Index
int64 0
10k
| title
stringlengths 10
200
| abstract
stringlengths 33
2.79k
|
---|---|---|
1,000 | Lifted Graphical Models: A Survey | This article presents a survey of work on lifted graphical models. We review
a general form for a lifted graphical model, a par-factor graph, and show how a
number of existing statistical relational representations map to this
formalism. We discuss inference algorithms, including lifted inference
algorithms, that efficiently compute the answers to probabilistic queries. We
also review work in learning lifted graphical models from data. It is our
belief that the need for statistical relational models (whether it goes by that
name or another) will grow in the coming decades, as we are inundated with data
which is a mix of structured and unstructured, with entities and relations
extracted in a noisy manner from text, and with the need to reason effectively
with this data. We hope that this synthesis of ideas from many different
research groups will provide an accessible starting point for new researchers
in this expanding field.
|
1,001 | Normative design using inductive learning | In this paper we propose a use-case-driven iterative design methodology for
normative frameworks, also called virtual institutions, which are used to
govern open systems. Our computational model represents the normative framework
as a logic program under answer set semantics (ASP). By means of an inductive
logic programming approach, implemented using ASP, it is possible to synthesise
new rules and revise the existing ones. The learning mechanism is guided by the
designer who describes the desired properties of the framework through use
cases, comprising (i) event traces that capture possible scenarios, and (ii) a
state that describes the desired outcome. The learning process then proposes
additional rules, or changes to current rules, to satisfy the constraints
expressed in the use cases. Thus, the contribution of this paper is a process
for the elaboration and revision of a normative framework by means of a
semi-automatic and iterative process driven from specifications of
(un)desirable behaviour. The process integrates a novel and general methodology
for theory revision based on ASP.
|
1,002 | Submodular Optimization for Efficient Semi-supervised Support Vector
Machines | In this work we present a quadratic programming approximation of the
Semi-Supervised Support Vector Machine (S3VM) problem, namely approximate
QP-S3VM, that can be efficiently solved using off the shelf optimization
packages. We prove that this approximate formulation establishes a relation
between the low density separation and the graph-based models of
semi-supervised learning (SSL) which is important to develop a unifying
framework for semi-supervised learning methods. Furthermore, we propose the
novel idea of representing SSL problems as submodular set functions and use
efficient submodular optimization algorithms to solve them. Using this new idea
we develop a representation of the approximate QP-S3VM as a maximization of a
submodular set function which makes it possible to optimize using efficient
greedy algorithms. We demonstrate that the proposed methods are accurate and
provide significant improvement in time complexity over the state of the art in
the literature.
|
1,003 | Multi Layer Analysis | This thesis presents a new methodology to analyze one-dimensional signals
trough a new approach called Multi Layer Analysis, for short MLA. It also
provides some new insights on the relationship between one-dimensional signals
processed by MLA and tree kernels, test of randomness and signal processing
techniques. The MLA approach has a wide range of application to the fields of
pattern discovery and matching, computational biology and many other areas of
computer science and signal processing. This thesis includes also some
applications of this approach to real problems in biology and seismology.
|
1,004 | Axioms for Rational Reinforcement Learning | We provide a formal, simple and intuitive theory of rational decision making
including sequential decisions that affect the environment. The theory has a
geometric flavor, which makes the arguments easy to visualize and understand.
Our theory is for complete decision makers, which means that they have a
complete set of preferences. Our main result shows that a complete rational
decision maker implicitly has a probabilistic model of the environment. We have
a countable version of this result that brings light on the issue of countable
vs finite additivity by showing how it depends on the geometry of the space
which we have preferences over. This is achieved through fruitfully connecting
rationality with the Hahn-Banach Theorem. The theory presented here can be
viewed as a formalization and extension of the betting odds approach to
probability of Ramsey and De Finetti.
|
1,005 | Universal Prediction of Selected Bits | Many learning tasks can be viewed as sequence prediction problems. For
example, online classification can be converted to sequence prediction with the
sequence being pairs of input/target data and where the goal is to correctly
predict the target data given input data and previous input/target pairs.
Solomonoff induction is known to solve the general sequence prediction problem,
but only if the entire sequence is sampled from a computable distribution. In
the case of classification and discriminative learning though, only the targets
need be structured (given the inputs). We show that the normalised version of
Solomonoff induction can still be used in this case, and more generally that it
can detect any recursive sub-pattern (regularity) within an otherwise
completely unstructured sequence. It is also shown that the unnormalised
version can fail to predict very simple recursive sub-patterns.
|
1,006 | Asymptotically Optimal Agents | Artificial general intelligence aims to create agents capable of learning to
solve arbitrary interesting problems. We define two versions of asymptotic
optimality and prove that no agent can satisfy the strong version while in some
cases, depending on discounting, there does exist a non-computable weak
asymptotically optimal agent.
|
1,007 | Automatic Network Reconstruction using ASP | Building biological models by inferring functional dependencies from
experimental data is an im- portant issue in Molecular Biology. To relieve the
biologist from this traditionally manual process, various approaches have been
proposed to increase the degree of automation. However, available ap- proaches
often yield a single model only, rely on specific assumptions, and/or use
dedicated, heuris- tic algorithms that are intolerant to changing circumstances
or requirements in the view of the rapid progress made in Biotechnology. Our
aim is to provide a declarative solution to the problem by ap- peal to Answer
Set Programming (ASP) overcoming these difficulties. We build upon an existing
approach to Automatic Network Reconstruction proposed by part of the authors.
This approach has firm mathematical foundations and is well suited for ASP due
to its combinatorial flavor providing a characterization of all models
explaining a set of experiments. The usage of ASP has several ben- efits over
the existing heuristic algorithms. First, it is declarative and thus
transparent for biological experts. Second, it is elaboration tolerant and thus
allows for an easy exploration and incorporation of biological constraints.
Third, it allows for exploring the entire space of possible models. Finally,
our approach offers an excellent performance, matching existing,
special-purpose systems.
|
1,008 | Generating a Diverse Set of High-Quality Clusterings | We provide a new framework for generating multiple good quality partitions
(clusterings) of a single data set. Our approach decomposes this problem into
two components, generating many high-quality partitions, and then grouping
these partitions to obtain k representatives. The decomposition makes the
approach extremely modular and allows us to optimize various criteria that
control the choice of representative partitions.
|
1,009 | CBR with Commonsense Reasoning and Structure Mapping: An Application to
Mediation | Mediation is an important method in dispute resolution. We implement a case
based reasoning approach to mediation integrating analogical and commonsense
reasoning components that allow an artificial mediation agent to satisfy
requirements expected from a human mediator, in particular: utilizing
experience with cases in different domains; and structurally transforming the
set of issues for a better solution. We utilize a case structure based on
ontologies reflecting the perceptions of the parties in dispute. The analogical
reasoning component, employing the Structure Mapping Theory from psychology,
provides a flexibility to respond innovatively in unusual circumstances, in
contrast with conventional approaches confined into specialized problem
domains. We aim to build a mediation case base incorporating real world
instances ranging from interpersonal or intergroup disputes to international
conflicts.
|
1,010 | Optimization with Sparsity-Inducing Penalties | Sparse estimation methods are aimed at using or obtaining parsimonious
representations of data or models. They were first dedicated to linear variable
selection but numerous extensions have now emerged such as structured sparsity
or kernel selection. It turns out that many of the related estimation problems
can be cast as convex optimization problems by regularizing the empirical risk
with appropriate non-smooth norms. The goal of this paper is to present from a
general perspective optimization tools and techniques dedicated to such
sparsity-inducing penalties. We cover proximal methods, block-coordinate
descent, reweighted $\ell_2$-penalized techniques, working-set and homotopy
methods, as well as non-convex formulations and extensions, and provide an
extensive set of experiments to compare various algorithms from a computational
point of view.
|
1,011 | Accurate Estimators for Improving Minwise Hashing and b-Bit Minwise
Hashing | Minwise hashing is the standard technique in the context of search and
databases for efficiently estimating set (e.g., high-dimensional 0/1 vector)
similarities. Recently, b-bit minwise hashing was proposed which significantly
improves upon the original minwise hashing in practice by storing only the
lowest b bits of each hashed value, as opposed to using 64 bits. b-bit hashing
is particularly effective in applications which mainly concern sets of high
similarities (e.g., the resemblance >0.5). However, there are other important
applications in which not just pairs of high similarities matter. For example,
many learning algorithms require all pairwise similarities and it is expected
that only a small fraction of the pairs are similar. Furthermore, many
applications care more about containment (e.g., how much one object is
contained by another object) than the resemblance. In this paper, we show that
the estimators for minwise hashing and b-bit minwise hashing used in the
current practice can be systematically improved and the improvements are most
significant for set pairs of low resemblance and high containment.
|
1,012 | A new embedding quality assessment method for manifold learning | Manifold learning is a hot research topic in the field of computer science. A
crucial issue with current manifold learning methods is that they lack a
natural quantitative measure to assess the quality of learned embeddings, which
greatly limits their applications to real-world problems. In this paper, a new
embedding quality assessment method for manifold learning, named as
Normalization Independent Embedding Quality Assessment (NIEQA), is proposed.
Compared with current assessment methods which are limited to isometric
embeddings, the NIEQA method has a much larger application range due to two
features. First, it is based on a new measure which can effectively evaluate
how well local neighborhood geometry is preserved under normalization, hence it
can be applied to both isometric and normalized embeddings. Second, it can
provide both local and global evaluations to output an overall assessment.
Therefore, NIEQA can serve as a natural tool in model selection and evaluation
tasks for manifold learning. Experimental results on benchmark data sets
validate the effectiveness of the proposed method.
|
1,013 | Activized Learning: Transforming Passive to Active with Improved Label
Complexity | We study the theoretical advantages of active learning over passive learning.
Specifically, we prove that, in noise-free classifier learning for VC classes,
any passive learning algorithm can be transformed into an active learning
algorithm with asymptotically strictly superior label complexity for all
nontrivial target functions and distributions. We further provide a general
characterization of the magnitudes of these improvements in terms of a novel
generalization of the disagreement coefficient. We also extend these results to
active learning in the presence of label noise, and find that even under broad
classes of noise distributions, we can typically guarantee strict improvements
over the known results for passive learning.
|
1,014 | Uncertain Nearest Neighbor Classification | This work deals with the problem of classifying uncertain data. With this aim
the Uncertain Nearest Neighbor (UNN) rule is here introduced, which represents
the generalization of the deterministic nearest neighbor rule to the case in
which uncertain objects are available. The UNN rule relies on the concept of
nearest neighbor class, rather than on that of nearest neighbor object. The
nearest neighbor class of a test object is the class that maximizes the
probability of providing its nearest neighbor. It is provided evidence that the
former concept is much more powerful than the latter one in the presence of
uncertainty, in that it correctly models the right semantics of the nearest
neighbor decision rule when applied to the uncertain scenario. An effective and
efficient algorithm to perform uncertain nearest neighbor classification of a
generic (un)certain test object is designed, based on properties that greatly
reduce the temporal cost associated with nearest neighbor class probability
computation. Experimental results are presented, showing that the UNN rule is
effective and efficient in classifying uncertain data.
|
1,015 | A survey on independence-based Markov networks learning | This work reports the most relevant technical aspects in the problem of
learning the \emph{Markov network structure} from data. Such problem has become
increasingly important in machine learning, and many other application fields
of machine learning. Markov networks, together with Bayesian networks, are
probabilistic graphical models, a widely used formalism for handling
probability distributions in intelligent systems. Learning graphical models
from data have been extensively applied for the case of Bayesian networks, but
for Markov networks learning it is not tractable in practice. However, this
situation is changing with time, given the exponential growth of computers
capacity, the plethora of available digital data, and the researching on new
learning technologies. This work stresses on a technology called
independence-based learning, which allows the learning of the independence
structure of those networks from data in an efficient and sound manner,
whenever the dataset is sufficiently large, and data is a representative
sampling of the target distribution. In the analysis of such technology, this
work surveys the current state-of-the-art algorithms for learning Markov
networks structure, discussing its current limitations, and proposing a series
of open problems where future works may produce some advances in the area in
terms of quality and efficiency. The paper concludes by opening a discussion
about how to develop a general formalism for improving the quality of the
structures learned, when data is scarce.
|
1,016 | Feature Extraction for Change-Point Detection using Stationary Subspace
Analysis | Detecting changes in high-dimensional time series is difficult because it
involves the comparison of probability densities that need to be estimated from
finite samples. In this paper, we present the first feature extraction method
tailored to change point detection, which is based on an extended version of
Stationary Subspace Analysis. We reduce the dimensionality of the data to the
most non-stationary directions, which are most informative for detecting state
changes in the time series. In extensive simulations on synthetic data we show
that the accuracy of three change point detection algorithms is significantly
increased by a prior feature extraction step. These findings are confirmed in
an application to industrial fault monitoring.
|
1,017 | Efficient Multicore Collaborative Filtering | This paper describes the solution method taken by LeBuSiShu team for track1
in ACM KDD CUP 2011 contest (resulting in the 5th place). We identified two
main challenges: the unique item taxonomy characteristics as well as the large
data set size.To handle the item taxonomy, we present a novel method called
Matrix Factorization Item Taxonomy Regularization (MFITR). MFITR obtained the
2nd best prediction result out of more then ten implemented algorithms. For
rapidly computing multiple solutions of various algorithms, we have implemented
an open source parallel collaborative filtering library on top of the GraphLab
machine learning framework. We report some preliminary performance results
obtained using the BlackLight supercomputer.
|
1,018 | Ensemble Risk Modeling Method for Robust Learning on Scarce Data | In medical risk modeling, typical data are "scarce": they have relatively
small number of training instances (N), censoring, and high dimensionality (M).
We show that the problem may be effectively simplified by reducing it to
bipartite ranking, and introduce new bipartite ranking algorithm, Smooth Rank,
for robust learning on scarce data. The algorithm is based on ensemble learning
with unsupervised aggregation of predictors. The advantage of our approach is
confirmed in comparison with two "gold standard" risk modeling methods on 10
real life survival analysis datasets, where the new approach has the best
results on all but two datasets with the largest ratio N/M. For systematic
study of the effects of data scarcity on modeling by all three methods, we
conducted two types of computational experiments: on real life data with
randomly drawn training sets of different sizes, and on artificial data with
increasing number of features. Both experiments demonstrated that Smooth Rank
has critical advantage over the popular methods on the scarce data; it does not
suffer from overfitting where other methods do.
|
1,019 | Generalised elastic nets | The elastic net was introduced as a heuristic algorithm for combinatorial
optimisation and has been applied, among other problems, to biological
modelling. It has an energy function which trades off a fitness term against a
tension term. In the original formulation of the algorithm the tension term was
implicitly based on a first-order derivative. In this paper we generalise the
elastic net model to an arbitrary quadratic tension term, e.g. derived from a
discretised differential operator, and give an efficient learning algorithm. We
refer to these as generalised elastic nets (GENs). We give a theoretical
analysis of the tension term for 1D nets with periodic boundary conditions, and
show that the model is sensitive to the choice of finite difference scheme that
represents the discretised derivative. We illustrate some of these issues in
the context of cortical map models, by relating the choice of tension term to a
cortical interaction function. In particular, we prove that this interaction
takes the form of a Mexican hat for the original elastic net, and of
progressively more oscillatory Mexican hats for higher-order derivatives. The
results apply not only to generalised elastic nets but also to other methods
using discrete differential penalties, and are expected to be useful in other
areas, such as data analysis, computer graphics and optimisation problems.
|
1,020 | Training Logistic Regression and SVM on 200GB Data Using b-Bit Minwise
Hashing and Comparisons with Vowpal Wabbit (VW) | We generated a dataset of 200 GB with 10^9 features, to test our recent b-bit
minwise hashing algorithms for training very large-scale logistic regression
and SVM. The results confirm our prior work that, compared with the VW hashing
algorithm (which has the same variance as random projections), b-bit minwise
hashing is substantially more accurate at the same storage. For example, with
merely 30 hashed values per data point, b-bit minwise hashing can achieve
similar accuracies as VW with 2^14 hashed values per data point.
We demonstrate that the preprocessing cost of b-bit minwise hashing is
roughly on the same order of magnitude as the data loading time. Furthermore,
by using a GPU, the preprocessing cost can be reduced to a small fraction of
the data loading time.
Minwise hashing has been widely used in industry, at least in the context of
search. One reason for its popularity is that one can efficiently simulate
permutations by (e.g.,) universal hashing. In other words, there is no need to
store the permutation matrix. In this paper, we empirically verify this
practice, by demonstrating that even using the simplest 2-universal hashing
does not degrade the learning performance.
|
1,021 | Stability Conditions for Online Learnability | Stability is a general notion that quantifies the sensitivity of a learning
algorithm's output to small change in the training dataset (e.g. deletion or
replacement of a single training sample). Such conditions have recently been
shown to be more powerful to characterize learnability in the general learning
setting under i.i.d. samples where uniform convergence is not necessary for
learnability, but where stability is both sufficient and necessary for
learnability. We here show that similar stability conditions are also
sufficient for online learnability, i.e. whether there exists a learning
algorithm such that under any sequence of examples (potentially chosen
adversarially) produces a sequence of hypotheses that has no regret in the
limit with respect to the best hypothesis in hindsight. We introduce online
stability, a stability condition related to uniform-leave-one-out stability in
the batch setting, that is sufficient for online learnability. In particular we
show that popular classes of online learners, namely algorithms that fall in
the category of Follow-the-(Regularized)-Leader, Mirror Descent, gradient-based
methods and randomized algorithms like Weighted Majority and Hedge, are
guaranteed to have no regret if they have such online stability property. We
provide examples that suggest the existence of an algorithm with such stability
condition might in fact be necessary for online learnability. For the more
restricted binary classification setting, we establish that such stability
condition is in fact both sufficient and necessary. We also show that for a
large class of online learnable problems in the general learning setting,
namely those with a notion of sub-exponential covering, no-regret online
algorithms that have such stability condition exists.
|
1,022 | A review and comparison of strategies for multi-step ahead time series
forecasting based on the NN5 forecasting competition | Multi-step ahead forecasting is still an open challenge in time series
forecasting. Several approaches that deal with this complex problem have been
proposed in the literature but an extensive comparison on a large number of
tasks is still missing. This paper aims to fill this gap by reviewing existing
strategies for multi-step ahead forecasting and comparing them in theoretical
and practical terms. To attain such an objective, we performed a large scale
comparison of these different strategies using a large experimental benchmark
(namely the 111 series from the NN5 forecasting competition). In addition, we
considered the effects of deseasonalization, input variable selection, and
forecast combination on these strategies and on multi-step ahead forecasting at
large. The following three findings appear to be consistently supported by the
experimental results: Multiple-Output strategies are the best performing
approaches, deseasonalization leads to uniformly improved forecast accuracy,
and input selection is more effective when performed in conjunction with
deseasonalization.
|
1,023 | A Machine Learning Perspective on Predictive Coding with PAQ | PAQ8 is an open source lossless data compression algorithm that currently
achieves the best compression rates on many benchmarks. This report presents a
detailed description of PAQ8 from a statistical machine learning perspective.
It shows that it is possible to understand some of the modules of PAQ8 and use
this understanding to improve the method. However, intuitive statistical
explanations of the behavior of other modules remain elusive. We hope the
description in this report will be a starting point for discussions that will
increase our understanding, lead to improvements to PAQ8, and facilitate a
transfer of knowledge from PAQ8 to other machine learning methods, such a
recurrent neural networks and stochastic memoizers. Finally, the report
presents a broad range of new applications of PAQ to machine learning tasks
including language modeling and adaptive text prediction, adaptive game
playing, classification, and compression using features from the field of deep
learning.
|
1,024 | Overlapping Mixtures of Gaussian Processes for the Data Association
Problem | In this work we introduce a mixture of GPs to address the data association
problem, i.e. to label a group of observations according to the sources that
generated them. Unlike several previously proposed GP mixtures, the novel
mixture has the distinct characteristic of using no gating function to
determine the association of samples and mixture components. Instead, all the
GPs in the mixture are global and samples are clustered following
"trajectories" across input space. We use a non-standard variational Bayesian
algorithm to efficiently recover sample labels and learn the hyperparameters.
We show how multi-object tracking problems can be disambiguated and also
explore the characteristics of the model in traditional regression settings.
|
1,025 | Premise Selection for Mathematics by Corpus Analysis and Kernel Methods | Smart premise selection is essential when using automated reasoning as a tool
for large-theory formal proof development. A good method for premise selection
in complex mathematical libraries is the application of machine learning to
large corpora of proofs. This work develops learning-based premise selection in
two ways. First, a newly available minimal dependency analysis of existing
high-level formal mathematical proofs is used to build a large knowledge base
of proof dependencies, providing precise data for ATP-based re-verification and
for training premise selection algorithms. Second, a new machine learning
algorithm for premise selection based on kernel methods is proposed and
implemented. To evaluate the impact of both techniques, a benchmark consisting
of 2078 large-theory mathematical problems is constructed,extending the older
MPTP Challenge benchmark. The combined effect of the techniques results in a
50% improvement on the benchmark over the Vampire/SInE state-of-the-art system
for automated reasoning in large theories.
|
1,026 | Structured Sparsity and Generalization | We present a data dependent generalization bound for a large class of
regularized algorithms which implement structured sparsity constraints. The
bound can be applied to standard squared-norm regularization, the Lasso, the
group Lasso, some versions of the group Lasso with overlapping groups, multiple
kernel learning and other regularization schemes. In all these cases
competitive results are obtained. A novel feature of our bound is that it can
be applied in an infinite dimensional setting such as the Lasso in a separable
Hilbert space or multiple kernel learning with a countable number of kernels.
|
1,027 | Dynamic Pricing with Limited Supply | We consider the problem of dynamic pricing with limited supply. A seller has
$k$ identical items for sale and is facing $n$ potential buyers ("agents") that
are arriving sequentially. Each agent is interested in buying one item. Each
agent's value for an item is an IID sample from some fixed distribution with
support $[0,1]$. The seller offers a take-it-or-leave-it price to each arriving
agent (possibly different for different agents), and aims to maximize his
expected revenue.
We focus on "prior-independent" mechanisms -- ones that do not use any
information about the distribution. They are desirable because knowing the
distribution is unrealistic in many practical scenarios. We study how the
revenue of such mechanisms compares to the revenue of the optimal offline
mechanism that knows the distribution ("offline benchmark").
We present a prior-independent dynamic pricing mechanism whose revenue is at
most $O((k \log n)^{2/3})$ less than the offline benchmark, for every
distribution that is regular. In fact, this guarantee holds without *any*
assumptions if the benchmark is relaxed to fixed-price mechanisms. Further, we
prove a matching lower bound. The performance guarantee for the same mechanism
can be improved to $O(\sqrt{k} \log n)$, with a distribution-dependent
constant, if $k/n$ is sufficiently small. We show that, in the worst case over
all demand distributions, this is essentially the best rate that can be
obtained with a distribution-specific constant.
On a technical level, we exploit the connection to multi-armed bandits (MAB).
While dynamic pricing with unlimited supply can easily be seen as an MAB
problem, the intuition behind MAB approaches breaks when applied to the setting
with limited supply. Our high-level conceptual contribution is that even the
limited supply setting can be fruitfully treated as a bandit problem.
|
1,028 | The fuzzy gene filter: A classifier performance assesment | The Fuzzy Gene Filter (FGF) is an optimised Fuzzy Inference System designed
to rank genes in order of differential expression, based on expression data
generated in a microarray experiment. This paper examines the effectiveness of
the FGF for feature selection using various classification architectures. The
FGF is compared to three of the most common gene ranking algorithms: t-test,
Wilcoxon test and ROC curve analysis. Four classification schemes are used to
compare the performance of the FGF vis-a-vis the standard approaches: K Nearest
Neighbour (KNN), Support Vector Machine (SVM), Naive Bayesian Classifier (NBC)
and Artificial Neural Network (ANN). A nested stratified Leave-One-Out Cross
Validation scheme is used to identify the optimal number top ranking genes, as
well as the optimal classifier parameters. Two microarray data sets are used
for the comparison: a prostate cancer data set and a lymphoma data set.
|
1,029 | Improving the performance of the ripper in insurance risk classification
: A comparitive study using feature selection | The Ripper algorithm is designed to generate rule sets for large datasets
with many features. However, it was shown that the algorithm struggles with
classification performance in the presence of missing data. The algorithm
struggles to classify instances when the quality of the data deteriorates as a
result of increasing missing data. In this paper, a feature selection technique
is used to help improve the classification performance of the Ripper model.
Principal component analysis and evidence automatic relevance determination
techniques are used to improve the performance. A comparison is done to see
which technique helps the algorithm improve the most. Training datasets with
completely observable data were used to construct the model and testing
datasets with missing values were used for measuring accuracy. The results
showed that principal component analysis is a better feature selection for the
Ripper in improving the classification performance.
|
1,030 | Optimal Algorithms for Ridge and Lasso Regression with Partially
Observed Attributes | We consider the most common variants of linear regression, including Ridge,
Lasso and Support-vector regression, in a setting where the learner is allowed
to observe only a fixed number of attributes of each example at training time.
We present simple and efficient algorithms for these problems: for Lasso and
Ridge regression they need the same total number of attributes (up to
constants) as do full-information algorithms, for reaching a certain accuracy.
For Support-vector regression, we require exponentially less attributes
compared to the state of the art. By that, we resolve an open problem recently
posed by Cesa-Bianchi et al. (2010). Experiments show the theoretical bounds to
be justified by superior performance compared to the state of the art.
|
1,031 | Non-trivial two-armed partial-monitoring games are bandits | We consider online learning in partial-monitoring games against an oblivious
adversary. We show that when the number of actions available to the learner is
two and the game is nontrivial then it is reducible to a bandit-like game and
thus the minimax regret is $\Theta(\sqrt{T})$.
|
1,032 | Prediction of peptide bonding affinity: kernel methods for nonlinear
modeling | This paper presents regression models obtained from a process of blind
prediction of peptide binding affinity from provided descriptors for several
distinct datasets as part of the 2006 Comparative Evaluation of Prediction
Algorithms (COEPRA) contest. This paper finds that kernel partial least
squares, a nonlinear partial least squares (PLS) algorithm, outperforms PLS,
and that the incorporation of transferable atom equivalent features improves
predictive capability.
|
1,033 | Improving Ranking Using Quantum Probability | The paper shows that ranking information units by quantum probability differs
from ranking them by classical probability provided the same data used for
parameter estimation. As probability of detection (also known as recall or
power) and probability of false alarm (also known as fallout or size) measure
the quality of ranking, we point out and show that ranking by quantum
probability yields higher probability of detection than ranking by classical
probability provided a given probability of false alarm and the same parameter
estimation data. As quantum probability provided more effective detectors than
classical probability within other domains that data management, we conjecture
that, the system that can implement subspace-based detectors shall be more
effective than a system which implements a set-based detectors, the
effectiveness being calculated as expected recall estimated over the
probability of detection and expected fallout estimated over the probability of
false alarm.
|
1,034 | Strategic Learning and Robust Protocol Design for Online Communities
with Selfish Users | This paper focuses on analyzing the free-riding behavior of self-interested
users in online communities. Hence, traditional optimization methods for
communities composed of compliant users such as network utility maximization
cannot be applied here. In our prior work, we show how social reciprocation
protocols can be designed in online communities which have populations
consisting of a continuum of users and are stationary under stochastic
permutations. Under these assumptions, we are able to prove that users
voluntarily comply with the pre-determined social norms and cooperate with
other users in the community by providing their services. In this paper, we
generalize the study by analyzing the interactions of self-interested users in
online communities with finite populations and are not stationary. To optimize
their long-term performance based on their knowledge, users adapt their
strategies to play their best response by solving individual stochastic control
problems. The best-response dynamic introduces a stochastic dynamic process in
the community, in which the strategies of users evolve over time. We then
investigate the long-term evolution of a community, and prove that the
community will converge to stochastically stable equilibria which are stable
against stochastic permutations. Understanding the evolution of a community
provides protocol designers with guidelines for designing social norms in which
no user has incentives to adapt its strategy and deviate from the prescribed
protocol, thereby ensuring that the adopted protocol will enable the community
to achieve the optimal social welfare.
|
1,035 | Getting Beyond the State of the Art of Information Retrieval with
Quantum Theory | According to the probability ranking principle, the document set with the
highest values of probability of relevance optimizes information retrieval
effectiveness given the probabilities are estimated as accurately as possible.
The key point of this principle is the separation of the document set into two
subsets with a given level of fallout and with the highest recall. If subsets
of set measures are replaced by subspaces and space measures, we obtain an
alternative theory stemming from Quantum Theory. That theory is named after
vector probability because vectors represent event like sets do in classical
probability. The paper shows that the separation into vector subspaces is more
effective than the separation into subsets with the same available evidence.
The result is proved mathematically and verified experimentally. In general,
the paper suggests that quantum theory is not only a source of rhetoric
inspiration, but is a sufficient condition to improve retrieval effectiveness
in a principled way.
|
1,036 | Datum-Wise Classification: A Sequential Approach to Sparsity | We propose a novel classification technique whose aim is to select an
appropriate representation for each datapoint, in contrast to the usual
approach of selecting a representation encompassing the whole dataset. This
datum-wise representation is found by using a sparsity inducing empirical risk,
which is a relaxation of the standard L 0 regularized risk. The classification
problem is modeled as a sequential decision process that sequentially chooses,
for each datapoint, which features to use before classifying. Datum-Wise
Classification extends naturally to multi-class tasks, and we describe a
specific case where our inference has equivalent complexity to a traditional
linear classifier, while still using a variable number of features. We compare
our classifier to classical L 1 regularized linear models (L 1-SVM and LARS) on
a set of common binary and multi-class datasets and show that for an equal
average number of features used we can get improved performance using our
method.
|
1,037 | Probability Ranking in Vector Spaces | The Probability Ranking Principle states that the document set with the
highest values of probability of relevance optimizes information retrieval
effectiveness given the probabilities are estimated as accurately as possible.
The key point of the principle is the separation of the document set into two
subsets with a given level of fallout and with the highest recall. The paper
introduces the separation between two vector subspaces and shows that the
separation yields a more effective performance than the optimal separation into
subsets with the same available evidence, the performance being measured with
recall and fallout. The result is proved mathematically and exemplified
experimentally.
|
1,038 | No Internal Regret via Neighborhood Watch | We present an algorithm which attains O(\sqrt{T}) internal (and thus
external) regret for finite games with partial monitoring under the local
observability condition. Recently, this condition has been shown by (Bartok,
Pal, and Szepesvari, 2011) to imply the O(\sqrt{T}) rate for partial monitoring
games against an i.i.d. opponent, and the authors conjectured that the same
holds for non-stochastic adversaries. Our result is in the affirmative, and it
completes the characterization of possible rates for finite partial-monitoring
games, an open question stated by (Cesa-Bianchi, Lugosi, and Stoltz, 2006). Our
regret guarantees also hold for the more general model of partial monitoring
with random signals.
|
1,039 | Transfer from Multiple MDPs | Transfer reinforcement learning (RL) methods leverage on the experience
collected on a set of source tasks to speed-up RL algorithms. A simple and
effective approach is to transfer samples from source tasks and include them
into the training set used to solve a given target task. In this paper, we
investigate the theoretical properties of this transfer method and we introduce
novel algorithms adapting the transfer process on the basis of the similarity
between source and target tasks. Finally, we report illustrative experimental
results in a continuous chain problem.
|
1,040 | Infinite Tucker Decomposition: Nonparametric Bayesian Models for
Multiway Data Analysis | Tensor decomposition is a powerful computational tool for multiway data
analysis. Many popular tensor decomposition approaches---such as the Tucker
decomposition and CANDECOMP/PARAFAC (CP)---amount to multi-linear
factorization. They are insufficient to model (i) complex interactions between
data entities, (ii) various data types (e.g. missing data and binary data), and
(iii) noisy observations and outliers. To address these issues, we propose
tensor-variate latent nonparametric Bayesian models, coupled with efficient
inference methods, for multiway data analysis. We name these models InfTucker.
Using these InfTucker, we conduct Tucker decomposition in an infinite feature
space. Unlike classical tensor decomposition models, our new approaches handle
both continuous and binary data in a probabilistic framework. Unlike previous
Bayesian models on matrices and tensors, our models are based on latent
Gaussian or $t$ processes with nonlinear covariance functions. To efficiently
learn the InfTucker from data, we develop a variational inference technique on
tensors. Compared with classical implementation, the new technique reduces both
time and space complexities by several orders of magnitude. Our experimental
results on chemometrics and social network datasets demonstrate that our new
models achieved significantly higher prediction accuracy than the most
state-of-art tensor decomposition
|
1,041 | Local Component Analysis | Kernel density estimation, a.k.a. Parzen windows, is a popular density
estimation method, which can be used for outlier detection or clustering. With
multivariate data, its performance is heavily reliant on the metric used within
the kernel. Most earlier work has focused on learning only the bandwidth of the
kernel (i.e., a scalar multiplicative factor). In this paper, we propose to
learn a full Euclidean metric through an expectation-minimization (EM)
procedure, which can be seen as an unsupervised counterpart to neighbourhood
component analysis (NCA). In order to avoid overfitting with a fully
nonparametric density estimator in high dimensions, we also consider a
semi-parametric Gaussian-Parzen density model, where some of the variables are
modelled through a jointly Gaussian density, while others are modelled through
Parzen windows. For these two models, EM leads to simple closed-form updates
based on matrix inversions and eigenvalue decompositions. We show empirically
that our method leads to density estimators with higher test-likelihoods than
natural competing methods, and that the metrics may be used within most
unsupervised learning techniques that rely on such metrics, such as spectral
clustering or manifold learning methods. Finally, we present a stochastic
approximation scheme which allows for the use of this method in a large-scale
setting.
|
1,042 | Differentially Private Online Learning | In this paper, we consider the problem of preserving privacy in the online
learning setting. We study the problem in the online convex programming (OCP)
framework---a popular online learning setting with several interesting
theoretical and practical implications---while using differential privacy as
the formal privacy measure. For this problem, we distill two critical
attributes that a private OCP algorithm should have in order to provide
reasonable privacy as well as utility guarantees: 1) linearly decreasing
sensitivity, i.e., as new data points arrive their effect on the learning model
decreases, 2) sub-linear regret bound---regret bound is a popular
goodness/utility measure of an online learning algorithm.
Given an OCP algorithm that satisfies these two conditions, we provide a
general framework to convert the given algorithm into a privacy preserving OCP
algorithm with good (sub-linear) regret. We then illustrate our approach by
converting two popular online learning algorithms into their differentially
private variants while guaranteeing sub-linear regret ($O(\sqrt{T})$). Next, we
consider the special case of online linear regression problems, a practically
important class of online learning problems, for which we generalize an
approach by Dwork et al. to provide a differentially private algorithm with
just $O(\log^{1.5} T)$ regret. Finally, we show that our online learning
framework can be used to provide differentially private algorithms for offline
learning as well. For the offline learning problem, our approach obtains better
error bounds as well as can handle larger class of problems than the existing
state-of-the-art methods Chaudhuri et al.
|
1,043 | Quantum adiabatic machine learning | We develop an approach to machine learning and anomaly detection via quantum
adiabatic evolution. In the training phase we identify an optimal set of weak
classifiers, to form a single strong classifier. In the testing phase we
adiabatically evolve one or more strong classifiers on a superposition of
inputs in order to find certain anomalous elements in the classification space.
Both the training and testing phases are executed via quantum adiabatic
evolution. We apply and illustrate this approach in detail to the problem of
software verification and validation.
|
1,044 | Gradient-based kernel dimension reduction for supervised learning | This paper proposes a novel kernel approach to linear dimension reduction for
supervised learning. The purpose of the dimension reduction is to find
directions in the input space to explain the output as effectively as possible.
The proposed method uses an estimator for the gradient of regression function,
based on the covariance operators on reproducing kernel Hilbert spaces. In
comparison with other existing methods, the proposed one has wide applicability
without strong assumptions on the distributions or the type of variables, and
uses computationally simple eigendecomposition. Experimental results show that
the proposed method successfully finds the effective directions with efficient
computation.
|
1,045 | The Variational Garrote | In this paper, we present a new variational method for sparse regression
using $L_0$ regularization. The variational parameters appear in the
approximate model in a way that is similar to Breiman's Garrote model. We refer
to this method as the variational Garrote (VG). We show that the combination of
the variational approximation and $L_0$ regularization has the effect of making
the problem effectively of maximal rank even when the number of samples is
small compared to the number of variables. The VG is compared numerically with
the Lasso method, ridge regression and the recently introduced paired mean
field method (PMF) (M. Titsias & M. L\'azaro-Gredilla., NIPS 2012). Numerical
results show that the VG and PMF yield more accurate predictions and more
accurately reconstruct the true model than the other methods. It is shown that
the VG finds correct solutions when the Lasso solution is inconsistent due to
large input correlations. Globally, VG is significantly faster than PMF and
tends to perform better as the problems become denser and in problems with
strongly correlated inputs. The naive implementation of the VG scales cubic
with the number of features. By introducing Lagrange multipliers we obtain a
dual formulation of the problem that scales cubic in the number of samples, but
close to linear in the number of features.
|
1,046 | How Open Should Open Source Be? | Many open-source projects land security fixes in public repositories before
shipping these patches to users. This paper presents attacks on such projects -
taking Firefox as a case-study - that exploit patch metadata to efficiently
search for security patches prior to shipping. Using access-restricted bug
reports linked from patch descriptions, security patches can be immediately
identified for 260 out of 300 days of Firefox 3 development. In response to
Mozilla obfuscating descriptions, we show that machine learning can exploit
metadata such as patch author to search for security patches, extending the
total window of vulnerability by 5 months in an 8 month period when examining
up to two patches daily. Finally we present strong evidence that further
metadata obfuscation is unlikely to prevent information leaks, and we argue
that open-source projects instead ought to keep security patches secret until
they are ready to be released.
|
1,047 | ShareBoost: Efficient Multiclass Learning with Feature Sharing | Multiclass prediction is the problem of classifying an object into a relevant
target class. We consider the problem of learning a multiclass predictor that
uses only few features, and in particular, the number of used features should
increase sub-linearly with the number of possible classes. This implies that
features should be shared by several classes. We describe and analyze the
ShareBoost algorithm for learning a multiclass predictor that uses few shared
features. We prove that ShareBoost efficiently finds a predictor that uses few
shared features (if such a predictor exists) and that it has a small
generalization error. We also describe how to use ShareBoost for learning a
non-linear predictor that has a fast evaluation time. In a series of
experiments with natural data sets we demonstrate the benefits of ShareBoost
and evaluate its success relatively to other state-of-the-art approaches.
|
1,048 | Nonlinear Channel Estimation for OFDM System by Complex LS-SVM under
High Mobility Conditions | A nonlinear channel estimator using complex Least Square Support Vector
Machines (LS-SVM) is proposed for pilot-aided OFDM system and applied to Long
Term Evolution (LTE) downlink under high mobility conditions. The estimation
algorithm makes use of the reference signals to estimate the total frequency
response of the highly selective multipath channel in the presence of
non-Gaussian impulse noise interfering with pilot signals. Thus, the algorithm
maps trained data into a high dimensional feature space and uses the structural
risk minimization (SRM) principle to carry out the regression estimation for
the frequency response function of the highly selective channel. The
simulations show the effectiveness of the proposed method which has good
performance and high precision to track the variations of the fading channels
compared to the conventional LS method and it is robust at high speed mobility.
|
1,049 | Review on Feature Selection Techniques and the Impact of SVM for Cancer
Classification using Gene Expression Profile | The DNA microarray technology has modernized the approach of biology research
in such a way that scientists can now measure the expression levels of
thousands of genes simultaneously in a single experiment. Gene expression
profiles, which represent the state of a cell at a molecular level, have great
potential as a medical diagnosis tool. But compared to the number of genes
involved, available training data sets generally have a fairly small sample
size for classification. These training data limitations constitute a challenge
to certain classification methodologies. Feature selection techniques can be
used to extract the marker genes which influence the classification accuracy
effectively by eliminating the un wanted noisy and redundant genes This paper
presents a review of feature selection techniques that have been employed in
micro array data based cancer classification and also the predominant role of
SVM for cancer classification.
|
1,050 | Localization on low-order eigenvectors of data matrices | Eigenvector localization refers to the situation when most of the components
of an eigenvector are zero or near-zero. This phenomenon has been observed on
eigenvectors associated with extremal eigenvalues, and in many of those cases
it can be meaningfully interpreted in terms of "structural heterogeneities" in
the data. For example, the largest eigenvectors of adjacency matrices of large
complex networks often have most of their mass localized on high-degree nodes;
and the smallest eigenvectors of the Laplacians of such networks are often
localized on small but meaningful community-like sets of nodes. Here, we
describe localization associated with low-order eigenvectors, i.e.,
eigenvectors corresponding to eigenvalues that are not extremal but that are
"buried" further down in the spectrum. Although we have observed it in several
unrelated applications, this phenomenon of low-order eigenvector localization
defies common intuitions and simple explanations, and it creates serious
difficulties for the applicability of popular eigenvector-based machine
learning and data analysis tools. After describing two examples where low-order
eigenvector localization arises, we present a very simple model that
qualitatively reproduces several of the empirically-observed results. This
model suggests certain coarse structural similarities among the
seemingly-unrelated applications where we have observed low-order eigenvector
localization, and it may be used as a diagnostic tool to help extract insight
from data graphs when such low-order eigenvector localization is present.
|
1,051 | Gossip Learning with Linear Models on Fully Distributed Data | Machine learning over fully distributed data poses an important problem in
peer-to-peer (P2P) applications. In this model we have one data record at each
network node, but without the possibility to move raw data due to privacy
considerations. For example, user profiles, ratings, history, or sensor
readings can represent this case. This problem is difficult, because there is
no possibility to learn local models, the system model offers almost no
guarantees for reliability, yet the communication cost needs to be kept low.
Here we propose gossip learning, a generic approach that is based on multiple
models taking random walks over the network in parallel, while applying an
online learning algorithm to improve themselves, and getting combined via
ensemble learning methods. We present an instantiation of this approach for the
case of classification with linear models. Our main contribution is an ensemble
learning method which---through the continuous combination of the models in the
network---implements a virtual weighted voting mechanism over an exponential
number of models at practically no extra cost as compared to independent random
walks. We prove the convergence of the method theoretically, and perform
extensive experiments on benchmark datasets. Our experimental analysis
demonstrates the performance and robustness of the proposed approach.
|
1,052 | Dynamics of Boltzmann Q-Learning in Two-Player Two-Action Games | We consider the dynamics of Q-learning in two-player two-action games with a
Boltzmann exploration mechanism. For any non-zero exploration rate the dynamics
is dissipative, which guarantees that agent strategies converge to rest points
that are generally different from the game's Nash Equlibria (NE). We provide a
comprehensive characterization of the rest point structure for different games,
and examine the sensitivity of this structure with respect to the noise due to
exploration. Our results indicate that for a class of games with multiple NE
the asymptotic behavior of learning dynamics can undergo drastic changes at
critical exploration rates. Furthermore, we demonstrate that for certain games
with a single NE, it is possible to have additional rest points (not
corresponding to any NE) that persist for a finite range of the exploration
rates and disappear when the exploration rates of both players tend to zero.
|
1,053 | The Non-Bayesian Restless Multi-Armed Bandit: A Case of Near-Logarithmic
Strict Regret | In the classic Bayesian restless multi-armed bandit (RMAB) problem, there are
$N$ arms, with rewards on all arms evolving at each time as Markov chains with
known parameters. A player seeks to activate $K \geq 1$ arms at each time in
order to maximize the expected total reward obtained over multiple plays. RMAB
is a challenging problem that is known to be PSPACE-hard in general. We
consider in this work the even harder non-Bayesian RMAB, in which the
parameters of the Markov chain are assumed to be unknown \emph{a priori}. We
develop an original approach to this problem that is applicable when the
corresponding Bayesian problem has the structure that, depending on the known
parameter values, the optimal solution is one of a prescribed finite set of
policies. In such settings, we propose to learn the optimal policy for the
non-Bayesian RMAB by employing a suitable meta-policy which treats each policy
from this finite set as an arm in a different non-Bayesian multi-armed bandit
problem for which a single-arm selection policy is optimal. We demonstrate this
approach by developing a novel sensing policy for opportunistic spectrum access
over unknown dynamic channels. We prove that our policy achieves
near-logarithmic regret (the difference in expected reward compared to a
model-aware genie), which leads to the same average reward that can be achieved
by the optimal policy under a known model. This is the first such result in the
literature for a non-Bayesian RMAB. For our proof, we also develop a novel
generalization of the Chernoff-Hoeffding bound.
|
1,054 | Efficient Online Learning for Opportunistic Spectrum Access | The problem of opportunistic spectrum access in cognitive radio networks has
been recently formulated as a non-Bayesian restless multi-armed bandit problem.
In this problem, there are N arms (corresponding to channels) and one player
(corresponding to a secondary user). The state of each arm evolves as a
finite-state Markov chain with unknown parameters. At each time slot, the
player can select K < N arms to play and receives state-dependent rewards
(corresponding to the throughput obtained given the activity of primary users).
The objective is to maximize the expected total rewards (i.e., total
throughput) obtained over multiple plays. The performance of an algorithm for
such a multi-armed bandit problem is measured in terms of regret, defined as
the difference in expected reward compared to a model-aware genie who always
plays the best K arms. In this paper, we propose a new continuous exploration
and exploitation (CEE) algorithm for this problem. When no information is
available about the dynamics of the arms, CEE is the first algorithm to
guarantee near-logarithmic regret uniformly over time. When some bounds
corresponding to the stationary state distributions and the state-dependent
rewards are known, we show that CEE can be easily modified to achieve
logarithmic regret over time. In contrast, prior algorithms require additional
information concerning bounds on the second eigenvalues of the transition
matrices in order to guarantee logarithmic regret. Finally, we show through
numerical simulations that CEE is more efficient than prior algorithms.
|
1,055 | On Clustering on Graphs with Multiple Edge Types | We study clustering on graphs with multiple edge types. Our main motivation
is that similarities between objects can be measured in many different metrics.
For instance similarity between two papers can be based on common authors,
where they are published, keyword similarity, citations, etc. As such, graphs
with multiple edges is a more accurate model to describe similarities between
objects. Each edge/metric provides only partial information about the data;
recovering full information requires aggregation of all the similarity metrics.
Clustering becomes much more challenging in this context, since in addition to
the difficulties of the traditional clustering problem, we have to deal with a
space of clusterings. We generalize the concept of clustering in single-edge
graphs to multi-edged graphs and investigate problems such as: Can we find a
clustering that remains good, even if we change the relative weights of
metrics? How can we describe the space of clusterings efficiently? Can we find
unexpected clusterings (a good clustering that is distant from all given
clusterings)? If given the ground-truth clustering, can we recover how the
weights for edge types were aggregated? %In this paper, we discuss these
problems and the underlying algorithmic challenges and propose some solutions.
We also present two case studies: one based on papers on Arxiv and one based on
CIA World Factbook.
|
1,056 | Online Learning for Combinatorial Network Optimization with Restless
Markovian Rewards | Combinatorial network optimization algorithms that compute optimal structures
taking into account edge weights form the foundation for many network
protocols. Examples include shortest path routing, minimal spanning tree
computation, maximum weighted matching on bipartite graphs, etc. We present
CLRMR, the first online learning algorithm that efficiently solves the
stochastic version of these problems where the underlying edge weights vary as
independent Markov chains with unknown dynamics.
The performance of an online learning algorithm is characterized in terms of
regret, defined as the cumulative difference in rewards between a
suitably-defined genie, and that obtained by the given algorithm. We prove
that, compared to a genie that knows the Markov transition matrices and uses
the single-best structure at all times, CLRMR yields regret that is polynomial
in the number of edges and nearly-logarithmic in time.
|
1,057 | Anomaly Sequences Detection from Logs Based on Compression | Mining information from logs is an old and still active research topic. In
recent years, with the rapid emerging of cloud computing, log mining becomes
increasingly important to industry. This paper focus on one major mission of
log mining: anomaly detection, and proposes a novel method for mining abnormal
sequences from large logs. Different from previous anomaly detection systems
which based on statistics, probabilities and Markov assumption, our approach
measures the strangeness of a sequence using compression. It first trains a
grammar about normal behaviors using grammar-based compression, then measures
the information quantities and densities of questionable sequences according to
incrementation of grammar length. We have applied our approach on mining some
real bugs from fine grained execution logs. We have also tested its ability on
intrusion detection using some publicity available system call traces. The
experiments show that our method successfully selects the strange sequences
which related to bugs or attacking.
|
1,058 | Weighted Clustering | One of the most prominent challenges in clustering is "the user's dilemma,"
which is the problem of selecting an appropriate clustering algorithm for a
specific task. A formal approach for addressing this problem relies on the
identification of succinct, user-friendly properties that formally capture when
certain clustering methods are preferred over others.
Until now these properties focused on advantages of classical Linkage-Based
algorithms, failing to identify when other clustering paradigms, such as
popular center-based methods, are preferable. We present surprisingly simple
new properties that delineate the differences between common clustering
paradigms, which clearly and formally demonstrates advantages of center-based
approaches for some applications. These properties address how sensitive
algorithms are to changes in element frequencies, which we capture in a
generalized setting where every element is associated with a real-valued
weight.
|
1,059 | Trace Lasso: a trace norm regularization for correlated designs | Using the $\ell_1$-norm to regularize the estimation of the parameter vector
of a linear model leads to an unstable estimator when covariates are highly
correlated. In this paper, we introduce a new penalty function which takes into
account the correlation of the design matrix to stabilize the estimation. This
norm, called the trace Lasso, uses the trace norm, which is a convex surrogate
of the rank, of the selected covariates as the criterion of model complexity.
We analyze the properties of our norm, describe an optimization algorithm based
on reweighted least-squares, and illustrate the behavior of this norm on
synthetic data, showing that it is more adapted to strong correlations than
competing methods such as the elastic net.
|
1,060 | Learning Sequence Neighbourhood Metrics | Recurrent neural networks (RNNs) in combination with a pooling operator and
the neighbourhood components analysis (NCA) objective function are able to
detect the characterizing dynamics of sequences and embed them into a
fixed-length vector space of arbitrary dimensionality. Subsequently, the
resulting features are meaningful and can be used for visualization or nearest
neighbour classification in linear time. This kind of metric learning for
sequential data enables the use of algorithms tailored towards fixed length
vector spaces such as R^n.
|
1,061 | Learning From Labeled And Unlabeled Data: An Empirical Study Across
Techniques And Domains | There has been increased interest in devising learning techniques that
combine unlabeled data with labeled data ? i.e. semi-supervised learning.
However, to the best of our knowledge, no study has been performed across
various techniques and different types and amounts of labeled and unlabeled
data. Moreover, most of the published work on semi-supervised learning
techniques assumes that the labeled and unlabeled data come from the same
distribution. It is possible for the labeling process to be associated with a
selection bias such that the distributions of data points in the labeled and
unlabeled sets are different. Not correcting for such bias can result in biased
function approximation with potentially poor performance. In this paper, we
present an empirical study of various semi-supervised learning techniques on a
variety of datasets. We attempt to answer various questions such as the effect
of independence or relevance amongst features, the effect of the size of the
labeled and unlabeled sets and the effect of noise. We also investigate the
impact of sample-selection bias on the semi-supervised learning techniques
under study and implement a bivariate probit technique particularly designed to
correct for such bias.
|
1,062 | Online Learning Algorithms for Stochastic Water-Filling | Water-filling is the term for the classic solution to the problem of
allocating constrained power to a set of parallel channels to maximize the
total data-rate. It is used widely in practice, for example, for power
allocation to sub-carriers in multi-user OFDM systems such as WiMax. The
classic water-filling algorithm is deterministic and requires perfect knowledge
of the channel gain to noise ratios. In this paper we consider how to do power
allocation over stochastically time-varying (i.i.d.) channels with unknown gain
to noise ratio distributions. We adopt an online learning framework based on
stochastic multi-armed bandits. We consider two variations of the problem, one
in which the goal is to find a power allocation to maximize $\sum\limits_i
\mathbb{E}[\log(1 + SNR_i)]$, and another in which the goal is to find a power
allocation to maximize $\sum\limits_i \log(1 + \mathbb{E}[SNR_i])$. For the
first problem, we propose a \emph{cognitive water-filling} algorithm that we
call CWF1. We show that CWF1 obtains a regret (defined as the cumulative gap
over time between the sum-rate obtained by a distribution-aware genie and this
policy) that grows polynomially in the number of channels and logarithmically
in time, implying that it asymptotically achieves the optimal time-averaged
rate that can be obtained when the gain distributions are known. For the second
problem, we present an algorithm called CWF2, which is, to our knowledge, the
first algorithm in the literature on stochastic multi-armed bandits to exploit
non-linear dependencies between the arms. We prove that the number of times
CWF2 picks the incorrect power allocation is bounded by a function that is
polynomial in the number of channels and logarithmic in time, implying that its
frequency of incorrect allocation tends to zero.
|
1,063 | Efficiency versus Convergence of Boolean Kernels for On-Line Learning
Algorithms | The paper studies machine learning problems where each example is described
using a set of Boolean features and where hypotheses are represented by linear
threshold elements. One method of increasing the expressiveness of learned
hypotheses in this context is to expand the feature set to include conjunctions
of basic features. This can be done explicitly or where possible by using a
kernel function. Focusing on the well known Perceptron and Winnow algorithms,
the paper demonstrates a tradeoff between the computational efficiency with
which the algorithm can be run over the expanded feature space and the
generalization ability of the corresponding learning algorithm. We first
describe several kernel functions which capture either limited forms of
conjunctions or all conjunctions. We show that these kernels can be used to
efficiently run the Perceptron algorithm over a feature space of exponentially
many conjunctions; however we also show that using such kernels, the Perceptron
algorithm can provably make an exponential number of mistakes even when
learning simple functions. We then consider the question of whether kernel
functions can analogously be used to run the multiplicative-update Winnow
algorithm over an expanded feature space of exponentially many conjunctions.
Known upper bounds imply that the Winnow algorithm can learn Disjunctive Normal
Form (DNF) formulae with a polynomial mistake bound in this setting. However,
we prove that it is computationally hard to simulate Winnows behavior for
learning DNF over such a feature set. This implies that the kernel functions
which correspond to running Winnow for this problem are not efficiently
computable, and that there is no general construction that can run Winnow with
kernels.
|
1,064 | Risk-Sensitive Reinforcement Learning Applied to Control under
Constraints | In this paper, we consider Markov Decision Processes (MDPs) with error
states. Error states are those states entering which is undesirable or
dangerous. We define the risk with respect to a policy as the probability of
entering such a state when the policy is pursued. We consider the problem of
finding good policies whose risk is smaller than some user-specified threshold,
and formalize it as a constrained MDP with two criteria. The first criterion
corresponds to the value function originally given. We will show that the risk
can be formulated as a second criterion function based on a cumulative return,
whose definition is independent of the original value function. We present a
model free, heuristic reinforcement learning algorithm that aims at finding
good deterministic policies. It is based on weighting the original value
function and the risk. The weight parameter is adapted in order to find a
feasible solution for the constrained problem that has a good performance with
respect to the value function. The algorithm was successfully applied to the
control of a feed tank with stochastic inflows that lies upstream of a
distillation column. This control task was originally formulated as an optimal
control problem with chance constraints, and it was solved under certain
assumptions on the model to obtain an optimal solution. The power of our
learning algorithm is that it can be used even when some of these restrictive
assumptions are relaxed.
|
1,065 | A Learning Theory Approach to Non-Interactive Database Privacy | In this paper we demonstrate that, ignoring computational constraints, it is
possible to privately release synthetic databases that are useful for large
classes of queries -- much larger in size than the database itself.
Specifically, we give a mechanism that privately releases synthetic data for a
class of queries over a discrete domain with error that grows as a function of
the size of the smallest net approximately representing the answers to that
class of queries. We show that this in particular implies a mechanism for
counting queries that gives error guarantees that grow only with the
VC-dimension of the class of queries, which itself grows only logarithmically
with the size of the query class.
We also show that it is not possible to privately release even simple classes
of queries (such as intervals and their generalizations) over continuous
domains. Despite this, we give a privacy-preserving polynomial time algorithm
that releases information useful for all halfspace queries, given a slight
relaxation of the utility guarantee. This algorithm does not release synthetic
data, but instead another data structure capable of representing an answer for
each query. We also give an efficient algorithm for releasing synthetic data
for the class of interval queries and axis-aligned rectangles of constant
dimension.
Finally, inspired by learning theory, we introduce a new notion of data
privacy, which we call distributional privacy, and show that it is strictly
stronger than the prevailing privacy notion, differential privacy.
|
1,066 | Bandits with an Edge | We consider a bandit problem over a graph where the rewards are not directly
observed. Instead, the decision maker can compare two nodes and receive
(stochastic) information pertaining to the difference in their value. The graph
structure describes the set of possible comparisons. Consequently, comparing
between two nodes that are relatively far requires estimating the difference
between every pair of nodes on the path between them. We analyze this problem
from the perspective of sample complexity: How many queries are needed to find
an approximately optimal node with probability more than $1-\delta$ in the PAC
setup? We show that the topology of the graph plays a crucial in defining the
sample complexity: graphs with a low diameter have a much better sample
complexity.
|
1,067 | MIS-Boost: Multiple Instance Selection Boosting | In this paper, we present a new multiple instance learning (MIL) method,
called MIS-Boost, which learns discriminative instance prototypes by explicit
instance selection in a boosting framework. Unlike previous instance selection
based MIL methods, we do not restrict the prototypes to a discrete set of
training instances but allow them to take arbitrary values in the instance
feature space. We also do not restrict the total number of prototypes and the
number of selected-instances per bag; these quantities are completely
data-driven. We show that MIS-Boost outperforms state-of-the-art MIL methods on
a number of benchmark datasets. We also apply MIS-Boost to large-scale image
classification, where we show that the automatically selected prototypes map to
visually meaningful image regions.
|
1,068 | A Probabilistic Framework for Discriminative Dictionary Learning | In this paper, we address the problem of discriminative dictionary learning
(DDL), where sparse linear representation and classification are combined in a
probabilistic framework. As such, a single discriminative dictionary and linear
binary classifiers are learned jointly. By encoding sparse representation and
discriminative classification models in a MAP setting, we propose a general
optimization framework that allows for a data-driven tradeoff between faithful
representation and accurate classification. As opposed to previous work, our
learning methodology is capable of incorporating a diverse family of
classification cost functions (including those used in popular boosting
methods), while avoiding the need for involved optimization techniques. We show
that DDL can be solved by a sequence of updates that make use of well-known and
well-studied sparse coding and dictionary learning algorithms from the
literature. To validate our DDL framework, we apply it to digit classification
and face recognition and test it on standard benchmarks.
|
1,069 | Structured sparsity through convex optimization | Sparse estimation methods are aimed at using or obtaining parsimonious
representations of data or models. While naturally cast as a combinatorial
optimization problem, variable or feature selection admits a convex relaxation
through the regularization by the $\ell_1$-norm. In this paper, we consider
situations where we are not only interested in sparsity, but where some
structural prior knowledge is available as well. We show that the $\ell_1$-norm
can then be extended to structured norms built on either disjoint or
overlapping groups of variables, leading to a flexible framework that can deal
with various structures. We present applications to unsupervised learning, for
structured sparse principal component analysis and hierarchical dictionary
learning, and to supervised learning in the context of non-linear variable
selection.
|
1,070 | Convergence Rates of Inexact Proximal-Gradient Methods for Convex
Optimization | We consider the problem of optimizing the sum of a smooth convex function and
a non-smooth convex function using proximal-gradient methods, where an error is
present in the calculation of the gradient of the smooth term or in the
proximity operator with respect to the non-smooth term. We show that both the
basic proximal-gradient method and the accelerated proximal-gradient method
achieve the same convergence rate as in the error-free case, provided that the
errors decrease at appropriate rates.Using these rates, we perform as well as
or better than a carefully chosen fixed error level on a set of structured
sparsity problems.
|
1,071 | Active Learning for Node Classification in Assortative and
Disassortative Networks | In many real-world networks, nodes have class labels, attributes, or
variables that affect the network's topology. If the topology of the network is
known but the labels of the nodes are hidden, we would like to select a small
subset of nodes such that, if we knew their labels, we could accurately predict
the labels of all the other nodes. We develop an active learning algorithm for
this problem which uses information-theoretic techniques to choose which nodes
to explore. We test our algorithm on networks from three different domains: a
social network, a network of English words that appear adjacently in a novel,
and a marine food web. Our algorithm makes no initial assumptions about how the
groups connect, and performs well even when faced with quite general types of
network structure. In particular, we do not assume that nodes of the same class
are more likely to be connected to each other---only that they connect to the
rest of the network in similar ways.
|
1,072 | Reconstruction of sequential data with density models | We introduce the problem of reconstructing a sequence of multidimensional
real vectors where some of the data are missing. This problem contains
regression and mapping inversion as particular cases where the pattern of
missing data is independent of the sequence index. The problem is hard because
it involves possibly multivalued mappings at each vector in the sequence, where
the missing variables can take more than one value given the present variables;
and the set of missing variables can vary from one vector to the next. To solve
this problem, we propose an algorithm based on two redundancy assumptions:
vector redundancy (the data live in a low-dimensional manifold), so that the
present variables constrain the missing ones; and sequence redundancy (e.g.
continuity), so that consecutive vectors constrain each other. We capture the
low-dimensional nature of the data in a probabilistic way with a joint density
model, here the generative topographic mapping, which results in a Gaussian
mixture. Candidate reconstructions at each vector are obtained as all the modes
of the conditional distribution of missing variables given present variables.
The reconstructed sequence is obtained by minimising a global constraint, here
the sequence length, by dynamic programming. We present experimental results
for a toy problem and for inverse kinematics of a robot arm.
|
1,073 | Distributed User Profiling via Spectral Methods | User profiling is a useful primitive for constructing personalised services,
such as content recommendation. In the present paper we investigate the
feasibility of user profiling in a distributed setting, with no central
authority and only local information exchanges between users. We compute a
profile vector for each user (i.e., a low-dimensional vector that characterises
her taste) via spectral transformation of observed user-produced ratings for
items. Our two main contributions follow: i) We consider a low-rank
probabilistic model of user taste. More specifically, we consider that users
and items are partitioned in a constant number of classes, such that users and
items within the same class are statistically identical. We prove that without
prior knowledge of the compositions of the classes, based solely on few random
observed ratings (namely $O(N\log N)$ such ratings for $N$ users), we can
predict user preference with high probability for unrated items by running a
local vote among users with similar profile vectors. In addition, we provide
empirical evaluations characterising the way in which spectral profiling
performance depends on the dimension of the profile space. Such evaluations are
performed on a data set of real user ratings provided by Netflix. ii) We
develop distributed algorithms which provably achieve an embedding of users
into a low-dimensional space, based on spectral transformation. These involve
simple message passing among users, and provably converge to the desired
embedding. Our method essentially relies on a novel combination of gossiping
and the algorithm proposed by Oja and Karhunen.
|
1,074 | Learning Topic Models by Belief Propagation | Latent Dirichlet allocation (LDA) is an important hierarchical Bayesian model
for probabilistic topic modeling, which attracts worldwide interests and
touches on many important applications in text mining, computer vision and
computational biology. This paper represents LDA as a factor graph within the
Markov random field (MRF) framework, which enables the classic loopy belief
propagation (BP) algorithm for approximate inference and parameter estimation.
Although two commonly-used approximate inference methods, such as variational
Bayes (VB) and collapsed Gibbs sampling (GS), have gained great successes in
learning LDA, the proposed BP is competitive in both speed and accuracy as
validated by encouraging experimental results on four large-scale document data
sets. Furthermore, the BP algorithm has the potential to become a generic
learning scheme for variants of LDA-based topic models. To this end, we show
how to learn two typical variants of LDA-based topic models, such as
author-topic models (ATM) and relational topic models (RTM), using BP based on
the factor graph representation.
|
1,075 | Active Ranking using Pairwise Comparisons | This paper examines the problem of ranking a collection of objects using
pairwise comparisons (rankings of two objects). In general, the ranking of $n$
objects can be identified by standard sorting methods using $n log_2 n$
pairwise comparisons. We are interested in natural situations in which
relationships among the objects may allow for ranking using far fewer pairwise
comparisons. Specifically, we assume that the objects can be embedded into a
$d$-dimensional Euclidean space and that the rankings reflect their relative
distances from a common reference point in $R^d$. We show that under this
assumption the number of possible rankings grows like $n^{2d}$ and demonstrate
an algorithm that can identify a randomly selected ranking using just slightly
more than $d log n$ adaptively selected pairwise comparisons, on average. If
instead the comparisons are chosen at random, then almost all pairwise
comparisons must be made in order to identify any ranking. In addition, we
propose a robust, error-tolerant algorithm that only requires that the pairwise
comparisons are probably correct. Experimental studies with synthetic and real
datasets support the conclusions of our theoretical analysis.
|
1,076 | Fast approximation of matrix coherence and statistical leverage | The statistical leverage scores of a matrix $A$ are the squared row-norms of
the matrix containing its (top) left singular vectors and the coherence is the
largest leverage score. These quantities are of interest in recently-popular
problems such as matrix completion and Nystr\"{o}m-based low-rank matrix
approximation as well as in large-scale statistical data analysis applications
more generally; moreover, they are of interest since they define the key
structural nonuniformity that must be dealt with in developing fast randomized
matrix algorithms. Our main result is a randomized algorithm that takes as
input an arbitrary $n \times d$ matrix $A$, with $n \gg d$, and that returns as
output relative-error approximations to all $n$ of the statistical leverage
scores. The proposed algorithm runs (under assumptions on the precise values of
$n$ and $d$) in $O(n d \log n)$ time, as opposed to the $O(nd^2)$ time required
by the na\"{i}ve algorithm that involves computing an orthogonal basis for the
range of $A$. Our analysis may be viewed in terms of computing a relative-error
approximation to an underconstrained least-squares approximation problem, or,
relatedly, it may be viewed as an application of Johnson-Lindenstrauss type
ideas. Several practically-important extensions of our basic result are also
described, including the approximation of so-called cross-leverage scores, the
extension of these ideas to matrices with $n \approx d$, and the extension to
streaming environments.
|
1,077 | Learning Discriminative Metrics via Generative Models and Kernel
Learning | Metrics specifying distances between data points can be learned in a
discriminative manner or from generative models. In this paper, we show how to
unify generative and discriminative learning of metrics via a kernel learning
framework. Specifically, we learn local metrics optimized from parametric
generative models. These are then used as base kernels to construct a global
kernel that minimizes a discriminative training criterion. We consider both
linear and nonlinear combinations of local metric kernels. Our empirical
results show that these combinations significantly improve performance on
classification tasks. The proposed learning algorithm is also very efficient,
achieving order of magnitude speedup in training time compared to previous
discriminative baseline methods.
|
1,078 | VC dimension of ellipsoids | We will establish that the VC dimension of the class of d-dimensional
ellipsoids is (d^2+3d)/2, and that maximum likelihood estimate with N-component
d-dimensional Gaussian mixture models induces a geometric class having VC
dimension at least N(d^2+3d)/2.
Keywords: VC dimension; finite dimensional ellipsoid; Gaussian mixture model
|
1,079 | Manifold estimation and singular deconvolution under Hausdorff loss | We find lower and upper bounds for the risk of estimating a manifold in
Hausdorff distance under several models. We also show that there are close
connections between manifold estimation and the problem of deconvolving a
singular measure.
|
1,080 | Memristive fuzzy edge detector | Fuzzy inference systems always suffer from the lack of efficient structures
or platforms for their hardware implementation. In this paper, we tried to
overcome this problem by proposing new method for the implementation of those
fuzzy inference systems which use fuzzy rule base to make inference. To achieve
this goal, we have designed a multi-layer neuro-fuzzy computing system based on
the memristor crossbar structure by introducing some new concepts like fuzzy
minterms. Although many applications can be realized through the use of our
proposed system, in this study we show how the fuzzy XOR function can be
constructed and how it can be used to extract edges from grayscale images. Our
memristive fuzzy edge detector (implemented in analog form) compared with other
common edge detectors has this advantage that it can extract edges of any given
image all at once in real-time.
|
1,081 | Robust estimation of latent tree graphical models: Inferring hidden
states with inexact parameters | Latent tree graphical models are widely used in computational biology, signal
and image processing, and network tomography. Here we design a new efficient,
estimation procedure for latent tree models, including Gaussian and discrete,
reversible models, that significantly improves on previous sample requirement
bounds. Our techniques are based on a new hidden state estimator which is
robust to inaccuracies in estimated parameters. More precisely, we prove that
latent tree models can be estimated with high probability in the so-called
Kesten-Stigum regime with $O(log^2 n)$ samples where $n$ is the number of
nodes.
|
1,082 | Exhaustive and Efficient Constraint Propagation: A Semi-Supervised
Learning Perspective and Its Applications | This paper presents a novel pairwise constraint propagation approach by
decomposing the challenging constraint propagation problem into a set of
independent semi-supervised learning subproblems which can be solved in
quadratic time using label propagation based on k-nearest neighbor graphs.
Considering that this time cost is proportional to the number of all possible
pairwise constraints, our approach actually provides an efficient solution for
exhaustively propagating pairwise constraints throughout the entire dataset.
The resulting exhaustive set of propagated pairwise constraints are further
used to adjust the similarity matrix for constrained spectral clustering. Other
than the traditional constraint propagation on single-source data, our approach
is also extended to more challenging constraint propagation on multi-source
data where each pairwise constraint is defined over a pair of data points from
different sources. This multi-source constraint propagation has an important
application to cross-modal multimedia retrieval. Extensive results have shown
the superior performance of our approach.
|
1,083 | Latent Semantic Learning with Structured Sparse Representation for Human
Action Recognition | This paper proposes a novel latent semantic learning method for extracting
high-level features (i.e. latent semantics) from a large vocabulary of abundant
mid-level features (i.e. visual keywords) with structured sparse
representation, which can help to bridge the semantic gap in the challenging
task of human action recognition. To discover the manifold structure of
midlevel features, we develop a spectral embedding approach to latent semantic
learning based on L1-graph, without the need to tune any parameter for graph
construction as a key step of manifold learning. More importantly, we construct
the L1-graph with structured sparse representation, which can be obtained by
structured sparse coding with its structured sparsity ensured by novel L1-norm
hypergraph regularization over mid-level features. In the new embedding space,
we learn latent semantics automatically from abundant mid-level features
through spectral clustering. The learnt latent semantics can be readily used
for human action recognition with SVM by defining a histogram intersection
kernel. Different from the traditional latent semantic analysis based on topic
models, our latent semantic learning method can explore the manifold structure
of mid-level features in both L1-graph construction and spectral embedding,
which results in compact but discriminative high-level features. The
experimental results on the commonly used KTH action dataset and unconstrained
YouTube action dataset show the superior performance of our method.
|
1,084 | Application of distances between terms for flat and hierarchical data | In machine learning, distance-based algorithms, and other approaches, use
information that is represented by propositional data. However, this kind of
representation can be quite restrictive and, in many cases, it requires more
complex structures in order to represent data in a more natural way. Terms are
the basis for functional and logic programming representation. Distances
between terms are a useful tool not only to compare terms, but also to
determine the search space in many of these applications. This dissertation
applies distances between terms, exploiting the features of each distance and
the possibility to compare from propositional data types to hierarchical
representations. The distances between terms are applied through the k-NN
(k-nearest neighbor) classification algorithm using XML as a common language
representation. To be able to represent these data in an XML structure and to
take advantage of the benefits of distance between terms, it is necessary to
apply some transformations. These transformations allow the conversion of flat
data into hierarchical data represented in XML, using some techniques based on
intuitive associations between the names and values of variables and
associations based on attribute similarity.
Several experiments with the distances between terms of Nienhuys-Cheng and
Estruch et al. were performed. In the case of originally propositional data,
these distances are compared to the Euclidean distance. In all cases, the
experiments were performed with the distance-weighted k-nearest neighbor
algorithm, using several exponents for the attraction function (weighted
distance). It can be seen that in some cases, the term distances can
significantly improve the results on approaches applied to flat
representations.
|
1,085 | Noise Tolerance under Risk Minimization | In this paper we explore noise tolerant learning of classifiers. We formulate
the problem as follows. We assume that there is an ${\bf unobservable}$
training set which is noise-free. The actual training set given to the learning
algorithm is obtained from this ideal data set by corrupting the class label of
each example. The probability that the class label of an example is corrupted
is a function of the feature vector of the example. This would account for most
kinds of noisy data one encounters in practice. We say that a learning method
is noise tolerant if the classifiers learnt with the ideal noise-free data and
with noisy data, both have the same classification accuracy on the noise-free
data. In this paper we analyze the noise tolerance properties of risk
minimization (under different loss functions), which is a generic method for
learning classifiers. We show that risk minimization under 0-1 loss function
has impressive noise tolerance properties and that under squared error loss is
tolerant only to uniform noise; risk minimization under other loss functions is
not noise tolerant. We conclude the paper with some discussion on implications
of these theoretical results.
|
1,086 | Simultaneous Codeword Optimization (SimCO) for Dictionary Update and
Learning | We consider the data-driven dictionary learning problem. The goal is to seek
an over-complete dictionary from which every training signal can be best
approximated by a linear combination of only a few codewords. This task is
often achieved by iteratively executing two operations: sparse coding and
dictionary update. In the literature, there are two benchmark mechanisms to
update a dictionary. The first approach, such as the MOD algorithm, is
characterized by searching for the optimal codewords while fixing the sparse
coefficients. In the second approach, represented by the K-SVD method, one
codeword and the related sparse coefficients are simultaneously updated while
all other codewords and coefficients remain unchanged. We propose a novel
framework that generalizes the aforementioned two methods. The unique feature
of our approach is that one can update an arbitrary set of codewords and the
corresponding sparse coefficients simultaneously: when sparse coefficients are
fixed, the underlying optimization problem is similar to that in the MOD
algorithm; when only one codeword is selected for update, it can be proved that
the proposed algorithm is equivalent to the K-SVD method; and more importantly,
our method allows us to update all codewords and all sparse coefficients
simultaneously, hence the term simultaneous codeword optimization (SimCO).
Under the proposed framework, we design two algorithms, namely, primitive and
regularized SimCO. We implement these two algorithms based on a simple gradient
descent mechanism. Simulations are provided to demonstrate the performance of
the proposed algorithms, as compared with two baseline algorithms MOD and
K-SVD. Results show that regularized SimCO is particularly appealing in terms
of both learning performance and running speed.
|
1,087 | Bias Plus Variance Decomposition for Survival Analysis Problems | Bias - variance decomposition of the expected error defined for regression
and classification problems is an important tool to study and compare different
algorithms, to find the best areas for their application. Here the
decomposition is introduced for the survival analysis problem. In our
experiments, we study bias -variance parts of the expected error for two
algorithms: original Cox proportional hazard regression and CoxPath, path
algorithm for L1-regularized Cox regression, on the series of increased
training sets. The experiments demonstrate that, contrary expectations, CoxPath
does not necessarily have an advantage over Cox regression.
|
1,088 | Higher-Order Markov Tag-Topic Models for Tagged Documents and Images | This paper studies the topic modeling problem of tagged documents and images.
Higher-order relations among tagged documents and images are major and
ubiquitous characteristics, and play positive roles in extracting reliable and
interpretable topics. In this paper, we propose the tag-topic models (TTM) to
depict such higher-order topic structural dependencies within the Markov random
field (MRF) framework. First, we use the novel factor graph representation of
latent Dirichlet allocation (LDA)-based topic models from the MRF perspective,
and present an efficient loopy belief propagation (BP) algorithm for
approximate inference and parameter estimation. Second, we propose the factor
hypergraph representation of TTM, and focus on both pairwise and higher-order
relation modeling among tagged documents and images. Efficient loopy BP
algorithm is developed to learn TTM, which encourages the topic labeling
smoothness among tagged documents and images. Extensive experimental results
confirm the incorporation of higher-order relations to be effective in
enhancing the overall topic modeling performance, when compared with current
state-of-the-art topic models, in many text and image mining tasks of broad
interests such as word and link prediction, document classification, and tag
recommendation.
|
1,089 | Making Gradient Descent Optimal for Strongly Convex Stochastic
Optimization | Stochastic gradient descent (SGD) is a simple and popular method to solve
stochastic optimization problems which arise in machine learning. For strongly
convex problems, its convergence rate was known to be O(\log(T)/T), by running
SGD for T iterations and returning the average point. However, recent results
showed that using a different algorithm, one can get an optimal O(1/T) rate.
This might lead one to believe that standard SGD is suboptimal, and maybe
should even be replaced as a method of choice. In this paper, we investigate
the optimality of SGD in a stochastic setting. We show that for smooth
problems, the algorithm attains the optimal O(1/T) rate. However, for
non-smooth problems, the convergence rate with averaging might really be
\Omega(\log(T)/T), and this is not just an artifact of the analysis. On the
flip side, we show that a simple modification of the averaging step suffices to
recover the O(1/T) rate, and no other change of the algorithm is necessary. We
also present experimental results which support our findings, and point out
open problems.
|
1,090 | Deterministic Feature Selection for $k$-means Clustering | We study feature selection for $k$-means clustering. Although the literature
contains many methods with good empirical performance, algorithms with provable
theoretical behavior have only recently been developed. Unfortunately, these
algorithms are randomized and fail with, say, a constant probability. We
address this issue by presenting a deterministic feature selection algorithm
for k-means with theoretical guarantees. At the heart of our algorithm lies a
deterministic method for decompositions of the identity.
|
1,091 | Learning Item Trees for Probabilistic Modelling of Implicit Feedback | User preferences for items can be inferred from either explicit feedback,
such as item ratings, or implicit feedback, such as rental histories. Research
in collaborative filtering has concentrated on explicit feedback, resulting in
the development of accurate and scalable models. However, since explicit
feedback is often difficult to collect it is important to develop effective
models that take advantage of the more widely available implicit feedback. We
introduce a probabilistic approach to collaborative filtering with implicit
feedback based on modelling the user's item selection process. In the interests
of scalability, we restrict our attention to tree-structured distributions over
items and develop a principled and efficient algorithm for learning item trees
from data. We also identify a problem with a widely used protocol for
evaluating implicit feedback models and propose a way of addressing it using a
small quantity of explicit feedback data.
|
1,092 | Domain Adaptation for Statistical Classifiers | The most basic assumption used in statistical learning theory is that
training data and test data are drawn from the same underlying distribution.
Unfortunately, in many applications, the "in-domain" test data is drawn from a
distribution that is related, but not identical, to the "out-of-domain"
distribution of the training data. We consider the common case in which labeled
out-of-domain data is plentiful, but labeled in-domain data is scarce. We
introduce a statistical formulation of this problem in terms of a simple
mixture model and present an instantiation of this framework to maximum entropy
classifiers and their linear chain counterparts. We present efficient inference
algorithms for this special case based on the technique of conditional
expectation maximization. Our experimental results show that our approach leads
to improved performance on three real world tasks on four different data sets
from the natural language processing domain.
|
1,093 | Learning image transformations without training examples | The use of image transformations is essential for efficient modeling and
learning of visual data. But the class of relevant transformations is large:
affine transformations, projective transformations, elastic deformations, ...
the list goes on. Therefore, learning these transformations, rather than hand
coding them, is of great conceptual interest. To the best of our knowledge, all
the related work so far has been concerned with either supervised or weakly
supervised learning (from correlated sequences, video streams, or
image-transform pairs). In this paper, on the contrary, we present a simple
method for learning affine and elastic transformations when no examples of
these transformations are explicitly given, and no prior knowledge of space
(such as ordering of pixels) is included either. The system has only access to
a moderately large database of natural images arranged in no particular order.
|
1,094 | Eclectic Extraction of Propositional Rules from Neural Networks | Artificial Neural Network is among the most popular algorithm for supervised
learning. However, Neural Networks have a well-known drawback of being a "Black
Box" learner that is not comprehensible to the Users. This lack of transparency
makes it unsuitable for many high risk tasks such as medical diagnosis that
requires a rational justification for making a decision. Rule Extraction
methods attempt to curb this limitation by extracting comprehensible rules from
a trained Network. Many such extraction algorithms have been developed over the
years with their respective strengths and weaknesses. They have been broadly
categorized into three types based on their approach to use internal model of
the Network. Eclectic Methods are hybrid algorithms that combine the other
approaches to attain more performance. In this paper, we present an Eclectic
method called HERETIC. Our algorithm uses Inductive Decision Tree learning
combined with information of the neural network structure for extracting
logical rules. Experiments and theoretical analysis show HERETIC to be better
in terms of speed and performance.
|
1,095 | Group Lasso with Overlaps: the Latent Group Lasso approach | We study a norm for structured sparsity which leads to sparse linear
predictors whose supports are unions of prede ned overlapping groups of
variables. We call the obtained formulation latent group Lasso, since it is
based on applying the usual group Lasso penalty on a set of latent variables. A
detailed analysis of the norm and its properties is presented and we
characterize conditions under which the set of groups associated with latent
variables are correctly identi ed. We motivate and discuss the delicate choice
of weights associated to each group, and illustrate this approach on simulated
data and on the problem of breast cancer prognosis from gene expression data.
|
1,096 | Two Projection Pursuit Algorithms for Machine Learning under
Non-Stationarity | This thesis derives, tests and applies two linear projection algorithms for
machine learning under non-stationarity. The first finds a direction in a
linear space upon which a data set is maximally non-stationary. The second aims
to robustify two-way classification against non-stationarity. The algorithm is
tested on a key application scenario, namely Brain Computer Interfacing.
|
1,097 | Directed information and Pearl's causal calculus | Probabilistic graphical models are a fundamental tool in statistics, machine
learning, signal processing, and control. When such a model is defined on a
directed acyclic graph (DAG), one can assign a partial ordering to the events
occurring in the corresponding stochastic system. Based on the work of Judea
Pearl and others, these DAG-based "causal factorizations" of joint probability
measures have been used for characterization and inference of functional
dependencies (causal links). This mostly expository paper focuses on several
connections between Pearl's formalism (and in particular his notion of
"intervention") and information-theoretic notions of causality and feedback
(such as causal conditioning, directed stochastic kernels, and directed
information). As an application, we show how conditional directed information
can be used to develop an information-theoretic version of Pearl's "back-door"
criterion for identifiability of causal effects from passive observations. This
suggests that the back-door criterion can be thought of as a causal analog of
statistical sufficiency.
|
1,098 | Linearized Additive Classifiers | We revisit the additive model learning literature and adapt a penalized
spline formulation due to Eilers and Marx, to train additive classifiers
efficiently. We also propose two new embeddings based two classes of orthogonal
basis with orthogonal derivatives, which can also be used to efficiently learn
additive classifiers. This paper follows the popular theme in the current
literature where kernel SVMs are learned much more efficiently using a
approximate embedding and linear machine. In this paper we show that spline
basis are especially well suited for learning additive models because of their
sparsity structure and the ease of computing the embedding which enables one to
train these models in an online manner, without incurring the memory overhead
of precomputing the storing the embeddings. We show interesting connections
between B-Spline basis and histogram intersection kernel and show that for a
particular choice of regularization and degree of the B-Splines, our proposed
learning algorithm closely approximates the histogram intersection kernel SVM.
This enables one to learn additive models with almost no memory overhead
compared to fast a linear solver, such as LIBLINEAR, while being only 5-6X
slower on average. On two large scale image classification datasets, MNIST and
Daimler Chrysler pedestrians, the proposed additive classifiers are as accurate
as the kernel SVM, while being two orders of magnitude faster to train.
|
1,099 | Dictionary Learning for Deblurring and Digital Zoom | This paper proposes a novel approach to image deblurring and digital zooming
using sparse local models of image appearance. These models, where small image
patches are represented as linear combinations of a few elements drawn from
some large set (dictionary) of candidates, have proven well adapted to several
image restoration tasks. A key to their success has been to learn dictionaries
adapted to the reconstruction of small image patches. In contrast, recent works
have proposed instead to learn dictionaries which are not only adapted to data
reconstruction, but also tuned for a specific task. We introduce here such an
approach to deblurring and digital zoom, using pairs of blurry/sharp (or
low-/high-resolution) images for training, as well as an effective stochastic
gradient algorithm for solving the corresponding optimization task. Although
this learning problem is not convex, once the dictionaries have been learned,
the sharp/high-resolution image can be recovered via convex optimization at
test time. Experiments with synthetic and real data demonstrate the
effectiveness of the proposed approach, leading to state-of-the-art performance
for non-blind image deblurring and digital zoom.
|