id
stringlengths
9
16
submitter
stringlengths
3
64
authors
stringlengths
4
20.7k
title
stringlengths
4
278
comments
stringlengths
1
594
journal-ref
stringlengths
1
545
doi
stringlengths
9
153
report-no
stringlengths
2
509
categories
sequencelengths
1
11
license
stringclasses
9 values
abstract
stringlengths
6
3.87k
versions
listlengths
1
35
update_date
stringlengths
10
10
authors_parsed
sequencelengths
1
1.35k
contents
null
0704.1139
Larry Wasserman
Larry Wasserman, Kathryn Roeder
High-dimensional variable selection
Published in at http://dx.doi.org/10.1214/08-AOS646 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2009, Vol. 37, No. 5A, 2178-2201
10.1214/08-AOS646
IMS-AOS-AOS646
[ "math.ST", "stat.ML", "stat.TH" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores the following question: what kind of statistical guarantees can be given when doing variable selection in high-dimensional models? In particular, we look at the error rates and power of some multi-stage regression methods. In the first stage we fit a set of candidate models. In the second stage we select one model by cross-validation. In the third stage we use hypothesis testing to eliminate some variables. We refer to the first two stages as "screening" and the last stage as "cleaning." We consider three screening methods: the lasso, marginal regression, and forward stepwise regression. Our method gives consistent variable selection under certain conditions.
[ { "created": "Mon, 9 Apr 2007 17:52:17 GMT", "version": "v1" }, { "created": "Thu, 20 Aug 2009 14:17:04 GMT", "version": "v2" } ]
2009-08-20
[ [ "Wasserman", "Larry", "" ], [ "Roeder", "Kathryn", "" ] ]
null
0704.1267
Laurence Likforman
Laurence Likforman-Sulem, Abderrazak Zahour, Bruno Taconet
Text Line Segmentation of Historical Documents: a Survey
25 pages, submitted version, To appear in International Journal on Document Analysis and Recognition, On line version available at http://www.springerlink.com/content/k2813176280456k3/
Vol. 9, no 2-4, April 2007, pp. 123-138
10.1007/s10032-006-0023-z
null
[ "cs.CV" ]
null
There is a huge amount of historical documents in libraries and in various National Archives that have not been exploited electronically. Although automatic reading of complete pages remains, in most cases, a long-term objective, tasks such as word spotting, text/image alignment, authentication and extraction of specific fields are in use today. For all these tasks, a major step is document segmentation into text lines. Because of the low quality and the complexity of these documents (background noise, artifacts due to aging, interfering lines),automatic text line segmentation remains an open research field. The objective of this paper is to present a survey of existing methods, developed during the last decade, and dedicated to documents of historical interest.
[ { "created": "Tue, 10 Apr 2007 16:26:42 GMT", "version": "v1" } ]
2007-05-23
[ [ "Likforman-Sulem", "Laurence", "" ], [ "Zahour", "Abderrazak", "" ], [ "Taconet", "Bruno", "" ] ]
null
0704.2083
Hassan Satori
H. Satori, M. Harti and N. Chenfour
Introduction to Arabic Speech Recognition Using CMUSphinx System
4 pages, 3 figures and 2 tables, was in Information and Communication Technologies International Symposium proceeding ICTIS07 Fes (2007)
null
null
null
[ "cs.CL", "cs.AI" ]
null
In this paper Arabic was investigated from the speech recognition problem point of view. We propose a novel approach to build an Arabic Automated Speech Recognition System (ASR). This system is based on the open source CMU Sphinx-4, from the Carnegie Mellon University. CMU Sphinx is a large-vocabulary; speaker-independent, continuous speech recognition system based on discrete Hidden Markov Models (HMMs). We build a model using utilities from the OpenSource CMU Sphinx. We will demonstrate the possible adaptability of this system to Arabic voice recognition.
[ { "created": "Tue, 17 Apr 2007 01:04:01 GMT", "version": "v1" } ]
2007-05-23
[ [ "Satori", "H.", "" ], [ "Harti", "M.", "" ], [ "Chenfour", "N.", "" ] ]
null
0704.2963
Stefan Pohl
Stefan Pohl
Using Access Data for Paper Recommendations on ArXiv.org
73 pages, 31 figures, Master's Thesis
null
null
null
[ "cs.DL", "cs.IR" ]
null
This thesis investigates in the use of access log data as a source of information for identifying related scientific papers. This is done for arXiv.org, the authority for publication of e-prints in several fields of physics. Compared to citation information, access logs have the advantage of being immediately available, without manual or automatic extraction of the citation graph. Because of that, a main focus is on the question, how far user behavior can serve as a replacement for explicit meta-data, which potentially might be expensive or completely unavailable. Therefore, we compare access, content, and citation-based measures of relatedness on different recommendation tasks. As a final result, an online recommendation system has been built that can help scientists to find further relevant literature, without having to search for them actively.
[ { "created": "Mon, 23 Apr 2007 15:52:47 GMT", "version": "v1" } ]
2007-05-23
[ [ "Pohl", "Stefan", "" ] ]
null
0704.3395
Marko A. Rodriguez
Marko A. Rodriguez
General-Purpose Computing on a Semantic Network Substrate
null
Emergent Web Intelligence: Advanced Semantic Technologies, Advanced Information and Knowledge Processing series, Springer-Verlag, pages 57-104, ISBN:978-1-84996-076-2, June 2010
null
LA-UR-07-2885
[ "cs.PL", "cs.AI" ]
http://creativecommons.org/licenses/publicdomain/
This article presents a model of general-purpose computing on a semantic network substrate. The concepts presented are applicable to any semantic network representation. However, due to the standards and technological infrastructure devoted to the Semantic Web effort, this article is presented from this point of view. In the proposed model of computing, the application programming interface, the run-time program, and the state of the computing virtual machine are all represented in the Resource Description Framework (RDF). The implementation of the concepts presented provides a practical computing paradigm that leverages the highly-distributed and standardized representational-layer of the Semantic Web.
[ { "created": "Wed, 25 Apr 2007 15:37:52 GMT", "version": "v1" }, { "created": "Thu, 4 Oct 2007 20:08:21 GMT", "version": "v2" }, { "created": "Sun, 7 Oct 2007 21:44:01 GMT", "version": "v3" }, { "created": "Sun, 6 Jun 2010 05:29:22 GMT", "version": "v4" } ]
2010-06-08
[ [ "Rodriguez", "Marko A.", "" ] ]
null
0704.3635
Fulufhelo Vincent Nelwamondo
Fulufhelo Vincent Nelwamondo and Tshilidzi Marwala
Rough Sets Computations to Impute Missing Data
19 pages
null
null
null
[ "cs.IR", "cs.CV" ]
null
Many techniques for handling missing data have been proposed in the literature. Most of these techniques are overly complex. This paper explores an imputation technique based on rough set computations. In this paper, characteristic relations are introduced to describe incompletely specified decision tables.It is shown that the basic rough set idea of lower and upper approximations for incompletely specified decision tables may be defined in a variety of different ways. Empirical results obtained using real data are given and they provide a valuable and promising insight to the problem of missing data. Missing data were predicted with an accuracy of up to 99%.
[ { "created": "Thu, 26 Apr 2007 22:22:45 GMT", "version": "v1" } ]
2007-05-23
[ [ "Nelwamondo", "Fulufhelo Vincent", "" ], [ "Marwala", "Tshilidzi", "" ] ]
null
0705.0960
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Uniqueness Domains in the Workspace of Parallel Manipulators
null
Syroco' 97 (1997) 1-6
null
null
[ "cs.RO" ]
null
This work investigates new kinematic features of parallel manipulators. It is well known that parallel manipulators admit generally several direct kinematic solutions for a given set of input joint values. The aim of this paper is to characterize the uniqueness domains in the workspace of parallel manipulators, as well as their image in the joint space. The study focuses on the most usual case of parallel manipulators with only one inverse kinematic solution. The notion of aspect introduced for serial manipulators in [Borrel 86] is redefined for such parallel manipulators. Then, it is shown that it is possible to link several solutions to the forward kinematic problem without meeting a singularity, thus meaning that the aspects are not uniqueness domains. An additional set of surfaces, namely the characteristic surfaces, are characterized which divide the workspace into basic regions and yield new uniqueness domains. This study is illustrated all along the paper with a 3-RPR planar parallel manipulator. An octree model of spaces is used to compute the joint space, the workspace and all other newly defined sets.
[ { "created": "Mon, 7 May 2007 18:33:34 GMT", "version": "v1" } ]
2007-05-23
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
null
0705.1280
Damien Chablat
F\'elix Majou (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
A Novel method for the design of 2-DOF Parallel mechanisms for machining applications
null
8th International Symposium on Advances in Robot Kinematics (2002) 1-11
null
null
[ "cs.RO" ]
null
Parallel Kinematic Mechanisms (PKM) are interesting alternative designs for machine tools. A design method based on velocity amplification factors analysis is presented in this paper. The comparative study of two simple two-degree-of-freedom PKM dedicated to machining applications is led through this method: the common desired properties are the largest square Cartesian workspace for given kinetostatic performances. The orientation and position of the Cartesian workspace are chosen to avoid singularities and to produce the best ratio between Cartesian workspace size and mechanism size. The machine size of each resulting design is used as a comparative criterion.
[ { "created": "Wed, 9 May 2007 13:18:59 GMT", "version": "v1" } ]
2007-05-23
[ [ "Majou", "Félix", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
null
0705.1344
Damien Chablat
Maher Baili (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Classification of one family of 3R positioning Manipulators
null
The 11Th International Conference on Advanced Robotics (2003) 1-6
null
null
[ "cs.RO" ]
null
The aim of this paper is to classify one family of 3R serial positioning manipulators. This categorization is based on the number of cusp points of quaternary, binary, generic and non-generic manipulators. It was found three subsets of manipulators with 0, 2 or 4 cusp points and one homotopy class for generic quaternary manipulators. This classification allows us to define the design parameters for which the manipulator is cuspidal or not, i.e., for which the manipulator can or cannot change posture without meeting a singularity, respectively.
[ { "created": "Wed, 9 May 2007 19:16:05 GMT", "version": "v1" } ]
2007-05-23
[ [ "Baili", "Maher", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
null
0705.1680
Tshilidzi Marwala
Michael Maio Pires, Tshilidzi Marwala
Option Pricing Using Bayesian Neural Networks
7 pages
null
null
null
[ "cs.NE", "cs.CE" ]
null
Options have provided a field of much study because of the complexity involved in pricing them. The Black-Scholes equations were developed to price options but they are only valid for European styled options. There is added complexity when trying to price American styled options and this is why the use of neural networks has been proposed. Neural Networks are able to predict outcomes based on past data. The inputs to the networks here are stock volatility, strike price and time to maturity with the output of the network being the call option price. There are two techniques for Bayesian neural networks used. One is Automatic Relevance Determination (for Gaussian Approximation) and one is a Hybrid Monte Carlo method, both used with Multi-Layer Perceptrons.
[ { "created": "Fri, 11 May 2007 15:55:31 GMT", "version": "v1" } ]
2007-05-23
[ [ "Pires", "Michael Maio", "" ], [ "Marwala", "Tshilidzi", "" ] ]
null
0705.1760
Tshilidzi Marwala
Tshilidzi Marwala
Dynamic Model Updating Using Particle Swarm Optimization Method
6 pages
null
null
null
[ "cs.NE", "cs.CE" ]
null
This paper proposes the use of particle swarm optimization method (PSO) for finite element (FE) model updating. The PSO method is compared to the existing methods that use simulated annealing (SA) or genetic algorithms (GA) for FE model for model updating. The proposed method is tested on an unsymmetrical H-shaped structure. It is observed that the proposed method gives updated natural frequencies the most accurate and followed by those given by an updated model that was obtained using the GA and a full FE model. It is also observed that the proposed method gives updated mode shapes that are best correlated to the measured ones, followed by those given by an updated model that was obtained using the SA and a full FE model. Furthermore, it is observed that the PSO achieves this accuracy at a computational speed that is faster than that by the GA and a full FE model which is faster than the SA and a full FE model.
[ { "created": "Sat, 12 May 2007 10:27:07 GMT", "version": "v1" } ]
2007-05-23
[ [ "Marwala", "Tshilidzi", "" ] ]
null
0705.3360
Kyriakos Sgarbas
Kyriakos N. Sgarbas
The Road to Quantum Artificial Intelligence
9 pages. Presented at PCI-2007: 11th Panhellenic Conference in Informatics, 18-20 May 2007, Patras, Greece
In: T.S.Papatheodorou, D.N.Christodoulakis and N.N.Karanikolas (eds), "Current Trends in Informatics", Vol.A, pp.469-477, New Technologies Publications, Athens, 2007 (SET 978-960-89784-0-9)
null
null
[ "cs.AI" ]
null
This paper overviews the basic principles and recent advances in the emerging field of Quantum Computation (QC), highlighting its potential application to Artificial Intelligence (AI). The paper provides a very brief introduction to basic QC issues like quantum registers, quantum gates and quantum algorithms and then it presents references, ideas and research guidelines on how QC can be used to deal with some basic AI problems, such as search and pattern matching, as soon as quantum computers become widely available.
[ { "created": "Wed, 23 May 2007 12:31:47 GMT", "version": "v1" } ]
2007-05-24
[ [ "Sgarbas", "Kyriakos N.", "" ] ]
null
0706.3188
Vladimir Vovk
Glenn Shafer and Vladimir Vovk
A tutorial on conformal prediction
58 pages, 9 figures
Journal of Machine Learning Research 9 (2008) 371-421. http://www.jmlr.org/papers/v9/shafer08a.html
null
null
[ "stat.ML", "cs.LG" ]
null
Conformal prediction uses past experience to determine precise levels of confidence in new predictions. Given an error probability $\epsilon$, together with a method that makes a prediction $\hat{y}$ of a label $y$, it produces a set of labels, typically containing $\hat{y}$, that also contains $y$ with probability $1-\epsilon$. Conformal prediction can be applied to any method for producing $\hat{y}$: a nearest-neighbor method, a support-vector machine, ridge regression, etc. Conformal prediction is designed for an on-line setting in which labels are predicted successively, each one being revealed before the next is predicted. The most novel and valuable feature of conformal prediction is that if the successive examples are sampled independently from the same distribution, then the successive predictions will be right $1-\epsilon$ of the time, even though they are based on an accumulating dataset rather than on independent datasets. In addition to the model under which successive examples are sampled independently, other on-line compression models can also use conformal prediction. The widely used Gaussian linear model is one of these. This tutorial presents a self-contained account of the theory of conformal prediction and works through several numerical examples. A more comprehensive treatment of the topic is provided in "Algorithmic Learning in a Random World", by Vladimir Vovk, Alex Gammerman, and Glenn Shafer (Springer, 2005).
[ { "created": "Thu, 21 Jun 2007 16:40:06 GMT", "version": "v1" } ]
2019-04-23
[ [ "Shafer", "Glenn", "" ], [ "Vovk", "Vladimir", "" ] ]
null
0707.0704
Alexandre d'Aspremont
Onureena Banerjee, Laurent El Ghaoui, Alexandre d'Aspremont
Model Selection Through Sparse Maximum Likelihood Estimation
null
null
null
null
[ "cs.LG", "cs.AI" ]
null
We consider the problem of estimating the parameters of a Gaussian or binary distribution in such a way that the resulting undirected graphical model is sparse. Our approach is to solve a maximum likelihood problem with an added l_1-norm penalty term. The problem as formulated is convex but the memory requirements and complexity of existing interior point methods are prohibitive for problems with more than tens of nodes. We present two new algorithms for solving problems with at least a thousand nodes in the Gaussian case. Our first algorithm uses block coordinate descent, and can be interpreted as recursive l_1-norm penalized regression. Our second algorithm, based on Nesterov's first order method, yields a complexity estimate with a better dependence on problem size than existing interior point methods. Using a log determinant relaxation of the log partition function (Wainwright & Jordan (2006)), we show that these same algorithms can be used to solve an approximate sparse maximum likelihood problem for the binary case. We test our algorithms on synthetic data, as well as on gene expression and senate voting records data.
[ { "created": "Wed, 4 Jul 2007 22:13:42 GMT", "version": "v1" } ]
2007-07-06
[ [ "Banerjee", "Onureena", "" ], [ "Ghaoui", "Laurent El", "" ], [ "d'Aspremont", "Alexandre", "" ] ]
null
0707.1824
Damien Chablat
Leonid Slutski (CIM), Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Kinematics of Manipulators Built From Closed Planar Mechanisms
null
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics (19/08/1999) 531-536
null
null
[ "cs.RO" ]
null
The paper discusses the kinematics of manipulators builts of planar closed kinematic chains. A special kinematic scheme is extracted from the array of these mechanisms that looks the most promising for the creation of different types of robotic manipulators. The structural features of this manipulator determine a number of its original properties that essentially simplify its control. These features allow the main control problems to be effectively overcome by application of the simple kinematic problems. The workspace and singular configurations of a basic planar manipulator are studied. By using a graphic simulation method, motions of the designed mechanism are examined. A prototype of this mechanism was implemented to verify the proposed approach.
[ { "created": "Thu, 12 Jul 2007 15:42:46 GMT", "version": "v1" } ]
2007-07-13
[ [ "Slutski", "Leonid", "", "CIM" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
null
0707.3536
Patrick Erik Bradley
Patrick Erik Bradley
Degenerating families of dendrograms
13 pages, 8 figures
J. Classif. 25, 27-42 (2008)
10.1007/s00357-008-9009-5
null
[ "stat.ML" ]
null
Dendrograms used in data analysis are ultrametric spaces, hence objects of nonarchimedean geometry. It is known that there exist $p$-adic representation of dendrograms. Completed by a point at infinity, they can be viewed as subtrees of the Bruhat-Tits tree associated to the $p$-adic projective line. The implications are that certain moduli spaces known in algebraic geometry are $p$-adic parameter spaces of (families of) dendrograms, and stochastic classification can also be handled within this framework. At the end, we calculate the topology of the hidden part of a dendrogram.
[ { "created": "Tue, 24 Jul 2007 12:45:39 GMT", "version": "v1" } ]
2008-06-28
[ [ "Bradley", "Patrick Erik", "" ] ]
null
0707.3552
Damien Chablat
Maher Baili (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Analyse Comparative des Manipulateurs 3R \`a Axes Orthogonaux
null
Dans Congr\`es international Conception et Mod\'elisation des Syst\`emes M\'ecaniques - Congr\`es international Conception et Mod\'elisation des Syst\`emes M\'ecaniques, Hammamet : Tunisie (03/2005)
null
null
[ "cs.RO" ]
null
A family of 3R orthogonal manipulators without offset on the third body can be divided into exactly nine workspace topologies. The workspace is characterized in a half-cross section by the singular curves. The workspace topology is defined by the number of cusps and nodes that appear on these singular curves. Based on this classification, we evaluate theses manipulators by the condition number related to the joint space and the proportion of the region with four inverse kinematic solutions compared to a sphere containing all the workspace. This second performance number is in relation with the workspace. We determine finally le topology of workspace to which belong manipulators having the best performance number values.
[ { "created": "Tue, 24 Jul 2007 13:46:22 GMT", "version": "v1" } ]
2007-07-25
[ [ "Baili", "Maher", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
null
0707.4032
Shiguo Lian
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
One-way Hash Function Based on Neural Network
7 pages,5 figures,submitted
null
null
null
[ "cs.NE", "cs.CR" ]
null
A hash function is constructed based on a three-layer neural network. The three neuron-layers are used to realize data confusion, diffusion and compression respectively, and the multi-block hash mode is presented to support the plaintext with variable length. Theoretical analysis and experimental results show that this hash function is one-way, with high key sensitivity and plaintext sensitivity, and secure against birthday attacks or meet-in-the-middle attacks. Additionally, the neural network's property makes it practical to realize in a parallel way. These properties make it a suitable choice for data signature or authentication.
[ { "created": "Fri, 27 Jul 2007 02:38:56 GMT", "version": "v1" } ]
2007-07-30
[ [ "Lian", "Shiguo", "" ], [ "Sun", "Jinsheng", "" ], [ "Wang", "Zhiquan", "" ] ]
null
0708.1527
Stasinos Konstantopoulos
Stasinos Konstantopoulos
A Data-Parallel Version of Aleph
Proceedings of Parallel and Distributed Computing for Machine Learning workshop, held in conjunction with the 14th European Conference on Machine Learning. Cavtat, Croatia, 2003
null
null
null
[ "cs.DC", "cs.AI" ]
null
This is to present work on modifying the Aleph ILP system so that it evaluates the hypothesised clauses in parallel by distributing the data-set among the nodes of a parallel or distributed machine. The paper briefly discusses MPI, the interface used to access message- passing libraries for parallel computers and clusters. It then proceeds to describe an extension of YAP Prolog with an MPI interface and an implementation of data-parallel clause evaluation for Aleph through this interface. The paper concludes by testing the data-parallel Aleph on artificially constructed data-sets.
[ { "created": "Fri, 10 Aug 2007 23:32:16 GMT", "version": "v1" } ]
2007-08-14
[ [ "Konstantopoulos", "Stasinos", "" ] ]
null
0708.3463
Sabatino Costanzo
Sabatino Costanzo, Loren Trigo, Luis Jimenez, Juan Gonzalez
A Neural Networks Model of the Venezuelan Economy
null
null
null
null
[ "cs.NE", "cs.CE" ]
null
Besides an indicator of the GDP, the Central Bank of Venezuela generates the so called Monthly Economic Activity General Indicator. The a priori knowledge of this indicator, which represents and sometimes even anticipates the economy's fluctuations, could be helpful in developing public policies and in investment decision making. The purpose of this study is forecasting the IGAEM through non parametric methods, an approach that has proven effective in a wide variety of problems in economics and finance.
[ { "created": "Sun, 26 Aug 2007 05:10:29 GMT", "version": "v1" } ]
2007-08-28
[ [ "Costanzo", "Sabatino", "" ], [ "Trigo", "Loren", "" ], [ "Jimenez", "Luis", "" ], [ "Gonzalez", "Juan", "" ] ]
null
0708.3607
Damien Chablat
F\'elix Majou (IRCCyN), Cl\'ement Gosselin (Robotics Laboratory), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Parametric stiffness analysis of the Orthoglide
null
Journal of Mechanism and Machine Theory 42, 3 (2007) 296-311
null
null
[ "cs.RO" ]
null
This paper presents a parametric stiffness analysis of the Orthoglide. A compliant modeling and a symbolic expression of the stiffness matrix are conducted. This allows a simple systematic analysis of the influence of the geometric design parameters and to quickly identify the critical link parameters. Our symbolic model is used to display the stiffest areas of the workspace for a specific machining task. Our approach can be applied to any parallel manipulator for which stiffness is a critical issue.
[ { "created": "Mon, 27 Aug 2007 13:59:35 GMT", "version": "v1" } ]
2007-08-28
[ [ "Majou", "Félix", "", "IRCCyN" ], [ "Gosselin", "Clément", "", "Robotics Laboratory" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
null
0708.4311
Juergen Schmidhuber
Juergen Schmidhuber
2006: Celebrating 75 years of AI - History and Outlook: the Next 25 Years
14 pages; preprint of invited contribution to the Proceedings of the ``50th Anniversary Summit of Artificial Intelligence'' at Monte Verita, Ascona, Switzerland, 9-14 July 2006
null
null
null
[ "cs.AI" ]
null
When Kurt Goedel layed the foundations of theoretical computer science in 1931, he also introduced essential concepts of the theory of Artificial Intelligence (AI). Although much of subsequent AI research has focused on heuristics, which still play a major role in many practical AI applications, in the new millennium AI theory has finally become a full-fledged formal science, with important optimality results for embodied agents living in unknown environments, obtained through a combination of theory a la Goedel and probability theory. Here we look back at important milestones of AI history, mention essential recent results, and speculate about what we may expect from the next 25 years, emphasizing the significance of the ongoing dramatic hardware speedups, and discussing Goedel-inspired, self-referential, self-improving universal problem solvers.
[ { "created": "Fri, 31 Aug 2007 11:12:26 GMT", "version": "v1" } ]
2007-09-03
[ [ "Schmidhuber", "Juergen", "" ] ]
null
0709.0409
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Maher Baili (IRCCyN)
A DH-parameter based condition for 3R orthogonal manipulators to have 4 distinct inverse kinematic solutions
null
Journal of Mechanical Design 127 (2005) 150-155
null
null
[ "cs.RO" ]
null
Positioning 3R manipulators may have two or four inverse kinematic solutions (IKS). This paper derives a necessary and sufficient condition for 3R positioning manipulators with orthogonal joint axes to have four distinct IKS. We show that the transition between manipulators with 2 and 4 IKS is defined by the set of manipulators with a quadruple root of their inverse kinematics. The resulting condition is explicit and states that the last link length of the manipulator must be greater than a quantity that depends on three of its remaining DH-parameters. This result is of interest for the design of new manipulators.
[ { "created": "Tue, 4 Sep 2007 12:27:14 GMT", "version": "v1" } ]
2007-09-05
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Baili", "Maher", "", "IRCCyN" ] ]
null
0709.3641
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE), Nicolas Delannay (DICE - MLG), Brieuc Conan-Guez (INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE), Michel Verleysen (DICE - MLG)
Representation of Functional Data in Neural Networks
Also available online from: http://www.sciencedirect.com/science/journal/09252312
Neurocomputing 64 (2005) 183--210
10.1016/j.neucom.2004.11.012
null
[ "cs.NE" ]
null
Functional Data Analysis (FDA) is an extension of traditional data analysis to functional data, for example spectra, temporal series, spatio-temporal images, gesture recognition data, etc. Functional data are rarely known in practice; usually a regular or irregular sampling is known. For this reason, some processing is needed in order to benefit from the smooth character of functional data in the analysis methods. This paper shows how to extend the Radial-Basis Function Networks (RBFN) and Multi-Layer Perceptron (MLP) models to functional data inputs, in particular when the latter are known through lists of input-output pairs. Various possibilities for functional processing are discussed, including the projection on smooth bases, Functional Principal Component Analysis, functional centering and reduction, and the use of differential operators. It is shown how to incorporate these functional processing into the RBFN and MLP models. The functional approach is illustrated on a benchmark of spectrometric data analysis.
[ { "created": "Sun, 23 Sep 2007 14:10:08 GMT", "version": "v1" } ]
2007-09-25
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis, CEREMADE" ], [ "Delannay", "Nicolas", "", "DICE - MLG" ], [ "Conan-Guez", "Brieuc", "", "INRIA Rocquencourt / INRIA\n Sophia Antipolis, CEREMADE" ], [ "Verleysen", "Michel", "", "DICE - MLG" ] ]
null
0710.3183
Robert Seiringer
Joel Predd, Robert Seiringer, Elliott H. Lieb, Daniel Osherson, Vincent Poor, Sanjeev Kulkarni
Probabilistic coherence and proper scoring rules
LaTeX2, 15 pages
IEEE T. Inform. Theory 55, 4786 (2009)
10.1109/TIT.2009.2027573
null
[ "stat.ML" ]
null
We provide self-contained proof of a theorem relating probabilistic coherence of forecasts to their non-domination by rival forecasts with respect to any proper scoring rule. The theorem appears to be new but is closely related to results achieved by other investigators.
[ { "created": "Tue, 16 Oct 2007 21:16:29 GMT", "version": "v1" } ]
2016-11-15
[ [ "Predd", "Joel", "" ], [ "Seiringer", "Robert", "" ], [ "Lieb", "Elliott H.", "" ], [ "Osherson", "Daniel", "" ], [ "Poor", "Vincent", "" ], [ "Kulkarni", "Sanjeev", "" ] ]
null
0710.4975
Yoshiharu Maeno
Yoshiharu Maeno
Node discovery problem for a social network
null
Connections vol.29, pp.62-76 (2009)
null
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Methods to solve a node discovery problem for a social network are presented. Covert nodes refer to the nodes which are not observable directly. They transmit the influence and affect the resulting collaborative activities among the persons in a social network, but do not appear in the surveillance logs which record the participants of the collaborative activities. Discovering the covert nodes is identifying the suspicious logs where the covert nodes would appear if the covert nodes became overt. The performance of the methods is demonstrated with a test dataset generated from computationally synthesized networks and a real organization.
[ { "created": "Fri, 26 Oct 2007 01:32:47 GMT", "version": "v1" }, { "created": "Fri, 7 Aug 2009 04:18:43 GMT", "version": "v2" } ]
2010-09-28
[ [ "Maeno", "Yoshiharu", "" ] ]
null
0711.0694
Bruno Scherrer
Bruno Scherrer (INRIA Lorraine - LORIA)
Performance Bounds for Lambda Policy Iteration and Application to the Game of Tetris
No. RR-6348 (2011)
null
null
null
[ "cs.RO", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the discrete-time infinite-horizon optimal control problem formalized by Markov Decision Processes. We revisit the work of Bertsekas and Ioffe, that introduced $\lambda$ Policy Iteration, a family of algorithms parameterized by $\lambda$ that generalizes the standard algorithms Value Iteration and Policy Iteration, and has some deep connections with the Temporal Differences algorithm TD($\lambda$) described by Sutton and Barto. We deepen the original theory developped by the authors by providing convergence rate bounds which generalize standard bounds for Value Iteration described for instance by Puterman. Then, the main contribution of this paper is to develop the theory of this algorithm when it is used in an approximate form and show that this is sound. Doing so, we extend and unify the separate analyses developped by Munos for Approximate Value Iteration and Approximate Policy Iteration. Eventually, we revisit the use of this algorithm in the training of a Tetris playing controller as originally done by Bertsekas and Ioffe. We provide an original performance bound that can be applied to such an undiscounted control problem. Our empirical results are different from those of Bertsekas and Ioffe (which were originally qualified as "paradoxical" and "intriguing"), and much more conform to what one would expect from a learning experiment. We discuss the possible reason for such a difference.
[ { "created": "Mon, 5 Nov 2007 17:07:22 GMT", "version": "v1" }, { "created": "Fri, 9 Nov 2007 15:46:43 GMT", "version": "v2" }, { "created": "Tue, 13 Nov 2007 12:34:37 GMT", "version": "v3" }, { "created": "Mon, 3 Oct 2011 11:58:38 GMT", "version": "v4" }, { "created": "Tue, 11 Oct 2011 12:42:24 GMT", "version": "v5" } ]
2015-03-13
[ [ "Scherrer", "Bruno", "", "INRIA Lorraine - LORIA" ] ]
null
0711.1814
Francesca A. Lisi
Francesca A. Lisi
Building Rules on Top of Ontologies for the Semantic Web with Inductive Logic Programming
30 pages, 6 figures
null
null
null
[ "cs.LG", "cs.AI" ]
null
Building rules on top of ontologies is the ultimate goal of the logical layer of the Semantic Web. To this aim an ad-hoc mark-up language for this layer is currently under discussion. It is intended to follow the tradition of hybrid knowledge representation and reasoning systems such as $\mathcal{AL}$-log that integrates the description logic $\mathcal{ALC}$ and the function-free Horn clausal language \textsc{Datalog}. In this paper we consider the problem of automating the acquisition of these rules for the Semantic Web. We propose a general framework for rule induction that adopts the methodological apparatus of Inductive Logic Programming and relies on the expressive and deductive power of $\mathcal{AL}$-log. The framework is valid whatever the scope of induction (description vs. prediction) is. Yet, for illustrative purposes, we also discuss an instantiation of the framework which aims at description and turns out to be useful in Ontology Refinement. Keywords: Inductive Logic Programming, Hybrid Knowledge Representation and Reasoning Systems, Ontologies, Semantic Web. Note: To appear in Theory and Practice of Logic Programming (TPLP)
[ { "created": "Mon, 12 Nov 2007 17:15:34 GMT", "version": "v1" } ]
2007-11-13
[ [ "Lisi", "Francesca A.", "" ] ]
null
0711.4902
Mikko Alava
Mikko Alava, John Ardelius, Erik Aurell, Petteri Kaski, Supriya Krishnamurthy, Pekka Orponen, and Sakari Seitz
Circumspect descent prevails in solving random constraint satisfaction problems
6 figures, about 17 pates
null
10.1073/pnas.0712263105
null
[ "cond-mat.stat-mech", "cs.DS", "cs.AI" ]
null
We study the performance of stochastic local search algorithms for random instances of the $K$-satisfiability ($K$-SAT) problem. We introduce a new stochastic local search algorithm, ChainSAT, which moves in the energy landscape of a problem instance by {\em never going upwards} in energy. ChainSAT is a \emph{focused} algorithm in the sense that it considers only variables occurring in unsatisfied clauses. We show by extensive numerical investigations that ChainSAT and other focused algorithms solve large $K$-SAT instances almost surely in linear time, up to high clause-to-variable ratios $\alpha$; for example, for K=4 we observe linear-time performance well beyond the recently postulated clustering and condensation transitions in the solution space. The performance of ChainSAT is a surprise given that by design the algorithm gets trapped into the first local energy minimum it encounters, yet no such minima are encountered. We also study the geometry of the solution space as accessed by stochastic local search algorithms.
[ { "created": "Fri, 30 Nov 2007 11:01:40 GMT", "version": "v1" } ]
2009-11-13
[ [ "Alava", "Mikko", "" ], [ "Ardelius", "John", "" ], [ "Aurell", "Erik", "" ], [ "Kaski", "Petteri", "" ], [ "Krishnamurthy", "Supriya", "" ], [ "Orponen", "Pekka", "" ], [ "Seitz", "Sakari", "" ] ]
null
0712.1345
Giorgi Japaridze
Giorgi Japaridze
Sequential operators in computability logic
To appear in "Information and Computation"
Information and Computation 206 (2008), pp. 1443-1475
10.1016/j.ic.2008.10.001
null
[ "cs.LO", "math.LO", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computability logic (CL) (see http://www.cis.upenn.edu/~giorgi/cl.html) is a semantical platform and research program for redeveloping logic as a formal theory of computability, as opposed to the formal theory of truth which it has more traditionally been. Formulas in CL stand for (interactive) computational problems, understood as games between a machine and its environment; logical operators represent operations on such entities; and "truth" is understood as existence of an effective solution, i.e., of an algorithmic winning strategy. The formalism of CL is open-ended, and may undergo series of extensions as the study of the subject advances. The main groups of operators on which CL has been focused so far are the parallel, choice, branching, and blind operators. The present paper introduces a new important group of operators, called sequential. The latter come in the form of sequential conjunction and disjunction, sequential quantifiers, and sequential recurrences. As the name may suggest, the algorithmic intuitions associated with this group are those of sequential computations, as opposed to the intuitions of parallel computations associated with the parallel group of operations: playing a sequential combination of games means playing its components in a sequential fashion, one after one. The main technical result of the present paper is a sound and complete axiomatization of the propositional fragment of computability logic whose vocabulary, together with negation, includes all three -- parallel, choice and sequential -- sorts of conjunction and disjunction. An extension of this result to the first-order level is also outlined.
[ { "created": "Sun, 9 Dec 2007 16:59:35 GMT", "version": "v1" }, { "created": "Wed, 15 Oct 2008 07:44:55 GMT", "version": "v2" } ]
2011-04-15
[ [ "Japaridze", "Giorgi", "" ] ]
null
0712.2497
Fangwen Fu
Fangwen Fu and Mihaela van der Schaar
A New Theoretic Foundation for Cross-Layer Optimization
39 pages, 10 figures, technical report
null
null
null
[ "cs.LG", "cs.NI" ]
null
Cross-layer optimization solutions have been proposed in recent years to improve the performance of network users operating in a time-varying, error-prone wireless environment. However, these solutions often rely on ad-hoc optimization approaches, which ignore the different environmental dynamics experienced at various layers by a user and violate the layered network architecture of the protocol stack by requiring layers to provide access to their internal protocol parameters to other layers. This paper presents a new theoretic foundation for cross-layer optimization, which allows each layer to make autonomous decisions individually, while maximizing the utility of the wireless user by optimally determining what information needs to be exchanged among layers. Hence, this cross-layer framework does not change the current layered architecture. Specifically, because the wireless user interacts with the environment at various layers of the protocol stack, the cross-layer optimization problem is formulated as a layered Markov decision process (MDP) in which each layer adapts its own protocol parameters and exchanges information (messages) with other layers in order to cooperatively maximize the performance of the wireless user. The message exchange mechanism for determining the optimal cross-layer transmission strategies has been designed for both off-line optimization and on-line dynamic adaptation. We also show that many existing cross-layer optimization algorithms can be formulated as simplified, sub-optimal, versions of our layered MDP framework.
[ { "created": "Sat, 15 Dec 2007 06:50:43 GMT", "version": "v1" } ]
2007-12-18
[ [ "Fu", "Fangwen", "" ], [ "van der Schaar", "Mihaela", "" ] ]
null
0712.3329
Marcus Hutter
Shane Legg and Marcus Hutter
Universal Intelligence: A Definition of Machine Intelligence
50 gentle pages
Minds & Machines, 17:4 (2007) pages 391-444
null
IDSIA-10-07
[ "cs.AI" ]
null
A fundamental problem in artificial intelligence is that nobody really knows what intelligence is. The problem is especially acute when we need to consider artificial systems which are significantly different to humans. In this paper we approach this problem in the following way: We take a number of well known informal definitions of human intelligence that have been given by experts, and extract their essential features. These are then mathematically formalised to produce a general measure of intelligence for arbitrary machines. We believe that this equation formally captures the concept of machine intelligence in the broadest reasonable sense. We then show how this formal definition is related to the theory of universal optimal learning agents. Finally, we survey the many other tests and definitions of intelligence that have been proposed for machines.
[ { "created": "Thu, 20 Dec 2007 05:50:54 GMT", "version": "v1" } ]
2008-06-26
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
null
0712.3825
Marcus Hutter
Shane Legg and Marcus Hutter
Tests of Machine Intelligence
12 pages; 1 table. Turing test and derivatives; Compression tests; Linguistic complexity; Multiple cognitive abilities; Competitive games; Psychometric tests; Smith's test; C-test; Universal intelligence
50 Years of Artificial Intelligence (2007) pages 232-242
null
IDSIA-11-07
[ "cs.AI" ]
null
Although the definition and measurement of intelligence is clearly of fundamental importance to the field of artificial intelligence, no general survey of definitions and tests of machine intelligence exists. Indeed few researchers are even aware of alternatives to the Turing test and its many derivatives. In this paper we fill this gap by providing a short survey of the many tests of machine intelligence that have been proposed.
[ { "created": "Sat, 22 Dec 2007 01:17:24 GMT", "version": "v1" } ]
2008-06-26
[ [ "Legg", "Shane", "" ], [ "Hutter", "Marcus", "" ] ]
null
0712.4273
Olivier Cappe
Olivier Capp\'e (LTCI), Eric Moulines (LTCI)
Online EM Algorithm for Latent Data Models
Version that includes the corrigendum published in volume 73, part 5 (2011), of the Journal of the Royal Statistical Society, Series B + the correction of a typo in Eqs. (32-33)
Journal of the Royal Statistical Society: Series B, Royal Statistical Society, 2009, 71 (3), pp.593-613
10.1111/j.1467-9868.2009.00698.x
null
[ "stat.CO", "cs.LG" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this contribution, we propose a generic online (also sometimes called adaptive or recursive) version of the Expectation-Maximisation (EM) algorithm applicable to latent variable models of independent observations. Compared to the algorithm of Titterington (1984), this approach is more directly connected to the usual EM algorithm and does not rely on integration with respect to the complete data distribution. The resulting algorithm is usually simpler and is shown to achieve convergence to the stationary points of the Kullback-Leibler divergence between the marginal distribution of the observation and the model distribution at the optimal rate, i.e., that of the maximum likelihood estimator. In addition, the proposed approach is also suitable for conditional (or regression) models, as illustrated in the case of the mixture of linear regressions model.
[ { "created": "Thu, 27 Dec 2007 19:44:34 GMT", "version": "v1" }, { "created": "Thu, 4 Sep 2008 14:36:55 GMT", "version": "v2" }, { "created": "Fri, 2 Dec 2011 14:59:41 GMT", "version": "v3" }, { "created": "Wed, 1 Mar 2017 13:40:32 GMT", "version": "v4" } ]
2017-03-02
[ [ "Cappé", "Olivier", "", "LTCI" ], [ "Moulines", "Eric", "", "LTCI" ] ]
null
0801.1179
Bernard Jacquemin
Bernard Jacquemin (ISC, UMR 7044, GERIICO), Sabine Ploux (ISC)
Corpus sp{\'e}cialis{\'e} et ressource de sp{\'e}cialit{\'e}
16 pages, in French
Appears in Fran\c{c}ois Maniez; Pascaline Dury; Nathalie Arlin; Claire Rougemont. Corpus et dictionnaires de langues de sp{\'e}cialit{\'e}, Presses Universitaires de Granoble, pp.197-212, 2008
null
null
[ "cs.CL", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
"Semantic Atlas" is a mathematic and statistic model to visualise word senses according to relations between words. The model, that has been applied to proximity relations from a corpus, has shown its ability to distinguish word senses as the corpus' contributors comprehend them. We propose to use the model and a specialised corpus in order to create automatically a specialised dictionary relative to the corpus' domain. A morpho-syntactic analysis performed on the corpus makes it possible to create the dictionary from syntactic relations between lexical units. The semantic resource can be used to navigate semantically - and not only lexically - through the corpus, to create classical dictionaries or for diachronic studies of the language.
[ { "created": "Tue, 8 Jan 2008 08:21:26 GMT", "version": "v1" }, { "created": "Fri, 19 Jun 2015 12:22:39 GMT", "version": "v2" } ]
2015-06-22
[ [ "Jacquemin", "Bernard", "", "ISC, UMR 7044, GERIICO" ], [ "Ploux", "Sabine", "", "ISC" ] ]
null
0801.1275
Christophe Roche
Christophe Roche (LISTIC)
Le terme et le concept : fondements d'une ontoterminologie
22 pages
Dans TOTh 2007 : Terminologie et Ontologie : Th\'eories et Applications - TOTh 2007 : Terminologie et Ontologie : Th\'eories et Applications, Annecy : France (2007)
null
null
[ "cs.AI" ]
null
Most definitions of ontology, viewed as a "specification of a conceptualization", agree on the fact that if an ontology can take different forms, it necessarily includes a vocabulary of terms and some specification of their meaning in relation to the domain's conceptualization. And as domain knowledge is mainly conveyed through scientific and technical texts, we can hope to extract some useful information from them for building ontology. But is it as simple as this? In this article we shall see that the lexical structure, i.e. the network of words linked by linguistic relationships, does not necessarily match the domain conceptualization. We have to bear in mind that writing documents is the concern of textual linguistics, of which one of the principles is the incompleteness of text, whereas building ontology - viewed as task-independent knowledge - is concerned with conceptualization based on formal and not natural languages. Nevertheless, the famous Sapir and Whorf hypothesis, concerning the interdependence of thought and language, is also applicable to formal languages. This means that the way an ontology is built and a concept is defined depends directly on the formal language which is used; and the results will not be the same. The introduction of the notion of ontoterminology allows to take into account epistemological principles for formal ontology building.
[ { "created": "Tue, 8 Jan 2008 20:12:02 GMT", "version": "v1" } ]
2008-01-09
[ [ "Roche", "Christophe", "", "LISTIC" ] ]
null
0801.1883
Andras Lorincz
Barnabas Poczos and Andras Lorincz
D-optimal Bayesian Interrogation for Parameter and Noise Identification of Recurrent Neural Networks
null
null
null
null
[ "cs.NE", "math.IT", "cs.IT" ]
null
We introduce a novel online Bayesian method for the identification of a family of noisy recurrent neural networks (RNNs). We develop Bayesian active learning technique in order to optimize the interrogating stimuli given past experiences. In particular, we consider the unknown parameters as stochastic variables and use the D-optimality principle, also known as `\emph{infomax method}', to choose optimal stimuli. We apply a greedy technique to maximize the information gain concerning network parameters at each time step. We also derive the D-optimal estimation of the additive noise that perturbs the dynamical system of the RNN. Our analytical results are approximation-free. The analytic derivation gives rise to attractive quadratic update rules.
[ { "created": "Sat, 12 Jan 2008 08:02:12 GMT", "version": "v1" } ]
2008-01-15
[ [ "Poczos", "Barnabas", "" ], [ "Lorincz", "Andras", "" ] ]
null
0801.3147
Ke Xu
Liang Li, Xin Li, Tian Liu, Ke Xu
From k-SAT to k-CSP: Two Generalized Algorithms
null
null
null
null
[ "cs.CC", "cs.DS", "cs.AI" ]
null
Constraint satisfaction problems (CSPs) models many important intractable NP-hard problems such as propositional satisfiability problem (SAT). Algorithms with non-trivial upper bounds on running time for restricted SAT with bounded clause length k (k-SAT) can be classified into three styles: DPLL-like, PPSZ-like and Local Search, with local search algorithms having already been generalized to CSP with bounded constraint arity k (k-CSP). We generalize a DPLL-like algorithm in its simplest form and a PPSZ-like algorithm from k-SAT to k-CSP. As far as we know, this is the first attempt to use PPSZ-like strategy to solve k-CSP, and before little work has been focused on the DPLL-like or PPSZ-like strategies for k-CSP.
[ { "created": "Mon, 21 Jan 2008 08:07:33 GMT", "version": "v1" } ]
2008-01-22
[ [ "Li", "Liang", "" ], [ "Li", "Xin", "" ], [ "Liu", "Tian", "" ], [ "Xu", "Ke", "" ] ]
null
0801.3547
Uwe Aickelin
Steve Cazyer and Uwe Aickelin
A Recommender System based on the Immune Network
null
Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2002), pp 807-813, Honolulu, USA, 2002
null
null
[ "cs.NE", "cs.AI" ]
null
The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an artificial immune system (AIS) that exploits some of these characteristics and is applied to the task of film recommendation by collaborative filtering (CF). Natural evolution and in particular the immune system have not been designed for classical optimisation. However, for this problem, we are not interested in finding a single optimum. Rather we intend to identify a sub-set of good matches on which recommendations can be based. It is our hypothesis that an AIS built on two central aspects of the biological immune system will be an ideal candidate to achieve this: Antigen - antibody interaction for matching and antibody - antibody interaction for diversity. Computational results are presented in support of this conjecture and compared to those found by other CF techniques.
[ { "created": "Wed, 23 Jan 2008 10:42:49 GMT", "version": "v1" }, { "created": "Mon, 3 Mar 2008 17:09:24 GMT", "version": "v2" } ]
2010-07-05
[ [ "Cazyer", "Steve", "" ], [ "Aickelin", "Uwe", "" ] ]
null
0802.1393
Clement Jonquet
Cl\'ement Jonquet (LIRMM), Stefano A. Cerri (LIRMM)
Les Agents comme des interpr\'eteurs Scheme : Sp\'ecification dynamique par la communication
null
Dans 14\`eme Congr\`es Francophone AFRIF-AFIA de Reconnaissance des Formes et Intelligence Artificielle - RFIA'04, Toulouse : France (2004)
null
null
[ "cs.AI", "cs.MA" ]
null
We proposed in previous papers an extension and an implementation of the STROBE model, which regards the Agents as Scheme interpreters. These Agents are able to interpret messages in a dedicated environment including an interpreter that learns from the current conversation therefore representing evolving meta-level Agent's knowledge. When the Agent's interpreter is a nondeterministic one, the dialogues may consist of subsequent refinements of specifications in the form of constraint sets. The paper presents a worked out example of dynamic service generation - such as necessary on Grids - by exploiting STROBE Agents equipped with a nondeterministic interpreter. It shows how enabling dynamic specification of a problem. Then it illustrates how these principles could be effective for other applications. Details of the implementation are not provided here, but are available.
[ { "created": "Mon, 11 Feb 2008 08:55:46 GMT", "version": "v1" } ]
2008-02-12
[ [ "Jonquet", "Clément", "", "LIRMM" ], [ "Cerri", "Stefano A.", "", "LIRMM" ] ]
null
0802.2001
Uwe Aickelin
Uwe Aickelin and Kathryn Dowsland
Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
null
Journal of Scheduling, 3(3), pp 139-153, 2000
10.1002/(SICI)1099-1425(200005/06)3:3<139::AID-JOS41>3.0.CO;2-2
null
[ "cs.NE", "cs.CE" ]
null
There is considerable interest in the use of genetic algorithms to solve problems arising in the areas of scheduling and timetabling. However, the classical genetic algorithm paradigm is not well equipped to handle the conflict between objectives and constraints that typically occurs in such problems. In order to overcome this, successful implementations frequently make use of problem specific knowledge. This paper is concerned with the development of a GA for a nurse rostering problem at a major UK hospital. The structure of the constraints is used as the basis for a co-evolutionary strategy using co-operating sub-populations. Problem specific knowledge is also used to define a system of incentives and disincentives, and a complementary mutation operator. Empirical results based on 52 weeks of live data show how these features are able to improve an unsuccessful canonical GA to the point where it is able to provide a practical solution to the problem
[ { "created": "Thu, 14 Feb 2008 11:25:37 GMT", "version": "v1" }, { "created": "Mon, 3 Mar 2008 16:56:56 GMT", "version": "v2" }, { "created": "Fri, 16 May 2008 10:44:23 GMT", "version": "v3" } ]
2010-07-05
[ [ "Aickelin", "Uwe", "" ], [ "Dowsland", "Kathryn", "" ] ]
null
0802.2305
Ping Li
Ping Li
Compressed Counting
null
null
null
null
[ "cs.DS", "cs.DM", "math.IT", "cs.IT", "cs.CC", "cs.LG" ]
null
Counting is among the most fundamental operations in computing. For example, counting the pth frequency moment has been a very active area of research, in theoretical computer science, databases, and data mining. When p=1, the task (i.e., counting the sum) can be accomplished using a simple counter. Compressed Counting (CC) is proposed for efficiently computing the pth frequency moment of a data stream signal A_t, where 0<p<=2. CC is applicable if the streaming data follow the Turnstile model, with the restriction that at the time t for the evaluation, A_t[i]>= 0, which includes the strict Turnstile model as a special case. For natural data streams encountered in practice, this restriction is minor. The underly technique for CC is what we call skewed stable random projections, which captures the intuition that, when p=1 a simple counter suffices, and when p = 1+/\Delta with small \Delta, the sample complexity of a counter system should be low (continuously as a function of \Delta). We show at small \Delta the sample complexity (number of projections) k = O(1/\epsilon) instead of O(1/\epsilon^2). Compressed Counting can serve a basic building block for other tasks in statistics and computing, for example, estimation entropies of data streams, parameter estimations using the method of moments and maximum likelihood. Finally, another contribution is an algorithm for approximating the logarithmic norm, \sum_{i=1}^D\log A_t[i], and logarithmic distance. The logarithmic distance is useful in machine learning practice with heavy-tailed data.
[ { "created": "Sun, 17 Feb 2008 16:42:52 GMT", "version": "v1" }, { "created": "Sun, 24 Feb 2008 09:51:09 GMT", "version": "v2" } ]
2008-02-24
[ [ "Li", "Ping", "" ] ]
null
0802.3137
Wolfgang Faber
Wolfgang Faber, Gerald Pfeifer, Nicola Leone, Tina Dell'Armi, Giuseppe Ielpa
Design and Implementation of Aggregate Functions in the DLV System
34 pages, 7 figures. This article has been accepted for publication in Theory and Practice of Logic Programming, Cambridge University Press
null
null
null
[ "cs.LO", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Disjunctive Logic Programming (DLP) is a very expressive formalism: it allows for expressing every property of finite structures that is decidable in the complexity class SigmaP2 (= NP^NP). Despite this high expressiveness, there are some simple properties, often arising in real-world applications, which cannot be encoded in a simple and natural manner. Especially properties that require the use of arithmetic operators (like sum, times, or count) on a set or multiset of elements, which satisfy some conditions, cannot be naturally expressed in classic DLP. To overcome this deficiency, we extend DLP by aggregate functions in a conservative way. In particular, we avoid the introduction of constructs with disputed semantics, by requiring aggregates to be stratified. We formally define the semantics of the extended language (called DLP^A), and illustrate how it can be profitably used for representing knowledge. Furthermore, we analyze the computational complexity of DLP^A, showing that the addition of aggregates does not bring a higher cost in that respect. Finally, we provide an implementation of DLP^A in DLV -- a state-of-the-art DLP system -- and report on experiments which confirm the usefulness of the proposed extension also for the efficiency of computation.
[ { "created": "Thu, 21 Feb 2008 15:44:09 GMT", "version": "v1" } ]
2008-02-22
[ [ "Faber", "Wolfgang", "" ], [ "Pfeifer", "Gerald", "" ], [ "Leone", "Nicola", "" ], [ "Dell'Armi", "Tina", "" ], [ "Ielpa", "Giuseppe", "" ] ]
null
0803.0146
Dorit Hochbaum
Dorit S. Hochbaum
Polynomial time algorithms for bi-criteria, multi-objective and ratio problems in clustering and imaging. Part I: Normalized cut and ratio regions
15 pages, 4 figures
IEEE Transactions on Pattern Analysis and Machine Intelligence, May 2010 32:5 889-898
null
null
[ "cs.DM", "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Partitioning and grouping of similar objects plays a fundamental role in image segmentation and in clustering problems. In such problems a typical goal is to group together similar objects, or pixels in the case of image processing. At the same time another goal is to have each group distinctly dissimilar from the rest and possibly to have the group size fairly large. These goals are often combined as a ratio optimization problem. One example of such problem is the normalized cut problem, another is the ratio regions problem. We devise here the first polynomial time algorithms solving these problems optimally. The algorithms are efficient and combinatorial. This contrasts with the heuristic approaches used in the image segmentation literature that formulate those problems as nonlinear optimization problems, which are then relaxed and solved with spectral techniques in real numbers. These approaches not only fail to deliver an optimal solution, but they are also computationally expensive. The algorithms presented here use as a subroutine a minimum $s,t-cut procedure on a related graph which is of polynomial size. The output consists of the optimal solution to the respective ratio problem, as well as a sequence of nested solution with respect to any relative weighting of the objectives of the numerator and denominator. An extension of the results here to bi-criteria and multi-criteria objective functions is presented in part II.
[ { "created": "Sun, 2 Mar 2008 21:30:58 GMT", "version": "v1" } ]
2010-10-12
[ [ "Hochbaum", "Dorit S.", "" ] ]
null
0803.0194
Radu Arsinte
Radu Arsinte, Costin Miron
Acquisition Accuracy Evaluation in Visual Inspection Systems - a Practical Approach
6 pages, 4 figures, ETc'96 Conference paper
Proceeedings of ETc '96 Conference, 1996, Timisoara, Romania
null
null
[ "cs.MM", "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper draws a proposal of a set of parameters and methods for accuracy evaluation of visual inspection systems. The case of a monochrome board is treated, but practically all conclusions and methods may be extended for colour acquisition. Basically, the proposed parameters are grouped in five sets as follows:Internal noise;Video ADC cuantisation parameters;Analogue processing section parameters;Dominant frequencies;Synchronisation (lock-in) accuracy. On basis of this set of parameters was developed a software environment, in conjunction with a test signal generator that allows the "test" images. The paper also presents conclusions of evaluation for two types of video acquisition boards
[ { "created": "Mon, 3 Mar 2008 08:57:10 GMT", "version": "v1" } ]
2008-03-04
[ [ "Arsinte", "Radu", "" ], [ "Miron", "Costin", "" ] ]
null
0803.1586
Jeroen Vendrig
Jarrad Springett, Jeroen Vendrig
Spatio-activity based object detection
To be submitted to: AVSS 2008 conference
null
null
null
[ "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the SAMMI lightweight object detection method which has a high level of accuracy and robustness, and which is able to operate in an environment with a large number of cameras. Background modeling is based on DCT coefficients provided by cameras. Foreground detection uses similarity in temporal characteristics of adjacent blocks of pixels, which is a computationally inexpensive way to make use of object coherence. Scene model updating uses the approximated median method for improved performance. Evaluation at pixel level and application level shows that SAMMI object detection performs better and faster than the conventional Mixture of Gaussians method.
[ { "created": "Tue, 11 Mar 2008 13:40:42 GMT", "version": "v1" } ]
2008-12-18
[ [ "Springett", "Jarrad", "" ], [ "Vendrig", "Jeroen", "" ] ]
null
0803.2306
Valentin Goranko
Valentin Goranko and Dmitry Shkatov
Tableau-based decision procedures for logics of strategic ability in multi-agent systems
To appear in ACM Transactions on Computational Logic. 48 pages
null
null
null
[ "cs.MA", "cs.LO", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop an incremental tableau-based decision procedures for the Alternating-time temporal logic ATL and some of its variants. While running within the theoretically established complexity upper bound, we claim that our tableau is practically more efficient in the average case than other decision procedures for ATL known so far. Besides, the ease of its adaptation to variants of ATL demonstrates the flexibility of the proposed procedure.
[ { "created": "Sat, 15 Mar 2008 16:22:53 GMT", "version": "v1" }, { "created": "Tue, 9 Sep 2008 10:53:22 GMT", "version": "v2" } ]
2008-09-09
[ [ "Goranko", "Valentin", "" ], [ "Shkatov", "Dmitry", "" ] ]
null
0803.3186
Denis Pallez
Denis Pallez (I3S), Laurent Brisson (I3S), Thierry Baccino (LPEQ)
Towards a human eye behavior model by applying Data Mining Techniques on Gaze Information from IEC
null
Dans Proceedings of the Third International Conference on Human Centered Processes - Human Centered Processes, Delft : Pays-Bas (2008)
null
null
[ "cs.NE", "cs.HC" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we firstly present what is Interactive Evolutionary Computation (IEC) and rapidly how we have combined this artificial intelligence technique with an eye-tracker for visual optimization. Next, in order to correctly parameterize our application, we present results from applying data mining techniques on gaze information coming from experiments conducted on about 80 human individuals.
[ { "created": "Fri, 21 Mar 2008 15:38:25 GMT", "version": "v1" } ]
2008-12-18
[ [ "Pallez", "Denis", "", "I3S" ], [ "Brisson", "Laurent", "", "I3S" ], [ "Baccino", "Thierry", "", "LPEQ" ] ]
null
0803.3490
Huan Xu Mr.
Huan Xu, Constantine Caramanis and Shie Mannor
Robustness and Regularization of Support Vector Machines
null
Journal of Machine Learning Research, vol 10, 1485-1510, year 2009
null
null
[ "cs.LG", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider regularized support vector machines (SVMs) and show that they are precisely equivalent to a new robust optimization formulation. We show that this equivalence of robust optimization and regularization has implications for both algorithms, and analysis. In terms of algorithms, the equivalence suggests more general SVM-like algorithms for classification that explicitly build in protection to noise, and at the same time control overfitting. On the analysis front, the equivalence of robustness and regularization, provides a robust optimization interpretation for the success of regularized SVMs. We use the this new robustness interpretation of SVMs to give a new proof of consistency of (kernelized) SVMs, thus establishing robustness as the reason regularized SVMs generalize well.
[ { "created": "Tue, 25 Mar 2008 03:51:59 GMT", "version": "v1" }, { "created": "Tue, 11 Nov 2008 22:36:47 GMT", "version": "v2" } ]
2010-02-25
[ [ "Xu", "Huan", "" ], [ "Caramanis", "Constantine", "" ], [ "Mannor", "Shie", "" ] ]
null
0803.3746
Leonid Litinskii
Leonid B. Litinskii
Cluster Approach to the Domains Formation
11 pages, 5 figures, PDF-file
Optical Memory & Neural Networks (Information Optics), 2007, v.16(3) pp.144-153
null
null
[ "cs.NE", "cs.DS" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a rule, a quadratic functional depending on a great number of binary variables has a lot of local minima. One of approaches allowing one to find in averaged deeper local minima is aggregation of binary variables into larger blocks/domains. To minimize the functional one has to change the states of aggregated variables (domains). In the present publication we discuss methods of domains formation. It is shown that the best results are obtained when domains are formed by variables that are strongly connected with each other.
[ { "created": "Wed, 26 Mar 2008 15:14:33 GMT", "version": "v1" } ]
2008-03-27
[ [ "Litinskii", "Leonid B.", "" ] ]
null
0804.2155
Joseph Y. Halpern
Joseph Y. Halpern
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
null
null
null
null
[ "cs.LO", "cs.CR", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A first-order conditional logic is considered, with semantics given by a variant of epsilon-semantics, where p -> q means that Pr(q | p) approaches 1 super-polynomially --faster than any inverse polynomial. This type of convergence is needed for reasoning about security protocols. A complete axiomatization is provided for this semantics, and it is shown how a qualitative proof of the correctness of a security protocol can be automatically converted to a quantitative proof appropriate for reasoning about concrete security.
[ { "created": "Mon, 14 Apr 2008 12:06:04 GMT", "version": "v1" } ]
2008-12-18
[ [ "Halpern", "Joseph Y.", "" ] ]
null
0804.3835
Jin Yu
Jin Yu, S.V.N. Vishwanathan, Simon Guenter, and Nicol N. Schraudolph
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
null
Journal of Machine Learning Research 11(Mar):1145-1200, 2010
null
null
[ "math.OC", "stat.ML" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by generalizing three components of BFGS to subdifferentials: the local quadratic model, the identification of a descent direction, and the Wolfe line search conditions. We prove that under some technical conditions, the resulting subBFGS algorithm is globally convergent in objective function value. We apply its memory-limited variant (subLBFGS) to L_2-regularized risk minimization with the binary hinge loss. To extend our algorithm to the multiclass and multilabel settings, we develop a new, efficient, exact line search algorithm. We prove its worst-case time complexity bounds, and show that our line search can also be used to extend a recently developed bundle method to the multiclass and multilabel settings. We also apply the direction-finding component of our algorithm to L_1-regularized risk minimization with logistic loss. In all these contexts our methods perform comparable to or better than specialized state-of-the-art solvers on a number of publicly available datasets. An open source implementation of our algorithms is freely available.
[ { "created": "Thu, 24 Apr 2008 04:38:54 GMT", "version": "v1" }, { "created": "Tue, 29 Apr 2008 09:08:14 GMT", "version": "v2" }, { "created": "Sun, 11 May 2008 02:54:28 GMT", "version": "v3" }, { "created": "Sat, 29 Nov 2008 05:07:29 GMT", "version": "v4" }, { "created": "Mon, 22 Feb 2010 08:53:56 GMT", "version": "v5" } ]
2010-11-30
[ [ "Yu", "Jin", "" ], [ "Vishwanathan", "S. V. N.", "" ], [ "Guenter", "Simon", "" ], [ "Schraudolph", "Nicol N.", "" ] ]
null
0804.4075
Wan Ahmad Tajuddin Wan Abdullah
Saratha Sathasivam (USM), Wan Ahmad Tajuddin Wan Abdullah (Univ Malaya)
Logic Learning in Hopfield Networks
To appear in Mod. Appl. Sci
null
null
null
[ "cs.NE", "cs.LO" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synaptic weights for neurons in logic programming can be calculated either by using Hebbian learning or by Wan Abdullah's method. In other words, Hebbian learning for governing events corresponding to some respective program clauses is equivalent with learning using Wan Abdullah's method for the same respective program clauses. In this paper we will evaluate experimentally the equivalence between these two types of learning through computer simulations.
[ { "created": "Fri, 25 Apr 2008 09:46:46 GMT", "version": "v1" } ]
2008-04-28
[ [ "Sathasivam", "Saratha", "", "USM" ], [ "Abdullah", "Wan Ahmad Tajuddin Wan", "", "Univ\n Malaya" ] ]
null
0804.4347
Sossio Vergara
Sossio Vergara
Nonorthogonal Bases and Phase Decomposition: Properties and Applications
11 pages
Published in : Digital Signal Processing (2014), pp. 223-230
null
null
[ "math.FA", "cs.NA", "cs.SD" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous paper [1] it was discussed the viability of functional analysis using as a basis a couple of generic functions, and hence vectorial decomposition. Here we complete the paradigm exploiting one of the analysis methodologies developed there, but applied to phase coordinates, so needing only one function as a basis. It will be shown that, thanks to the novel iterative analysis, any function satisfying a rather loose requisite is ontologically a basis. This in turn generalizes the polar version of the Fourier theorem to an ample class of nonorthogonal bases. The main advantage of this generalization is that it inherits some of the properties of the original Fourier theorem. As a result the new transform has a wide range of applications and some remarkable consequences. The new tool will be compared with wavelets and frames. Examples of analysis and reconstruction of functions using the developed algorithms and generic bases will be given. Some of the properties, and applications that can promptly benefit from the theory, will be discussed. The implementation of a matched filter for noise suppression will be used as an example of the potential of the theory.
[ { "created": "Mon, 28 Apr 2008 08:59:52 GMT", "version": "v1" }, { "created": "Sat, 23 Nov 2013 08:32:29 GMT", "version": "v2" } ]
2013-11-26
[ [ "Vergara", "Sossio", "" ] ]
null
0804.4395
Icius Committee
My Pham, Thanh Tung Nguyen, Nam Seo Goo
Development of a peristaltic micropump for bio-medical applications based on mini LIPCA
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 6 pages, 9 figures, 1 tables
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-B002
null
null
[ "cs.RO" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the design, fabrication, and experimental characterization of a peristaltic micropump. The micropump is composed of two layers fabricated from polydimethylsiloxane (PDMS) material. The first layer has a rectangular channel and two valve seals. Three rectangular mini lightweight piezo-composite actuators are integrated in the second layer, and used as actuation parts. Two layers are bonded, and covered by two polymethyl methacrylate (PMMA) plates, which help increase the stiffness of the micropump. A maximum flow rate of 900 mokroliter per min and a maximum backpressure of 1.8 kPa are recorded when water is used as pump liquid. We measured the power consumption of the micropump. The micropump is found to be a promising candidate for bio-medical application due to its bio-compatibility, portability, bidirectionality, and simple effective design.
[ { "created": "Mon, 28 Apr 2008 12:59:55 GMT", "version": "v1" } ]
2008-04-29
[ [ "Pham", "My", "" ], [ "Nguyen", "Thanh Tung", "" ], [ "Goo", "Nam Seo", "" ] ]
null
0805.0697
Tshilidzi Marwala
Meir Perez and Tshilidzi Marwala
Stochastic Optimization Approaches for Solving Sudoku
13 pages
null
10.1016/j.eswa.2012.04.019
null
[ "cs.NE" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the Sudoku problem is solved using stochastic search techniques and these are: Cultural Genetic Algorithm (CGA), Repulsive Particle Swarm Optimization (RPSO), Quantum Simulated Annealing (QSA) and the Hybrid method that combines Genetic Algorithm with Simulated Annealing (HGASA). The results obtained show that the CGA, QSA and HGASA are able to solve the Sudoku puzzle with CGA finding a solution in 28 seconds, while QSA finding a solution in 65 seconds and HGASA in 1.447 seconds. This is mainly because HGASA combines the parallel searching of GA with the flexibility of SA. The RPSO was found to be unable to solve the puzzle.
[ { "created": "Tue, 6 May 2008 11:06:49 GMT", "version": "v1" } ]
2012-04-25
[ [ "Perez", "Meir", "" ], [ "Marwala", "Tshilidzi", "" ] ]
null
0805.1785
Michael Hilker
Michael Hilker
Distributed Self Management for Distributed Security Systems
12 pages, 3 figures
Proceedings of the 2nd International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2007), September 2007, Zhengzhou, China
null
null
[ "cs.AI", "cs.MA" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed system as e.g. artificial immune systems, complex adaptive systems, or multi-agent systems are widely used in Computer Science, e.g. for network security, optimisations, or simulations. In these systems, small entities move through the network and perform certain tasks. At some time, the entities move to another place and require therefore information where to move is most profitable. Common used systems do not provide any information or use a centralised approach where a center delegates the entities. This article discusses whether small information about the neighbours enhances the performance of the overall system or not. Therefore, two information-protocols are introduced and analysed. In addition, the protocols are implemented and tested using the artificial immune system SANA that protects a network against intrusions.
[ { "created": "Tue, 13 May 2008 06:32:12 GMT", "version": "v1" } ]
2008-05-14
[ [ "Hilker", "Michael", "" ] ]
null
0805.2537
Patrick Henry
Patrick Henry, Christian Bassac (LaBRI)
A toolkit for a generative lexicon
poster - 6 pages
Dans A toolkit for a Generative Lexicon - Fourth International Workshop on Generative Approaches to the Lexicon, PARIS : France (2007)
null
null
[ "cs.CL" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the conception of a software toolkit designed for the construction, maintenance and collaborative use of a Generative Lexicon. In order to ease its portability and spreading use, this tool was built with free and open source products. We eventually tested the toolkit and showed it filters the adequate form of anaphoric reference to the modifier in endocentric compounds.
[ { "created": "Fri, 16 May 2008 13:58:44 GMT", "version": "v1" } ]
2008-12-18
[ [ "Henry", "Patrick", "", "LaBRI" ], [ "Bassac", "Christian", "", "LaBRI" ] ]
null
0805.3273
Pranab K. Sen
Pranab K. Sen
Kendall's tau in high-dimensional genomic parsimony
Published in at http://dx.doi.org/10.1214/074921708000000183 the IMS Collections (http://www.imstat.org/publications/imscollections.htm) by the Institute of Mathematical Statistics (http://www.imstat.org)
IMS Collections 2008, Vol. 3, 251-266
10.1214/074921708000000183
IMS-COLL3-IMSCOLL318
[ "math.ST", "stat.ML", "stat.TH", "stat.ME" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-dimensional data models, often with low sample size, abound in many interdisciplinary studies, genomics and large biological systems being most noteworthy. The conventional assumption of multinormality or linearity of regression may not be plausible for such models which are likely to be statistically complex due to a large number of parameters as well as various underlying restraints. As such, parametric approaches may not be very effective. Anything beyond parametrics, albeit, having increased scope and robustness perspectives, may generally be baffled by the low sample size and hence unable to give reasonable margins of errors. Kendall's tau statistic is exploited in this context with emphasis on dimensional rather than sample size asymptotics. The Chen--Stein theorem has been thoroughly appraised in this study. Applications of these findings in some microarray data models are illustrated.
[ { "created": "Wed, 21 May 2008 13:13:30 GMT", "version": "v1" } ]
2008-12-18
[ [ "Sen", "Pranab K.", "" ] ]
null
0805.4521
Doina Tatar
Doina Tatar and Militon Frentiu
Textual Entailment Recognizing by Theorem Proving Approach
10 pages
Studia Univ.Babes-Bolyai, Informatica, Vol.LI, Number 2, 2006
null
null
[ "cs.CL" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present two original methods for recognizing textual inference. First one is a modified resolution method such that some linguistic considerations are introduced in the unification of two atoms. The approach is possible due to the recent methods of transforming texts in logic formulas. Second one is based on semantic relations in text, as presented in WordNet. Some similarities between these two methods are remarked.
[ { "created": "Thu, 29 May 2008 11:53:39 GMT", "version": "v1" } ]
2008-05-30
[ [ "Tatar", "Doina", "" ], [ "Frentiu", "Militon", "" ] ]
null
0806.1797
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2)
A new generalization of the proportional conflict redistribution rule stable in terms of decision
null
Advances and Applications of DSmT for Information Fusion, Florentin Smarandache & Jean Dezert (Ed.) (2006) 69-88
null
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this chapter, we present and discuss a new generalized proportional conflict redistribution rule. The Dezert-Smarandache extension of the Demster-Shafer theory has relaunched the studies on the combination rules especially for the management of the conflict. Many combination rules have been proposed in the last few years. We study here different combination rules and compare them in terms of decision on didactic example and on generated data. Indeed, in real applications, we need a reliable decision and it is the final results that matter. This chapter shows that a fine proportional conflict redistribution rule must be preferred for the combination in the belief function theory.
[ { "created": "Wed, 11 Jun 2008 07:05:48 GMT", "version": "v1" } ]
2008-12-18
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ] ]
null
0806.2581
Doina Tatar
Doina Tatar, Gabriela Serban, Andreea Mihis, Mihaiela Lupea, Dana Lupsa and Militon Frentiu
A chain dictionary method for Word Sense Disambiguation and applications
8 pages, 5 figures
Studia Universitatis Babes-Bolyai, Special Issue, KEPT 2007, Knowledge Engineering: Principles and Technologies, Cluj-Napoca, June 6-8, 2007, pp 33-40,
null
null
[ "cs.CL" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large class of unsupervised algorithms for Word Sense Disambiguation (WSD) is that of dictionary-based methods. Various algorithms have as the root Lesk's algorithm, which exploits the sense definitions in the dictionary directly. Our approach uses the lexical base WordNet for a new algorithm originated in Lesk's, namely "chain algorithm for disambiguation of all words", CHAD. We show how translation from a language into another one and also text entailment verification could be accomplished by this disambiguation.
[ { "created": "Mon, 16 Jun 2008 13:48:55 GMT", "version": "v1" } ]
2008-12-18
[ [ "Tatar", "Doina", "" ], [ "Serban", "Gabriela", "" ], [ "Mihis", "Andreea", "" ], [ "Lupea", "Mihaiela", "" ], [ "Lupsa", "Dana", "" ], [ "Frentiu", "Militon", "" ] ]
null
0806.3765
Philipp Mayr
Philipp Mayr, Vivien Petras
Cross-concordances: terminology mapping and its effectiveness for information retrieval
19 pages, 4 figures, 11 tables, IFLA conference 2008
null
null
null
[ "cs.DL", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The German Federal Ministry for Education and Research funded a major terminology mapping initiative, which found its conclusion in 2007. The task of this terminology mapping initiative was to organize, create and manage 'cross-concordances' between controlled vocabularies (thesauri, classification systems, subject heading lists) centred around the social sciences but quickly extending to other subject areas. 64 crosswalks with more than 500,000 relations were established. In the final phase of the project, a major evaluation effort to test and measure the effectiveness of the vocabulary mappings in an information system environment was conducted. The paper reports on the cross-concordance work and evaluation results.
[ { "created": "Mon, 23 Jun 2008 20:37:10 GMT", "version": "v1" } ]
2008-06-25
[ [ "Mayr", "Philipp", "" ], [ "Petras", "Vivien", "" ] ]
null
0806.4021
Agus Budiyono PhD
Agus Budiyono, H.Y Sutarto
Linear Parameter Varying Model Identification for Control of Rotorcraft-based UAV
6 pages, 6 figures; Fifth Indonesia-Taiwan Workshop on Aeronautical Science, Technology and Industry, Tainan, Taiwan, November 13-16, 2006
null
null
null
[ "cs.RO" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rotorcraft-based unmanned aerial vehicle exhibits more complex properties compared to its full-size counterparts due to its increased sensitivity to control inputs and disturbances and higher bandwidth of its dynamics. As an aerial vehicle with vertical take-off and landing capability, the helicopter specifically poses a difficult problem of transition between forward flight and unstable hover and vice versa. The LPV control technique explicitly takes into account the change in performance due to the real-time parameter variations. The technique therefore theoretically guarantees the performance and robustness over the entire operating envelope. In this study, we investigate a new approach implementing model identification for use in the LPV control framework. The identification scheme employs recursive least square technique implemented on the LPV system represented by dynamics of helicopter during a transition. The airspeed as the scheduling of parameter trajectory is not assumed to vary slowly. The exclusion of slow parameter change requirement allows for the application of the algorithm for aggressive maneuvering capability without the need of expensive computation. The technique is tested numerically and will be validated in the autonomous flight of a small scale helicopter.
[ { "created": "Wed, 25 Jun 2008 04:09:29 GMT", "version": "v1" } ]
2008-06-26
[ [ "Budiyono", "Agus", "" ], [ "Sutarto", "H. Y", "" ] ]
null
0806.4341
Vladimir Vyugin
Vladimir V. V'yugin
On Sequences with Non-Learnable Subsequences
null
LNCS 5010, pp. 302-313, 2008
null
null
[ "cs.LG", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The remarkable results of Foster and Vohra was a starting point for a series of papers which show that any sequence of outcomes can be learned (with no prior knowledge) using some universal randomized forecasting algorithm and forecast-dependent checking rules. We show that for the class of all computationally efficient outcome-forecast-based checking rules, this property is violated. Moreover, we present a probabilistic algorithm generating with probability close to one a sequence with a subsequence which simultaneously miscalibrates all partially weakly computable randomized forecasting algorithms. %subsequences non-learnable by each randomized algorithm. According to the Dawid's prequential framework we consider partial recursive randomized algorithms.
[ { "created": "Thu, 26 Jun 2008 15:21:00 GMT", "version": "v1" } ]
2008-06-27
[ [ "V'yugin", "Vladimir V.", "" ] ]
null
0807.0337
Emanuel Diamant
Emanuel Diamant
Unveiling the mystery of visual information processing in human brain
Accepted to be published in Brain Research (BRES-38102)
null
null
null
[ "cs.IR", "q-bio.NC", "math.IT", "cs.IT", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is generally accepted that human vision is an extremely powerful information processing system that facilitates our interaction with the surrounding world. However, despite extended and extensive research efforts, which encompass many exploration fields, the underlying fundamentals and operational principles of visual information processing in human brain remain unknown. We still are unable to figure out where and how along the path from eyes to the cortex the sensory input perceived by the retina is converted into a meaningful object representation, which can be consciously manipulated by the brain. Studying the vast literature considering the various aspects of brain information processing, I was surprised to learn that the respected scholarly discussion is totally indifferent to the basic keynote question: "What is information?" in general or "What is visual information?" in particular. In the old days, it was assumed that any scientific research approach has first to define its basic departure points. Why was it overlooked in brain information processing research remains a conundrum. In this paper, I am trying to find a remedy for this bizarre situation. I propose an uncommon definition of "information", which can be derived from Kolmogorov's Complexity Theory and Chaitin's notion of Algorithmic Information. Embracing this new definition leads to an inevitable revision of traditional dogmas that shape the state of the art of brain information processing research. I hope this revision would better serve the challenging goal of human visual information processing modeling.
[ { "created": "Wed, 2 Jul 2008 12:33:48 GMT", "version": "v1" } ]
2008-07-07
[ [ "Diamant", "Emanuel", "" ] ]
null
0807.4417
Daniel Sonntag
Daniel Sonntag
On Introspection, Metacognitive Control and Augmented Data Mining Live Cycles
10 pages, 3 figures
null
null
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss metacognitive modelling as an enhancement to cognitive modelling and computing. Metacognitive control mechanisms should enable AI systems to self-reflect, reason about their actions, and to adapt to new situations. In this respect, we propose implementation details of a knowledge taxonomy and an augmented data mining life cycle which supports a live integration of obtained models.
[ { "created": "Mon, 28 Jul 2008 12:05:16 GMT", "version": "v1" }, { "created": "Thu, 15 Jan 2009 15:43:21 GMT", "version": "v2" } ]
2009-01-15
[ [ "Sonntag", "Daniel", "" ] ]
null
0808.2670
Mat\'u\v{s} Medo
Tao Zhou, Zoltan Kuscsik, Jian-Guo Liu, Matus Medo, Joseph R. Wakeling, Yi-Cheng Zhang
Solving the apparent diversity-accuracy dilemma of recommender systems
10 pages, 9 figures, 4 tables (final version with supporting information included)
PNAS 107, 4511-4515, 2010
10.1073/pnas.1000488107
null
[ "physics.soc-ph", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recommender systems use data on past user preferences to predict possible future likes and interests. A key challenge is that while the most useful individual recommendations are to be found among diverse niche objects, the most reliably accurate results are obtained by methods that recommend objects based on user or object similarity. In this paper we introduce a new algorithm specifically to address the challenge of diversity and show how it can be used to resolve this apparent dilemma when combined in an elegant hybrid with an accuracy-focused algorithm. By tuning the hybrid appropriately we are able to obtain, without relying on any semantic or context-specific information, simultaneous gains in both accuracy and diversity of recommendations.
[ { "created": "Tue, 19 Aug 2008 23:17:40 GMT", "version": "v1" }, { "created": "Tue, 24 Mar 2009 16:14:59 GMT", "version": "v2" }, { "created": "Fri, 12 Mar 2010 16:27:39 GMT", "version": "v3" } ]
2010-03-15
[ [ "Zhou", "Tao", "" ], [ "Kuscsik", "Zoltan", "" ], [ "Liu", "Jian-Guo", "" ], [ "Medo", "Matus", "" ], [ "Wakeling", "Joseph R.", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
null
0808.3726
Jianguo Liu
Jian-Guo Liu, Tao Zhou, Bing-Hong Wang, and Yi-Cheng Zhang
Highly accurate recommendation algorithm based on high-order similarities
null
Physica A 389, 881-886 (2010)
10.1016/j.physa.2009.10.027
null
[ "physics.data-an", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this Letter, we introduce a modified collaborative filtering (MCF) algorithm, which has remarkably higher accuracy than the standard collaborative filtering. In the MCF, instead of the standard Pearson coefficient, the user-user similarities are obtained by a diffusion process. Furthermore, by considering the second order similarities, we design an effective algorithm that depresses the influence of mainstream preferences. The corresponding algorithmic accuracy, measured by the ranking score, is further improved by 24.9% in the optimal case. In addition, two significant criteria of algorithmic performance, diversity and popularity, are also taken into account. Numerical results show that the algorithm based on second order similarity can outperform the MCF simultaneously in all three criteria.
[ { "created": "Wed, 27 Aug 2008 15:42:02 GMT", "version": "v1" }, { "created": "Wed, 14 Oct 2009 15:24:36 GMT", "version": "v2" } ]
2015-05-13
[ [ "Liu", "Jian-Guo", "" ], [ "Zhou", "Tao", "" ], [ "Wang", "Bing-Hong", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
null
0809.3182
Damien Chablat
Patricia Ben-Horin (Technion), Moshe Shoham (Technion), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
SINGULAB - A Graphical user Interface for the Singularity Analysis of Parallel Robots based on Grassmann-Cayley Algebra
Advances in Robot Kinematics, Batz sur Mer : France (2008)
null
null
null
[ "cs.RO" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents SinguLab, a graphical user interface for the singularity analysis of parallel robots. The algorithm is based on Grassmann-Cayley algebra. The proposed tool is interactive and introduces the designer to the singularity analysis performed by this method, showing all the stages along the procedure and eventually showing the solution algebraically and graphically, allowing as well the singularity verification of different robot poses.
[ { "created": "Thu, 18 Sep 2008 15:19:36 GMT", "version": "v1" } ]
2008-09-19
[ [ "Ben-Horin", "Patricia", "", "Technion" ], [ "Shoham", "Moshe", "", "Technion" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
null
0809.3214
Soubhik Chakraborty
Soubhik Chakraborty, Sandeep Singh Solanki, Sayan Roy, Shivee Chauhan, Sanjaya Shankar Tripathy and Kartik Mahto
A Statistical Approach to Modeling Indian Classical Music Performance
24 pages,11 figures;a replacement paper is being uploaded because the the nyas swars of Yaman were not correctly given;some typos have been corrected
null
null
null
[ "stat.AP", "cs.SD" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A raga is a melodic structure with fixed notes and a set of rules characterizing a certain mood endorsed through performance. By a vadi swar is meant that note which plays the most significant role in expressing the raga. A samvadi swar similarly is the second most significant note. However, the determination of their significance has an element of subjectivity and hence we are motivated to find some truths through an objective analysis. The paper proposes a probabilistic method of note detection and demonstrates how the relative frequency (relative number of occurrences of the pitch) of the more important notes stabilize far more quickly than that of others. In addition, a count for distinct transitory and similar looking non-transitory (fundamental) frequency movements (but possibly embedding distinct emotions!) between the notes is also taken depicting the varnalankars or musical ornaments decorating the notes and note sequences as rendered by the artist. They reflect certain structural properties of the ragas. Several case studies are presented.
[ { "created": "Thu, 18 Sep 2008 17:38:57 GMT", "version": "v1" }, { "created": "Sat, 25 Oct 2008 14:10:00 GMT", "version": "v2" } ]
2008-10-25
[ [ "Chakraborty", "Soubhik", "" ], [ "Solanki", "Sandeep Singh", "" ], [ "Roy", "Sayan", "" ], [ "Chauhan", "Shivee", "" ], [ "Tripathy", "Sanjaya Shankar", "" ], [ "Mahto", "Kartik", "" ] ]
null
0809.3902
Stefano M. Iacus
Alessandro De Gregorio, Stefano Maria Iacus
Clustering of discretely observed diffusion processes
null
null
null
null
[ "math.PR", "stat.ML", "q-fin.ST", "stat.ME" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a new dissimilarity measure to identify groups of assets dynamics is proposed. The underlying generating process is assumed to be a diffusion process solution of stochastic differential equations and observed at discrete time. The mesh of observations is not required to shrink to zero. As distance between two observed paths, the quadratic distance of the corresponding estimated Markov operators is considered. Analysis of both synthetic data and real financial data from NYSE/NASDAQ stocks, give evidence that this distance seems capable to catch differences in both the drift and diffusion coefficients contrary to other commonly used metrics.
[ { "created": "Tue, 23 Sep 2008 12:31:17 GMT", "version": "v1" } ]
2008-12-02
[ [ "De Gregorio", "Alessandro", "" ], [ "Iacus", "Stefano Maria", "" ] ]
null
0809.4622
Jeremy Fix
J\'er\'emy Fix (INRIA Lorraine - Loria), Nicolas P. Rougier (INRIA Lorraine - Loria, University of Colorado, Boulder), Fr\'ed\'eric Alexandre (INRIA Lorraine - Loria)
A computational approach to the covert and overt deployment of spatial attention
null
Dans NeuroComp 2008 : 2i\`eme Conf\'erence Fran\c{c}aise de Neurosciences Computationnelles (2008)
null
null
[ "cs.NE" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Popular computational models of visual attention tend to neglect the influence of saccadic eye movements whereas it has been shown that the primates perform on average three of them per seconds and that the neural substrate for the deployment of attention and the execution of an eye movement might considerably overlap. Here we propose a computational model in which the deployment of attention with or without a subsequent eye movement emerges from local, distributed and numerical computations.
[ { "created": "Fri, 26 Sep 2008 13:12:36 GMT", "version": "v1" } ]
2008-09-29
[ [ "Fix", "Jérémy", "", "INRIA Lorraine - Loria" ], [ "Rougier", "Nicolas P.", "", "INRIA\n Lorraine - Loria, University of Colorado, Boulder" ], [ "Alexandre", "Frédéric", "", "INRIA Lorraine - Loria" ] ]
null
0810.1207
Pascal Vaillant
Pascal Vaillant
A Layered Grammar Model: Using Tree-Adjoining Grammars to Build a Common Syntactic Kernel for Related Dialects
8 pages, 3 figures, 2 tables. LaTeX 2e using the coling08 style (and standard packages like epsf, amssymb, multirow, url...). Proceedings of the 9th International Workshop on Tree Adjoining Grammars and Related Formalisms. Tuebingen, Baden-Wurttemberg, Germany, 6-8 June 2008
Proceedings of the Ninth International Workshop on Tree Adjoining Grammars and Related Formalisms (TAG+9 2008), p. 157-164. Tuebingen, Baden-Wurttemberg, Germany, 6-8 June 2008
null
null
[ "cs.CL" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes the design of a common syntactic description for the core grammar of a group of related dialects. The common description does not rely on an abstract sub-linguistic structure like a metagrammar: it consists in a single FS-LTAG where the actual specific language is included as one of the attributes in the set of attribute types defined for the features. When the lang attribute is instantiated, the selected subset of the grammar is equivalent to the grammar of one dialect. When it is not, we have a model of a hybrid multidialectal linguistic system. This principle is used for a group of creole languages of the West-Atlantic area, namely the French-based Creoles of Haiti, Guadeloupe, Martinique and French Guiana.
[ { "created": "Tue, 7 Oct 2008 14:50:59 GMT", "version": "v1" } ]
2008-10-08
[ [ "Vaillant", "Pascal", "" ] ]
null
0810.1991
Axel Boldt
Axel Boldt and Michael Janich
A global physician-oriented medical information system
8 pages
null
null
null
[ "cs.CY", "cs.DB", "cs.AI" ]
http://creativecommons.org/licenses/publicdomain/
We propose to improve medical decision making and reduce global health care costs by employing a free Internet-based medical information system with two main target groups: practicing physicians and medical researchers. After acquiring patients' consent, physicians enter medical histories, physiological data and symptoms or disorders into the system; an integrated expert system can then assist in diagnosis and statistical software provides a list of the most promising treatment options and medications, tailored to the patient. Physicians later enter information about the outcomes of the chosen treatments, data the system uses to optimize future treatment recommendations. Medical researchers can analyze the aggregate data to compare various drugs or treatments in defined patient populations on a large scale.
[ { "created": "Sat, 11 Oct 2008 02:01:45 GMT", "version": "v1" } ]
2008-10-14
[ [ "Boldt", "Axel", "" ], [ "Janich", "Michael", "" ] ]
null
0810.2311
Nikolaos Vasiloglou
Nikolaos Vasiloglou, Alexander G. Gray, David V. Anderson
Non-Negative Matrix Factorization, Convexity and Isometry
accpepted in SIAM Data Mining 2009, 12 pages
null
null
null
[ "cs.CV", "cs.AI" ]
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we explore avenues for improving the reliability of dimensionality reduction methods such as Non-Negative Matrix Factorization (NMF) as interpretive exploratory data analysis tools. We first explore the difficulties of the optimization problem underlying NMF, showing for the first time that non-trivial NMF solutions always exist and that the optimization problem is actually convex, by using the theory of Completely Positive Factorization. We subsequently explore four novel approaches to finding globally-optimal NMF solutions using various ideas from convex optimization. We then develop a new method, isometric NMF (isoNMF), which preserves non-negativity while also providing an isometric embedding, simultaneously achieving two properties which are helpful for interpretation. Though it results in a more difficult optimization problem, we show experimentally that the resulting method is scalable and even achieves more compact spectra than standard NMF.
[ { "created": "Mon, 13 Oct 2008 20:43:24 GMT", "version": "v1" }, { "created": "Wed, 22 Apr 2009 16:05:22 GMT", "version": "v2" } ]
2009-04-22
[ [ "Vasiloglou", "Nikolaos", "" ], [ "Gray", "Alexander G.", "" ], [ "Anderson", "David V.", "" ] ]
null
0810.5655
Wenxin Jiang
Wenxin Jiang, Martin A. Tanner
Gibbs posterior for variable selection in high-dimensional classification and data mining
Published in at http://dx.doi.org/10.1214/07-AOS547 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2008, Vol. 36, No. 5, 2207-2231
10.1214/07-AOS547
IMS-AOS-AOS547
[ "stat.ML", "stat.ME" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the popular approach of "Bayesian variable selection" (BVS), one uses prior and posterior distributions to select a subset of candidate variables to enter the model. A completely new direction will be considered here to study BVS with a Gibbs posterior originating in statistical mechanics. The Gibbs posterior is constructed from a risk function of practical interest (such as the classification error) and aims at minimizing a risk function without modeling the data probabilistically. This can improve the performance over the usual Bayesian approach, which depends on a probability model which may be misspecified. Conditions will be provided to achieve good risk performance, even in the presence of high dimensionality, when the number of candidate variables "$K$" can be much larger than the sample size "$n$." In addition, we develop a convenient Markov chain Monte Carlo algorithm to implement BVS with the Gibbs posterior.
[ { "created": "Fri, 31 Oct 2008 10:38:41 GMT", "version": "v1" } ]
2008-11-03
[ [ "Jiang", "Wenxin", "" ], [ "Tanner", "Martin A.", "" ] ]
null
0811.0602
Patricia Gautier
Alain Lelu (LASELDI), Pascal Cuxac (INIST), Joel Johansson (INIST)
Classification dynamique d'un flux documentaire : une \'evaluation statique pr\'ealable de l'algorithme GERMEN
null
JADT 2006 : 8es Journ\'ees internationales d'Analyse statistique des Donn\'ees Textuelles, France (2006)
null
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data-stream clustering is an ever-expanding subdomain of knowledge extraction. Most of the past and present research effort aims at efficient scaling up for the huge data repositories. Our approach focuses on qualitative improvement, mainly for "weak signals" detection and precise tracking of topical evolutions in the framework of information watch - though scalability is intrinsically guaranteed in a possibly distributed implementation. Our GERMEN algorithm exhaustively picks up the whole set of density peaks of the data at time t, by identifying the local perturbations induced by the current document vector, such as changing cluster borders, or new/vanishing clusters. Optimality yields from the uniqueness 1) of the density landscape for any value of our zoom parameter, 2) of the cluster allocation operated by our border propagation rule. This results in a rigorous independence from the data presentation ranking or any initialization parameter. We present here as a first step the only assessment of a static view resulting from one year of the CNRS/INIST Pascal database in the field of geotechnics.
[ { "created": "Tue, 4 Nov 2008 20:42:52 GMT", "version": "v1" } ]
2008-11-05
[ [ "Lelu", "Alain", "", "LASELDI" ], [ "Cuxac", "Pascal", "", "INIST" ], [ "Johansson", "Joel", "", "INIST" ] ]
null
0811.2026
Seyoung Kim
Seyoung Kim, Kyung-Ah Sohn and Eric P. Xing
A Multivariate Regression Approach to Association Analysis of Quantitative Trait Network
Submitted to The American Journal of Human Genetics
null
null
CMU-ML-08-113
[ "q-bio.GN", "q-bio.QM", "stat.ME", "q-bio.MN", "stat.ML" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many complex disease syndromes such as asthma consist of a large number of highly related, rather than independent, clinical phenotypes, raising a new technical challenge in identifying genetic variations associated simultaneously with correlated traits. In this study, we propose a new statistical framework called graph-guided fused lasso (GFlasso) to address this issue in a principled way. Our approach explicitly represents the dependency structure among the quantitative traits as a network, and leverages this trait network to encode structured regularizations in a multivariate regression model over the genotypes and traits, so that the genetic markers that jointly influence subgroups of highly correlated traits can be detected with high sensitivity and specificity. While most of the traditional methods examined each phenotype independently and combined the results afterwards, our approach analyzes all of the traits jointly in a single statistical method, and borrow information across correlated phenotypes to discover the genetic markers that perturbe a subset of correlated triats jointly rather than a single trait. Using simulated datasets based on the HapMap consortium data and an asthma dataset, we compare the performance of our method with the single-marker analysis, and other sparse regression methods such as the ridge regression and the lasso that do not use any structural information in the traits. Our results show that there is a significant advantage in detecting the true causal SNPs when we incorporate the correlation pattern in traits using our proposed methods.
[ { "created": "Thu, 13 Nov 2008 03:44:48 GMT", "version": "v1" } ]
2008-11-16
[ [ "Kim", "Seyoung", "" ], [ "Sohn", "Kyung-Ah", "" ], [ "Xing", "Eric P.", "" ] ]
null
0811.4186
Aleksandar Bradic M
Aleksandar Bradic
Search Result Clustering via Randomized Partitioning of Query-Induced Subgraphs
16th Telecommunications Forum TELFOR 2008
null
null
null
[ "cs.DS", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an approach to search result clustering, using partitioning of underlying link graph. We define the notion of "query-induced subgraph" and formulate the problem of search result clustering as a problem of efficient partitioning of given subgraph into topic-related clusters. Also, we propose a novel algorithm for approximative partitioning of such graph, which results in cluster quality comparable to the one obtained by deterministic algorithms, while operating in more efficient computation time, suitable for practical implementations. Finally, we present a practical clustering search engine developed as a part of this research and use it to get results about real-world performance of proposed concepts.
[ { "created": "Tue, 25 Nov 2008 23:11:55 GMT", "version": "v1" } ]
2008-11-27
[ [ "Bradic", "Aleksandar", "" ] ]
null
0811.4458
Oliver Schulte
Oliver Schulte, Hassan Khosravi, Flavia Moser, Martin Ester
Learning Class-Level Bayes Nets for Relational Data
14 pages (2 column)
null
null
TR 2008-17, School of Computing Science, Simon Fraser University
[ "cs.LG", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many databases store data in relational format, with different types of entities and information about links between the entities. The field of statistical-relational learning (SRL) has developed a number of new statistical models for such data. In this paper we focus on learning class-level or first-order dependencies, which model the general database statistics over attributes of linked objects and links (e.g., the percentage of A grades given in computer science classes). Class-level statistical relationships are important in themselves, and they support applications like policy making, strategic planning, and query optimization. Most current SRL methods find class-level dependencies, but their main task is to support instance-level predictions about the attributes or links of specific entities. We focus only on class-level prediction, and describe algorithms for learning class-level models that are orders of magnitude faster for this task. Our algorithms learn Bayes nets with relational structure, leveraging the efficiency of single-table nonrelational Bayes net learners. An evaluation of our methods on three data sets shows that they are computationally feasible for realistic table sizes, and that the learned structures represent the statistical information in the databases well. After learning compiles the database statistics into a Bayes net, querying these statistics via Bayes net inference is faster than with SQL queries, and does not depend on the size of the database.
[ { "created": "Thu, 27 Nov 2008 01:02:33 GMT", "version": "v1" }, { "created": "Tue, 20 Oct 2009 18:58:20 GMT", "version": "v2" } ]
2009-10-20
[ [ "Schulte", "Oliver", "" ], [ "Khosravi", "Hassan", "" ], [ "Moser", "Flavia", "" ], [ "Ester", "Martin", "" ] ]
null
0812.0340
Simon Morgan
Simon P. Morgan, Wotao Yin, Kevin R. Vixie
A Matlab Implementation of a Flat Norm Motivated Polygonal Edge Matching Method using a Decomposition of Boundary into Four 1-Dimensional Currents
Contains Matlab code and 4 figures
null
null
null
[ "cs.CG", "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe and provide code and examples for a polygonal edge matching method.
[ { "created": "Mon, 1 Dec 2008 18:59:52 GMT", "version": "v1" }, { "created": "Thu, 1 Oct 2009 18:44:03 GMT", "version": "v2" } ]
2013-08-12
[ [ "Morgan", "Simon P.", "" ], [ "Yin", "Wotao", "" ], [ "Vixie", "Kevin R.", "" ] ]
null
0812.2388
Vyacheslav Yukalov
V.I. Yukalov and D. Sornette
Physics of risk and uncertainty in quantum decision making
Latex file, 30 pages. Published variant
Eur. Phys. J. B 71 (2009) 533-548
10.1140/epjb/e2009-00245-9
null
[ "quant-ph", "physics.soc-ph", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Quantum Decision Theory, developed recently by the authors, is applied to clarify the role of risk and uncertainty in decision making and in particular in relation to the phenomenon of dynamic inconsistency. By formulating this notion in precise mathematical terms, we distinguish three types of inconsistency: time inconsistency, planning paradox, and inconsistency occurring in some discounting effects. While time inconsistency is well accounted for in classical decision theory, the planning paradox is in contradiction with classical utility theory. It finds a natural explanation in the frame of the Quantum Decision Theory. Different types of discounting effects are analyzed and shown to enjoy a straightforward explanation within the suggested theory. We also introduce a general methodology based on self-similar approximation theory for deriving the evolution equations for the probabilities of future prospects. This provides a novel classification of possible discount factors, which include the previously known cases (exponential or hyperbolic discounting), but also predicts a novel class of discount factors that decay to a strictly positive constant for very large future time horizons. This class may be useful to deal with very long-term discounting situations associated with intergenerational public policy choices, encompassing issues such as global warming and nuclear waste disposal.
[ { "created": "Fri, 12 Dec 2008 14:46:41 GMT", "version": "v1" }, { "created": "Wed, 21 Oct 2009 09:50:11 GMT", "version": "v2" } ]
2015-05-13
[ [ "Yukalov", "V. I.", "" ], [ "Sornette", "D.", "" ] ]
null
0812.4580
Marcus Hutter
Marcus Hutter
Feature Markov Decision Processes
7 pages
Proc. 2nd Conf. on Artificial General Intelligence (AGI 2009) pages 61-66
null
null
[ "math.IT", "cs.LG", "cs.IT", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
General purpose intelligent learning agents cycle through (complex,non-MDP) sequences of observations, actions, and rewards. On the other hand, reinforcement learning is well-developed for small finite state Markov Decision Processes (MDPs). So far it is an art performed by human designers to extract the right state representation out of the bare observations, i.e. to reduce the agent setup to the MDP framework. Before we can think of mechanizing this search for suitable MDPs, we need a formal objective criterion. The main contribution of this article is to develop such a criterion. I also integrate the various parts into one learning algorithm. Extensions to more realistic dynamic Bayesian networks are developed in a companion article.
[ { "created": "Thu, 25 Dec 2008 00:27:22 GMT", "version": "v1" } ]
2009-12-30
[ [ "Hutter", "Marcus", "" ] ]
null
0901.0296
Joseph Kong
Joseph S. Kong, Nima Sarshar, Vwani P. Roychowdhury
Experience versus Talent Shapes the Structure of the Web
null
Proceedings of the National Academy of Sciences (PNAS), Vol. 105, Pages 13724-13729, 2008
10.1073/pnas.0805921105
null
[ "cs.CY", "physics.soc-ph", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use sequential large-scale crawl data to empirically investigate and validate the dynamics that underlie the evolution of the structure of the web. We find that the overall structure of the web is defined by an intricate interplay between experience or entitlement of the pages (as measured by the number of inbound hyperlinks a page already has), inherent talent or fitness of the pages (as measured by the likelihood that someone visiting the page would give a hyperlink to it), and the continual high rates of birth and death of pages on the web. We find that the web is conservative in judging talent and the overall fitness distribution is exponential, showing low variability. The small variance in talent, however, is enough to lead to experience distributions with high variance: The preferential attachment mechanism amplifies these small biases and leads to heavy-tailed power-law (PL) inbound degree distributions over all pages, as well as over pages that are of the same age. The balancing act between experience and talent on the web allows newly introduced pages with novel and interesting content to grow quickly and surpass older pages. In this regard, it is much like what we observe in high-mobility and meritocratic societies: People with entitlement continue to have access to the best resources, but there is just enough screening for fitness that allows for talented winners to emerge and join the ranks of the leaders. Finally, we show that the fitness estimates have potential practical applications in ranking query results.
[ { "created": "Fri, 2 Jan 2009 23:11:08 GMT", "version": "v1" } ]
2009-01-06
[ [ "Kong", "Joseph S.", "" ], [ "Sarshar", "Nima", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
null
0901.0760
Marco Duarte
Mark A. Davenport, Chinmay Hegde, Marco F. Duarte, and Richard G. Baraniuk
A Theoretical Analysis of Joint Manifolds
24 pages, 4 figures. Corrected typo on grant number in acknowledgements, page 1
null
null
TREE0901, Department of Electrical and Computer Engineering, Rice University
[ "cs.LG", "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emergence of low-cost sensor architectures for diverse modalities has made it possible to deploy sensor arrays that capture a single event from a large number of vantage points and using multiple modalities. In many scenarios, these sensors acquire very high-dimensional data such as audio signals, images, and video. To cope with such high-dimensional data, we typically rely on low-dimensional models. Manifold models provide a particularly powerful model that captures the structure of high-dimensional data when it is governed by a low-dimensional set of parameters. However, these models do not typically take into account dependencies among multiple sensors. We thus propose a new joint manifold framework for data ensembles that exploits such dependencies. We show that simple algorithms can exploit the joint manifold structure to improve their performance on standard signal processing applications. Additionally, recent results concerning dimensionality reduction for manifolds enable us to formulate a network-scalable data compression scheme that uses random projections of the sensed data. This scheme efficiently fuses the data from all sensors through the addition of such projections, regardless of the data modalities and dimensions.
[ { "created": "Wed, 7 Jan 2009 06:47:47 GMT", "version": "v1" }, { "created": "Wed, 9 Dec 2009 07:18:30 GMT", "version": "v2" } ]
2009-12-09
[ [ "Davenport", "Mark A.", "" ], [ "Hegde", "Chinmay", "" ], [ "Duarte", "Marco F.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
null
0901.1144
Arturo Berrones
Arturo Berrones
Bayesian Inference Based on Stationary Fokker-Planck Sampling
Accepted in Neural Computation
null
null
null
[ "cs.NE", "physics.data-an", "cond-mat.dis-nn" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel formalism for Bayesian learning in the context of complex inference models is proposed. The method is based on the use of the Stationary Fokker--Planck (SFP) approach to sample from the posterior density. Stationary Fokker--Planck sampling generalizes the Gibbs sampler algorithm for arbitrary and unknown conditional densities. By the SFP procedure approximate analytical expressions for the conditionals and marginals of the posterior can be constructed. At each stage of SFP, the approximate conditionals are used to define a Gibbs sampling process, which is convergent to the full joint posterior. By the analytical marginals efficient learning methods in the context of Artificial Neural Networks are outlined. Off--line and incremental Bayesian inference and Maximum Likelihood Estimation from the posterior is performed in classification and regression examples. A comparison of SFP with other Monte Carlo strategies in the general problem of sampling from arbitrary densities is also presented. It is shown that SFP is able to jump large low--probabilty regions without the need of a careful tuning of any step size parameter. In fact, the SFP method requires only a small set of meaningful parameters which can be selected following clear, problem--independent guidelines. The computation cost of SFP, measured in terms of loss function evaluations, grows linearly with the given model's dimension.
[ { "created": "Thu, 8 Jan 2009 22:09:02 GMT", "version": "v1" }, { "created": "Mon, 22 Jun 2009 15:40:00 GMT", "version": "v2" }, { "created": "Mon, 26 Oct 2009 01:02:27 GMT", "version": "v3" } ]
2009-10-26
[ [ "Berrones", "Arturo", "" ] ]
null
0901.2216
Animesh Mukherjee
Animesh Mukherjee, Monojit Choudhury and Ravi Kannan
Discovering Global Patterns in Linguistic Networks through Spectral Analysis: A Case Study of the Consonant Inventories
In the proceedings of EACL 2009
null
null
null
[ "physics.data-an", "cs.CL" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research has shown that language and the socio-cognitive phenomena associated with it can be aptly modeled and visualized through networks of linguistic entities. However, most of the existing works on linguistic networks focus only on the local properties of the networks. This study is an attempt to analyze the structure of languages via a purely structural technique, namely spectral analysis, which is ideally suited for discovering the global correlations in a network. Application of this technique to PhoNet, the co-occurrence network of consonants, not only reveals several natural linguistic principles governing the structure of the consonant inventories, but is also able to quantify their relative importance. We believe that this powerful technique can be successfully applied, in general, to study the structure of natural languages.
[ { "created": "Thu, 15 Jan 2009 10:22:28 GMT", "version": "v1" } ]
2009-01-18
[ [ "Mukherjee", "Animesh", "" ], [ "Choudhury", "Monojit", "" ], [ "Kannan", "Ravi", "" ] ]
null
0901.2376
Sumio Watanabe
Sumio Watanabe
A Limit Theorem in Singular Regression Problem
16 pages
null
null
null
[ "cs.LG" ]
http://creativecommons.org/licenses/publicdomain/
In statistical problems, a set of parameterized probability distributions is used to estimate the true probability distribution. If Fisher information matrix at the true distribution is singular, then it has been left unknown what we can estimate about the true distribution from random samples. In this paper, we study a singular regression problem and prove a limit theorem which shows the relation between the singular regression problem and two birational invariants, a real log canonical threshold and a singular fluctuation. The obtained theorem has an important application to statistics, because it enables us to estimate the generalization error from the training error without any knowledge of the true probability distribution.
[ { "created": "Fri, 16 Jan 2009 01:00:39 GMT", "version": "v1" } ]
2009-01-19
[ [ "Watanabe", "Sumio", "" ] ]
null
0901.3608
Christoph Benzmueller
Christoph Benzmueller
A remark on higher order RUE-resolution with EXTRUE
3 pages
SEKI Report (ISSN 1437-4447), Saarland University, 1999
null
SR-02-05
[ "cs.LO", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a prominent counterexample for the completeness of first order RUE-resolution does not apply to the higher order RUE-resolution approach EXTRUE.
[ { "created": "Fri, 23 Jan 2009 06:18:30 GMT", "version": "v1" } ]
2009-01-26
[ [ "Benzmueller", "Christoph", "" ] ]
null
0901.4137
Marcus Hutter
Marcus Hutter
Practical Robust Estimators for the Imprecise Dirichlet Model
22 pages, 2 figures
International Journal of Approximate Reasoning, 50:2 (2009) pages 231-242
null
null
[ "math.ST", "stat.ML", "cs.LG", "stat.TH" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Walley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends the classical Dirichlet model to a set of priors. It overcomes several fundamental problems which other approaches to uncertainty suffer from. Yet, to be useful in practice, one needs efficient ways for computing the imprecise=robust sets or intervals. The main objective of this work is to derive exact, conservative, and approximate, robust and credible interval estimates under the IDM for a large class of statistical estimators, including the entropy and mutual information.
[ { "created": "Mon, 26 Jan 2009 23:05:06 GMT", "version": "v1" } ]
2009-12-30
[ [ "Hutter", "Marcus", "" ] ]
null
0901.4761
Philippe Fournier-Viger
P. Fournier-Viger, R. Nkambou and E. Mephu Nguifo
A Knowledge Discovery Framework for Learning Task Models from User Interactions in Intelligent Tutoring Systems
Proceedings of the 7th Mexican International Conference on Artificial Intelligence (MICAI 2008), Springer, pp. 765-778
null
10.1007/978-3-540-88636-5
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain experts should provide relevant domain knowledge to an Intelligent Tutoring System (ITS) so that it can guide a learner during problemsolving learning activities. However, for many ill-defined domains, the domain knowledge is hard to define explicitly. In previous works, we showed how sequential pattern mining can be used to extract a partial problem space from logged user interactions, and how it can support tutoring services during problem-solving exercises. This article describes an extension of this approach to extract a problem space that is richer and more adapted for supporting tutoring services. We combined sequential pattern mining with (1) dimensional pattern mining (2) time intervals, (3) the automatic clustering of valued actions and (4) closed sequences mining. Some tutoring services have been implemented and an experiment has been conducted in a tutoring system.
[ { "created": "Thu, 29 Jan 2009 19:58:09 GMT", "version": "v1" } ]
2009-01-30
[ [ "Fournier-Viger", "P.", "" ], [ "Nkambou", "R.", "" ], [ "Nguifo", "E. Mephu", "" ] ]
null
0901.4953
Marcelo Hashimoto
Marcelo Hashimoto and Roberto M. Cesar Jr
A Keygraph Classification Framework for Real-Time Object Detection
9 pages, 23 figures
null
null
null
[ "cs.CV" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new approach for keypoint-based object detection. Traditional keypoint-based methods consist in classifying individual points and using pose estimation to discard misclassifications. Since a single point carries no relational features, such methods inherently restrict the usage of structural information to the pose estimation phase. Therefore, the classifier considers purely appearance-based feature vectors, thus requiring computationally expensive feature extraction or complex probabilistic modelling to achieve satisfactory robustness. In contrast, our approach consists in classifying graphs of keypoints, which incorporates structural information during the classification phase and allows the extraction of simpler feature vectors that are naturally robust. In the present work, 3-vertices graphs have been considered, though the methodology is general and larger order graphs may be adopted. Successful experimental results obtained for real-time object detection in video sequences are reported.
[ { "created": "Fri, 30 Jan 2009 19:38:44 GMT", "version": "v1" } ]
2009-02-02
[ [ "Hashimoto", "Marcelo", "" ], [ "Cesar", "Roberto M.", "Jr" ] ]
null
0902.1258
Baptiste Jeudy
Baptiste Jeudy (LAHC), Fran\c{c}ois Rioult (GREYC)
Extraction de concepts sous contraintes dans des donn\'ees d'expression de g\`enes
null
Conf\'erence sur l'apprentissage automatique, Nice : France (2005)
null
null
[ "cs.LG" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a technique to extract constrained formal concepts.
[ { "created": "Sat, 7 Feb 2009 18:01:09 GMT", "version": "v1" } ]
2009-02-10
[ [ "Jeudy", "Baptiste", "", "LAHC" ], [ "Rioult", "François", "", "GREYC" ] ]
null
0902.1690
Anna Kucerova
A. Kucerova, M. Leps and J. Zeman
Back analysis of microplane model parameters using soft computing methods
21 pages, 27 figures, 7 tables
CAMES: Computer Assisted Mechanics and Engineering Sciences, 14 (2), 219-242, 2007
null
null
[ "cs.NE", "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new procedure based on layered feed-forward neural networks for the microplane material model parameters identification is proposed in the present paper. Novelties are usage of the Latin Hypercube Sampling method for the generation of training sets, a systematic employment of stochastic sensitivity analysis and a genetic algorithm-based training of a neural network by an evolutionary algorithm. Advantages and disadvantages of this approach together with possible extensions are thoroughly discussed and analyzed.
[ { "created": "Tue, 10 Feb 2009 16:43:06 GMT", "version": "v1" } ]
2009-02-11
[ [ "Kucerova", "A.", "" ], [ "Leps", "M.", "" ], [ "Zeman", "J.", "" ] ]
null
0902.1834
Sebastien Tixeuil
St\'ephane Devismes (VERIMAG - IMAG), Franck Petit (LIP, INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme), S\'ebastien Tixeuil (LIP6)
Optimal Probabilistic Ring Exploration by Asynchronous Oblivious Robots
null
null
null
RR-6838
[ "cs.DC", "cs.RO", "cs.DS", "cs.CC" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a team of $k$ identical, oblivious, asynchronous mobile robots that are able to sense (\emph{i.e.}, view) their environment, yet are unable to communicate, and evolve on a constrained path. Previous results in this weak scenario show that initial symmetry yields high lower bounds when problems are to be solved by \emph{deterministic} robots. In this paper, we initiate research on probabilistic bounds and solutions in this context, and focus on the \emph{exploration} problem of anonymous unoriented rings of any size. It is known that $\Theta(\log n)$ robots are necessary and sufficient to solve the problem with $k$ deterministic robots, provided that $k$ and $n$ are coprime. By contrast, we show that \emph{four} identical probabilistic robots are necessary and sufficient to solve the same problem, also removing the coprime constraint. Our positive results are constructive.
[ { "created": "Wed, 11 Feb 2009 10:18:32 GMT", "version": "v1" } ]
2009-09-30
[ [ "Devismes", "Stéphane", "", "VERIMAG - IMAG" ], [ "Petit", "Franck", "", "LIP, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
null
0902.2186
Travis Deyle
Young Sang Choi, Travis Deyle, Charles C. Kemp
A List of Household Objects for Robotic Retrieval Prioritized by People with ALS (Version 092008)
null
null
null
null
[ "cs.RO", "cs.HC" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This technical report is designed to serve as a citable reference for the original prioritized object list that the Healthcare Robotics Lab at Georgia Tech released on its website in September of 2008. It is also expected to serve as the primary citable reference for the research associated with this list until the publication of a detailed, peer-reviewed paper. The original prioritized list of object classes resulted from a needs assessment involving 8 motor-impaired patients with amyotrophic lateral sclerosis (ALS) and targeted, in-person interviews of 15 motor-impaired ALS patients. All of these participants were drawn from the Emory ALS Center. The prioritized object list consists of 43 object classes ranked by how important the participants considered each class to be for retrieval by an assistive robot. We intend for this list to be used by researchers to inform the design and benchmarking of robotic systems, especially research related to autonomous mobile manipulation.
[ { "created": "Thu, 12 Feb 2009 18:18:42 GMT", "version": "v1" } ]
2009-02-13
[ [ "Choi", "Young Sang", "" ], [ "Deyle", "Travis", "" ], [ "Kemp", "Charles C.", "" ] ]
null
0902.2362
Christophe Lecoutre
Olivier Roussel, Christophe Lecoutre
XML Representation of Constraint Networks: Format XCSP 2.1
null
null
null
null
[ "cs.AI" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new extended format to represent constraint networks using XML. This format allows us to represent constraints defined either in extension or in intension. It also allows us to reference global constraints. Any instance of the problems CSP (Constraint Satisfaction Problem), QCSP (Quantified CSP) and WCSP (Weighted CSP) can be represented using this format.
[ { "created": "Fri, 13 Feb 2009 18:24:27 GMT", "version": "v1" } ]
2009-02-16
[ [ "Roussel", "Olivier", "" ], [ "Lecoutre", "Christophe", "" ] ]
null
0902.3130
Servane Gey
Servane Gey (MAP5)
Risk Bounds for CART Classifiers under a Margin Condition
null
Pattern Recognition 45 (2012) 3523-3534
10.1016/j.patcog.2012.02.021
MAP5 2009-04
[ "math.ST", "stat.ML", "stat.TH" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Risk bounds for Classification and Regression Trees (CART, Breiman et. al. 1984) classifiers are obtained under a margin condition in the binary supervised classification framework. These risk bounds are obtained conditionally on the construction of the maximal deep binary tree and permit to prove that the linear penalty used in the CART pruning algorithm is valid under a margin condition. It is also shown that, conditionally on the construction of the maximal tree, the final selection by test sample does not alter dramatically the estimation accuracy of the Bayes classifier. In the two-class classification framework, the risk bounds that are proved, obtained by using penalized model selection, validate the CART algorithm which is used in many data mining applications such as Biology, Medicine or Image Coding.
[ { "created": "Wed, 18 Feb 2009 13:20:10 GMT", "version": "v1" }, { "created": "Mon, 2 Mar 2009 14:34:13 GMT", "version": "v2" }, { "created": "Wed, 12 Aug 2009 19:29:08 GMT", "version": "v3" }, { "created": "Fri, 2 Jul 2010 14:38:40 GMT", "version": "v4" }, { "created": "Thu, 1 Mar 2012 14:11:49 GMT", "version": "v5" } ]
2012-06-27
[ [ "Gey", "Servane", "", "MAP5" ] ]
null
0902.4042
Leonard Kwuida
Rokia Missaoui, Leonard Kwuida, Mohamed Quafafou, Jean Vaillancourt
Algebraic operators for querying pattern bases
null
null
null
null
[ "cs.DB", "cs.IR" ]
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objectives of this research work which is intimately related to pattern discovery and management are threefold: (i) handle the problem of pattern manipulation by defining operations on patterns, (ii) study the problem of enriching and updating a pattern set (e.g., concepts, rules) when changes occur in the user's needs and the input data (e.g., object/attribute insertion or elimination, taxonomy utilization), and (iii) approximate a "presumed" concept using a related pattern space so that patterns can augment data with knowledge. To conduct our work, we use formal concept analysis (FCA) as a framework for pattern discovery and management and we take a joint database-FCA perspective by defining operators similar in spirit to relational algebra operators, investigating approximation in concept lattices and exploiting existing work related to operations on contexts and lattices to formalize such operators.
[ { "created": "Tue, 24 Feb 2009 00:43:56 GMT", "version": "v1" } ]
2009-02-25
[ [ "Missaoui", "Rokia", "" ], [ "Kwuida", "Leonard", "" ], [ "Quafafou", "Mohamed", "" ], [ "Vaillancourt", "Jean", "" ] ]
null
README.md exists but content is empty.
Downloads last month
17