conference on Emerging Research in
Computing, Information, Communications and Applications, Elsevier
Publications, ISBN: 9789351072638, vol. III, pp: 299-308, held at NMIT,
Bangalore August 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a gradient difference based approach to text
localization in videos and scene images. The input video frame/ image is first
compressed using multilevel 2-D wavelet transform. The edge information of the
reconstructed image is found which is further used for finding the maximum
gradient difference between the pixels and then the boundaries of the detected
text blocks are computed using zero crossing technique. We perform logical AND
operation of the text blocks obtained by gradient difference and the zero
crossing technique followed by connected component analysis to eliminate the
false positives. Finally, the morphological dilation operation is employed on
the detected text blocks for scene text localization. The experimental results
obtained on publicly available standard datasets illustrate that the proposed
method can detect and localize the texts of various sizes, fonts and colors.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 09:08:35 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Shekar",
"B. H.",
""
],
[
"L",
"Smitha M.",
""
]
] | TITLE: Gradient Difference based approach for Text Localization in Compressed
domain
ABSTRACT: In this paper, we propose a gradient difference based approach to text
localization in videos and scene images. The input video frame/ image is first
compressed using multilevel 2-D wavelet transform. The edge information of the
reconstructed image is found which is further used for finding the maximum
gradient difference between the pixels and then the boundaries of the detected
text blocks are computed using zero crossing technique. We perform logical AND
operation of the text blocks obtained by gradient difference and the zero
crossing technique followed by connected component analysis to eliminate the
false positives. Finally, the morphological dilation operation is employed on
the detected text blocks for scene text localization. The experimental results
obtained on publicly available standard datasets illustrate that the proposed
method can detect and localize the texts of various sizes, fonts and colors.
| no_new_dataset | 0.713444 |
1502.05925 | Feng Nan | Feng Nan, Joseph Wang, Venkatesh Saligrama | Feature-Budgeted Random Forest | null | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We seek decision rules for prediction-time cost reduction, where complete
data is available for training, but during prediction-time, each feature can
only be acquired for an additional cost. We propose a novel random forest
algorithm to minimize prediction error for a user-specified {\it average}
feature acquisition budget. While random forests yield strong generalization
performance, they do not explicitly account for feature costs and furthermore
require low correlation among trees, which amplifies costs. Our random forest
grows trees with low acquisition cost and high strength based on greedy minimax
cost-weighted-impurity splits. Theoretically, we establish near-optimal
acquisition cost guarantees for our algorithm. Empirically, on a number of
benchmark datasets we demonstrate superior accuracy-cost curves against
state-of-the-art prediction-time algorithms.
| [
{
"version": "v1",
"created": "Fri, 20 Feb 2015 16:42:40 GMT"
}
] | 2015-02-23T00:00:00 | [
[
"Nan",
"Feng",
""
],
[
"Wang",
"Joseph",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] | TITLE: Feature-Budgeted Random Forest
ABSTRACT: We seek decision rules for prediction-time cost reduction, where complete
data is available for training, but during prediction-time, each feature can
only be acquired for an additional cost. We propose a novel random forest
algorithm to minimize prediction error for a user-specified {\it average}
feature acquisition budget. While random forests yield strong generalization
performance, they do not explicitly account for feature costs and furthermore
require low correlation among trees, which amplifies costs. Our random forest
grows trees with low acquisition cost and high strength based on greedy minimax
cost-weighted-impurity splits. Theoretically, we establish near-optimal
acquisition cost guarantees for our algorithm. Empirically, on a number of
benchmark datasets we demonstrate superior accuracy-cost curves against
state-of-the-art prediction-time algorithms.
| no_new_dataset | 0.708994 |
1502.04272 | Alex James Dr | Joshin John Mathew and Alex Pappachen James | Spatial Stimuli Gradient Sketch Model | accepted for publication in IEEE Signal Processing Letters, 2015 | Volume: 22 Issue: 9 On page(s): 1336-1339, 2015 | 10.1109/LSP.2015.2404827 | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The inability of automated edge detection methods inspired from primal sketch
models to accurately calculate object edges under the influence of pixel noise
is an open problem. Extending the principles of image perception i.e.
Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection
method and formulation that use perceived brightness and neighbourhood
similarity calculations in the determination of robust object edges. The
robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and
Prewitt edge detection methods in an example face recognition problem showing
statistically significant improvement in recognition accuracy and pixel noise
tolerance.
| [
{
"version": "v1",
"created": "Sun, 15 Feb 2015 02:42:56 GMT"
}
] | 2015-02-20T00:00:00 | [
[
"Mathew",
"Joshin John",
""
],
[
"James",
"Alex Pappachen",
""
]
] | TITLE: Spatial Stimuli Gradient Sketch Model
ABSTRACT: The inability of automated edge detection methods inspired from primal sketch
models to accurately calculate object edges under the influence of pixel noise
is an open problem. Extending the principles of image perception i.e.
Weber-Fechner law, and Sheperd similarity law, we propose a new edge detection
method and formulation that use perceived brightness and neighbourhood
similarity calculations in the determination of robust object edges. The
robustness of the detected edges is benchmark against Sobel, SIS, Kirsch, and
Prewitt edge detection methods in an example face recognition problem showing
statistically significant improvement in recognition accuracy and pixel noise
tolerance.
| no_new_dataset | 0.711782 |
1502.05461 | Carl Vondrick | Carl Vondrick, Aditya Khosla, Hamed Pirsiavash, Tomasz Malisiewicz,
Antonio Torralba | Visualizing Object Detection Features | In submission to IJCV | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce algorithms to visualize feature spaces used by object detectors.
Our method works by inverting a visual feature back to multiple natural images.
We found that these visualizations allow us to analyze object detection systems
in new ways and gain new insight into the detector's failures. For example,
when we visualize the features for high scoring false alarms, we discovered
that, although they are clearly wrong in image space, they do look deceptively
similar to true positives in feature space. This result suggests that many of
these false alarms are caused by our choice of feature space, and supports that
creating a better learning algorithm or building bigger datasets is unlikely to
correct these errors. By visualizing feature spaces, we can gain a more
intuitive understanding of recognition systems.
| [
{
"version": "v1",
"created": "Thu, 19 Feb 2015 04:11:14 GMT"
}
] | 2015-02-20T00:00:00 | [
[
"Vondrick",
"Carl",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Pirsiavash",
"Hamed",
""
],
[
"Malisiewicz",
"Tomasz",
""
],
[
"Torralba",
"Antonio",
""
]
] | TITLE: Visualizing Object Detection Features
ABSTRACT: We introduce algorithms to visualize feature spaces used by object detectors.
Our method works by inverting a visual feature back to multiple natural images.
We found that these visualizations allow us to analyze object detection systems
in new ways and gain new insight into the detector's failures. For example,
when we visualize the features for high scoring false alarms, we discovered
that, although they are clearly wrong in image space, they do look deceptively
similar to true positives in feature space. This result suggests that many of
these false alarms are caused by our choice of feature space, and supports that
creating a better learning algorithm or building bigger datasets is unlikely to
correct these errors. By visualizing feature spaces, we can gain a more
intuitive understanding of recognition systems.
| no_new_dataset | 0.711644 |
1502.04868 | Rafael Boloix-Tortosa | Rafael Boloix-Tortosa, F. Javier Pay\'an-Somet, Eva Arias-de-Reyna and
Juan Jos\'e Murillo-Fuentes | Proper Complex Gaussian Processes for Regression | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex-valued signals are used in the modeling of many systems in
engineering and science, hence being of fundamental interest. Often, random
complex-valued signals are considered to be proper. A proper complex random
variable or process is uncorrelated with its complex conjugate. This assumption
is a good model of the underlying physics in many problems, and simplifies the
computations. While linear processing and neural networks have been widely
studied for these signals, the development of complex-valued nonlinear kernel
approaches remains an open problem. In this paper we propose Gaussian processes
for regression as a framework to develop 1) a solution for proper
complex-valued kernel regression and 2) the design of the reproducing kernel
for complex-valued inputs, using the convolutional approach for
cross-covariances. In this design we pay attention to preserve, in the complex
domain, the measure of similarity between near inputs. The hyperparameters of
the kernel are learned maximizing the marginal likelihood using Wirtinger
derivatives. Besides, the approach is connected to the multiple output learning
scenario. In the experiments included, we first solve a proper complex Gaussian
process where the cross-covariance does not cancel, a challenging scenario when
dealing with proper complex signals. Then we successfully use these novel
results to solve some problems previously proposed in the literature as
benchmarks, reporting a remarkable improvement in the estimation error.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 11:59:44 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Feb 2015 09:33:34 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Boloix-Tortosa",
"Rafael",
""
],
[
"Payán-Somet",
"F. Javier",
""
],
[
"Arias-de-Reyna",
"Eva",
""
],
[
"Murillo-Fuentes",
"Juan José",
""
]
] | TITLE: Proper Complex Gaussian Processes for Regression
ABSTRACT: Complex-valued signals are used in the modeling of many systems in
engineering and science, hence being of fundamental interest. Often, random
complex-valued signals are considered to be proper. A proper complex random
variable or process is uncorrelated with its complex conjugate. This assumption
is a good model of the underlying physics in many problems, and simplifies the
computations. While linear processing and neural networks have been widely
studied for these signals, the development of complex-valued nonlinear kernel
approaches remains an open problem. In this paper we propose Gaussian processes
for regression as a framework to develop 1) a solution for proper
complex-valued kernel regression and 2) the design of the reproducing kernel
for complex-valued inputs, using the convolutional approach for
cross-covariances. In this design we pay attention to preserve, in the complex
domain, the measure of similarity between near inputs. The hyperparameters of
the kernel are learned maximizing the marginal likelihood using Wirtinger
derivatives. Besides, the approach is connected to the multiple output learning
scenario. In the experiments included, we first solve a proper complex Gaussian
process where the cross-covariance does not cancel, a challenging scenario when
dealing with proper complex signals. Then we successfully use these novel
results to solve some problems previously proposed in the literature as
benchmarks, reporting a remarkable improvement in the estimation error.
| no_new_dataset | 0.709982 |
1502.05167 | Mansaf Alam Dr | Kashish Ara Shakil, Shadma Anis and Mansaf Alam | Dengue disease prediction using weka data mining tool | null | null | null | null | cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dengue is a life threatening disease prevalent in several developed as well
as developing countries like India.In this paper we discuss various algorithm
approaches of data mining that have been utilized for dengue disease
prediction. Data mining is a well known technique used by health organizations
for classification of diseases such as dengue, diabetes and cancer in
bioinformatics research. In the proposed approach we have used WEKA with 10
cross validation to evaluate data and compare results. Weka has an extensive
collection of different machine learning and data mining algorithms. In this
paper we have firstly classified the dengue data set and then compared the
different data mining techniques in weka through Explorer, knowledge flow and
Experimenter interfaces. Furthermore in order to validate our approach we have
used a dengue dataset with 108 instances but weka used 99 rows and 18
attributes to determine the prediction of disease and their accuracy using
classifications of different algorithms to find out the best performance. The
main objective of this paper is to classify data and assist the users in
extracting useful information from data and easily identify a suitable
algorithm for accurate predictive model from it. From the findings of this
paper it can be concluded that Na\"ive Bayes and J48 are the best performance
algorithms for classified accuracy because they achieved maximum accuracy= 100%
with 99 correctly classified instances, maximum ROC = 1, had least mean
absolute error and it took minimum time for building this model through
Explorer and Knowledge flow results
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 09:52:55 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Shakil",
"Kashish Ara",
""
],
[
"Anis",
"Shadma",
""
],
[
"Alam",
"Mansaf",
""
]
] | TITLE: Dengue disease prediction using weka data mining tool
ABSTRACT: Dengue is a life threatening disease prevalent in several developed as well
as developing countries like India.In this paper we discuss various algorithm
approaches of data mining that have been utilized for dengue disease
prediction. Data mining is a well known technique used by health organizations
for classification of diseases such as dengue, diabetes and cancer in
bioinformatics research. In the proposed approach we have used WEKA with 10
cross validation to evaluate data and compare results. Weka has an extensive
collection of different machine learning and data mining algorithms. In this
paper we have firstly classified the dengue data set and then compared the
different data mining techniques in weka through Explorer, knowledge flow and
Experimenter interfaces. Furthermore in order to validate our approach we have
used a dengue dataset with 108 instances but weka used 99 rows and 18
attributes to determine the prediction of disease and their accuracy using
classifications of different algorithms to find out the best performance. The
main objective of this paper is to classify data and assist the users in
extracting useful information from data and easily identify a suitable
algorithm for accurate predictive model from it. From the findings of this
paper it can be concluded that Na\"ive Bayes and J48 are the best performance
algorithms for classified accuracy because they achieved maximum accuracy= 100%
with 99 correctly classified instances, maximum ROC = 1, had least mean
absolute error and it took minimum time for building this model through
Explorer and Knowledge flow results
| no_new_dataset | 0.711794 |
1502.05212 | Gianluigi Cioca | Gianluigi Ciocca, Paolo Napoletano, Raimondo Schettini | IAT - Image Annotation Tool: Manual | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The annotation of image and video data of large datasets is a fundamental
task in multimedia information retrieval and computer vision applications. In
order to support the users during the image and video annotation process,
several software tools have been developed to provide them with a graphical
environment which helps drawing object contours, handling tracking information
and specifying object metadata. Here we introduce a preliminary version of the
image annotation tools developed at the Imaging and Vision Laboratory.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 13:11:46 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Ciocca",
"Gianluigi",
""
],
[
"Napoletano",
"Paolo",
""
],
[
"Schettini",
"Raimondo",
""
]
] | TITLE: IAT - Image Annotation Tool: Manual
ABSTRACT: The annotation of image and video data of large datasets is a fundamental
task in multimedia information retrieval and computer vision applications. In
order to support the users during the image and video annotation process,
several software tools have been developed to provide them with a graphical
environment which helps drawing object contours, handling tracking information
and specifying object metadata. Here we introduce a preliminary version of the
image annotation tools developed at the Imaging and Vision Laboratory.
| no_new_dataset | 0.711994 |
1502.05241 | Michael Dirnberger | Michael Dirnberger and Adrian Neumann and Tim Kehl | NEFI: Network Extraction From Images | null | null | null | null | cs.CV cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Networks and network-like structures are amongst the central building blocks
of many technological and biological systems. Given a mathematical graph
representation of a network, methods from graph theory enable a precise
investigation of its properties. Software for the analysis of graphs is widely
available and has been applied to graphs describing large scale networks such
as social networks, protein-interaction networks, etc. In these applications,
graph acquisition, i.e., the extraction of a mathematical graph from a network,
is relatively simple. However, for many network-like structures, e.g. leaf
venations, slime molds and mud cracks, data collection relies on images where
graph extraction requires domain-specific solutions or even manual. Here we
introduce Network Extraction From Images, NEFI, a software tool that
automatically extracts accurate graphs from images of a wide range of networks
originating in various domains. While there is previous work on graph
extraction from images, theoretical results are fully accessible only to an
expert audience and ready-to-use implementations for non-experts are rarely
available or insufficiently documented. NEFI provides a novel platform allowing
practitioners from many disciplines to easily extract graph representations
from images by supplying flexible tools from image processing, computer vision
and graph theory bundled in a convenient package. Thus, NEFI constitutes a
scalable alternative to tedious and error-prone manual graph extraction and
special purpose tools. We anticipate NEFI to enable the collection of larger
datasets by reducing the time spent on graph extraction. The analysis of these
new datasets may open up the possibility to gain new insights into the
structure and function of various types of networks. NEFI is open source and
available http://nefi.mpi-inf.mpg.de.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2015 14:20:25 GMT"
}
] | 2015-02-19T00:00:00 | [
[
"Dirnberger",
"Michael",
""
],
[
"Neumann",
"Adrian",
""
],
[
"Kehl",
"Tim",
""
]
] | TITLE: NEFI: Network Extraction From Images
ABSTRACT: Networks and network-like structures are amongst the central building blocks
of many technological and biological systems. Given a mathematical graph
representation of a network, methods from graph theory enable a precise
investigation of its properties. Software for the analysis of graphs is widely
available and has been applied to graphs describing large scale networks such
as social networks, protein-interaction networks, etc. In these applications,
graph acquisition, i.e., the extraction of a mathematical graph from a network,
is relatively simple. However, for many network-like structures, e.g. leaf
venations, slime molds and mud cracks, data collection relies on images where
graph extraction requires domain-specific solutions or even manual. Here we
introduce Network Extraction From Images, NEFI, a software tool that
automatically extracts accurate graphs from images of a wide range of networks
originating in various domains. While there is previous work on graph
extraction from images, theoretical results are fully accessible only to an
expert audience and ready-to-use implementations for non-experts are rarely
available or insufficiently documented. NEFI provides a novel platform allowing
practitioners from many disciplines to easily extract graph representations
from images by supplying flexible tools from image processing, computer vision
and graph theory bundled in a convenient package. Thus, NEFI constitutes a
scalable alternative to tedious and error-prone manual graph extraction and
special purpose tools. We anticipate NEFI to enable the collection of larger
datasets by reducing the time spent on graph extraction. The analysis of these
new datasets may open up the possibility to gain new insights into the
structure and function of various types of networks. NEFI is open source and
available http://nefi.mpi-inf.mpg.de.
| no_new_dataset | 0.70477 |
1502.04983 | Thanapong Intharah | Thanapong Intharah and Gabriel J. Brostow | Context Tricks for Cheap Semantic Segmentation | Supplementary material can be found at
http://www0.cs.ucl.ac.uk/staff/T.Intharah/research.html | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate semantic labeling of image pixels is difficult because intra-class
variability is often greater than inter-class variability. In turn, fast
semantic segmentation is hard because accurate models are usually too
complicated to also run quickly at test-time. Our experience with building and
running semantic segmentation systems has also shown a reasonably obvious
bottleneck on model complexity, imposed by small training datasets. We
therefore propose two simple complementary strategies that leverage context to
give better semantic segmentation, while scaling up or down to train on
different-sized datasets.
As easy modifications for existing semantic segmentation algorithms, we
introduce Decorrelated Semantic Texton Forests, and the Context Sensitive Image
Level Prior. The proposed modifications are tested using a Semantic Texton
Forest (STF) system, and the modifications are validated on two standard
benchmark datasets, MSRC-21 and PascalVOC-2010. In Python based comparisons,
our system is insignificantly slower than STF at test-time, yet produces
superior semantic segmentations overall, with just push-button training.
| [
{
"version": "v1",
"created": "Tue, 17 Feb 2015 18:08:53 GMT"
}
] | 2015-02-18T00:00:00 | [
[
"Intharah",
"Thanapong",
""
],
[
"Brostow",
"Gabriel J.",
""
]
] | TITLE: Context Tricks for Cheap Semantic Segmentation
ABSTRACT: Accurate semantic labeling of image pixels is difficult because intra-class
variability is often greater than inter-class variability. In turn, fast
semantic segmentation is hard because accurate models are usually too
complicated to also run quickly at test-time. Our experience with building and
running semantic segmentation systems has also shown a reasonably obvious
bottleneck on model complexity, imposed by small training datasets. We
therefore propose two simple complementary strategies that leverage context to
give better semantic segmentation, while scaling up or down to train on
different-sized datasets.
As easy modifications for existing semantic segmentation algorithms, we
introduce Decorrelated Semantic Texton Forests, and the Context Sensitive Image
Level Prior. The proposed modifications are tested using a Semantic Texton
Forest (STF) system, and the modifications are validated on two standard
benchmark datasets, MSRC-21 and PascalVOC-2010. In Python based comparisons,
our system is insignificantly slower than STF at test-time, yet produces
superior semantic segmentations overall, with just push-button training.
| no_new_dataset | 0.710848 |
1212.0975 | Arya Iranmehr | Hamed Masnadi-Shirazi, Nuno Vasconcelos and Arya Iranmehr | Cost-Sensitive Support Vector Machines | 32 pages, 4 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new procedure for learning cost-sensitive SVM(CS-SVM) classifiers is
proposed. The SVM hinge loss is extended to the cost sensitive setting, and the
CS-SVM is derived as the minimizer of the associated risk. The extension of the
hinge loss draws on recent connections between risk minimization and
probability elicitation. These connections are generalized to cost-sensitive
classification, in a manner that guarantees consistency with the cost-sensitive
Bayes risk, and associated Bayes decision rule. This ensures that optimal
decision rules, under the new hinge loss, implement the Bayes-optimal
cost-sensitive classification boundary. Minimization of the new hinge loss is
shown to be a generalization of the classic SVM optimization problem, and can
be solved by identical procedures. The dual problem of CS-SVM is carefully
scrutinized by means of regularization theory and sensitivity analysis and the
CS-SVM algorithm is substantiated. The proposed algorithm is also extended to
cost-sensitive learning with example dependent costs. The minimum cost
sensitive risk is proposed as the performance measure and is connected to ROC
analysis through vector optimization. The resulting algorithm avoids the
shortcomings of previous approaches to cost-sensitive SVM design, and is shown
to have superior experimental performance on a large number of cost sensitive
and imbalanced datasets.
| [
{
"version": "v1",
"created": "Wed, 5 Dec 2012 09:24:11 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Feb 2015 11:17:57 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Masnadi-Shirazi",
"Hamed",
""
],
[
"Vasconcelos",
"Nuno",
""
],
[
"Iranmehr",
"Arya",
""
]
] | TITLE: Cost-Sensitive Support Vector Machines
ABSTRACT: A new procedure for learning cost-sensitive SVM(CS-SVM) classifiers is
proposed. The SVM hinge loss is extended to the cost sensitive setting, and the
CS-SVM is derived as the minimizer of the associated risk. The extension of the
hinge loss draws on recent connections between risk minimization and
probability elicitation. These connections are generalized to cost-sensitive
classification, in a manner that guarantees consistency with the cost-sensitive
Bayes risk, and associated Bayes decision rule. This ensures that optimal
decision rules, under the new hinge loss, implement the Bayes-optimal
cost-sensitive classification boundary. Minimization of the new hinge loss is
shown to be a generalization of the classic SVM optimization problem, and can
be solved by identical procedures. The dual problem of CS-SVM is carefully
scrutinized by means of regularization theory and sensitivity analysis and the
CS-SVM algorithm is substantiated. The proposed algorithm is also extended to
cost-sensitive learning with example dependent costs. The minimum cost
sensitive risk is proposed as the performance measure and is connected to ROC
analysis through vector optimization. The resulting algorithm avoids the
shortcomings of previous approaches to cost-sensitive SVM design, and is shown
to have superior experimental performance on a large number of cost sensitive
and imbalanced datasets.
| no_new_dataset | 0.710635 |
1309.2168 | Pablo Gonz\'alez-Brevis Dr | Jacek Gondzio, Pablo Gonz\'alez-Brevis and Pedro Munari | Large-scale optimization with the primal-dual column generation method | 28 pages, 1 figure, minor revision, scaled CPU times | null | null | Technical Report ERGO 13-014 | math.OC cs.LG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primal-dual column generation method (PDCGM) is a general-purpose column
generation technique that relies on the primal-dual interior point method to
solve the restricted master problems. The use of this interior point method
variant allows to obtain suboptimal and well-centered dual solutions which
naturally stabilizes the column generation. As recently presented in the
literature, reductions in the number of calls to the oracle and in the CPU
times are typically observed when compared to the standard column generation,
which relies on extreme optimal dual solutions. However, these results are
based on relatively small problems obtained from linear relaxations of
combinatorial applications. In this paper, we investigate the behaviour of the
PDCGM in a broader context, namely when solving large-scale convex optimization
problems. We have selected applications that arise in important real-life
contexts such as data analysis (multiple kernel learning problem),
decision-making under uncertainty (two-stage stochastic programming problems)
and telecommunication and transportation networks (multicommodity network flow
problem). In the numerical experiments, we use publicly available benchmark
instances to compare the performance of the PDCGM against recent results for
different methods presented in the literature, which were the best available
results to date. The analysis of these results suggests that the PDCGM offers
an attractive alternative over specialized methods since it remains competitive
in terms of number of iterations and CPU times even for large-scale
optimization problems.
| [
{
"version": "v1",
"created": "Mon, 9 Sep 2013 14:19:10 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 17:40:28 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Gondzio",
"Jacek",
""
],
[
"González-Brevis",
"Pablo",
""
],
[
"Munari",
"Pedro",
""
]
] | TITLE: Large-scale optimization with the primal-dual column generation method
ABSTRACT: The primal-dual column generation method (PDCGM) is a general-purpose column
generation technique that relies on the primal-dual interior point method to
solve the restricted master problems. The use of this interior point method
variant allows to obtain suboptimal and well-centered dual solutions which
naturally stabilizes the column generation. As recently presented in the
literature, reductions in the number of calls to the oracle and in the CPU
times are typically observed when compared to the standard column generation,
which relies on extreme optimal dual solutions. However, these results are
based on relatively small problems obtained from linear relaxations of
combinatorial applications. In this paper, we investigate the behaviour of the
PDCGM in a broader context, namely when solving large-scale convex optimization
problems. We have selected applications that arise in important real-life
contexts such as data analysis (multiple kernel learning problem),
decision-making under uncertainty (two-stage stochastic programming problems)
and telecommunication and transportation networks (multicommodity network flow
problem). In the numerical experiments, we use publicly available benchmark
instances to compare the performance of the PDCGM against recent results for
different methods presented in the literature, which were the best available
results to date. The analysis of these results suggests that the PDCGM offers
an attractive alternative over specialized methods since it remains competitive
in terms of number of iterations and CPU times even for large-scale
optimization problems.
| no_new_dataset | 0.709799 |
1406.7611 | Lutz Bornmann Dr. | Lutz Bornmann | Validity of altmetrics data for measuring societal impact: A study using
data from Altmetric and F1000Prime | null | null | null | null | cs.DL physics.soc-ph stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Can altmetric data be validly used for the measurement of societal impact?
The current study seeks to answer this question with a comprehensive dataset
(about 100,000 records) from very disparate sources (F1000, Altmetric, and an
in-house database based on Web of Science). In the F1000 peer review system,
experts attach particular tags to scientific papers which indicate whether a
paper could be of interest for science or rather for other segments of society.
The results show that papers with the tag "good for teaching" do achieve higher
altmetric counts than papers without this tag - if the quality of the papers is
controlled. At the same time, a higher citation count is shown especially by
papers with a tag that is specifically scientifically oriented ("new finding").
The findings indicate that papers tailored for a readership outside the area of
research should lead to societal impact. If altmetric data is to be used for
the measurement of societal impact, the question arises of its normalization.
In bibliometrics, citations are normalized for the papers' subject area and
publication year. This study has taken a second analytic step involving a
possible normalization of altmetric data. As the results show there are
particular scientific topics which are of especial interest for a wide
audience. Since these more or less interesting topics are not completely
reflected in Thomson Reuters' journal sets, a normalization of altmetric data
should not be based on the level of subject categories, but on the level of
topics.
| [
{
"version": "v1",
"created": "Mon, 30 Jun 2014 06:19:24 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 08:37:42 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Bornmann",
"Lutz",
""
]
] | TITLE: Validity of altmetrics data for measuring societal impact: A study using
data from Altmetric and F1000Prime
ABSTRACT: Can altmetric data be validly used for the measurement of societal impact?
The current study seeks to answer this question with a comprehensive dataset
(about 100,000 records) from very disparate sources (F1000, Altmetric, and an
in-house database based on Web of Science). In the F1000 peer review system,
experts attach particular tags to scientific papers which indicate whether a
paper could be of interest for science or rather for other segments of society.
The results show that papers with the tag "good for teaching" do achieve higher
altmetric counts than papers without this tag - if the quality of the papers is
controlled. At the same time, a higher citation count is shown especially by
papers with a tag that is specifically scientifically oriented ("new finding").
The findings indicate that papers tailored for a readership outside the area of
research should lead to societal impact. If altmetric data is to be used for
the measurement of societal impact, the question arises of its normalization.
In bibliometrics, citations are normalized for the papers' subject area and
publication year. This study has taken a second analytic step involving a
possible normalization of altmetric data. As the results show there are
particular scientific topics which are of especial interest for a wide
audience. Since these more or less interesting topics are not completely
reflected in Thomson Reuters' journal sets, a normalization of altmetric data
should not be based on the level of subject categories, but on the level of
topics.
| no_new_dataset | 0.703919 |
1409.2863 | Lutz Bornmann Dr. | Lutz Bornmann | Usefulness of altmetrics for measuring the broader impact of research: A
case study using data from PLOS (altmetrics) and F1000Prime (paper tags) | arXiv admin note: text overlap with arXiv:1406.7611 | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Purpose: Whereas citation counts allow the measurement of the impact of
research on research itself, an important role in the measurement of the impact
of research on other parts of society is ascribed to altmetrics. The present
case study investigates the usefulness of altmetrics for measuring the broader
impact of research. Methods: This case study is essentially based on a dataset
with papers obtained from F1000. The dataset was augmented with altmetrics
(such as Twitter counts) which were provided by PLOS (the Public Library of
Science). In total, the case study covers a total of 1,082 papers. Findings:
The F1000 dataset contains tags on papers which were assigned intellectually by
experts and which can characterise a paper. The most interesting tag for
altmetric research is "good for teaching". This tag is assigned to papers which
could be of interest to a wider circle of readers than the peers in a
specialist area. Particularly on Facebook and Twitter, one could expect papers
with this tag to be mentioned more often than those without this tag. With
respect to the "good for teaching" tag, the results from regression models were
able to confirm these expectations: Papers with this tag show significantly
higher Facebook and Twitter counts than papers without this tag. This
association could not be seen with Mendeley or Figshare counts (that is with
counts from platforms which are chiefly of interest in a scientific context).
Conclusions: The results of the current study indicate that Facebook and
Twitter, but not Figshare or Mendeley, can provide indications of papers which
are of interest to a broader circle of readers (and not only for the peers in a
specialist area), and seem therefore be useful for societal impact measurement.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 08:05:37 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2015 08:43:56 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Bornmann",
"Lutz",
""
]
] | TITLE: Usefulness of altmetrics for measuring the broader impact of research: A
case study using data from PLOS (altmetrics) and F1000Prime (paper tags)
ABSTRACT: Purpose: Whereas citation counts allow the measurement of the impact of
research on research itself, an important role in the measurement of the impact
of research on other parts of society is ascribed to altmetrics. The present
case study investigates the usefulness of altmetrics for measuring the broader
impact of research. Methods: This case study is essentially based on a dataset
with papers obtained from F1000. The dataset was augmented with altmetrics
(such as Twitter counts) which were provided by PLOS (the Public Library of
Science). In total, the case study covers a total of 1,082 papers. Findings:
The F1000 dataset contains tags on papers which were assigned intellectually by
experts and which can characterise a paper. The most interesting tag for
altmetric research is "good for teaching". This tag is assigned to papers which
could be of interest to a wider circle of readers than the peers in a
specialist area. Particularly on Facebook and Twitter, one could expect papers
with this tag to be mentioned more often than those without this tag. With
respect to the "good for teaching" tag, the results from regression models were
able to confirm these expectations: Papers with this tag show significantly
higher Facebook and Twitter counts than papers without this tag. This
association could not be seen with Mendeley or Figshare counts (that is with
counts from platforms which are chiefly of interest in a scientific context).
Conclusions: The results of the current study indicate that Facebook and
Twitter, but not Figshare or Mendeley, can provide indications of papers which
are of interest to a broader circle of readers (and not only for the peers in a
specialist area), and seem therefore be useful for societal impact measurement.
| no_new_dataset | 0.698265 |
1502.03536 | Vamsi Ithapu | Chris Hinrichs, Vamsi K Ithapu, Qinyuan Sun, Sterling C Johnson, Vikas
Singh | Speeding up Permutation Testing in Neuroimaging | NIPS 13 | Advances in neural information processing systems (2013), pp.
890-898 | null | null | stat.CO cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple hypothesis testing is a significant problem in nearly all
neuroimaging studies. In order to correct for this phenomena, we require a
reliable estimate of the Family-Wise Error Rate (FWER). The well known
Bonferroni correction method, while simple to implement, is quite conservative,
and can substantially under-power a study because it ignores dependencies
between test statistics. Permutation testing, on the other hand, is an exact,
non-parametric method of estimating the FWER for a given $\alpha$-threshold,
but for acceptably low thresholds the computational burden can be prohibitive.
In this paper, we show that permutation testing in fact amounts to populating
the columns of a very large matrix ${\bf P}$. By analyzing the spectrum of this
matrix, under certain conditions, we see that ${\bf P}$ has a low-rank plus a
low-variance residual decomposition which makes it suitable for highly
sub--sampled --- on the order of $0.5\%$ --- matrix completion methods. Based
on this observation, we propose a novel permutation testing methodology which
offers a large speedup, without sacrificing the fidelity of the estimated FWER.
Our evaluations on four different neuroimaging datasets show that a
computational speedup factor of roughly $50\times$ can be achieved while
recovering the FWER distribution up to very high accuracy. Further, we show
that the estimated $\alpha$-threshold is also recovered faithfully, and is
stable.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 04:30:06 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Hinrichs",
"Chris",
""
],
[
"Ithapu",
"Vamsi K",
""
],
[
"Sun",
"Qinyuan",
""
],
[
"Johnson",
"Sterling C",
""
],
[
"Singh",
"Vikas",
""
]
] | TITLE: Speeding up Permutation Testing in Neuroimaging
ABSTRACT: Multiple hypothesis testing is a significant problem in nearly all
neuroimaging studies. In order to correct for this phenomena, we require a
reliable estimate of the Family-Wise Error Rate (FWER). The well known
Bonferroni correction method, while simple to implement, is quite conservative,
and can substantially under-power a study because it ignores dependencies
between test statistics. Permutation testing, on the other hand, is an exact,
non-parametric method of estimating the FWER for a given $\alpha$-threshold,
but for acceptably low thresholds the computational burden can be prohibitive.
In this paper, we show that permutation testing in fact amounts to populating
the columns of a very large matrix ${\bf P}$. By analyzing the spectrum of this
matrix, under certain conditions, we see that ${\bf P}$ has a low-rank plus a
low-variance residual decomposition which makes it suitable for highly
sub--sampled --- on the order of $0.5\%$ --- matrix completion methods. Based
on this observation, we propose a novel permutation testing methodology which
offers a large speedup, without sacrificing the fidelity of the estimated FWER.
Our evaluations on four different neuroimaging datasets show that a
computational speedup factor of roughly $50\times$ can be achieved while
recovering the FWER distribution up to very high accuracy. Further, we show
that the estimated $\alpha$-threshold is also recovered faithfully, and is
stable.
| no_new_dataset | 0.707556 |
1502.04132 | Zhenzhong Lan | Zhenzhong Lan, Xuanchong Li, Ming Lin, Alexander G. Hauptmann | Long-short Term Motion Feature for Action Classification and Retrieval | arXiv admin note: text overlap with arXiv:1411.6660 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a method for representing motion information for video
classification and retrieval. We improve upon local descriptor based methods
that have been among the most popular and successful models for representing
videos. The desired local descriptors need to satisfy two requirements: 1) to
be representative, 2) to be discriminative. Therefore, they need to occur
frequently enough in the videos and to be be able to tell the difference among
different types of motions. To generate such local descriptors, the video
blocks they are based on must contain just the right amount of motion
information. However, current state-of-the-art local descriptor methods use
video blocks with a single fixed size, which is insufficient for covering
actions with varying speeds. In this paper, we introduce a long-short term
motion feature that generates descriptors from video blocks with multiple
lengths, thus covering motions with large speed variance. Experimental results
show that, albeit simple, our model achieves state-of-the-arts results on
several benchmark datasets.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 21:15:57 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Lan",
"Zhenzhong",
""
],
[
"Li",
"Xuanchong",
""
],
[
"Lin",
"Ming",
""
],
[
"Hauptmann",
"Alexander G.",
""
]
] | TITLE: Long-short Term Motion Feature for Action Classification and Retrieval
ABSTRACT: We propose a method for representing motion information for video
classification and retrieval. We improve upon local descriptor based methods
that have been among the most popular and successful models for representing
videos. The desired local descriptors need to satisfy two requirements: 1) to
be representative, 2) to be discriminative. Therefore, they need to occur
frequently enough in the videos and to be be able to tell the difference among
different types of motions. To generate such local descriptors, the video
blocks they are based on must contain just the right amount of motion
information. However, current state-of-the-art local descriptor methods use
video blocks with a single fixed size, which is insufficient for covering
actions with varying speeds. In this paper, we introduce a long-short term
motion feature that generates descriptors from video blocks with multiple
lengths, thus covering motions with large speed variance. Experimental results
show that, albeit simple, our model achieves state-of-the-arts results on
several benchmark datasets.
| no_new_dataset | 0.713432 |
1502.04220 | Can Lu | Can Lu, Jeffrey Xu Yu, Rong-Hua Li, Hao Wei | Exploring Hierarchies in Online Social Networks | null | null | null | null | cs.SI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social hierarchy (i.e., pyramid structure of societies) is a fundamental
concept in sociology and social network analysis. The importance of social
hierarchy in a social network is that the topological structure of the social
hierarchy is essential in both shaping the nature of social interactions
between individuals and unfolding the structure of the social networks. The
social hierarchy found in a social network can be utilized to improve the
accuracy of link prediction, provide better query results, rank web pages, and
study information flow and spread in complex networks. In this paper, we model
a social network as a directed graph G, and consider the social hierarchy as
DAG (directed acyclic graph) of G, denoted as GD. By DAG, all the vertices in G
can be partitioned into different levels, the vertices at the same level
represent a disjoint group in the social hierarchy, and all the edges in DAG
follow one direction. The main issue we study in this paper is how to find DAG
GD in G. The approach we take is to find GD by removing all possible cycles
from G such that G = U(G) + GD where U(G) is a maximum Eulerian subgraph which
contains all possible cycles. We give the reasons for doing so, investigate the
properties of GD found, and discuss the applications. In addition, we develop a
novel two-phase algorithm, called Greedy-&-Refine, which greedily computes an
Eulerian subgraph and then refines this greedy solution to find the maximum
Eulerian subgraph. We give a bound between the greedy solution and the optimal.
The quality of our greedy approach is high. We conduct comprehensive
experimental studies over 14 real-world datasets. The results show that our
algorithms are at least two orders of magnitude faster than the baseline
algorithm.
| [
{
"version": "v1",
"created": "Sat, 14 Feb 2015 16:02:00 GMT"
}
] | 2015-02-17T00:00:00 | [
[
"Lu",
"Can",
""
],
[
"Yu",
"Jeffrey Xu",
""
],
[
"Li",
"Rong-Hua",
""
],
[
"Wei",
"Hao",
""
]
] | TITLE: Exploring Hierarchies in Online Social Networks
ABSTRACT: Social hierarchy (i.e., pyramid structure of societies) is a fundamental
concept in sociology and social network analysis. The importance of social
hierarchy in a social network is that the topological structure of the social
hierarchy is essential in both shaping the nature of social interactions
between individuals and unfolding the structure of the social networks. The
social hierarchy found in a social network can be utilized to improve the
accuracy of link prediction, provide better query results, rank web pages, and
study information flow and spread in complex networks. In this paper, we model
a social network as a directed graph G, and consider the social hierarchy as
DAG (directed acyclic graph) of G, denoted as GD. By DAG, all the vertices in G
can be partitioned into different levels, the vertices at the same level
represent a disjoint group in the social hierarchy, and all the edges in DAG
follow one direction. The main issue we study in this paper is how to find DAG
GD in G. The approach we take is to find GD by removing all possible cycles
from G such that G = U(G) + GD where U(G) is a maximum Eulerian subgraph which
contains all possible cycles. We give the reasons for doing so, investigate the
properties of GD found, and discuss the applications. In addition, we develop a
novel two-phase algorithm, called Greedy-&-Refine, which greedily computes an
Eulerian subgraph and then refines this greedy solution to find the maximum
Eulerian subgraph. We give a bound between the greedy solution and the optimal.
The quality of our greedy approach is high. We conduct comprehensive
experimental studies over 14 real-world datasets. The results show that our
algorithms are at least two orders of magnitude faster than the baseline
algorithm.
| no_new_dataset | 0.710597 |
1310.6670 | Matteo Camilli M.Sc. | Carlo Bellettini, Matteo Camilli, Lorenzo Capra, Mattia Monga | Distributed CTL Model Checking in the Cloud | 8 pages | null | 10.1109/SYNASC.2014.52 | null | cs.SE cs.DC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent extensive availability of "big data" platforms calls for a more
widespread adoption by the formal verification community. In fact, formal
verification requires high performance data processing software for extracting
knowledge from the unprecedented amount of data which come from analyzed
systems. Since cloud based computing resources have became easily accessible,
there is an opportunity for verification techniques and tools to undergo a deep
technological transition to exploit the new available architectures. This has
created an increasing interest in parallelizing and distributing verification
techniques. In this paper we introduce a distributed approach which exploits
techniques typically used by the "big data" community to enable verification of
Computation Tree Logic (CTL) formulas on very large state spaces using
distributed systems and cloud computing facilities. The outcome of several
tests performed on benchmark specifications are presented, thus showing the
convenience of the proposed approach.
| [
{
"version": "v1",
"created": "Thu, 24 Oct 2013 16:54:37 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Bellettini",
"Carlo",
""
],
[
"Camilli",
"Matteo",
""
],
[
"Capra",
"Lorenzo",
""
],
[
"Monga",
"Mattia",
""
]
] | TITLE: Distributed CTL Model Checking in the Cloud
ABSTRACT: The recent extensive availability of "big data" platforms calls for a more
widespread adoption by the formal verification community. In fact, formal
verification requires high performance data processing software for extracting
knowledge from the unprecedented amount of data which come from analyzed
systems. Since cloud based computing resources have became easily accessible,
there is an opportunity for verification techniques and tools to undergo a deep
technological transition to exploit the new available architectures. This has
created an increasing interest in parallelizing and distributing verification
techniques. In this paper we introduce a distributed approach which exploits
techniques typically used by the "big data" community to enable verification of
Computation Tree Logic (CTL) formulas on very large state spaces using
distributed systems and cloud computing facilities. The outcome of several
tests performed on benchmark specifications are presented, thus showing the
convenience of the proposed approach.
| no_new_dataset | 0.708168 |
1408.3873 | Lorenzo Livi | Lorenzo Livi, Antonello Rizzi, Alireza Sadeghian | Classifying sequences by the optimized dissimilarity space embedding
approach: a case study on the solubility analysis of the E. coli proteome | 10 pages, 49 references | null | 10.3233/IFS-151550 | null | cs.CV cs.AI physics.bio-ph q-bio.BM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We evaluate a version of the recently-proposed classification system named
Optimized Dissimilarity Space Embedding (ODSE) that operates in the input space
of sequences of generic objects. The ODSE system has been originally presented
as a classification system for patterns represented as labeled graphs. However,
since ODSE is founded on the dissimilarity space representation of the input
data, the classifier can be easily adapted to any input domain where it is
possible to define a meaningful dissimilarity measure. Here we demonstrate the
effectiveness of the ODSE classifier for sequences by considering an
application dealing with the recognition of the solubility degree of the
Escherichia coli proteome. Solubility, or analogously aggregation propensity,
is an important property of protein molecules, which is intimately related to
the mechanisms underlying the chemico-physical process of folding. Each protein
of our dataset is initially associated with a solubility degree and it is
represented as a sequence of symbols, denoting the 20 amino acid residues. The
herein obtained computational results, which we stress that have been achieved
with no context-dependent tuning of the ODSE system, confirm the validity and
generality of the ODSE-based approach for structured data classification.
| [
{
"version": "v1",
"created": "Sun, 17 Aug 2014 23:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2015 21:20:19 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Livi",
"Lorenzo",
""
],
[
"Rizzi",
"Antonello",
""
],
[
"Sadeghian",
"Alireza",
""
]
] | TITLE: Classifying sequences by the optimized dissimilarity space embedding
approach: a case study on the solubility analysis of the E. coli proteome
ABSTRACT: We evaluate a version of the recently-proposed classification system named
Optimized Dissimilarity Space Embedding (ODSE) that operates in the input space
of sequences of generic objects. The ODSE system has been originally presented
as a classification system for patterns represented as labeled graphs. However,
since ODSE is founded on the dissimilarity space representation of the input
data, the classifier can be easily adapted to any input domain where it is
possible to define a meaningful dissimilarity measure. Here we demonstrate the
effectiveness of the ODSE classifier for sequences by considering an
application dealing with the recognition of the solubility degree of the
Escherichia coli proteome. Solubility, or analogously aggregation propensity,
is an important property of protein molecules, which is intimately related to
the mechanisms underlying the chemico-physical process of folding. Each protein
of our dataset is initially associated with a solubility degree and it is
represented as a sequence of symbols, denoting the 20 amino acid residues. The
herein obtained computational results, which we stress that have been achieved
with no context-dependent tuning of the ODSE system, confirm the validity and
generality of the ODSE-based approach for structured data classification.
| no_new_dataset | 0.706437 |
1409.2802 | William March | William B. March and George Biros | Far-Field Compression for Fast Kernel Summation Methods in High
Dimensions | 43 pages, 21 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider fast kernel summations in high dimensions: given a large set of
points in $d$ dimensions (with $d \gg 3$) and a pair-potential function (the
{\em kernel} function), we compute a weighted sum of all pairwise kernel
interactions for each point in the set. Direct summation is equivalent to a
(dense) matrix-vector multiplication and scales quadratically with the number
of points. Fast kernel summation algorithms reduce this cost to log-linear or
linear complexity.
Treecodes and Fast Multipole Methods (FMMs) deliver tremendous speedups by
constructing approximate representations of interactions of points that are far
from each other. In algebraic terms, these representations correspond to
low-rank approximations of blocks of the overall interaction matrix. Existing
approaches require an excessive number of kernel evaluations with increasing
$d$ and number of points in the dataset.
To address this issue, we use a randomized algebraic approach in which we
first sample the rows of a block and then construct its approximate, low-rank
interpolative decomposition. We examine the feasibility of this approach
theoretically and experimentally. We provide a new theoretical result showing a
tighter bound on the reconstruction error from uniformly sampling rows than the
existing state-of-the-art. We demonstrate that our sampling approach is
competitive with existing (but prohibitively expensive) methods from the
literature. We also construct kernel matrices for the Laplacian, Gaussian, and
polynomial kernels -- all commonly used in physics and data analysis. We
explore the numerical properties of blocks of these matrices, and show that
they are amenable to our approach. Depending on the data set, our randomized
algorithm can successfully compute low rank approximations in high dimensions.
We report results for data sets with ambient dimensions from four to 1,000.
| [
{
"version": "v1",
"created": "Tue, 9 Sep 2014 16:28:40 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Feb 2015 00:30:28 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"March",
"William B.",
""
],
[
"Biros",
"George",
""
]
] | TITLE: Far-Field Compression for Fast Kernel Summation Methods in High
Dimensions
ABSTRACT: We consider fast kernel summations in high dimensions: given a large set of
points in $d$ dimensions (with $d \gg 3$) and a pair-potential function (the
{\em kernel} function), we compute a weighted sum of all pairwise kernel
interactions for each point in the set. Direct summation is equivalent to a
(dense) matrix-vector multiplication and scales quadratically with the number
of points. Fast kernel summation algorithms reduce this cost to log-linear or
linear complexity.
Treecodes and Fast Multipole Methods (FMMs) deliver tremendous speedups by
constructing approximate representations of interactions of points that are far
from each other. In algebraic terms, these representations correspond to
low-rank approximations of blocks of the overall interaction matrix. Existing
approaches require an excessive number of kernel evaluations with increasing
$d$ and number of points in the dataset.
To address this issue, we use a randomized algebraic approach in which we
first sample the rows of a block and then construct its approximate, low-rank
interpolative decomposition. We examine the feasibility of this approach
theoretically and experimentally. We provide a new theoretical result showing a
tighter bound on the reconstruction error from uniformly sampling rows than the
existing state-of-the-art. We demonstrate that our sampling approach is
competitive with existing (but prohibitively expensive) methods from the
literature. We also construct kernel matrices for the Laplacian, Gaussian, and
polynomial kernels -- all commonly used in physics and data analysis. We
explore the numerical properties of blocks of these matrices, and show that
they are amenable to our approach. Depending on the data set, our randomized
algorithm can successfully compute low rank approximations in high dimensions.
We report results for data sets with ambient dimensions from four to 1,000.
| no_new_dataset | 0.707569 |
1502.03845 | Alessandro Provetti | Biagio Bonasera, Emilio Ferrara, Giacomo Fiumara, Francesco Pagano,
Alessandro Provetti | Adaptive Search over Sorted Sets | 9 pages | Journal of Discrete Algorithms, Volume 30, 2015, pp. 128--133 | 10.1016/j.jda.2014.12.007 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We revisit the classical algorithms for searching over sorted sets to
introduce an algorithm refinement, called Adaptive Search, that combines the
good features of Interpolation search and those of Binary search. W.r.t.
Interpolation search, only a constant number of extra comparisons is
introduced. Yet, under diverse input data distributions our algorithm shows
costs comparable to that of Interpolation search, i.e., O(log log n) while the
worst-case cost is always in O(log n), as with Binary search. On benchmarks
drawn from large datasets, both synthetic and real-life, Adaptive search scores
better times and lesser memory accesses even than Santoro and Sidney's
Interpolation-Binary search.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 22:12:54 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Bonasera",
"Biagio",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
],
[
"Pagano",
"Francesco",
""
],
[
"Provetti",
"Alessandro",
""
]
] | TITLE: Adaptive Search over Sorted Sets
ABSTRACT: We revisit the classical algorithms for searching over sorted sets to
introduce an algorithm refinement, called Adaptive Search, that combines the
good features of Interpolation search and those of Binary search. W.r.t.
Interpolation search, only a constant number of extra comparisons is
introduced. Yet, under diverse input data distributions our algorithm shows
costs comparable to that of Interpolation search, i.e., O(log log n) while the
worst-case cost is always in O(log n), as with Binary search. On benchmarks
drawn from large datasets, both synthetic and real-life, Adaptive search scores
better times and lesser memory accesses even than Santoro and Sidney's
Interpolation-Binary search.
| no_new_dataset | 0.711005 |
1502.03851 | Arash Vahdat | Mehran Khodabandeh, Arash Vahdat, Guang-Tong Zhou, Hossein
Hajimirsadeghi, Mehrsan Javan Roshtkhari, Greg Mori, Stephen Se | Discovering Human Interactions in Videos with Limited Data Labeling | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach for discovering human interactions in videos.
Activity understanding techniques usually require a large number of labeled
examples, which are not available in many practical cases. Here, we focus on
recovering semantically meaningful clusters of human-human and human-object
interaction in an unsupervised fashion. A new iterative solution is introduced
based on Maximum Margin Clustering (MMC), which also accepts user feedback to
refine clusters. This is achieved by formulating the whole process as a unified
constrained latent max-margin clustering problem. Extensive experiments have
been carried out over three challenging datasets, Collective Activity, VIRAT,
and UT-interaction. Empirical results demonstrate that the proposed algorithm
can efficiently discover perfect semantic clusters of human interactions with
only a small amount of labeling effort.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 22:38:28 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Khodabandeh",
"Mehran",
""
],
[
"Vahdat",
"Arash",
""
],
[
"Zhou",
"Guang-Tong",
""
],
[
"Hajimirsadeghi",
"Hossein",
""
],
[
"Roshtkhari",
"Mehrsan Javan",
""
],
[
"Mori",
"Greg",
""
],
[
"Se",
"Stephen",
""
]
] | TITLE: Discovering Human Interactions in Videos with Limited Data Labeling
ABSTRACT: We present a novel approach for discovering human interactions in videos.
Activity understanding techniques usually require a large number of labeled
examples, which are not available in many practical cases. Here, we focus on
recovering semantically meaningful clusters of human-human and human-object
interaction in an unsupervised fashion. A new iterative solution is introduced
based on Maximum Margin Clustering (MMC), which also accepts user feedback to
refine clusters. This is achieved by formulating the whole process as a unified
constrained latent max-margin clustering problem. Extensive experiments have
been carried out over three challenging datasets, Collective Activity, VIRAT,
and UT-interaction. Empirical results demonstrate that the proposed algorithm
can efficiently discover perfect semantic clusters of human interactions with
only a small amount of labeling effort.
| no_new_dataset | 0.709208 |
1502.03879 | Weiya Ren | Weiya Ren | Semi-supervised Data Representation via Affinity Graph Learning | 10 pages,2 Tables. Written in Aug,2013 | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the general problem of utilizing both labeled and unlabeled data
to improve data representation performance. A new semi-supervised learning
framework is proposed by combing manifold regularization and data
representation methods such as Non negative matrix factorization and sparse
coding. We adopt unsupervised data representation methods as the learning
machines because they do not depend on the labeled data, which can improve
machine's generation ability as much as possible. The proposed framework forms
the Laplacian regularizer through learning the affinity graph. We incorporate
the new Laplacian regularizer into the unsupervised data representation to
smooth the low dimensional representation of data and make use of label
information. Experimental results on several real benchmark datasets indicate
that our semi-supervised learning framework achieves encouraging results
compared with state-of-art methods.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 03:35:15 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Ren",
"Weiya",
""
]
] | TITLE: Semi-supervised Data Representation via Affinity Graph Learning
ABSTRACT: We consider the general problem of utilizing both labeled and unlabeled data
to improve data representation performance. A new semi-supervised learning
framework is proposed by combing manifold regularization and data
representation methods such as Non negative matrix factorization and sparse
coding. We adopt unsupervised data representation methods as the learning
machines because they do not depend on the labeled data, which can improve
machine's generation ability as much as possible. The proposed framework forms
the Laplacian regularizer through learning the affinity graph. We incorporate
the new Laplacian regularizer into the unsupervised data representation to
smooth the low dimensional representation of data and make use of label
information. Experimental results on several real benchmark datasets indicate
that our semi-supervised learning framework achieves encouraging results
compared with state-of-art methods.
| no_new_dataset | 0.710478 |
1502.04025 | Tilo Wettig | Paul Arts, Jacques Bloch, Peter Georg, Benjamin Glaessle, Simon
Heybrock, Yu Komatsubara, Robert Lohmayer, Simon Mages, Bernhard Mendl, Nils
Meyer, Alessio Parcianello, Dirk Pleiter, Florian Rappl, Mauro Rossi, Stefan
Solbrig, Giampietro Tecchiolli, Tilo Wettig, Gianpaolo Zanier | QPACE 2 and Domain Decomposition on the Intel Xeon Phi | plenary talk at Lattice 2014, to appear in the conference proceedings
PoS(LATTICE2014), 15 pages, 9 figures | null | null | null | cs.DC hep-lat physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an overview of QPACE 2, which is a custom-designed supercomputer
based on Intel Xeon Phi processors, developed in a collaboration of Regensburg
University and Eurotech. We give some general recommendations for how to write
high-performance code for the Xeon Phi and then discuss our implementation of a
domain-decomposition-based solver and present a number of benchmarks.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2015 15:23:52 GMT"
}
] | 2015-02-16T00:00:00 | [
[
"Arts",
"Paul",
""
],
[
"Bloch",
"Jacques",
""
],
[
"Georg",
"Peter",
""
],
[
"Glaessle",
"Benjamin",
""
],
[
"Heybrock",
"Simon",
""
],
[
"Komatsubara",
"Yu",
""
],
[
"Lohmayer",
"Robert",
""
],
[
"Mages",
"Simon",
""
],
[
"Mendl",
"Bernhard",
""
],
[
"Meyer",
"Nils",
""
],
[
"Parcianello",
"Alessio",
""
],
[
"Pleiter",
"Dirk",
""
],
[
"Rappl",
"Florian",
""
],
[
"Rossi",
"Mauro",
""
],
[
"Solbrig",
"Stefan",
""
],
[
"Tecchiolli",
"Giampietro",
""
],
[
"Wettig",
"Tilo",
""
],
[
"Zanier",
"Gianpaolo",
""
]
] | TITLE: QPACE 2 and Domain Decomposition on the Intel Xeon Phi
ABSTRACT: We give an overview of QPACE 2, which is a custom-designed supercomputer
based on Intel Xeon Phi processors, developed in a collaboration of Regensburg
University and Eurotech. We give some general recommendations for how to write
high-performance code for the Xeon Phi and then discuss our implementation of a
domain-decomposition-based solver and present a number of benchmarks.
| no_new_dataset | 0.712414 |
1402.3144 | Marc Claesen | Marc Claesen, Frank De Smet, Johan A. K. Suykens, Bart De Moor | A Robust Ensemble Approach to Learn From Positive and Unlabeled Data
Using SVM Base Models | 34 pages, 6 figures, 6 tables. Accepted for publication in
Neurocomputing: Special Issue on Advances in Learning with Label Noise | null | 10.1016/j.neucom.2014.10.081 | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach to learn binary classifiers when only positive
and unlabeled instances are available (PU learning). This problem is routinely
cast as a supervised task with label noise in the negative set. We use an
ensemble of SVM models trained on bootstrap resamples of the training data for
increased robustness against label noise. The approach can be considered in a
bagging framework which provides an intuitive explanation for its mechanics in
a semi-supervised setting. We compared our method to state-of-the-art
approaches in simulations using multiple public benchmark data sets. The
included benchmark comprises three settings with increasing label noise: (i)
fully supervised, (ii) PU learning and (iii) PU learning with false positives.
Our approach shows a marginal improvement over existing methods in the second
setting and a significant improvement in the third.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2014 14:18:17 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2014 12:29:58 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Claesen",
"Marc",
""
],
[
"De Smet",
"Frank",
""
],
[
"Suykens",
"Johan A. K.",
""
],
[
"De Moor",
"Bart",
""
]
] | TITLE: A Robust Ensemble Approach to Learn From Positive and Unlabeled Data
Using SVM Base Models
ABSTRACT: We present a novel approach to learn binary classifiers when only positive
and unlabeled instances are available (PU learning). This problem is routinely
cast as a supervised task with label noise in the negative set. We use an
ensemble of SVM models trained on bootstrap resamples of the training data for
increased robustness against label noise. The approach can be considered in a
bagging framework which provides an intuitive explanation for its mechanics in
a semi-supervised setting. We compared our method to state-of-the-art
approaches in simulations using multiple public benchmark data sets. The
included benchmark comprises three settings with increasing label noise: (i)
fully supervised, (ii) PU learning and (iii) PU learning with false positives.
Our approach shows a marginal improvement over existing methods in the second
setting and a significant improvement in the third.
| no_new_dataset | 0.708635 |
1408.6615 | Shervin Minaee | Shervin Minaee and AmirAli Abdolrashidi | Multispectral Palmprint Recognition Using Textural Features | 5 pages, Published in IEEE Signal Processing in Medicine and Biology
Symposium 2014 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to utilize identification to the best extent, we need robust and
fast algorithms and systems to process the data. Having palmprint as a reliable
and unique characteristic of every person, we extract and use its features
based on its geometry, lines and angles. There are countless ways to define
measures for the recognition task. To analyze a new point of view, we extracted
textural features and used them for palmprint recognition. Co-occurrence matrix
can be used for textural feature extraction. As classifiers, we have used the
minimum distance classifier (MDC) and the weighted majority voting system
(WMV). The proposed method is tested on a well-known multispectral palmprint
dataset of 6000 samples and an accuracy rate of 99.96-100% is obtained for most
scenarios which outperforms all previous works in multispectral palmprint
recognition.
| [
{
"version": "v1",
"created": "Thu, 28 Aug 2014 03:20:38 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 04:49:30 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Feb 2015 03:03:02 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Minaee",
"Shervin",
""
],
[
"Abdolrashidi",
"AmirAli",
""
]
] | TITLE: Multispectral Palmprint Recognition Using Textural Features
ABSTRACT: In order to utilize identification to the best extent, we need robust and
fast algorithms and systems to process the data. Having palmprint as a reliable
and unique characteristic of every person, we extract and use its features
based on its geometry, lines and angles. There are countless ways to define
measures for the recognition task. To analyze a new point of view, we extracted
textural features and used them for palmprint recognition. Co-occurrence matrix
can be used for textural feature extraction. As classifiers, we have used the
minimum distance classifier (MDC) and the weighted majority voting system
(WMV). The proposed method is tested on a well-known multispectral palmprint
dataset of 6000 samples and an accuracy rate of 99.96-100% is obtained for most
scenarios which outperforms all previous works in multispectral palmprint
recognition.
| no_new_dataset | 0.709038 |
1502.03556 | Md. Hanif Seddiqui | Md. Hanif Seddiqui, Rudra Pratap Deb Nath, Masaki Aono | An Efficient Metric of Automatic Weight Generation for Properties in
Instance Matching Technique | 17 pages, 5 figures, 3 tables, pp. 1-17, publication year 2015,
journal publication, vol. 6 number 1 | Journal of Web and Semantic Technology (IJWeST), vol.6 no.1, pp.
1-17 (2015) | 10.5121/ijwest.2015.6101 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of heterogeneous data sources of semantic knowledge base
intensifies the need of an automatic instance matching technique. However, the
efficiency of instance matching is often influenced by the weight of a property
associated to instances. Automatic weight generation is a non-trivial, however
an important task in instance matching technique. Therefore, identifying an
appropriate metric for generating weight for a property automatically is
nevertheless a formidable task. In this paper, we investigate an approach of
generating weights automatically by considering hypotheses: (1) the weight of a
property is directly proportional to the ratio of the number of its distinct
values to the number of instances contain the property, and (2) the weight is
also proportional to the ratio of the number of distinct values of a property
to the number of instances in a training dataset. The basic intuition behind
the use of our approach is the classical theory of information content that
infrequent words are more informative than frequent ones. Our mathematical
model derives a metric for generating property weights automatically, which is
applied in instance matching system to produce re-conciliated instances
efficiently. Our experiments and evaluations show the effectiveness of our
proposed metric of automatic weight generation for properties in an instance
matching technique.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2015 07:51:39 GMT"
}
] | 2015-02-13T00:00:00 | [
[
"Seddiqui",
"Md. Hanif",
""
],
[
"Nath",
"Rudra Pratap Deb",
""
],
[
"Aono",
"Masaki",
""
]
] | TITLE: An Efficient Metric of Automatic Weight Generation for Properties in
Instance Matching Technique
ABSTRACT: The proliferation of heterogeneous data sources of semantic knowledge base
intensifies the need of an automatic instance matching technique. However, the
efficiency of instance matching is often influenced by the weight of a property
associated to instances. Automatic weight generation is a non-trivial, however
an important task in instance matching technique. Therefore, identifying an
appropriate metric for generating weight for a property automatically is
nevertheless a formidable task. In this paper, we investigate an approach of
generating weights automatically by considering hypotheses: (1) the weight of a
property is directly proportional to the ratio of the number of its distinct
values to the number of instances contain the property, and (2) the weight is
also proportional to the ratio of the number of distinct values of a property
to the number of instances in a training dataset. The basic intuition behind
the use of our approach is the classical theory of information content that
infrequent words are more informative than frequent ones. Our mathematical
model derives a metric for generating property weights automatically, which is
applied in instance matching system to produce re-conciliated instances
efficiently. Our experiments and evaluations show the effectiveness of our
proposed metric of automatic weight generation for properties in an instance
matching technique.
| no_new_dataset | 0.71247 |
1502.00996 | Brian Thomas | Brian Thomas, Tim Jenness, Frossie Economou, Perry Greenfield, Paul
Hirst, David S. Berry, Erik Bray, Norman Gray, Demitri Muna, James Turner,
Miguel de Val-Borro, Juande Santander-Vela, David Shupe, John Good, G. Bruce
Berriman, Slava Kitaeff, Jonathan Fay, Omar Laurino, Anastasia Alexov, Walter
Landry, Joe Masters, Adam Brazier, Reinhold Schaaf, Kevin Edwards, Russell O.
Redman, Thomas R. Marsh, Ole Streicher, Pat Norris, Sergio Pascual, Matthew
Davie, Michael Droettboom, Thomas Robitaille, Riccardo Campana, Alex Hagen,
Paul Hartogh, Dominik Klaes, Matthew W. Craig, Derek Homeier | Learning from FITS: Limitations in use in modern astronomical research | null | null | 10.1016/j.ascom.2015.01.009 | null | astro-ph.IM cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Flexible Image Transport System (FITS) standard has been a great boon to
astronomy, allowing observatories, scientists and the public to exchange
astronomical information easily. The FITS standard, however, is showing its
age. Developed in the late 1970s, the FITS authors made a number of
implementation choices that, while common at the time, are now seen to limit
its utility with modern data. The authors of the FITS standard could not
anticipate the challenges which we are facing today in astronomical computing.
Difficulties we now face include, but are not limited to, addressing the need
to handle an expanded range of specialized data product types (data models),
being more conducive to the networked exchange and storage of data, handling
very large datasets, and capturing significantly more complex metadata and data
relationships.
There are members of the community today who find some or all of these
limitations unworkable, and have decided to move ahead with storing data in
other formats. If this fragmentation continues, we risk abandoning the
advantages of broad interoperability, and ready archivability, that the FITS
format provides for astronomy. In this paper we detail some selected important
problems which exist within the FITS standard today. These problems may provide
insight into deeper underlying issues which reside in the format and we provide
a discussion of some lessons learned. It is not our intention here to prescribe
specific remedies to these issues; rather, it is to call attention of the FITS
and greater astronomical computing communities to these problems in the hope
that it will spur action to address them.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 20:27:29 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2015 21:35:57 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Thomas",
"Brian",
""
],
[
"Jenness",
"Tim",
""
],
[
"Economou",
"Frossie",
""
],
[
"Greenfield",
"Perry",
""
],
[
"Hirst",
"Paul",
""
],
[
"Berry",
"David S.",
""
],
[
"Bray",
"Erik",
""
],
[
"Gray",
"Norman",
""
],
[
"Muna",
"Demitri",
""
],
[
"Turner",
"James",
""
],
[
"de Val-Borro",
"Miguel",
""
],
[
"Santander-Vela",
"Juande",
""
],
[
"Shupe",
"David",
""
],
[
"Good",
"John",
""
],
[
"Berriman",
"G. Bruce",
""
],
[
"Kitaeff",
"Slava",
""
],
[
"Fay",
"Jonathan",
""
],
[
"Laurino",
"Omar",
""
],
[
"Alexov",
"Anastasia",
""
],
[
"Landry",
"Walter",
""
],
[
"Masters",
"Joe",
""
],
[
"Brazier",
"Adam",
""
],
[
"Schaaf",
"Reinhold",
""
],
[
"Edwards",
"Kevin",
""
],
[
"Redman",
"Russell O.",
""
],
[
"Marsh",
"Thomas R.",
""
],
[
"Streicher",
"Ole",
""
],
[
"Norris",
"Pat",
""
],
[
"Pascual",
"Sergio",
""
],
[
"Davie",
"Matthew",
""
],
[
"Droettboom",
"Michael",
""
],
[
"Robitaille",
"Thomas",
""
],
[
"Campana",
"Riccardo",
""
],
[
"Hagen",
"Alex",
""
],
[
"Hartogh",
"Paul",
""
],
[
"Klaes",
"Dominik",
""
],
[
"Craig",
"Matthew W.",
""
],
[
"Homeier",
"Derek",
""
]
] | TITLE: Learning from FITS: Limitations in use in modern astronomical research
ABSTRACT: The Flexible Image Transport System (FITS) standard has been a great boon to
astronomy, allowing observatories, scientists and the public to exchange
astronomical information easily. The FITS standard, however, is showing its
age. Developed in the late 1970s, the FITS authors made a number of
implementation choices that, while common at the time, are now seen to limit
its utility with modern data. The authors of the FITS standard could not
anticipate the challenges which we are facing today in astronomical computing.
Difficulties we now face include, but are not limited to, addressing the need
to handle an expanded range of specialized data product types (data models),
being more conducive to the networked exchange and storage of data, handling
very large datasets, and capturing significantly more complex metadata and data
relationships.
There are members of the community today who find some or all of these
limitations unworkable, and have decided to move ahead with storing data in
other formats. If this fragmentation continues, we risk abandoning the
advantages of broad interoperability, and ready archivability, that the FITS
format provides for astronomy. In this paper we detail some selected important
problems which exist within the FITS standard today. These problems may provide
insight into deeper underlying issues which reside in the format and we provide
a discussion of some lessons learned. It is not our intention here to prescribe
specific remedies to these issues; rather, it is to call attention of the FITS
and greater astronomical computing communities to these problems in the hope
that it will spur action to address them.
| no_new_dataset | 0.706361 |
1502.02772 | Kean Lau Hong | Kean Hong Lau, Yong Haur Tay, Fook Loong Lo | A HMAX with LLC for visual recognition | 10 pages, 3 figures, 2 tables, 23 references | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today's high performance deep artificial neural networks (ANNs) rely heavily
on parameter optimization, which is sequential in nature and even with a
powerful GPU, would have taken weeks to train them up for solving challenging
tasks [22]. HMAX [17] has demonstrated that a simple high performing network
could be obtained without heavy optimization. In this paper, we had improved on
the existing best HMAX neural network [12] in terms of structural simplicity
and performance. Our design replaces the L1 minimization sparse coding (SC)
with a locality-constrained linear coding (LLC) [20] which has a lower
computational demand. We also put the simple orientation filter bank back into
the front layer of the network replacing PCA. Our system's performance has
improved over the existing architecture and reached 79.0% on the challenging
Caltech-101 [7] dataset, which is state-of-the-art for ANNs (without transfer
learning). From our empirical data, the main contributors to our system's
performance include an introduction of partial signal whitening, a spot
detector, and a spatial pyramid matching (SPM) [14] layer.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 04:01:43 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Feb 2015 04:40:20 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Lau",
"Kean Hong",
""
],
[
"Tay",
"Yong Haur",
""
],
[
"Lo",
"Fook Loong",
""
]
] | TITLE: A HMAX with LLC for visual recognition
ABSTRACT: Today's high performance deep artificial neural networks (ANNs) rely heavily
on parameter optimization, which is sequential in nature and even with a
powerful GPU, would have taken weeks to train them up for solving challenging
tasks [22]. HMAX [17] has demonstrated that a simple high performing network
could be obtained without heavy optimization. In this paper, we had improved on
the existing best HMAX neural network [12] in terms of structural simplicity
and performance. Our design replaces the L1 minimization sparse coding (SC)
with a locality-constrained linear coding (LLC) [20] which has a lower
computational demand. We also put the simple orientation filter bank back into
the front layer of the network replacing PCA. Our system's performance has
improved over the existing architecture and reached 79.0% on the challenging
Caltech-101 [7] dataset, which is state-of-the-art for ANNs (without transfer
learning). From our empirical data, the main contributors to our system's
performance include an introduction of partial signal whitening, a spot
detector, and a spatial pyramid matching (SPM) [14] layer.
| no_new_dataset | 0.709233 |
1502.03406 | Adeline Decuyper | Vincent D. Blondel, Adeline Decuyper, Gautier Krings | A survey of results on mobile phone datasets analysis | null | null | null | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we review some advances made recently in the study of mobile
phone datasets. This area of research has emerged a decade ago, with the
increasing availability of large-scale anonymized datasets, and has grown into
a stand-alone topic. We will survey the contributions made so far on the social
networks that can be constructed with such data, the study of personal
mobility, geographical partitioning, urban planning, and help towards
development as well as security and privacy issues.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2015 18:58:12 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Decuyper",
"Adeline",
""
],
[
"Krings",
"Gautier",
""
]
] | TITLE: A survey of results on mobile phone datasets analysis
ABSTRACT: In this paper, we review some advances made recently in the study of mobile
phone datasets. This area of research has emerged a decade ago, with the
increasing availability of large-scale anonymized datasets, and has grown into
a stand-alone topic. We will survey the contributions made so far on the social
networks that can be constructed with such data, the study of personal
mobility, geographical partitioning, urban planning, and help towards
development as well as security and privacy issues.
| no_new_dataset | 0.707657 |
1502.03409 | Karl Ni | Karl Ni, Roger Pearce, Kofi Boakye, Brian Van Essen, Damian Borth,
Barry Chen, Eric Wang | Large-Scale Deep Learning on the YFCC100M Dataset | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/publicdomain/ | We present a work-in-progress snapshot of learning with a 15 billion
parameter deep learning network on HPC architectures applied to the largest
publicly available natural image and video dataset released to-date. Recent
advancements in unsupervised deep neural networks suggest that scaling up such
networks in both model and training dataset size can yield significant
improvements in the learning of concepts at the highest layers. We train our
three-layer deep neural network on the Yahoo! Flickr Creative Commons 100M
dataset. The dataset comprises approximately 99.2 million images and 800,000
user-created videos from Yahoo's Flickr image and video sharing platform.
Training of our network takes eight days on 98 GPU nodes at the High
Performance Computing Center at Lawrence Livermore National Laboratory.
Encouraging preliminary results and future research directions are presented
and discussed.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2015 19:24:36 GMT"
}
] | 2015-02-12T00:00:00 | [
[
"Ni",
"Karl",
""
],
[
"Pearce",
"Roger",
""
],
[
"Boakye",
"Kofi",
""
],
[
"Van Essen",
"Brian",
""
],
[
"Borth",
"Damian",
""
],
[
"Chen",
"Barry",
""
],
[
"Wang",
"Eric",
""
]
] | TITLE: Large-Scale Deep Learning on the YFCC100M Dataset
ABSTRACT: We present a work-in-progress snapshot of learning with a 15 billion
parameter deep learning network on HPC architectures applied to the largest
publicly available natural image and video dataset released to-date. Recent
advancements in unsupervised deep neural networks suggest that scaling up such
networks in both model and training dataset size can yield significant
improvements in the learning of concepts at the highest layers. We train our
three-layer deep neural network on the Yahoo! Flickr Creative Commons 100M
dataset. The dataset comprises approximately 99.2 million images and 800,000
user-created videos from Yahoo's Flickr image and video sharing platform.
Training of our network takes eight days on 98 GPU nodes at the High
Performance Computing Center at Lawrence Livermore National Laboratory.
Encouraging preliminary results and future research directions are presented
and discussed.
| no_new_dataset | 0.702096 |
1404.7514 | Mihai Alexandru Petrovici | Mihai A. Petrovici, Bernhard Vogginger, Paul M\"uller, Oliver
Breitwieser, Mikael Lundqvist, Lyle Muller, Matthias Ehrlich, Alain Destexhe,
Anders Lansner, Ren\'e Sch\"uffny, Johannes Schemmel, Karlheinz Meier | Characterization and Compensation of Network-Level Anomalies in
Mixed-Signal Neuromorphic Modeling Platforms | null | PLOS ONE, October 10th 2014 | 10.1371/journal.pone.0108590 | null | q-bio.NC cond-mat.dis-nn cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advancing the size and complexity of neural network models leads to an ever
increasing demand for computational resources for their simulation.
Neuromorphic devices offer a number of advantages over conventional computing
architectures, such as high emulation speed or low power consumption, but this
usually comes at the price of reduced configurability and precision. In this
article, we investigate the consequences of several such factors that are
common to neuromorphic devices, more specifically limited hardware resources,
limited parameter configurability and parameter variations. Our final aim is to
provide an array of methods for coping with such inevitable distortion
mechanisms. As a platform for testing our proposed strategies, we use an
executable system specification (ESS) of the BrainScaleS neuromorphic system,
which has been designed as a universal emulation back-end for neuroscientific
modeling. We address the most essential limitations of this device in detail
and study their effects on three prototypical benchmark network models within a
well-defined, systematic workflow. For each network model, we start by defining
quantifiable functionality measures by which we then assess the effects of
typical hardware-specific distortion mechanisms, both in idealized software
simulations and on the ESS. For those effects that cause unacceptable
deviations from the original network dynamics, we suggest generic compensation
mechanisms and demonstrate their effectiveness. Both the suggested workflow and
the investigated compensation mechanisms are largely back-end independent and
do not require additional hardware configurability beyond the one required to
emulate the benchmark networks in the first place. We hereby provide a generic
methodological environment for configurable neuromorphic devices that are
targeted at emulating large-scale, functional neural networks.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2014 20:20:13 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2015 14:05:53 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Petrovici",
"Mihai A.",
""
],
[
"Vogginger",
"Bernhard",
""
],
[
"Müller",
"Paul",
""
],
[
"Breitwieser",
"Oliver",
""
],
[
"Lundqvist",
"Mikael",
""
],
[
"Muller",
"Lyle",
""
],
[
"Ehrlich",
"Matthias",
""
],
[
"Destexhe",
"Alain",
""
],
[
"Lansner",
"Anders",
""
],
[
"Schüffny",
"René",
""
],
[
"Schemmel",
"Johannes",
""
],
[
"Meier",
"Karlheinz",
""
]
] | TITLE: Characterization and Compensation of Network-Level Anomalies in
Mixed-Signal Neuromorphic Modeling Platforms
ABSTRACT: Advancing the size and complexity of neural network models leads to an ever
increasing demand for computational resources for their simulation.
Neuromorphic devices offer a number of advantages over conventional computing
architectures, such as high emulation speed or low power consumption, but this
usually comes at the price of reduced configurability and precision. In this
article, we investigate the consequences of several such factors that are
common to neuromorphic devices, more specifically limited hardware resources,
limited parameter configurability and parameter variations. Our final aim is to
provide an array of methods for coping with such inevitable distortion
mechanisms. As a platform for testing our proposed strategies, we use an
executable system specification (ESS) of the BrainScaleS neuromorphic system,
which has been designed as a universal emulation back-end for neuroscientific
modeling. We address the most essential limitations of this device in detail
and study their effects on three prototypical benchmark network models within a
well-defined, systematic workflow. For each network model, we start by defining
quantifiable functionality measures by which we then assess the effects of
typical hardware-specific distortion mechanisms, both in idealized software
simulations and on the ESS. For those effects that cause unacceptable
deviations from the original network dynamics, we suggest generic compensation
mechanisms and demonstrate their effectiveness. Both the suggested workflow and
the investigated compensation mechanisms are largely back-end independent and
do not require additional hardware configurability beyond the one required to
emulate the benchmark networks in the first place. We hereby provide a generic
methodological environment for configurable neuromorphic devices that are
targeted at emulating large-scale, functional neural networks.
| no_new_dataset | 0.710986 |
1502.02761 | Yujia Li | Yujia Li, Kevin Swersky and Richard Zemel | Generative Moment Matching Networks | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of learning deep generative models from data. We
formulate a method that generates an independent sample via a single
feedforward pass through a multilayer perceptron, as in the recently proposed
generative adversarial networks (Goodfellow et al., 2014). Training a
generative adversarial network, however, requires careful optimization of a
difficult minimax program. Instead, we utilize a technique from statistical
hypothesis testing known as maximum mean discrepancy (MMD), which leads to a
simple objective that can be interpreted as matching all orders of statistics
between a dataset and samples from the model, and can be trained by
backpropagation. We further boost the performance of this approach by combining
our generative network with an auto-encoder network, using MMD to learn to
generate codes that can then be decoded to produce samples. We show that the
combination of these techniques yields excellent generative models compared to
baseline approaches as measured on MNIST and the Toronto Face Database.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 02:54:58 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Li",
"Yujia",
""
],
[
"Swersky",
"Kevin",
""
],
[
"Zemel",
"Richard",
""
]
] | TITLE: Generative Moment Matching Networks
ABSTRACT: We consider the problem of learning deep generative models from data. We
formulate a method that generates an independent sample via a single
feedforward pass through a multilayer perceptron, as in the recently proposed
generative adversarial networks (Goodfellow et al., 2014). Training a
generative adversarial network, however, requires careful optimization of a
difficult minimax program. Instead, we utilize a technique from statistical
hypothesis testing known as maximum mean discrepancy (MMD), which leads to a
simple objective that can be interpreted as matching all orders of statistics
between a dataset and samples from the model, and can be trained by
backpropagation. We further boost the performance of this approach by combining
our generative network with an auto-encoder network, using MMD to learn to
generate codes that can then be decoded to produce samples. We show that the
combination of these techniques yields excellent generative models compared to
baseline approaches as measured on MNIST and the Toronto Face Database.
| no_new_dataset | 0.708767 |
1502.02821 | Paul Doyle Dr. | Paul Doyle | Building a scalable global data processing pipeline for large
astronomical photometric datasets | PhD Thesis, Dublin Institute of Technology | null | null | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Astronomical photometry is the science of measuring the flux of a celestial
object. Since its introduction, the CCD has been the principle method of
measuring flux to calculate the apparent magnitude of an object. Each CCD image
taken must go through a process of cleaning and calibration prior to its use.
As the number of research telescopes increases the overall computing resources
required for image processing also increases. Existing processing techniques
are primarily sequential in nature, requiring increasingly powerful servers,
faster disks and faster networks to process data. Existing High Performance
Computing solutions involving high capacity data centres are complex in design
and expensive to maintain, while providing resources primarily to high profile
science projects. This research describes three distributed pipeline
architectures, a virtualised cloud based IRAF, the Astronomical Compute Node
(ACN), a private cloud based pipeline, and NIMBUS, a globally distributed
system. The ACN pipeline processed data at a rate of 4 Terabytes per day
demonstrating data compression and upload to a central cloud storage service at
a rate faster than data generation. The primary contribution of this research
is NIMBUS, which is rapidly scalable, resilient to failure and capable of
processing CCD image data at a rate of hundreds of Terabytes per day. This
pipeline is implemented using a decentralised web queue to control the
compression of data, uploading of data to distributed web servers, and creating
web messages to identify the location of the data. Using distributed web queue
messages, images are downloaded by computing resources distributed around the
globe. Rigorous experimental evidence is presented verifying the horizontal
scalability of the system which has demonstrated a processing rate of 192
Terabytes per day with clear indications that higher processing rates are
possible.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 09:27:58 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Doyle",
"Paul",
""
]
] | TITLE: Building a scalable global data processing pipeline for large
astronomical photometric datasets
ABSTRACT: Astronomical photometry is the science of measuring the flux of a celestial
object. Since its introduction, the CCD has been the principle method of
measuring flux to calculate the apparent magnitude of an object. Each CCD image
taken must go through a process of cleaning and calibration prior to its use.
As the number of research telescopes increases the overall computing resources
required for image processing also increases. Existing processing techniques
are primarily sequential in nature, requiring increasingly powerful servers,
faster disks and faster networks to process data. Existing High Performance
Computing solutions involving high capacity data centres are complex in design
and expensive to maintain, while providing resources primarily to high profile
science projects. This research describes three distributed pipeline
architectures, a virtualised cloud based IRAF, the Astronomical Compute Node
(ACN), a private cloud based pipeline, and NIMBUS, a globally distributed
system. The ACN pipeline processed data at a rate of 4 Terabytes per day
demonstrating data compression and upload to a central cloud storage service at
a rate faster than data generation. The primary contribution of this research
is NIMBUS, which is rapidly scalable, resilient to failure and capable of
processing CCD image data at a rate of hundreds of Terabytes per day. This
pipeline is implemented using a decentralised web queue to control the
compression of data, uploading of data to distributed web servers, and creating
web messages to identify the location of the data. Using distributed web queue
messages, images are downloaded by computing resources distributed around the
globe. Rigorous experimental evidence is presented verifying the horizontal
scalability of the system which has demonstrated a processing rate of 192
Terabytes per day with clear indications that higher processing rates are
possible.
| no_new_dataset | 0.709466 |
1502.02852 | Daniel Gregorek | Daniel Gregorek, Robert Schmidt, Alberto Garcia-Ortiz | Transaction Level Analysis for a Clustered and Hardware-Enhanced Task
Manager on Homogeneous Many-Core Systems | Presented at HIP3ES, 2015 (arXiv: 1501.03064) | null | null | HIP3ES/2015/03 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing parallelism of many-core systems demands for efficient
strategies for the run-time system management. Due to the large number of cores
the management overhead has a rising impact to the overall system performance.
This work analyzes a clustered infrastructure of dedicated hardware nodes to
manage a homogeneous many-core system. The hardware nodes implement a message
passing protocol and perform the task mapping and synchronization at run-time.
To make meaningful mapping decisions, the global management nodes employ a
workload status communication mechanism.
This paper discusses the design-space of the dedicated infrastructure by
means of task mapping use-cases and a parallel benchmark including
application-interference. We evaluate the architecture in terms of application
speedup and analyze the mechanism for the status communication. A comparison
versus centralized and fully-distributed configurations demonstrates the
reduction of the computation and communication management overhead for our
approach.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2015 10:56:50 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Gregorek",
"Daniel",
""
],
[
"Schmidt",
"Robert",
""
],
[
"Garcia-Ortiz",
"Alberto",
""
]
] | TITLE: Transaction Level Analysis for a Clustered and Hardware-Enhanced Task
Manager on Homogeneous Many-Core Systems
ABSTRACT: The increasing parallelism of many-core systems demands for efficient
strategies for the run-time system management. Due to the large number of cores
the management overhead has a rising impact to the overall system performance.
This work analyzes a clustered infrastructure of dedicated hardware nodes to
manage a homogeneous many-core system. The hardware nodes implement a message
passing protocol and perform the task mapping and synchronization at run-time.
To make meaningful mapping decisions, the global management nodes employ a
workload status communication mechanism.
This paper discusses the design-space of the dedicated infrastructure by
means of task mapping use-cases and a parallel benchmark including
application-interference. We evaluate the architecture in terms of application
speedup and analyze the mechanism for the status communication. A comparison
versus centralized and fully-distributed configurations demonstrates the
reduction of the computation and communication management overhead for our
approach.
| no_new_dataset | 0.708862 |
cs/0604054 | Maria Paola Bonacina | Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan
Schulz | New results on rewrite-based satisfiability procedures | To appear in the ACM Transactions on Computational Logic, 49 pages | ACM Transactions on Computational Logic, 10(1):129-179, January
2009 | 10.1145/1459010.1459014 | RR 36/2005 | cs.AI cs.LO | null | Program analysis and verification require decision procedures to reason on
theories of data structures. Many problems can be reduced to the satisfiability
of sets of ground literals in theory T. If a sound and complete inference
system for first-order logic is guaranteed to terminate on T-satisfiability
problems, any theorem-proving strategy with that system and a fair search plan
is a T-satisfiability procedure. We prove termination of a rewrite-based
first-order engine on the theories of records, integer offsets, integer offsets
modulo and lists. We give a modularity theorem stating sufficient conditions
for termination on a combinations of theories, given termination on each. The
above theories, as well as others, satisfy these conditions. We introduce
several sets of benchmarks on these theories and their combinations, including
both parametric synthetic benchmarks to test scalability, and real-world
problems to test performances on huge sets of literals. We compare the
rewrite-based theorem prover E with the validity checkers CVC and CVC Lite.
Contrary to the folklore that a general-purpose prover cannot compete with
reasoners with built-in theories, the experiments are overall favorable to the
theorem prover, showing that not only the rewriting approach is elegant and
conceptually simple, but has important practical implications.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2006 19:53:24 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 19:54:27 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jun 2007 17:15:23 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Jun 2008 02:02:27 GMT"
}
] | 2015-02-11T00:00:00 | [
[
"Armando",
"Alessandro",
""
],
[
"Bonacina",
"Maria Paola",
""
],
[
"Ranise",
"Silvio",
""
],
[
"Schulz",
"Stephan",
""
]
] | TITLE: New results on rewrite-based satisfiability procedures
ABSTRACT: Program analysis and verification require decision procedures to reason on
theories of data structures. Many problems can be reduced to the satisfiability
of sets of ground literals in theory T. If a sound and complete inference
system for first-order logic is guaranteed to terminate on T-satisfiability
problems, any theorem-proving strategy with that system and a fair search plan
is a T-satisfiability procedure. We prove termination of a rewrite-based
first-order engine on the theories of records, integer offsets, integer offsets
modulo and lists. We give a modularity theorem stating sufficient conditions
for termination on a combinations of theories, given termination on each. The
above theories, as well as others, satisfy these conditions. We introduce
several sets of benchmarks on these theories and their combinations, including
both parametric synthetic benchmarks to test scalability, and real-world
problems to test performances on huge sets of literals. We compare the
rewrite-based theorem prover E with the validity checkers CVC and CVC Lite.
Contrary to the folklore that a general-purpose prover cannot compete with
reasoners with built-in theories, the experiments are overall favorable to the
theorem prover, showing that not only the rewriting approach is elegant and
conceptually simple, but has important practical implications.
| no_new_dataset | 0.707354 |
1407.8186 | Xiaoting Zhao | Xiaoting Zhao, Peter I. Frazier | Exploration vs. Exploitation in the Information Filtering Problem | 36 pages, 5 figures | null | null | null | math.OC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider information filtering, in which we face a stream of items too
voluminous to process by hand (e.g., scientific articles, blog posts, emails),
and must rely on a computer system to automatically filter out irrelevant
items. Such systems face the exploration vs. exploitation tradeoff, in which it
may be beneficial to present an item despite a low probability of relevance,
just to learn about future items with similar content. We present a Bayesian
sequential decision-making model of this problem, show how it may be solved to
optimality using a decomposition to a collection of two-armed bandit problems,
and show structural results for the optimal policy. We show that the resulting
method is especially useful when facing the cold start problem, i.e., when
filtering items for new users without a long history of past interactions. We
then present an application of this information filtering method to a
historical dataset from the arXiv.org repository of scientific articles.
| [
{
"version": "v1",
"created": "Wed, 30 Jul 2014 20:00:11 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2014 20:01:00 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Feb 2015 21:03:08 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Zhao",
"Xiaoting",
""
],
[
"Frazier",
"Peter I.",
""
]
] | TITLE: Exploration vs. Exploitation in the Information Filtering Problem
ABSTRACT: We consider information filtering, in which we face a stream of items too
voluminous to process by hand (e.g., scientific articles, blog posts, emails),
and must rely on a computer system to automatically filter out irrelevant
items. Such systems face the exploration vs. exploitation tradeoff, in which it
may be beneficial to present an item despite a low probability of relevance,
just to learn about future items with similar content. We present a Bayesian
sequential decision-making model of this problem, show how it may be solved to
optimality using a decomposition to a collection of two-armed bandit problems,
and show structural results for the optimal policy. We show that the resulting
method is especially useful when facing the cold start problem, i.e., when
filtering items for new users without a long history of past interactions. We
then present an application of this information filtering method to a
historical dataset from the arXiv.org repository of scientific articles.
| no_new_dataset | 0.71086 |
1412.4446 | Pascal Germain | Hana Ajakan, Pascal Germain, Hugo Larochelle, Fran\c{c}ois Laviolette,
Mario Marchand | Domain-Adversarial Neural Networks | The first version of this paper was accepted at the "Second Workshop
on Transfer and Multi-Task Learning: Theory meets Practice" (NIPS 2014,
Montreal, Canada). See: https://sites.google.com/site/multitaskwsnips2014/ | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new representation learning algorithm suited to the context of
domain adaptation, in which data at training and test time come from similar
but different distributions. Our algorithm is directly inspired by theory on
domain adaptation suggesting that, for effective domain transfer to be
achieved, predictions must be made based on a data representation that cannot
discriminate between the training (source) and test (target) domains. We
propose a training objective that implements this idea in the context of a
neural network, whose hidden layer is trained to be predictive of the
classification task, but uninformative as to the domain of the input. Our
experiments on a sentiment analysis classification benchmark, where the target
domain data available at training time is unlabeled, show that our neural
network for domain adaption algorithm has better performance than either a
standard neural network or an SVM, even if trained on input features extracted
with the state-of-the-art marginalized stacked denoising autoencoders of Chen
et al. (2012).
| [
{
"version": "v1",
"created": "Mon, 15 Dec 2014 02:16:07 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 17:52:03 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ajakan",
"Hana",
""
],
[
"Germain",
"Pascal",
""
],
[
"Larochelle",
"Hugo",
""
],
[
"Laviolette",
"François",
""
],
[
"Marchand",
"Mario",
""
]
] | TITLE: Domain-Adversarial Neural Networks
ABSTRACT: We introduce a new representation learning algorithm suited to the context of
domain adaptation, in which data at training and test time come from similar
but different distributions. Our algorithm is directly inspired by theory on
domain adaptation suggesting that, for effective domain transfer to be
achieved, predictions must be made based on a data representation that cannot
discriminate between the training (source) and test (target) domains. We
propose a training objective that implements this idea in the context of a
neural network, whose hidden layer is trained to be predictive of the
classification task, but uninformative as to the domain of the input. Our
experiments on a sentiment analysis classification benchmark, where the target
domain data available at training time is unlabeled, show that our neural
network for domain adaption algorithm has better performance than either a
standard neural network or an SVM, even if trained on input features extracted
with the state-of-the-art marginalized stacked denoising autoencoders of Chen
et al. (2012).
| no_new_dataset | 0.709868 |
1501.03326 | Heiko Strathmann | Heiko Strathmann, Dino Sejdinovic, Mark Girolami | Unbiased Bayes for Big Data: Paths of Partial Posteriors | 18 pages, 10 figures | null | null | null | stat.ML cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A key quantity of interest in Bayesian inference are expectations of
functions with respect to a posterior distribution. Markov Chain Monte Carlo is
a fundamental tool to consistently compute these expectations via averaging
samples drawn from an approximate posterior. However, its feasibility is being
challenged in the era of so called Big Data as all data needs to be processed
in every iteration. Realising that such simulation is an unnecessarily hard
problem if the goal is estimation, we construct a computationally scalable
methodology that allows unbiased estimation of the required expectations --
without explicit simulation from the full posterior. The scheme's variance is
finite by construction and straightforward to control, leading to algorithms
that are provably unbiased and naturally arrive at a desired error tolerance.
This is achieved at an average computational complexity that is sub-linear in
the size of the dataset and its free parameters are easy to tune. We
demonstrate the utility and generality of the methodology on a range of common
statistical models applied to large-scale benchmark and real-world datasets.
| [
{
"version": "v1",
"created": "Wed, 14 Jan 2015 12:15:14 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 16:21:20 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Strathmann",
"Heiko",
""
],
[
"Sejdinovic",
"Dino",
""
],
[
"Girolami",
"Mark",
""
]
] | TITLE: Unbiased Bayes for Big Data: Paths of Partial Posteriors
ABSTRACT: A key quantity of interest in Bayesian inference are expectations of
functions with respect to a posterior distribution. Markov Chain Monte Carlo is
a fundamental tool to consistently compute these expectations via averaging
samples drawn from an approximate posterior. However, its feasibility is being
challenged in the era of so called Big Data as all data needs to be processed
in every iteration. Realising that such simulation is an unnecessarily hard
problem if the goal is estimation, we construct a computationally scalable
methodology that allows unbiased estimation of the required expectations --
without explicit simulation from the full posterior. The scheme's variance is
finite by construction and straightforward to control, leading to algorithms
that are provably unbiased and naturally arrive at a desired error tolerance.
This is achieved at an average computational complexity that is sub-linear in
the size of the dataset and its free parameters are easy to tune. We
demonstrate the utility and generality of the methodology on a range of common
statistical models applied to large-scale benchmark and real-world datasets.
| no_new_dataset | 0.70724 |
1502.00558 | Marcelo Cicconet | Marcelo Cicconet, Davi Geiger, and Michael Werman | Complex-Valued Hough Transforms for Circles | The paper has been withdrawn since the authors concluded a more
comprehensive study on the choice of parameters needs to be performed | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper advocates the use of complex variables to represent votes in the
Hough transform for circle detection. Replacing the positive numbers
classically used in the parameter space of the Hough transforms by complex
numbers allows cancellation effects when adding up the votes. Cancellation and
the computation of shape likelihood via a complex number's magnitude square
lead to more robust solutions than the "classic" algorithms, as shown by
computational experiments on synthetic and real datasets.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 17:22:26 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2015 19:38:58 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Cicconet",
"Marcelo",
""
],
[
"Geiger",
"Davi",
""
],
[
"Werman",
"Michael",
""
]
] | TITLE: Complex-Valued Hough Transforms for Circles
ABSTRACT: This paper advocates the use of complex variables to represent votes in the
Hough transform for circle detection. Replacing the positive numbers
classically used in the parameter space of the Hough transforms by complex
numbers allows cancellation effects when adding up the votes. Cancellation and
the computation of shape likelihood via a complex number's magnitude square
lead to more robust solutions than the "classic" algorithms, as shown by
computational experiments on synthetic and real datasets.
| no_new_dataset | 0.712795 |
1502.02072 | Bharath Ramsundar | Bharath Ramsundar, Steven Kearnes, Patrick Riley, Dale Webster, David
Konerding, Vijay Pande | Massively Multitask Networks for Drug Discovery | Preliminary work. Under review by the International Conference on
Machine Learning (ICML) | null | null | null | stat.ML cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Massively multitask neural architectures provide a learning framework for
drug discovery that synthesizes information from many distinct biological
sources. To train these architectures at scale, we gather large amounts of data
from public sources to create a dataset of nearly 40 million measurements
across more than 200 biological targets. We investigate several aspects of the
multitask framework by performing a series of empirical studies and obtain some
interesting results: (1) massively multitask networks obtain predictive
accuracies significantly better than single-task methods, (2) the predictive
power of multitask networks improves as additional tasks and data are added,
(3) the total amount of data and the total number of tasks both contribute
significantly to multitask improvement, and (4) multitask networks afford
limited transferability to tasks not in the training set. Our results
underscore the need for greater data sharing and further algorithmic innovation
to accelerate the drug discovery process.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 23:04:01 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ramsundar",
"Bharath",
""
],
[
"Kearnes",
"Steven",
""
],
[
"Riley",
"Patrick",
""
],
[
"Webster",
"Dale",
""
],
[
"Konerding",
"David",
""
],
[
"Pande",
"Vijay",
""
]
] | TITLE: Massively Multitask Networks for Drug Discovery
ABSTRACT: Massively multitask neural architectures provide a learning framework for
drug discovery that synthesizes information from many distinct biological
sources. To train these architectures at scale, we gather large amounts of data
from public sources to create a dataset of nearly 40 million measurements
across more than 200 biological targets. We investigate several aspects of the
multitask framework by performing a series of empirical studies and obtain some
interesting results: (1) massively multitask networks obtain predictive
accuracies significantly better than single-task methods, (2) the predictive
power of multitask networks improves as additional tasks and data are added,
(3) the total amount of data and the total number of tasks both contribute
significantly to multitask improvement, and (4) multitask networks afford
limited transferability to tasks not in the training set. Our results
underscore the need for greater data sharing and further algorithmic innovation
to accelerate the drug discovery process.
| no_new_dataset | 0.711619 |
1502.02134 | Derrick Wing Kwan Ng | Derrick Wing Kwan Ng, Yongpeng Wu, and Robert Schober | Power Efficient Resource Allocation for Full-Duplex Radio Distributed
Antenna Networks | Submitted for possible journal publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the resource allocation algorithm design for
distributed antenna multiuser networks with full-duplex (FD) radio base
stations (BSs) which enable simultaneous uplink and downlink communications.
The considered resource allocation algorithm design is formulated as an
optimization problem taking into account the antenna circuit power consumption
of the BSs and the quality of service (QoS) requirements of both uplink and
downlink users. We minimize the total network power consumption by jointly
optimizing the downlink beamformer, the uplink transmit power, and the antenna
selection. To overcome the intractability of the resulting problem, we
reformulate it as an optimization problem with decoupled binary selection
variables and non-convex constraints. The reformulated problem facilitates the
design of an iterative resource allocation algorithm which obtains an optimal
solution based on the generalized Bender's decomposition (GBD) and serves as a
benchmark scheme. Furthermore, to strike a balance between computational
complexity and system performance, a suboptimal algorithm with polynomial time
complexity is proposed. Simulation results illustrate that the proposed GBD
based iterative algorithm converges to the global optimal solution and the
suboptimal algorithm achieves a close-to-optimal performance. Our results also
demonstrate the trade-off between power efficiency and the number of active
transmit antennas when the circuit power consumption is taken into account. In
particular, activating an exceedingly large number of antennas may not be a
power efficient solution for reducing the total system power consumption. In
addition, our results reveal that FD systems facilitate significant power
savings compared to traditional half-duplex systems, despite the non-negligible
self-interference.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2015 12:50:13 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Ng",
"Derrick Wing Kwan",
""
],
[
"Wu",
"Yongpeng",
""
],
[
"Schober",
"Robert",
""
]
] | TITLE: Power Efficient Resource Allocation for Full-Duplex Radio Distributed
Antenna Networks
ABSTRACT: In this paper, we study the resource allocation algorithm design for
distributed antenna multiuser networks with full-duplex (FD) radio base
stations (BSs) which enable simultaneous uplink and downlink communications.
The considered resource allocation algorithm design is formulated as an
optimization problem taking into account the antenna circuit power consumption
of the BSs and the quality of service (QoS) requirements of both uplink and
downlink users. We minimize the total network power consumption by jointly
optimizing the downlink beamformer, the uplink transmit power, and the antenna
selection. To overcome the intractability of the resulting problem, we
reformulate it as an optimization problem with decoupled binary selection
variables and non-convex constraints. The reformulated problem facilitates the
design of an iterative resource allocation algorithm which obtains an optimal
solution based on the generalized Bender's decomposition (GBD) and serves as a
benchmark scheme. Furthermore, to strike a balance between computational
complexity and system performance, a suboptimal algorithm with polynomial time
complexity is proposed. Simulation results illustrate that the proposed GBD
based iterative algorithm converges to the global optimal solution and the
suboptimal algorithm achieves a close-to-optimal performance. Our results also
demonstrate the trade-off between power efficiency and the number of active
transmit antennas when the circuit power consumption is taken into account. In
particular, activating an exceedingly large number of antennas may not be a
power efficient solution for reducing the total system power consumption. In
addition, our results reveal that FD systems facilitate significant power
savings compared to traditional half-duplex systems, despite the non-negligible
self-interference.
| no_new_dataset | 0.710478 |
1502.02171 | Liang Zheng | Liang Zheng, Liyue Shen, Lu Tian, Shengjin Wang, Jiahao Bu, Qi Tian | Person Re-identification Meets Image Search | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For long time, person re-identification and image search are two separately
studied tasks. However, for person re-identification, the effectiveness of
local features and the "query-search" mode make it well posed for image search
techniques.
In the light of recent advances in image search, this paper proposes to treat
person re-identification as an image search problem. Specifically, this paper
claims two major contributions. 1) By designing an unsupervised Bag-of-Words
representation, we are devoted to bridging the gap between the two tasks by
integrating techniques from image search in person re-identification. We show
that our system sets up an effective yet efficient baseline that is amenable to
further supervised/unsupervised improvements. 2) We contribute a new high
quality dataset which uses DPM detector and includes a number of distractor
images. Our dataset reaches closer to realistic settings, and new perspectives
are provided.
Compared with approaches that rely on feature-feature match, our method is
faster by over two orders of magnitude. Moreover, on three datasets, we report
competitive results compared with the state-of-the-art methods.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2015 18:56:35 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Zheng",
"Liang",
""
],
[
"Shen",
"Liyue",
""
],
[
"Tian",
"Lu",
""
],
[
"Wang",
"Shengjin",
""
],
[
"Bu",
"Jiahao",
""
],
[
"Tian",
"Qi",
""
]
] | TITLE: Person Re-identification Meets Image Search
ABSTRACT: For long time, person re-identification and image search are two separately
studied tasks. However, for person re-identification, the effectiveness of
local features and the "query-search" mode make it well posed for image search
techniques.
In the light of recent advances in image search, this paper proposes to treat
person re-identification as an image search problem. Specifically, this paper
claims two major contributions. 1) By designing an unsupervised Bag-of-Words
representation, we are devoted to bridging the gap between the two tasks by
integrating techniques from image search in person re-identification. We show
that our system sets up an effective yet efficient baseline that is amenable to
further supervised/unsupervised improvements. 2) We contribute a new high
quality dataset which uses DPM detector and includes a number of distractor
images. Our dataset reaches closer to realistic settings, and new perspectives
are provided.
Compared with approaches that rely on feature-feature match, our method is
faster by over two orders of magnitude. Moreover, on three datasets, we report
competitive results compared with the state-of-the-art methods.
| new_dataset | 0.714479 |
1502.02215 | Jobin Wilson | Jobin Wilson, Chitharanj Kachappilly, Rakesh Mohan, Prateek Kapadia,
Arun Soman, Santanu Chaudhury | Real World Applications of Machine Learning Techniques over Large Mobile
Subscriber Datasets | SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop)
https://sites.google.com/site/software4ml/accepted-papers | null | null | null | cs.LG cs.CY cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication Service Providers (CSPs) are in a unique position to utilize
their vast transactional data assets generated from interactions of subscribers
with network elements as well as with other subscribers. CSPs could leverage
its data assets for a gamut of applications such as service personalization,
predictive offer management, loyalty management, revenue forecasting, network
capacity planning, product bundle optimization and churn management to gain
significant competitive advantage. However, due to the sheer data volume,
variety, velocity and veracity of mobile subscriber datasets, sophisticated
data analytics techniques and frameworks are necessary to derive actionable
insights in a useable timeframe. In this paper, we describe our journey from a
relational database management system (RDBMS) based campaign management
solution which allowed data scientists and marketers to use hand-written rules
for service personalization and targeted promotions to a distributed Big Data
Analytics platform, capable of performing large scale machine learning and data
mining to deliver real time service personalization, predictive modelling and
product optimization. Our work involves a careful blend of technology,
processes and best practices, which facilitate man-machine collaboration and
continuous experimentation to derive measurable economic value from data. Our
platform has a reach of more than 500 million mobile subscribers worldwide,
delivering over 1 billion personalized recommendations annually, processing a
total data volume of 64 Petabytes, corresponding to 8.5 trillion events.
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2015 06:18:55 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Wilson",
"Jobin",
""
],
[
"Kachappilly",
"Chitharanj",
""
],
[
"Mohan",
"Rakesh",
""
],
[
"Kapadia",
"Prateek",
""
],
[
"Soman",
"Arun",
""
],
[
"Chaudhury",
"Santanu",
""
]
] | TITLE: Real World Applications of Machine Learning Techniques over Large Mobile
Subscriber Datasets
ABSTRACT: Communication Service Providers (CSPs) are in a unique position to utilize
their vast transactional data assets generated from interactions of subscribers
with network elements as well as with other subscribers. CSPs could leverage
its data assets for a gamut of applications such as service personalization,
predictive offer management, loyalty management, revenue forecasting, network
capacity planning, product bundle optimization and churn management to gain
significant competitive advantage. However, due to the sheer data volume,
variety, velocity and veracity of mobile subscriber datasets, sophisticated
data analytics techniques and frameworks are necessary to derive actionable
insights in a useable timeframe. In this paper, we describe our journey from a
relational database management system (RDBMS) based campaign management
solution which allowed data scientists and marketers to use hand-written rules
for service personalization and targeted promotions to a distributed Big Data
Analytics platform, capable of performing large scale machine learning and data
mining to deliver real time service personalization, predictive modelling and
product optimization. Our work involves a careful blend of technology,
processes and best practices, which facilitate man-machine collaboration and
continuous experimentation to derive measurable economic value from data. Our
platform has a reach of more than 500 million mobile subscribers worldwide,
delivering over 1 billion personalized recommendations annually, processing a
total data volume of 64 Petabytes, corresponding to 8.5 trillion events.
| no_new_dataset | 0.708042 |
1502.02407 | James J.Q. Yu | James J.Q. Yu and Victor O.K. Li | A Social Spider Algorithm for Global Optimization | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The growing complexity of real-world problems has motivated computer
scientists to search for efficient problem-solving methods. Metaheuristics
based on evolutionary computation and swarm intelligence are outstanding
examples of nature-inspired solution techniques. Inspired by the social
spiders, we propose a novel Social Spider Algorithm to solve global
optimization problems. This algorithm is mainly based on the foraging strategy
of social spiders, utilizing the vibrations on the spider web to determine the
positions of preys. Different from the previously proposed swarm intelligence
algorithms, we introduce a new social animal foraging strategy model to solve
optimization problems. In addition, we perform preliminary parameter
sensitivity analysis for our proposed algorithm, developing guidelines for
choosing the parameter values. The Social Spider Algorithm is evaluated by a
series of widely-used benchmark functions, and our proposed algorithm has
superior performance compared with other state-of-the-art metaheuristics.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2015 09:46:40 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Yu",
"James J. Q.",
""
],
[
"Li",
"Victor O. K.",
""
]
] | TITLE: A Social Spider Algorithm for Global Optimization
ABSTRACT: The growing complexity of real-world problems has motivated computer
scientists to search for efficient problem-solving methods. Metaheuristics
based on evolutionary computation and swarm intelligence are outstanding
examples of nature-inspired solution techniques. Inspired by the social
spiders, we propose a novel Social Spider Algorithm to solve global
optimization problems. This algorithm is mainly based on the foraging strategy
of social spiders, utilizing the vibrations on the spider web to determine the
positions of preys. Different from the previously proposed swarm intelligence
algorithms, we introduce a new social animal foraging strategy model to solve
optimization problems. In addition, we perform preliminary parameter
sensitivity analysis for our proposed algorithm, developing guidelines for
choosing the parameter values. The Social Spider Algorithm is evaluated by a
series of widely-used benchmark functions, and our proposed algorithm has
superior performance compared with other state-of-the-art metaheuristics.
| no_new_dataset | 0.710672 |
1502.02448 | Tom Crick | Tom Crick and Benjamin A. Hall and Samin Ishtiaq | Dear CAV, We Need to Talk About Reproducibility | Submitted to the 27th International Conference on Computer Aided
Verification (CAV 2015); 9 pages, LaTeX | null | null | null | cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How many times have you tried to re-implement a past CAV tool paper, and
failed?
Reliably reproducing published scientific discoveries has been acknowledged
as a barrier to scientific progress for some time but there remains only a
small subset of software available to support the specific needs of the
research community (i.e. beyond generic tools such as source code
repositories). In this paper we propose an infrastructure for enabling
reproducibility in our community, by automating the build, unit testing and
benchmarking of research software.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2015 11:59:40 GMT"
}
] | 2015-02-10T00:00:00 | [
[
"Crick",
"Tom",
""
],
[
"Hall",
"Benjamin A.",
""
],
[
"Ishtiaq",
"Samin",
""
]
] | TITLE: Dear CAV, We Need to Talk About Reproducibility
ABSTRACT: How many times have you tried to re-implement a past CAV tool paper, and
failed?
Reliably reproducing published scientific discoveries has been acknowledged
as a barrier to scientific progress for some time but there remains only a
small subset of software available to support the specific needs of the
research community (i.e. beyond generic tools such as source code
repositories). In this paper we propose an infrastructure for enabling
reproducibility in our community, by automating the build, unit testing and
benchmarking of research software.
| no_new_dataset | 0.709208 |
1406.0167 | Saurabh Paul | Saurabh Paul, Malik Magdon-Ismail and Petros Drineas | Feature Selection for Linear SVM with Provable Guarantees | Appearing in Proceedings of 18th AISTATS, JMLR W&CP, vol 38, 2015 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give two provably accurate feature-selection techniques for the linear
SVM. The algorithms run in deterministic and randomized time respectively. Our
algorithms can be used in an unsupervised or supervised setting. The supervised
approach is based on sampling features from support vectors. We prove that the
margin in the feature space is preserved to within $\epsilon$-relative error of
the margin in the full feature space in the worst-case. In the unsupervised
setting, we also provide worst-case guarantees of the radius of the minimum
enclosing ball, thereby ensuring comparable generalization as in the full
feature space and resolving an open problem posed in Dasgupta et al. We present
extensive experiments on real-world datasets to support our theory and to
demonstrate that our method is competitive and often better than prior
state-of-the-art, for which there are no known provable guarantees.
| [
{
"version": "v1",
"created": "Sun, 1 Jun 2014 14:37:54 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2014 14:20:00 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Feb 2015 13:43:54 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Paul",
"Saurabh",
""
],
[
"Magdon-Ismail",
"Malik",
""
],
[
"Drineas",
"Petros",
""
]
] | TITLE: Feature Selection for Linear SVM with Provable Guarantees
ABSTRACT: We give two provably accurate feature-selection techniques for the linear
SVM. The algorithms run in deterministic and randomized time respectively. Our
algorithms can be used in an unsupervised or supervised setting. The supervised
approach is based on sampling features from support vectors. We prove that the
margin in the feature space is preserved to within $\epsilon$-relative error of
the margin in the full feature space in the worst-case. In the unsupervised
setting, we also provide worst-case guarantees of the radius of the minimum
enclosing ball, thereby ensuring comparable generalization as in the full
feature space and resolving an open problem posed in Dasgupta et al. We present
extensive experiments on real-world datasets to support our theory and to
demonstrate that our method is competitive and often better than prior
state-of-the-art, for which there are no known provable guarantees.
| no_new_dataset | 0.711437 |
1409.5181 | Zhilin Zhang | Zhilin Zhang, Zhouyue Pi, Benyuan Liu | TROIKA: A General Framework for Heart Rate Monitoring Using Wrist-Type
Photoplethysmographic Signals During Intensive Physical Exercise | Matlab codes and data are available at:
https://sites.google.com/site/researchbyzhang/ | IEEE Transactions on Biomedical Engineering, vol. 62, no. 2, pp.
522-531, February 2015 | 10.1109/TBME.2014.2359372 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heart rate monitoring using wrist-type photoplethysmographic (PPG) signals
during subjects' intensive exercise is a difficult problem, since the signals
are contaminated by extremely strong motion artifacts caused by subjects' hand
movements. So far few works have studied this problem. In this work, a general
framework, termed TROIKA, is proposed, which consists of signal decomposiTion
for denoising, sparse signal RecOnstructIon for high-resolution spectrum
estimation, and spectral peaK trAcking with verification. The TROIKA framework
has high estimation accuracy and is robust to strong motion artifacts. Many
variants can be straightforwardly derived from this framework. Experimental
results on datasets recorded from 12 subjects during fast running at the peak
speed of 15 km/hour showed that the average absolute error of heart rate
estimation was 2.34 beat per minute (BPM), and the Pearson correlation between
the estimates and the ground-truth of heart rate was 0.992. This framework is
of great values to wearable devices such as smart-watches which use PPG signals
to monitor heart rate for fitness.
| [
{
"version": "v1",
"created": "Thu, 18 Sep 2014 03:24:49 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2015 07:47:00 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Feb 2015 06:16:09 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Zhang",
"Zhilin",
""
],
[
"Pi",
"Zhouyue",
""
],
[
"Liu",
"Benyuan",
""
]
] | TITLE: TROIKA: A General Framework for Heart Rate Monitoring Using Wrist-Type
Photoplethysmographic Signals During Intensive Physical Exercise
ABSTRACT: Heart rate monitoring using wrist-type photoplethysmographic (PPG) signals
during subjects' intensive exercise is a difficult problem, since the signals
are contaminated by extremely strong motion artifacts caused by subjects' hand
movements. So far few works have studied this problem. In this work, a general
framework, termed TROIKA, is proposed, which consists of signal decomposiTion
for denoising, sparse signal RecOnstructIon for high-resolution spectrum
estimation, and spectral peaK trAcking with verification. The TROIKA framework
has high estimation accuracy and is robust to strong motion artifacts. Many
variants can be straightforwardly derived from this framework. Experimental
results on datasets recorded from 12 subjects during fast running at the peak
speed of 15 km/hour showed that the average absolute error of heart rate
estimation was 2.34 beat per minute (BPM), and the Pearson correlation between
the estimates and the ground-truth of heart rate was 0.992. This framework is
of great values to wearable devices such as smart-watches which use PPG signals
to monitor heart rate for fitness.
| no_new_dataset | 0.703308 |
1412.1145 | Victor Pan | Victor Y. Pan | Matrix Multiplication, Trilinear Decompositions, APA Algorithms, and
Summation | 16 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Matrix multiplication (hereafter we use the acronym MM) is among the most
fundamental operations of modern computations. The efficiency of its
performance depends on various factors, in particular vectorization, data
movement and arithmetic complexity of the computations, but here we focus just
on the study of the arithmetic cost and the impact of this study on other areas
of modern computing. In the early 1970s it was expected that the
straightforward cubic time algorithm for MM will soon be accelerated to enable
MM in nearly quadratic arithmetic time, with some far fetched implications.
While pursuing this goal the mainstream research had its focus on the decrease
of the classical exponent 3 of the complexity of MM towards its lower bound 2,
disregarding the growth of the input size required to support this decrease.
Eventually, surprising combinations of novel ideas and sophisticated techniques
enabled the decrease of the exponent to its benchmark value of about 2.38, but
the supporting MM algorithms improved the straightforward one only for the
inputs of immense sizes. Meanwhile, the communication complexity, rather than
the arithmetic complexity, has become the bottleneck of computations in linear
algebra. This development may seem to undermine the value of the past and
future research aimed at the decrease of the arithmetic cost of MM, but we feel
that the study should be reassessed rather than closed and forgotten. We review
the old and new work in this area in the present day context, recall some major
techniques introduced in the study of MM, discuss their impact on the modern
theory and practice of computations for MM and beyond MM, and link one of these
techniques to some simple algorithms for inner product and summation.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2014 01:00:19 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Dec 2014 14:07:37 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Feb 2015 22:26:34 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Pan",
"Victor Y.",
""
]
] | TITLE: Matrix Multiplication, Trilinear Decompositions, APA Algorithms, and
Summation
ABSTRACT: Matrix multiplication (hereafter we use the acronym MM) is among the most
fundamental operations of modern computations. The efficiency of its
performance depends on various factors, in particular vectorization, data
movement and arithmetic complexity of the computations, but here we focus just
on the study of the arithmetic cost and the impact of this study on other areas
of modern computing. In the early 1970s it was expected that the
straightforward cubic time algorithm for MM will soon be accelerated to enable
MM in nearly quadratic arithmetic time, with some far fetched implications.
While pursuing this goal the mainstream research had its focus on the decrease
of the classical exponent 3 of the complexity of MM towards its lower bound 2,
disregarding the growth of the input size required to support this decrease.
Eventually, surprising combinations of novel ideas and sophisticated techniques
enabled the decrease of the exponent to its benchmark value of about 2.38, but
the supporting MM algorithms improved the straightforward one only for the
inputs of immense sizes. Meanwhile, the communication complexity, rather than
the arithmetic complexity, has become the bottleneck of computations in linear
algebra. This development may seem to undermine the value of the past and
future research aimed at the decrease of the arithmetic cost of MM, but we feel
that the study should be reassessed rather than closed and forgotten. We review
the old and new work in this area in the present day context, recall some major
techniques introduced in the study of MM, discuss their impact on the modern
theory and practice of computations for MM and beyond MM, and link one of these
techniques to some simple algorithms for inner product and summation.
| no_new_dataset | 0.707367 |
1502.01782 | Conrad Sanderson | Johanna Carvajal, Conrad Sanderson, Chris McCool, Brian C. Lovell | Multi-Action Recognition via Stochastic Modelling of Optical Flow and
Gradients | null | Workshop on Machine Learning for Sensory Data Analysis (MLSDA),
pp. 19-24, 2014 | 10.1145/2689746.2689748 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a novel approach to multi-action recognition that
performs joint segmentation and classification. This approach models each
action using a Gaussian mixture using robust low-dimensional action features.
Segmentation is achieved by performing classification on overlapping temporal
windows, which are then merged to produce the final result. This approach is
considerably less complicated than previous methods which use dynamic
programming or computationally expensive hidden Markov models (HMMs). Initial
experiments on a stitched version of the KTH dataset show that the proposed
approach achieves an accuracy of 78.3%, outperforming a recent HMM-based
approach which obtained 71.2%.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 03:30:10 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Carvajal",
"Johanna",
""
],
[
"Sanderson",
"Conrad",
""
],
[
"McCool",
"Chris",
""
],
[
"Lovell",
"Brian C.",
""
]
] | TITLE: Multi-Action Recognition via Stochastic Modelling of Optical Flow and
Gradients
ABSTRACT: In this paper we propose a novel approach to multi-action recognition that
performs joint segmentation and classification. This approach models each
action using a Gaussian mixture using robust low-dimensional action features.
Segmentation is achieved by performing classification on overlapping temporal
windows, which are then merged to produce the final result. This approach is
considerably less complicated than previous methods which use dynamic
programming or computationally expensive hidden Markov models (HMMs). Initial
experiments on a stitched version of the KTH dataset show that the proposed
approach achieves an accuracy of 78.3%, outperforming a recent HMM-based
approach which obtained 71.2%.
| no_new_dataset | 0.711268 |
1502.01801 | Sayan Mitra | Chuchu Fan and Sayan Mitra | Bounded Verification with On-the-Fly Discrepancy Computation | 24 pages | null | null | University of Illinois Urbana Champaign, Tech Report
UILU-ENG-15-2201 | cs.SY cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulation-based verification algorithms can provide formal safety guarantees
for nonlinear and hybrid systems. The previous algorithms rely on user provided
model annotations called discrepancy function, which are crucial for computing
reachtubes from simulations. In this paper, we eliminate this requirement by
presenting an algorithm for computing piece-wise exponential discrepancy
functions. The algorithm relies on computing local convergence or divergence
rates of trajectories along a simulation using a coarse over-approximation of
the reach set and bounding the maximal eigenvalue of the Jacobian over this
over-approximation. The resulting discrepancy function preserves the soundness
and the relative completeness of the verification algorithm. We also provide a
coordinate transformation method to improve the local estimates for the
convergence or divergence rates in practical examples. We extend the method to
get the input-to-state discrepancy of nonlinear dynamical systems which can be
used for compositional analysis. Our experiments show that the approach is
effective in terms of running time for several benchmark problems, scales
reasonably to larger dimensional systems, and compares favorably with respect
to available tools for nonlinear models.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 05:32:03 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Fan",
"Chuchu",
""
],
[
"Mitra",
"Sayan",
""
]
] | TITLE: Bounded Verification with On-the-Fly Discrepancy Computation
ABSTRACT: Simulation-based verification algorithms can provide formal safety guarantees
for nonlinear and hybrid systems. The previous algorithms rely on user provided
model annotations called discrepancy function, which are crucial for computing
reachtubes from simulations. In this paper, we eliminate this requirement by
presenting an algorithm for computing piece-wise exponential discrepancy
functions. The algorithm relies on computing local convergence or divergence
rates of trajectories along a simulation using a coarse over-approximation of
the reach set and bounding the maximal eigenvalue of the Jacobian over this
over-approximation. The resulting discrepancy function preserves the soundness
and the relative completeness of the verification algorithm. We also provide a
coordinate transformation method to improve the local estimates for the
convergence or divergence rates in practical examples. We extend the method to
get the input-to-state discrepancy of nonlinear dynamical systems which can be
used for compositional analysis. Our experiments show that the approach is
effective in terms of running time for several benchmark problems, scales
reasonably to larger dimensional systems, and compares favorably with respect
to available tools for nonlinear models.
| no_new_dataset | 0.709177 |
1502.01812 | Teng Li Dr. | Teng Li, Huan Chang, Meng Wang, Bingbing Ni, Richang Hong and
Shuicheng Yan | Crowded Scene Analysis: A Survey | 20 pages in IEEE Transactions on Circuits and Systems for Video
Technology, 2015 | null | 10.1109/TCSVT.2014.2358029 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated scene analysis has been a topic of great interest in computer
vision and cognitive science. Recently, with the growth of crowd phenomena in
the real world, crowded scene analysis has attracted much attention. However,
the visual occlusions and ambiguities in crowded scenes, as well as the complex
behaviors and scene semantics, make the analysis a challenging task. In the
past few years, an increasing number of works on crowded scene analysis have
been reported, covering different aspects including crowd motion pattern
learning, crowd behavior and activity analysis, and anomaly detection in
crowds. This paper surveys the state-of-the-art techniques on this topic. We
first provide the background knowledge and the available features related to
crowded scenes. Then, existing models, popular algorithms, evaluation
protocols, as well as system performance are provided corresponding to
different aspects of crowded scene analysis. We also outline the available
datasets for performance evaluation. Finally, some research problems and
promising future directions are presented with discussions.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 06:36:12 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Li",
"Teng",
""
],
[
"Chang",
"Huan",
""
],
[
"Wang",
"Meng",
""
],
[
"Ni",
"Bingbing",
""
],
[
"Hong",
"Richang",
""
],
[
"Yan",
"Shuicheng",
""
]
] | TITLE: Crowded Scene Analysis: A Survey
ABSTRACT: Automated scene analysis has been a topic of great interest in computer
vision and cognitive science. Recently, with the growth of crowd phenomena in
the real world, crowded scene analysis has attracted much attention. However,
the visual occlusions and ambiguities in crowded scenes, as well as the complex
behaviors and scene semantics, make the analysis a challenging task. In the
past few years, an increasing number of works on crowded scene analysis have
been reported, covering different aspects including crowd motion pattern
learning, crowd behavior and activity analysis, and anomaly detection in
crowds. This paper surveys the state-of-the-art techniques on this topic. We
first provide the background knowledge and the available features related to
crowded scenes. Then, existing models, popular algorithms, evaluation
protocols, as well as system performance are provided corresponding to
different aspects of crowded scene analysis. We also outline the available
datasets for performance evaluation. Finally, some research problems and
promising future directions are presented with discussions.
| no_new_dataset | 0.710879 |
1502.01827 | Guang-Tong Zhou | Guang-Tong Zhou, Sung Ju Hwang, Mark Schmidt, Leonid Sigal and Greg
Mori | Hierarchical Maximum-Margin Clustering | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a hierarchical maximum-margin clustering method for unsupervised
data analysis. Our method extends beyond flat maximum-margin clustering, and
performs clustering recursively in a top-down manner. We propose an effective
greedy splitting criteria for selecting which cluster to split next, and employ
regularizers that enforce feature sharing/competition for capturing data
semantics. Experimental results obtained on four standard datasets show that
our method outperforms flat and hierarchical clustering baselines, while
forming clean and semantically meaningful cluster hierarchies.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 08:37:55 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Zhou",
"Guang-Tong",
""
],
[
"Hwang",
"Sung Ju",
""
],
[
"Schmidt",
"Mark",
""
],
[
"Sigal",
"Leonid",
""
],
[
"Mori",
"Greg",
""
]
] | TITLE: Hierarchical Maximum-Margin Clustering
ABSTRACT: We present a hierarchical maximum-margin clustering method for unsupervised
data analysis. Our method extends beyond flat maximum-margin clustering, and
performs clustering recursively in a top-down manner. We propose an effective
greedy splitting criteria for selecting which cluster to split next, and employ
regularizers that enforce feature sharing/competition for capturing data
semantics. Experimental results obtained on four standard datasets show that
our method outperforms flat and hierarchical clustering baselines, while
forming clean and semantically meaningful cluster hierarchies.
| no_new_dataset | 0.71081 |
1502.01852 | Kaiming He | Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun | Delving Deep into Rectifiers: Surpassing Human-Level Performance on
ImageNet Classification | null | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rectified activation units (rectifiers) are essential for state-of-the-art
neural networks. In this work, we study rectifier neural networks for image
classification from two aspects. First, we propose a Parametric Rectified
Linear Unit (PReLU) that generalizes the traditional rectified unit. PReLU
improves model fitting with nearly zero extra computational cost and little
overfitting risk. Second, we derive a robust initialization method that
particularly considers the rectifier nonlinearities. This method enables us to
train extremely deep rectified models directly from scratch and to investigate
deeper or wider network architectures. Based on our PReLU networks
(PReLU-nets), we achieve 4.94% top-5 test error on the ImageNet 2012
classification dataset. This is a 26% relative improvement over the ILSVRC 2014
winner (GoogLeNet, 6.66%). To our knowledge, our result is the first to surpass
human-level performance (5.1%, Russakovsky et al.) on this visual recognition
challenge.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 10:44:00 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"He",
"Kaiming",
""
],
[
"Zhang",
"Xiangyu",
""
],
[
"Ren",
"Shaoqing",
""
],
[
"Sun",
"Jian",
""
]
] | TITLE: Delving Deep into Rectifiers: Surpassing Human-Level Performance on
ImageNet Classification
ABSTRACT: Rectified activation units (rectifiers) are essential for state-of-the-art
neural networks. In this work, we study rectifier neural networks for image
classification from two aspects. First, we propose a Parametric Rectified
Linear Unit (PReLU) that generalizes the traditional rectified unit. PReLU
improves model fitting with nearly zero extra computational cost and little
overfitting risk. Second, we derive a robust initialization method that
particularly considers the rectifier nonlinearities. This method enables us to
train extremely deep rectified models directly from scratch and to investigate
deeper or wider network architectures. Based on our PReLU networks
(PReLU-nets), we achieve 4.94% top-5 test error on the ImageNet 2012
classification dataset. This is a 26% relative improvement over the ILSVRC 2014
winner (GoogLeNet, 6.66%). To our knowledge, our result is the first to surpass
human-level performance (5.1%, Russakovsky et al.) on this visual recognition
challenge.
| no_new_dataset | 0.711619 |
1502.01972 | Michael Saint-Guillain | Michael Saint-Guillain, Yves Deville and Christine Solnon | A Multistage Stochastic Programming Approach to the Dynamic and
Stochastic VRPTW - Extended version | Extended version of the same-name study submitted for publication in
conference CPAIOR2015 | null | null | null | cs.AI cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a dynamic vehicle routing problem with time windows and
stochastic customers (DS-VRPTW), such that customers may request for services
as vehicles have already started their tours. To solve this problem, the goal
is to provide a decision rule for choosing, at each time step, the next action
to perform in light of known requests and probabilistic knowledge on requests
likelihood. We introduce a new decision rule, called Global Stochastic
Assessment (GSA) rule for the DS-VRPTW, and we compare it with existing
decision rules, such as MSA. In particular, we show that GSA fully integrates
nonanticipativity constraints so that it leads to better decisions in our
stochastic context. We describe a new heuristic approach for efficiently
approximating our GSA rule. We introduce a new waiting strategy. Experiments on
dynamic and stochastic benchmarks, which include instances of different degrees
of dynamism, show that not only our approach is competitive with
state-of-the-art methods, but also enables to compute meaningful offline
solutions to fully dynamic problems where absolutely no a priori customer
request is provided.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2015 18:11:09 GMT"
}
] | 2015-02-09T00:00:00 | [
[
"Saint-Guillain",
"Michael",
""
],
[
"Deville",
"Yves",
""
],
[
"Solnon",
"Christine",
""
]
] | TITLE: A Multistage Stochastic Programming Approach to the Dynamic and
Stochastic VRPTW - Extended version
ABSTRACT: We consider a dynamic vehicle routing problem with time windows and
stochastic customers (DS-VRPTW), such that customers may request for services
as vehicles have already started their tours. To solve this problem, the goal
is to provide a decision rule for choosing, at each time step, the next action
to perform in light of known requests and probabilistic knowledge on requests
likelihood. We introduce a new decision rule, called Global Stochastic
Assessment (GSA) rule for the DS-VRPTW, and we compare it with existing
decision rules, such as MSA. In particular, we show that GSA fully integrates
nonanticipativity constraints so that it leads to better decisions in our
stochastic context. We describe a new heuristic approach for efficiently
approximating our GSA rule. We introduce a new waiting strategy. Experiments on
dynamic and stochastic benchmarks, which include instances of different degrees
of dynamism, show that not only our approach is competitive with
state-of-the-art methods, but also enables to compute meaningful offline
solutions to fully dynamic problems where absolutely no a priori customer
request is provided.
| no_new_dataset | 0.707222 |
1403.6025 | Ruven Pillay | Emmanuel Bertin, Ruven Pillay, Chiara Marmo | Web-Based Visualization of Very Large Scientific Astronomy Imagery | Published in Astronomy & Computing. IIPImage server available from
http://iipimage.sourceforge.net . Visiomatic code and demos available from
http://www.visiomatic.org/ | Astronomy and Computing, vol. 10, pp. 43-53, Apr. 2015 | 10.1016/j.ascom.2014.12.006 | null | astro-ph.IM cs.CE cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visualizing and navigating through large astronomy images from a remote
location with current astronomy display tools can be a frustrating experience
in terms of speed and ergonomics, especially on mobile devices. In this paper,
we present a high performance, versatile and robust client-server system for
remote visualization and analysis of extremely large scientific images.
Applications of this work include survey image quality control, interactive
data query and exploration, citizen science, as well as public outreach. The
proposed software is entirely open source and is designed to be generic and
applicable to a variety of datasets. It provides access to floating point data
at terabyte scales, with the ability to precisely adjust image settings in
real-time. The proposed clients are light-weight, platform-independent web
applications built on standard HTML5 web technologies and compatible with both
touch and mouse-based devices. We put the system to the test and assess the
performance of the system and show that a single server can comfortably handle
more than a hundred simultaneous users accessing full precision 32 bit
astronomy data.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2014 16:24:57 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jan 2015 14:21:56 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Feb 2015 22:29:40 GMT"
},
{
"version": "v4",
"created": "Thu, 5 Feb 2015 10:40:31 GMT"
}
] | 2015-02-06T00:00:00 | [
[
"Bertin",
"Emmanuel",
""
],
[
"Pillay",
"Ruven",
""
],
[
"Marmo",
"Chiara",
""
]
] | TITLE: Web-Based Visualization of Very Large Scientific Astronomy Imagery
ABSTRACT: Visualizing and navigating through large astronomy images from a remote
location with current astronomy display tools can be a frustrating experience
in terms of speed and ergonomics, especially on mobile devices. In this paper,
we present a high performance, versatile and robust client-server system for
remote visualization and analysis of extremely large scientific images.
Applications of this work include survey image quality control, interactive
data query and exploration, citizen science, as well as public outreach. The
proposed software is entirely open source and is designed to be generic and
applicable to a variety of datasets. It provides access to floating point data
at terabyte scales, with the ability to precisely adjust image settings in
real-time. The proposed clients are light-weight, platform-independent web
applications built on standard HTML5 web technologies and compatible with both
touch and mouse-based devices. We put the system to the test and assess the
performance of the system and show that a single server can comfortably handle
more than a hundred simultaneous users accessing full precision 32 bit
astronomy data.
| no_new_dataset | 0.708364 |
1410.6973 | Anna Choromanska | Mariusz Bojarski, Anna Choromanska, Krzysztof Choromanski, Yann LeCun | Differentially- and non-differentially-private random decision trees | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider supervised learning with random decision trees, where the tree
construction is completely random. The method is popularly used and works well
in practice despite the simplicity of the setting, but its statistical
mechanism is not yet well-understood. In this paper we provide strong
theoretical guarantees regarding learning with random decision trees. We
analyze and compare three different variants of the algorithm that have minimal
memory requirements: majority voting, threshold averaging and probabilistic
averaging. The random structure of the tree enables us to adapt these methods
to a differentially-private setting thus we also propose differentially-private
versions of all three schemes. We give upper-bounds on the generalization error
and mathematically explain how the accuracy depends on the number of random
decision trees. Furthermore, we prove that only logarithmic (in the size of the
dataset) number of independently selected random decision trees suffice to
correctly classify most of the data, even when differential-privacy guarantees
must be maintained. We empirically show that majority voting and threshold
averaging give the best accuracy, also for conservative users requiring high
privacy guarantees. Furthermore, we demonstrate that a simple majority voting
rule is an especially good candidate for the differentially-private classifier
since it is much less sensitive to the choice of forest parameters than other
methods.
| [
{
"version": "v1",
"created": "Sun, 26 Oct 2014 00:16:16 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Feb 2015 20:48:11 GMT"
}
] | 2015-02-06T00:00:00 | [
[
"Bojarski",
"Mariusz",
""
],
[
"Choromanska",
"Anna",
""
],
[
"Choromanski",
"Krzysztof",
""
],
[
"LeCun",
"Yann",
""
]
] | TITLE: Differentially- and non-differentially-private random decision trees
ABSTRACT: We consider supervised learning with random decision trees, where the tree
construction is completely random. The method is popularly used and works well
in practice despite the simplicity of the setting, but its statistical
mechanism is not yet well-understood. In this paper we provide strong
theoretical guarantees regarding learning with random decision trees. We
analyze and compare three different variants of the algorithm that have minimal
memory requirements: majority voting, threshold averaging and probabilistic
averaging. The random structure of the tree enables us to adapt these methods
to a differentially-private setting thus we also propose differentially-private
versions of all three schemes. We give upper-bounds on the generalization error
and mathematically explain how the accuracy depends on the number of random
decision trees. Furthermore, we prove that only logarithmic (in the size of the
dataset) number of independently selected random decision trees suffice to
correctly classify most of the data, even when differential-privacy guarantees
must be maintained. We empirically show that majority voting and threshold
averaging give the best accuracy, also for conservative users requiring high
privacy guarantees. Furthermore, we demonstrate that a simple majority voting
rule is an especially good candidate for the differentially-private classifier
since it is much less sensitive to the choice of forest parameters than other
methods.
| no_new_dataset | 0.711606 |
1311.1266 | Diego Amancio | Diego R. Amancio and Osvaldo N. Oliveira Jr. and Luciano da F. Costa | Topological-collaborative approach for disambiguating authors' names in
collaborative networks | To appear in Scientometrics, 2014 | Scientometrics 102 (1), 465--485, 2015 | 10.1007/s11192-014-1381-9 | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Concepts and methods of complex networks have been employed to uncover
patterns in a myriad of complex systems. Unfortunately, the relevance and
significance of these patterns strongly depends on the reliability of the data
sets. In the study of collaboration networks, for instance, unavoidable noise
pervading author's collaboration datasets arises when authors share the same
name. To address this problem, we derive a hybrid approach based on authors'
collaboration patterns and on topological features of collaborative networks.
Our results show that the combination of strategies, in most cases, performs
better than the traditional approach which disregards topological features. We
also show that the main factor for improving the discriminability of homonymous
authors is the average distance between authors. Finally, we show that it is
possible to predict the weighting associated to each strategy compounding the
hybrid system by examining the discrimination obtained from the traditional
analysis of collaboration patterns. Once the methodology devised here is
generic, our approach is potentially useful to classify many other networked
systems governed by complex interactions.
| [
{
"version": "v1",
"created": "Wed, 6 Nov 2013 01:43:51 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jun 2014 16:01:45 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Amancio",
"Diego R.",
""
],
[
"Oliveira",
"Osvaldo N.",
"Jr."
],
[
"Costa",
"Luciano da F.",
""
]
] | TITLE: Topological-collaborative approach for disambiguating authors' names in
collaborative networks
ABSTRACT: Concepts and methods of complex networks have been employed to uncover
patterns in a myriad of complex systems. Unfortunately, the relevance and
significance of these patterns strongly depends on the reliability of the data
sets. In the study of collaboration networks, for instance, unavoidable noise
pervading author's collaboration datasets arises when authors share the same
name. To address this problem, we derive a hybrid approach based on authors'
collaboration patterns and on topological features of collaborative networks.
Our results show that the combination of strategies, in most cases, performs
better than the traditional approach which disregards topological features. We
also show that the main factor for improving the discriminability of homonymous
authors is the average distance between authors. Finally, we show that it is
possible to predict the weighting associated to each strategy compounding the
hybrid system by examining the discrimination obtained from the traditional
analysis of collaboration patterns. Once the methodology devised here is
generic, our approach is potentially useful to classify many other networked
systems governed by complex interactions.
| no_new_dataset | 0.709655 |
1403.2407 | Lorenzo Reyes | Andrey Bernstein (1), Lorenzo Reyes-Chamorro (2), Jean-Yves Le Boudec
(1) and Mario Paolone (2) ((1) Laboratory for Communications and Applications
2. \'Ecole Polytechnique F\'ed\'erale de Lausanne, (2) Distributed Electrical
Systems Laboratory. \'Ecole Polytechnique F\'ed\'erale de Lausanne) | A Composable Method for Real-Time Control of Active Distribution
Networks with Explicit Power Setpoints | 71 pages, 21 figures, 5 tables | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conventional approach for the control of distribution networks, in the
presence of active generation and/or controllable loads and storage, involves a
combination of both frequency and voltage regulation at different time scales.
With the increased penetration of stochastic resources, distributed generation
and demand response, this approach shows severe limitations in both the optimal
and feasible operation of these networks, as well as in the aggregation of the
network resources for upper-layer power systems. An alternative approach is to
directly control the targeted grid by defining explicit and real-time setpoints
for active/reactive power absorptions/injections defined by a solution of a
specific optimization problem; but this quickly becomes intractable when
systems get large or diverse. In this paper, we address this problem and
propose a method for the explicit control of the grid status, based on a common
abstract model characterized by the main property of being composable. That is
to say, subsystems can be aggregated into virtual devices that hide their
internal complexity. Thus the proposed method can easily cope with systems of
any size or complexity. The framework is presented in this Part I, whilst in
Part II we illustrate its application to a CIGR\'E low voltage benchmark
microgrid. In particular, we provide implementation examples with respect to
typical devices connected to distribution networks and evaluate of the
performance and benefits of the proposed control framework.
| [
{
"version": "v1",
"created": "Fri, 7 Mar 2014 13:08:54 GMT"
},
{
"version": "v2",
"created": "Tue, 6 May 2014 15:16:04 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Aug 2014 17:26:26 GMT"
},
{
"version": "v4",
"created": "Wed, 4 Feb 2015 00:09:54 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Bernstein",
"Andrey",
""
],
[
"Reyes-Chamorro",
"Lorenzo",
""
],
[
"Boudec",
"Jean-Yves Le",
""
],
[
"Paolone",
"Mario",
""
]
] | TITLE: A Composable Method for Real-Time Control of Active Distribution
Networks with Explicit Power Setpoints
ABSTRACT: The conventional approach for the control of distribution networks, in the
presence of active generation and/or controllable loads and storage, involves a
combination of both frequency and voltage regulation at different time scales.
With the increased penetration of stochastic resources, distributed generation
and demand response, this approach shows severe limitations in both the optimal
and feasible operation of these networks, as well as in the aggregation of the
network resources for upper-layer power systems. An alternative approach is to
directly control the targeted grid by defining explicit and real-time setpoints
for active/reactive power absorptions/injections defined by a solution of a
specific optimization problem; but this quickly becomes intractable when
systems get large or diverse. In this paper, we address this problem and
propose a method for the explicit control of the grid status, based on a common
abstract model characterized by the main property of being composable. That is
to say, subsystems can be aggregated into virtual devices that hide their
internal complexity. Thus the proposed method can easily cope with systems of
any size or complexity. The framework is presented in this Part I, whilst in
Part II we illustrate its application to a CIGR\'E low voltage benchmark
microgrid. In particular, we provide implementation examples with respect to
typical devices connected to distribution networks and evaluate of the
performance and benefits of the proposed control framework.
| no_new_dataset | 0.707209 |
1501.03396 | Davide Fransos | Luca Bruno and Davide Fransos | Sand transverse dune aerodynamics: 3D Coherent Flow Structures from a
computational study | null | null | null | null | physics.flu-dyn cs.CE physics.ao-ph physics.geo-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The engineering interest about dune fields is dictated by the their
interaction with a number of human infrastructures in arid environments. Sand
dunes dynamics is dictated by wind and its ability to induce sand erosion,
transport and deposition. A deep understanding of dune aerodynamics serves then
to ground effective strategies for the protection of human infrastructures from
sand, the so-called sand mitigation. Because of their simple geometry and their
frequent occurrence in desert area, transverse sand dunes are usually adopted
in literature as a benchmark to investigate dune aerodynamics by means of both
computational or experimental approaches, usually in nominally 2D setups. The
present study aims at evaluating 3D flow features in the wake of a idealised
transverse dune, if any, under different nominally 2D setup conditions by means
of computational simulations and to compare the obtained results with
experimental measurements available in literature.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2015 13:31:40 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2015 12:03:15 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Bruno",
"Luca",
""
],
[
"Fransos",
"Davide",
""
]
] | TITLE: Sand transverse dune aerodynamics: 3D Coherent Flow Structures from a
computational study
ABSTRACT: The engineering interest about dune fields is dictated by the their
interaction with a number of human infrastructures in arid environments. Sand
dunes dynamics is dictated by wind and its ability to induce sand erosion,
transport and deposition. A deep understanding of dune aerodynamics serves then
to ground effective strategies for the protection of human infrastructures from
sand, the so-called sand mitigation. Because of their simple geometry and their
frequent occurrence in desert area, transverse sand dunes are usually adopted
in literature as a benchmark to investigate dune aerodynamics by means of both
computational or experimental approaches, usually in nominally 2D setups. The
present study aims at evaluating 3D flow features in the wake of a idealised
transverse dune, if any, under different nominally 2D setup conditions by means
of computational simulations and to compare the obtained results with
experimental measurements available in literature.
| no_new_dataset | 0.709453 |
1502.00254 | Ravi Kiran Sarvadevabhatla | Ravi Kiran Sarvadevabhatla and R. Venkatesh Babu | Freehand Sketch Recognition Using Deep Features | Submitted to ICIP-2015, 5 pages. Removed an erroneous claim regarding
a work cited in the paper | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Freehand sketches often contain sparse visual detail. In spite of the
sparsity, they are easily and consistently recognized by humans across
cultures, languages and age groups. Therefore, analyzing such sparse sketches
can aid our understanding of the neuro-cognitive processes involved in visual
representation and recognition. In the recent past, Convolutional Neural
Networks (CNNs) have emerged as a powerful framework for feature representation
and recognition for a variety of image domains. However, the domain of sketch
images has not been explored. This paper introduces a freehand sketch
recognition framework based on "deep" features extracted from CNNs. We use two
popular CNNs for our experiments -- Imagenet CNN and a modified version of
LeNet CNN. We evaluate our recognition framework on a publicly available
benchmark database containing thousands of freehand sketches depicting everyday
objects. Our results are an improvement over the existing state-of-the-art
accuracies by 3% - 11%. The effectiveness and relative compactness of our deep
features also make them an ideal candidate for related problems such as
sketch-based image retrieval. In addition, we provide a preliminary glimpse of
how such features can help identify crucial attributes (e.g. object-parts) of
the sketched objects.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2015 13:35:44 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2015 14:41:15 GMT"
}
] | 2015-02-05T00:00:00 | [
[
"Sarvadevabhatla",
"Ravi Kiran",
""
],
[
"Babu",
"R. Venkatesh",
""
]
] | TITLE: Freehand Sketch Recognition Using Deep Features
ABSTRACT: Freehand sketches often contain sparse visual detail. In spite of the
sparsity, they are easily and consistently recognized by humans across
cultures, languages and age groups. Therefore, analyzing such sparse sketches
can aid our understanding of the neuro-cognitive processes involved in visual
representation and recognition. In the recent past, Convolutional Neural
Networks (CNNs) have emerged as a powerful framework for feature representation
and recognition for a variety of image domains. However, the domain of sketch
images has not been explored. This paper introduces a freehand sketch
recognition framework based on "deep" features extracted from CNNs. We use two
popular CNNs for our experiments -- Imagenet CNN and a modified version of
LeNet CNN. We evaluate our recognition framework on a publicly available
benchmark database containing thousands of freehand sketches depicting everyday
objects. Our results are an improvement over the existing state-of-the-art
accuracies by 3% - 11%. The effectiveness and relative compactness of our deep
features also make them an ideal candidate for related problems such as
sketch-based image retrieval. In addition, we provide a preliminary glimpse of
how such features can help identify crucial attributes (e.g. object-parts) of
the sketched objects.
| no_new_dataset | 0.709252 |
1305.0194 | Chantal Cherifi | Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean-Fran\c{c}ois
Santucci | MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation | null | In International Conference on Networked Digital Technologies,
Springer CCIS 136),China (2011) | 10.1007/978-3-642-22185-9_27 | null | cs.SE cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many recent works aim at developing methods and tools for the processing of
semantic Web services. In order to be properly tested, these tools must be
applied to an appropriate benchmark, taking the form of a collection of
semantic WS descriptions. However, all of the existing publicly available
collections are limited by their size or their realism (use of randomly
generated or resampled descriptions). Larger and realistic syntactic (WSDL)
collections exist, but their semantic annotation requires a certain level of
automation, due to the number of operations to be processed. In this article,
we propose a fully automatic method to semantically annotate such large WS
collections. Our approach is multimodal, in the sense it takes advantage of the
latent semantics present not only in the parameter names, but also in the type
names and structures. Concept-to-word association is performed by using Sigma,
a mapping of WordNet to the SUMO ontology. After having described in details
our annotation method, we apply it to the larger collection of real-world
syntactic WS descriptions we could find, and assess its efficiency.
| [
{
"version": "v1",
"created": "Wed, 1 May 2013 15:07:18 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Aksoy",
"Cihan",
""
],
[
"Labatut",
"Vincent",
""
],
[
"Cherifi",
"Chantal",
""
],
[
"Santucci",
"Jean-François",
""
]
] | TITLE: MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation
ABSTRACT: Many recent works aim at developing methods and tools for the processing of
semantic Web services. In order to be properly tested, these tools must be
applied to an appropriate benchmark, taking the form of a collection of
semantic WS descriptions. However, all of the existing publicly available
collections are limited by their size or their realism (use of randomly
generated or resampled descriptions). Larger and realistic syntactic (WSDL)
collections exist, but their semantic annotation requires a certain level of
automation, due to the number of operations to be processed. In this article,
we propose a fully automatic method to semantically annotate such large WS
collections. Our approach is multimodal, in the sense it takes advantage of the
latent semantics present not only in the parameter names, but also in the type
names and structures. Concept-to-word association is performed by using Sigma,
a mapping of WordNet to the SUMO ontology. After having described in details
our annotation method, we apply it to the larger collection of real-world
syntactic WS descriptions we could find, and assess its efficiency.
| no_new_dataset | 0.709384 |
1502.00652 | Lubor Ladicky | \v{L}ubor Ladick\'y, Christian H\"ane and Marc Pollefeys | Learning the Matching Function | rejected from ACCV 2014 and probably from CVPR 2015 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The matching function for the problem of stereo reconstruction or optical
flow has been traditionally designed as a function of the distance between the
features describing matched pixels. This approach works under assumption, that
the appearance of pixels in two stereo cameras or in two consecutive video
frames does not change dramatically. However, this might not be the case, if we
try to match pixels over a large interval of time.
In this paper we propose a method, which learns the matching function, that
automatically finds the space of allowed changes in visual appearance, such as
due to the motion blur, chromatic distortions, different colour calibration or
seasonal changes. Furthermore, it automatically learns the importance of
matching scores of contextual features at different relative locations and
scales. Proposed classifier gives reliable estimations of pixel disparities
already without any form of regularization.
We evaluated our method on two standard problems - stereo matching on KITTI
outdoor dataset, optical flow on Sintel data set, and on newly introduced
TimeLapse change detection dataset. Our algorithm obtained very promising
results comparable to the state-of-the-art.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2015 21:20:43 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Ladický",
"Ľubor",
""
],
[
"Häne",
"Christian",
""
],
[
"Pollefeys",
"Marc",
""
]
] | TITLE: Learning the Matching Function
ABSTRACT: The matching function for the problem of stereo reconstruction or optical
flow has been traditionally designed as a function of the distance between the
features describing matched pixels. This approach works under assumption, that
the appearance of pixels in two stereo cameras or in two consecutive video
frames does not change dramatically. However, this might not be the case, if we
try to match pixels over a large interval of time.
In this paper we propose a method, which learns the matching function, that
automatically finds the space of allowed changes in visual appearance, such as
due to the motion blur, chromatic distortions, different colour calibration or
seasonal changes. Furthermore, it automatically learns the importance of
matching scores of contextual features at different relative locations and
scales. Proposed classifier gives reliable estimations of pixel disparities
already without any form of regularization.
We evaluated our method on two standard problems - stereo matching on KITTI
outdoor dataset, optical flow on Sintel data set, and on newly introduced
TimeLapse change detection dataset. Our algorithm obtained very promising
results comparable to the state-of-the-art.
| no_new_dataset | 0.691211 |
1502.00712 | Liang Lin | Zhanglin Peng, Liang Lin, Ruimao Zhang, Jing Xu | Deep Boosting: Layered Feature Mining for General Image Classification | 6 pages, 4 figures, ICME 2014 | Multimedia and Expo (ICME), 2014 IEEE International Conference on
, vol., no., pp.1,6, 14-18 July 2014 | 10.1109/ICME.2014.6890323 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing effective representations is a critical but challenging problem
in multimedia understanding. The traditional handcraft features often rely on
domain knowledge, limiting the performances of exiting methods. This paper
discusses a novel computational architecture for general image feature mining,
which assembles the primitive filters (i.e. Gabor wavelets) into compositional
features in a layer-wise manner. In each layer, we produce a number of base
classifiers (i.e. regression stumps) associated with the generated features,
and discover informative compositions by using the boosting algorithm. The
output compositional features of each layer are treated as the base components
to build up the next layer. Our framework is able to generate expressive image
representations while inducing very discriminate functions for image
classification. The experiments are conducted on several public datasets, and
we demonstrate superior performances over state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 02:44:10 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Peng",
"Zhanglin",
""
],
[
"Lin",
"Liang",
""
],
[
"Zhang",
"Ruimao",
""
],
[
"Xu",
"Jing",
""
]
] | TITLE: Deep Boosting: Layered Feature Mining for General Image Classification
ABSTRACT: Constructing effective representations is a critical but challenging problem
in multimedia understanding. The traditional handcraft features often rely on
domain knowledge, limiting the performances of exiting methods. This paper
discusses a novel computational architecture for general image feature mining,
which assembles the primitive filters (i.e. Gabor wavelets) into compositional
features in a layer-wise manner. In each layer, we produce a number of base
classifiers (i.e. regression stumps) associated with the generated features,
and discover informative compositions by using the boosting algorithm. The
output compositional features of each layer are treated as the base components
to build up the next layer. Our framework is able to generate expressive image
representations while inducing very discriminate functions for image
classification. The experiments are conducted on several public datasets, and
we demonstrate superior performances over state-of-the-art approaches.
| no_new_dataset | 0.710415 |
1502.00717 | Hongyuan Zhu | Hongyuan Zhu, Fanman Meng, Jianfei Cai, Shijian Lu | Beyond Pixels: A Comprehensive Survey from Bottom-up to Semantic Image
Segmentation and Cosegmentation | submitted to Elsevier Journal of Visual Communications and Image
Representation | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Image segmentation refers to the process to divide an image into
nonoverlapping meaningful regions according to human perception, which has
become a classic topic since the early ages of computer vision. A lot of
research has been conducted and has resulted in many applications. However,
while many segmentation algorithms exist, yet there are only a few sparse and
outdated summarizations available, an overview of the recent achievements and
issues is lacking. We aim to provide a comprehensive review of the recent
progress in this field. Covering 180 publications, we give an overview of broad
areas of segmentation topics including not only the classic bottom-up
approaches, but also the recent development in superpixel, interactive methods,
object proposals, semantic image parsing and image cosegmentation. In addition,
we also review the existing influential datasets and evaluation metrics.
Finally, we suggest some design flavors and research directions for future
research in image segmentation.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 03:00:52 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Zhu",
"Hongyuan",
""
],
[
"Meng",
"Fanman",
""
],
[
"Cai",
"Jianfei",
""
],
[
"Lu",
"Shijian",
""
]
] | TITLE: Beyond Pixels: A Comprehensive Survey from Bottom-up to Semantic Image
Segmentation and Cosegmentation
ABSTRACT: Image segmentation refers to the process to divide an image into
nonoverlapping meaningful regions according to human perception, which has
become a classic topic since the early ages of computer vision. A lot of
research has been conducted and has resulted in many applications. However,
while many segmentation algorithms exist, yet there are only a few sparse and
outdated summarizations available, an overview of the recent achievements and
issues is lacking. We aim to provide a comprehensive review of the recent
progress in this field. Covering 180 publications, we give an overview of broad
areas of segmentation topics including not only the classic bottom-up
approaches, but also the recent development in superpixel, interactive methods,
object proposals, semantic image parsing and image cosegmentation. In addition,
we also review the existing influential datasets and evaluation metrics.
Finally, we suggest some design flavors and research directions for future
research in image segmentation.
| no_new_dataset | 0.709202 |
1502.00725 | Hongwei Li | Hongwei Li and Qiang Liu | Cheaper and Better: Selecting Good Workers for Crowdsourcing | null | null | null | null | stat.ML cs.AI cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crowdsourcing provides a popular paradigm for data collection at scale. We
study the problem of selecting subsets of workers from a given worker pool to
maximize the accuracy under a budget constraint. One natural question is
whether we should hire as many workers as the budget allows, or restrict on a
small number of top-quality workers. By theoretically analyzing the error rate
of a typical setting in crowdsourcing, we frame the worker selection problem
into a combinatorial optimization problem and propose an algorithm to solve it
efficiently. Empirical results on both simulated and real-world datasets show
that our algorithm is able to select a small number of high-quality workers,
and performs as good as, sometimes even better than, the much larger crowds as
the budget allows.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 03:45:48 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Li",
"Hongwei",
""
],
[
"Liu",
"Qiang",
""
]
] | TITLE: Cheaper and Better: Selecting Good Workers for Crowdsourcing
ABSTRACT: Crowdsourcing provides a popular paradigm for data collection at scale. We
study the problem of selecting subsets of workers from a given worker pool to
maximize the accuracy under a budget constraint. One natural question is
whether we should hire as many workers as the budget allows, or restrict on a
small number of top-quality workers. By theoretically analyzing the error rate
of a typical setting in crowdsourcing, we frame the worker selection problem
into a combinatorial optimization problem and propose an algorithm to solve it
efficiently. Empirical results on both simulated and real-world datasets show
that our algorithm is able to select a small number of high-quality workers,
and performs as good as, sometimes even better than, the much larger crowds as
the budget allows.
| no_new_dataset | 0.711994 |
1502.00739 | Liang Lin | Wei Yang, Ping Luo, Liang Lin | Clothing Co-Parsing by Joint Image Segmentation and Labeling | 8 pages, 5 figures, CVPR 2014 | Computer Vision and Pattern Recognition (CVPR), 2014 IEEE
Conference on , vol., no., pp.3182,3189, 23-28 June 2014 | 10.1109/CVPR.2014.407 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper aims at developing an integrated system of clothing co-parsing, in
order to jointly parse a set of clothing images (unsegmented but annotated with
tags) into semantic configurations. We propose a data-driven framework
consisting of two phases of inference. The first phase, referred as "image
co-segmentation", iterates to extract consistent regions on images and jointly
refines the regions over all images by employing the exemplar-SVM (E-SVM)
technique [23]. In the second phase (i.e. "region co-labeling"), we construct a
multi-image graphical model by taking the segmented regions as vertices, and
incorporate several contexts of clothing configuration (e.g., item location and
mutual interactions). The joint label assignment can be solved using the
efficient Graph Cuts algorithm. In addition to evaluate our framework on the
Fashionista dataset [30], we construct a dataset called CCP consisting of 2098
high-resolution street fashion photos to demonstrate the performance of our
system. We achieve 90.29% / 88.23% segmentation accuracy and 65.52% / 63.89%
recognition rate on the Fashionista and the CCP datasets, respectively, which
are superior compared with state-of-the-art methods.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 04:59:41 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Yang",
"Wei",
""
],
[
"Luo",
"Ping",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Clothing Co-Parsing by Joint Image Segmentation and Labeling
ABSTRACT: This paper aims at developing an integrated system of clothing co-parsing, in
order to jointly parse a set of clothing images (unsegmented but annotated with
tags) into semantic configurations. We propose a data-driven framework
consisting of two phases of inference. The first phase, referred as "image
co-segmentation", iterates to extract consistent regions on images and jointly
refines the regions over all images by employing the exemplar-SVM (E-SVM)
technique [23]. In the second phase (i.e. "region co-labeling"), we construct a
multi-image graphical model by taking the segmented regions as vertices, and
incorporate several contexts of clothing configuration (e.g., item location and
mutual interactions). The joint label assignment can be solved using the
efficient Graph Cuts algorithm. In addition to evaluate our framework on the
Fashionista dataset [30], we construct a dataset called CCP consisting of 2098
high-resolution street fashion photos to demonstrate the performance of our
system. We achieve 90.29% / 88.23% segmentation accuracy and 65.52% / 63.89%
recognition rate on the Fashionista and the CCP datasets, respectively, which
are superior compared with state-of-the-art methods.
| new_dataset | 0.713656 |
1502.00750 | Liang Lin | Xiaodan Liang, Qingxing Cao, Rui Huang, Liang Lin | Recognizing Focal Liver Lesions in Contrast-Enhanced Ultrasound with
Discriminatively Trained Spatio-Temporal Model | 5 pages, 1 figures | Biomedical Imaging (ISBI), 2014 IEEE 11th International Symposium
on , vol., no., pp.1184-1187, April 2014 | 10.1109/ISBI.2014.6868087 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this study is to provide an automatic computational framework to
assist clinicians in diagnosing Focal Liver Lesions (FLLs) in
Contrast-Enhancement Ultrasound (CEUS). We represent FLLs in a CEUS video clip
as an ensemble of Region-of-Interests (ROIs), whose locations are modeled as
latent variables in a discriminative model. Different types of FLLs are
characterized by both spatial and temporal enhancement patterns of the ROIs.
The model is learned by iteratively inferring the optimal ROI locations and
optimizing the model parameters. To efficiently search the optimal spatial and
temporal locations of the ROIs, we propose a data-driven inference algorithm by
combining effective spatial and temporal pruning. The experiments show that our
method achieves promising results on the largest dataset in the literature (to
the best of our knowledge), which we have made publicly available.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2015 06:14:30 GMT"
}
] | 2015-02-04T00:00:00 | [
[
"Liang",
"Xiaodan",
""
],
[
"Cao",
"Qingxing",
""
],
[
"Huang",
"Rui",
""
],
[
"Lin",
"Liang",
""
]
] | TITLE: Recognizing Focal Liver Lesions in Contrast-Enhanced Ultrasound with
Discriminatively Trained Spatio-Temporal Model
ABSTRACT: The aim of this study is to provide an automatic computational framework to
assist clinicians in diagnosing Focal Liver Lesions (FLLs) in
Contrast-Enhancement Ultrasound (CEUS). We represent FLLs in a CEUS video clip
as an ensemble of Region-of-Interests (ROIs), whose locations are modeled as
latent variables in a discriminative model. Different types of FLLs are
characterized by both spatial and temporal enhancement patterns of the ROIs.
The model is learned by iteratively inferring the optimal ROI locations and
optimizing the model parameters. To efficiently search the optimal spatial and
temporal locations of the ROIs, we propose a data-driven inference algorithm by
combining effective spatial and temporal pruning. The experiments show that our
method achieves promising results on the largest dataset in the literature (to
the best of our knowledge), which we have made publicly available.
| no_new_dataset | 0.710409 |
1403.0388 | Mohammadzaman Zamani | Mohammadzaman Zamani, Hamid Beigy, and Amirreza Shaban | Cascading Randomized Weighted Majority: A New Online Ensemble Learning
Algorithm | 15 pages, 3 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasing volume of data in the world, the best approach for
learning from this data is to exploit an online learning algorithm. Online
ensemble methods are online algorithms which take advantage of an ensemble of
classifiers to predict labels of data. Prediction with expert advice is a
well-studied problem in the online ensemble learning literature. The Weighted
Majority algorithm and the randomized weighted majority (RWM) are the most
well-known solutions to this problem, aiming to converge to the best expert.
Since among some expert, the best one does not necessarily have the minimum
error in all regions of data space, defining specific regions and converging to
the best expert in each of these regions will lead to a better result. In this
paper, we aim to resolve this defect of RWM algorithms by proposing a novel
online ensemble algorithm to the problem of prediction with expert advice. We
propose a cascading version of RWM to achieve not only better experimental
results but also a better error bound for sufficiently large datasets.
| [
{
"version": "v1",
"created": "Mon, 3 Mar 2014 11:05:10 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Dec 2014 17:57:03 GMT"
},
{
"version": "v3",
"created": "Sun, 4 Jan 2015 03:01:38 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Feb 2015 17:18:43 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zamani",
"Mohammadzaman",
""
],
[
"Beigy",
"Hamid",
""
],
[
"Shaban",
"Amirreza",
""
]
] | TITLE: Cascading Randomized Weighted Majority: A New Online Ensemble Learning
Algorithm
ABSTRACT: With the increasing volume of data in the world, the best approach for
learning from this data is to exploit an online learning algorithm. Online
ensemble methods are online algorithms which take advantage of an ensemble of
classifiers to predict labels of data. Prediction with expert advice is a
well-studied problem in the online ensemble learning literature. The Weighted
Majority algorithm and the randomized weighted majority (RWM) are the most
well-known solutions to this problem, aiming to converge to the best expert.
Since among some expert, the best one does not necessarily have the minimum
error in all regions of data space, defining specific regions and converging to
the best expert in each of these regions will lead to a better result. In this
paper, we aim to resolve this defect of RWM algorithms by proposing a novel
online ensemble algorithm to the problem of prediction with expert advice. We
propose a cascading version of RWM to achieve not only better experimental
results but also a better error bound for sufficiently large datasets.
| no_new_dataset | 0.710653 |
1408.4910 | Kai Zhao | Kai Zhao, Mirco Musolesi, Pan Hui, Weixiong Rao and Sasu Tarkoma | Explaining the Power-law Distribution of Human Mobility Through
Transportation Modality Decomposition | null | null | null | null | physics.soc-ph cs.SI physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human mobility has been empirically observed to exhibit Levy flight
characteristics and behaviour with power-law distributed jump size. The
fundamental mechanisms behind this behaviour has not yet been fully explained.
In this paper, we analyze urban human mobility and we propose to explain the
Levy walk behaviour observed in human mobility patterns by decomposing them
into different classes according to the different transportation modes, such as
Walk/Run, Bicycle, Train/Subway or Car/Taxi/Bus. Our analysis is based on two
real-life GPS datasets containing approximately 10 and 20 million GPS samples
with transportation mode information. We show that human mobility can be
modelled as a mixture of different transportation modes, and that these single
movement patterns can be approximated by a lognormal distribution rather than a
power-law distribution. Then, we demonstrate that the mixture of the decomposed
lognormal flight distributions associated with each modality is a power-law
distribution, providing an explanation to the emergence of Levy Walk patterns
that characterize human mobility patterns.
| [
{
"version": "v1",
"created": "Thu, 21 Aug 2014 08:19:19 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Sep 2014 09:23:48 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Feb 2015 08:30:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Zhao",
"Kai",
""
],
[
"Musolesi",
"Mirco",
""
],
[
"Hui",
"Pan",
""
],
[
"Rao",
"Weixiong",
""
],
[
"Tarkoma",
"Sasu",
""
]
] | TITLE: Explaining the Power-law Distribution of Human Mobility Through
Transportation Modality Decomposition
ABSTRACT: Human mobility has been empirically observed to exhibit Levy flight
characteristics and behaviour with power-law distributed jump size. The
fundamental mechanisms behind this behaviour has not yet been fully explained.
In this paper, we analyze urban human mobility and we propose to explain the
Levy walk behaviour observed in human mobility patterns by decomposing them
into different classes according to the different transportation modes, such as
Walk/Run, Bicycle, Train/Subway or Car/Taxi/Bus. Our analysis is based on two
real-life GPS datasets containing approximately 10 and 20 million GPS samples
with transportation mode information. We show that human mobility can be
modelled as a mixture of different transportation modes, and that these single
movement patterns can be approximated by a lognormal distribution rather than a
power-law distribution. Then, we demonstrate that the mixture of the decomposed
lognormal flight distributions associated with each modality is a power-law
distribution, providing an explanation to the emergence of Levy Walk patterns
that characterize human mobility patterns.
| no_new_dataset | 0.710434 |
1501.07093 | Mallenahalli Naresh Kumar Prof. Dr. | V. Sree Hari Rao and M. Naresh Kumar | Novel Approaches for Predicting Risk Factors of Atherosclerosis | 7 pages, 2 figures | Biomedical and Health Informatics, IEEE Journal of , vol.17, no.1,
pp.183,189, Jan. 2013 | 10.1109/TITB.2012.2227271 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coronary heart disease (CHD) caused by hardening of artery walls due to
cholesterol known as atherosclerosis is responsible for large number of deaths
world-wide. The disease progression is slow, asymptomatic and may lead to
sudden cardiac arrest, stroke or myocardial infraction. Presently, imaging
techniques are being employed to understand the molecular and metabolic
activity of atherosclerotic plaques to estimate the risk. Though imaging
methods are able to provide some information on plaque metabolism they lack the
required resolution and sensitivity for detection. In this paper we consider
the clinical observations and habits of individuals for predicting the risk
factors of CHD. The identification of risk factors helps in stratifying
patients for further intensive tests such as nuclear imaging or coronary
angiography. We present a novel approach for predicting the risk factors of
atherosclerosis with an in-built imputation algorithm and particle swarm
optimization (PSO). We compare the performance of our methodology with other
machine learning techniques on STULONG dataset which is based on longitudinal
study of middle aged individuals lasting for twenty years. Our methodology
powered by PSO search has identified physical inactivity as one of the risk
factor for the onset of atherosclerosis in addition to other already known
factors. The decision rules extracted by our methodology are able to predict
the risk factors with an accuracy of $99.73%$ which is higher than the
accuracies obtained by application of the state-of-the-art machine learning
techniques presently being employed in the identification of atherosclerosis
risk studies.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2015 13:26:02 GMT"
},
{
"version": "v2",
"created": "Sat, 31 Jan 2015 03:22:15 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Rao",
"V. Sree Hari",
""
],
[
"Kumar",
"M. Naresh",
""
]
] | TITLE: Novel Approaches for Predicting Risk Factors of Atherosclerosis
ABSTRACT: Coronary heart disease (CHD) caused by hardening of artery walls due to
cholesterol known as atherosclerosis is responsible for large number of deaths
world-wide. The disease progression is slow, asymptomatic and may lead to
sudden cardiac arrest, stroke or myocardial infraction. Presently, imaging
techniques are being employed to understand the molecular and metabolic
activity of atherosclerotic plaques to estimate the risk. Though imaging
methods are able to provide some information on plaque metabolism they lack the
required resolution and sensitivity for detection. In this paper we consider
the clinical observations and habits of individuals for predicting the risk
factors of CHD. The identification of risk factors helps in stratifying
patients for further intensive tests such as nuclear imaging or coronary
angiography. We present a novel approach for predicting the risk factors of
atherosclerosis with an in-built imputation algorithm and particle swarm
optimization (PSO). We compare the performance of our methodology with other
machine learning techniques on STULONG dataset which is based on longitudinal
study of middle aged individuals lasting for twenty years. Our methodology
powered by PSO search has identified physical inactivity as one of the risk
factor for the onset of atherosclerosis in addition to other already known
factors. The decision rules extracted by our methodology are able to predict
the risk factors with an accuracy of $99.73%$ which is higher than the
accuracies obtained by application of the state-of-the-art machine learning
techniques presently being employed in the identification of atherosclerosis
risk studies.
| no_new_dataset | 0.708408 |
1502.00030 | Sravanthi Bondugula | Sravanthi Bondugula, Varun Manjunatha, Larry S. Davis, David Doermann | SHOE: Supervised Hashing with Output Embeddings | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a supervised binary encoding scheme for image retrieval that
learns projections by taking into account similarity between classes obtained
from output embeddings. Our motivation is that binary hash codes learned in
this way improve both the visual quality of retrieval results and existing
supervised hashing schemes. We employ a sequential greedy optimization that
learns relationship aware projections by minimizing the difference between
inner products of binary codes and output embedding vectors. We develop a joint
optimization framework to learn projections which improve the accuracy of
supervised hashing over the current state of the art with respect to standard
and sibling evaluation metrics. We further boost performance by applying the
supervised dimensionality reduction technique on kernelized input CNN features.
Experiments are performed on three datasets: CUB-2011, SUN-Attribute and
ImageNet ILSVRC 2010. As a by-product of our method, we show that using a
simple k-nn pooling classifier with our discriminative codes improves over the
complex classification models on fine grained datasets like CUB and offer an
impressive compression ratio of 1024 on CNN features.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2015 22:04:12 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Bondugula",
"Sravanthi",
""
],
[
"Manjunatha",
"Varun",
""
],
[
"Davis",
"Larry S.",
""
],
[
"Doermann",
"David",
""
]
] | TITLE: SHOE: Supervised Hashing with Output Embeddings
ABSTRACT: We present a supervised binary encoding scheme for image retrieval that
learns projections by taking into account similarity between classes obtained
from output embeddings. Our motivation is that binary hash codes learned in
this way improve both the visual quality of retrieval results and existing
supervised hashing schemes. We employ a sequential greedy optimization that
learns relationship aware projections by minimizing the difference between
inner products of binary codes and output embedding vectors. We develop a joint
optimization framework to learn projections which improve the accuracy of
supervised hashing over the current state of the art with respect to standard
and sibling evaluation metrics. We further boost performance by applying the
supervised dimensionality reduction technique on kernelized input CNN features.
Experiments are performed on three datasets: CUB-2011, SUN-Attribute and
ImageNet ILSVRC 2010. As a by-product of our method, we show that using a
simple k-nn pooling classifier with our discriminative codes improves over the
complex classification models on fine grained datasets like CUB and offer an
impressive compression ratio of 1024 on CNN features.
| no_new_dataset | 0.708635 |
1502.00046 | Davis King | Davis E. King | Max-Margin Object Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most object detection methods operate by applying a binary classifier to
sub-windows of an image, followed by a non-maximum suppression step where
detections on overlapping sub-windows are removed. Since the number of possible
sub-windows in even moderately sized image datasets is extremely large, the
classifier is typically learned from only a subset of the windows. This avoids
the computational difficulty of dealing with the entire set of sub-windows,
however, as we will show in this paper, it leads to sub-optimal detector
performance.
In particular, the main contribution of this paper is the introduction of a
new method, Max-Margin Object Detection (MMOD), for learning to detect objects
in images. This method does not perform any sub-sampling, but instead optimizes
over all sub-windows. MMOD can be used to improve any object detection method
which is linear in the learned parameters, such as HOG or bag-of-visual-word
models. Using this approach we show substantial performance gains on three
publicly available datasets. Strikingly, we show that a single rigid HOG filter
can outperform a state-of-the-art deformable part model on the Face Detection
Data Set and Benchmark when the HOG filter is learned via MMOD.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 00:32:34 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"King",
"Davis E.",
""
]
] | TITLE: Max-Margin Object Detection
ABSTRACT: Most object detection methods operate by applying a binary classifier to
sub-windows of an image, followed by a non-maximum suppression step where
detections on overlapping sub-windows are removed. Since the number of possible
sub-windows in even moderately sized image datasets is extremely large, the
classifier is typically learned from only a subset of the windows. This avoids
the computational difficulty of dealing with the entire set of sub-windows,
however, as we will show in this paper, it leads to sub-optimal detector
performance.
In particular, the main contribution of this paper is the introduction of a
new method, Max-Margin Object Detection (MMOD), for learning to detect objects
in images. This method does not perform any sub-sampling, but instead optimizes
over all sub-windows. MMOD can be used to improve any object detection method
which is linear in the learned parameters, such as HOG or bag-of-visual-word
models. Using this approach we show substantial performance gains on three
publicly available datasets. Strikingly, we show that a single rigid HOG filter
can outperform a state-of-the-art deformable part model on the Face Detection
Data Set and Benchmark when the HOG filter is learned via MMOD.
| no_new_dataset | 0.709189 |
1502.00093 | Sotetsu Koyamada | Sotetsu Koyamada and Yumi Shikauchi and Ken Nakae and Masanori Koyama
and Shin Ishii | Deep learning of fMRI big data: a novel approach to subject-transfer
decoding | null | null | null | null | stat.ML cs.LG q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a technology to read brain states from measurable brain activities, brain
decoding are widely applied in industries and medical sciences. In spite of
high demands in these applications for a universal decoder that can be applied
to all individuals simultaneously, large variation in brain activities across
individuals has limited the scope of many studies to the development of
individual-specific decoders. In this study, we used deep neural network (DNN),
a nonlinear hierarchical model, to construct a subject-transfer decoder. Our
decoder is the first successful DNN-based subject-transfer decoder. When
applied to a large-scale functional magnetic resonance imaging (fMRI) database,
our DNN-based decoder achieved higher decoding accuracy than other baseline
methods, including support vector machine (SVM). In order to analyze the
knowledge acquired by this decoder, we applied principal sensitivity analysis
(PSA) to the decoder and visualized the discriminative features that are common
to all subjects in the dataset. Our PSA successfully visualized the
subject-independent features contributing to the subject-transferability of the
trained decoder.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2015 11:58:26 GMT"
}
] | 2015-02-03T00:00:00 | [
[
"Koyamada",
"Sotetsu",
""
],
[
"Shikauchi",
"Yumi",
""
],
[
"Nakae",
"Ken",
""
],
[
"Koyama",
"Masanori",
""
],
[
"Ishii",
"Shin",
""
]
] | TITLE: Deep learning of fMRI big data: a novel approach to subject-transfer
decoding
ABSTRACT: As a technology to read brain states from measurable brain activities, brain
decoding are widely applied in industries and medical sciences. In spite of
high demands in these applications for a universal decoder that can be applied
to all individuals simultaneously, large variation in brain activities across
individuals has limited the scope of many studies to the development of
individual-specific decoders. In this study, we used deep neural network (DNN),
a nonlinear hierarchical model, to construct a subject-transfer decoder. Our
decoder is the first successful DNN-based subject-transfer decoder. When
applied to a large-scale functional magnetic resonance imaging (fMRI) database,
our DNN-based decoder achieved higher decoding accuracy than other baseline
methods, including support vector machine (SVM). In order to analyze the
knowledge acquired by this decoder, we applied principal sensitivity analysis
(PSA) to the decoder and visualized the discriminative features that are common
to all subjects in the dataset. Our PSA successfully visualized the
subject-independent features contributing to the subject-transferability of the
trained decoder.
| no_new_dataset | 0.704795 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.