Fast Methods for Kernel-based Text Analysis

Size: px
Start display at page:

Download "Fast Methods for Kernel-based Text Analysis"

Transcription

1 Proceedings of the 41st Annua Meeting of the Association for Computationa Linguistics, Juy 2003, pp Fast Methods for Kerne-based Text Anaysis Taku Kudo and Yuji Matsumoto Graduate Schoo of Information Science, Nara Institute of Science and Technoogy Abstract Kerne-based earning (e.g., Support Vector Machines has been successfuy appied to many hard probems in Natura Language Processing (NLP. In NLP, athough feature combinations are crucia to improving performance, they are heuristicay seected. Kerne methods change this situation. The merit of the kerne methods is that effective feature combination is impicity expanded without oss of generaity and increasing the computationa costs. Kerne-based text anaysis shows an exceent performance in terms in accuracy; however, these methods are usuay too sow to appy to arge-scae text anaysis. In this paper, we extend a Basket Mining agorithm to convert a kerne-based cassifier into a simpe and fast inear cassifier. Experimenta resuts on Engish BaseNP Chunking, Japanese Word Segmentation and Japanese Dependency Parsing show that our new cassifiers are about 30 to 300 times faster than the standard kerne-based cassifiers. 1 Introduction Kerne methods (e.g., Support Vector Machines (Vapnik, 1995 attract a great dea of attention recenty. In the fied of Natura Language Processing, many successes have been reported. Exampes incude Part-of-Speech tagging (Nakagawa et a., 2002 Text Chunking (Kudo and Matsumoto, 2001, Named Entity Recognition (Isozaki and Kazawa, 2002, and Japanese Dependency Parsing (Kudo and Matsumoto, 2000; Kudo and Matsumoto, It is known in NLP that combination of features contributes to a significant improvement in accuracy. For instance, in the task of dependency parsing, it woud be hard to confirm a correct dependency reation with ony a singe set of features from either a head or its modifier. Rather, dependency reations shoud be determined by at east information from both of two phrases. In previous research, feature combination has been seected manuay, and the performance significanty depended on these seections. This is not the case with kerne-based methodoogy. For instance, if we use a poynomia kerne, a feature combinations are impicity expanded without oss of generaity and increasing the computationa costs. Athough the mapped feature space is quite arge, the maxima margin strategy (Vapnik, 1995 of SVMs gives us a good generaization performance compared to the previous manua feature seection. This is the main reason why kerne-based earning has deivered great resuts to the fied of NLP. Kerne-based text anaysis shows an exceent performance in terms in accuracy; however, its inefficiency in actua anaysis imits practica appication. For exampe, an SVM-based NE-chunker runs at a rate of ony 85 byte/sec, whie previous ruebased system can process severa kiobytes per second (Isozaki and Kazawa, Such sow execution time is inadequate for Information Retrieva, Question Answering, or Text Mining, where fast

2 anaysis of arge quantities of text is indispensabe. This paper presents two nove methods that make the kerne-based text anayzers substantiay faster. These methods are appicabe not ony to the NLP tasks but aso to genera machine earning tasks where training and test exampes are represented in a binary vector. More specificay, we focus on a Poynomia Kerne of degree d, which can attain feature combinations that are crucia to improving the performance of tasks in NLP. Second, we introduce two fast cassification agorithms for this kerne. One is PKI (Poynomia Kerne Inverted, which is an extension of Inverted Index in Information Retrieva. The other is PKE (Poynomia Kerne Expanded, where a feature combinations are expicity expanded. By appying PKE, we can convert a kerne-based cassifier into a simpe and fast iner cassifier. In order to buid PKE, we extend the PrefixSpan (Pei et a., 2001, an efficient Basket Mining agorithm, to enumerate effective feature combinations from a set of support exampes. Experiments on Engish BaseNP Chunking, Japanese Word Segmentation and Japanese Dependency Parsing show that PKI and PKE perform respectivey 2 to 13 times and 30 to 300 times faster than standard kerne-based systems, without a discernibe change in accuracy. 2 Kerne Method and Support Vector Machines Suppose we have a set of training data for a binary cassification probem: (x 1, y 1,..., (x L, y L x j R N, y j {+1, 1}, where x j is a feature vector of the j-th training sampe, and y j is the cass abe associated with this training sampe. The decision function of SVMs is defined by y(x = sgn y j α j φ(x j φ(x + b, (1 where: (A φ is a non-iner mapping function from R N to R H (N H. (B α j, b R, α j 0. The mapping function φ shoud be designed such that a training exampes are ineary separabe in R H space. Since H is much arger than N, it requires heavy computation to evauate the dot products φ(x i φ(x in an expicit form. This probem can be overcome by noticing that both construction of optima parameter α i (we wi omit the detais of this construction here and the cacuation of the decision function ony require the evauation of dot products φ(x i φ(x. This is critica, since, in some cases, the dot products can be evauated by a simpe Kerne Function: K(x 1, x 2 = φ(x 1 φ(x 2. Substituting kerne function into (1, we have the foowing decision function. y(x = sgn y j α j K(x j, x + b (2 One of the advantages of kernes is that they are not imited to vectoria object x, but that they are appicabe to any kind of object representation, just given the dot products. 3 Poynomia Kerne of degree d For many tasks in NLP, the training and test exampes are represented in binary vectors; or sets, since exampes in NLP are usuay represented in socaed Feature Structures. Here, we focus on such cases 1. Suppose a feature set F = {1, 2,..., N} and training exampes X j (j = 1, 2,..., L, a of which are subsets of F (i.e., X j F. In this case, X j can be regarded as a binary vector x j = (x j1, x j2,..., x jn where x ji = 1 if i X j, x ji = 0 otherwise. The dot product of x 1 and x 2 is given by x 1 x 2 = X 1 X 2. Definition 1 Poynomia Kerne of degree d Given sets X and Y, corresponding to binary feature vectors x and y, Poynomia Kerne of degree d K d (X, Y is given by K d (x, y = K d (X, Y = (1 + X Y d, (3 where d = 1, 2, 3,.... In this paper, (3 wi be referred to as an impicit form of the Poynomia Kerne. 1 In the Maximum Entropy mode widey appied in NLP, we usuay suppose binary feature functions f i (X j {0, 1}. This formaization is exacty same as representing an exampe X j in a set {k f k (X j = 1}.

3 It is known in NLP that a combination of features, a subset of feature set F in genera, contributes to overa accuracy. In previous research, feature combination has been seected manuay. The use of a poynomia kerne aows such feature expansion without oss of generaity or an increase in computationa costs, since the Poynomia Kerne of degree d impicity maps the origina feature space F into F d space. (i.e., φ : F F d. This property is critica and some reports say that, in NLP, the poynomia kerne outperforms the simpe inear kerne (Kudo and Matsumoto, 2000; Isozaki and Kazawa, Here, we wi give an expicit form of the Poynomia Kerne to show the mapping function φ(. Lemma 1 Expicit form of Poynomia Kerne. The Poynomia Kerne of degree d can be rewritten as K d (X, Y = c d (r P r (X Y, (4 r=0 where P r (X is a set of a subsets of X with exacty r eements in it, c d (r = d ( d rm=0 =r ( 1 r m m ( r m. Proof See Appendix A. c d (r wi be referred as a subset weight of the Poynomia Kerne of degree d. This function gives a prior weight to the subset s, where s = r. Exampe 1 Quadratic and Cubic Kerne Given sets X = {a, b, c, d} and Y = {a, b, d, e}, the Quadratic Kerne K 2 (X, Y and the Cubic Kerne K 3 (X, Y can be cacuated in an impicit form as: K 2 (X, Y = (1 + X Y 2 = ( = 16, K 3 (X, Y = (1 + X Y 3 = ( = 64. Using Lemma 1, the subset weights of the Quadratic Kerne and the Cubic Kerne can be cacuated as c 2 (0 = 1, c 2 (1 = 3, c 2 (2 = 2 and c 3 (0=1, c 3 (1=7, c 3 (2=12, c 3 (3=6. In addition, subsets P r (X Y (r = 0, 1, 2, 3 are given as foows: P 0 (X Y = {φ}, P 1 (X Y = {{a}, {b}, {d}}, P 2 (X Y = {{a, b}, {a, d}, {b, d}}, P 3 (X Y = {{a, b, d}}. K 2 (X, Y and K 3 (X, Y can simiary be cacuated in an expicit form as: function PKI cassify (X r = 0 # an array, initiaized as 0 foreach i X foreach j h(i r j = r j + 1 end end resut = 0 foreach j SV resut = resut + y j α j (1 + r j d end return sgn(resut + b end Figure 1: Pseudo code for PKI K 2 (X, Y = = 16, K 3 (X, Y = = Fast Cassifiers for Poynomia Kerne In this section, we introduce two fast cassification agorithms for the Poynomia Kerne of degree d. Before describing them, we give the baseine cassifier (PKB: y(x = sgn y j α j (1 + X j X d + b. (5 The compexity of PKB is O( X SV, since it takes O( X to cacuate (1 + X j X d and there are a tota of SV support exampes. 4.1 PKI (Inverted Representation Given an item i F, if we know in advance the set of support exampes which contain item i F, we do not need to cacuate X j X for a support exampes. This is a naive extension of Inverted Indexing in Information Retrieva. Figure 1 shows the pseudo code of the agorithm PKI. The function h(i is a pre-compied tabe and returns a set of support exampes which contain item i. The compexity of the PKI is O( X B + SV, where B is an average of h(i over a item i F. The PKI can make the cassification speed drasticay faster when B is sma, in other words, when feature space is reativey sparse (i.e., B SV. The feature space is often sparse in many tasks in NLP, since exica entries are used as features. The agorithm PKI does not change the fina accuracy of the cassification.

4 4.2 PKE (Expanded Representation Basic Idea of PKE Using Lemma 1, we can represent the decision function (5 in an expicit form: y(x = sgn y j α j ( d r=0 If we, in advance, cacuate w(s = c d (r P r (X j X + b. (6 y j α j c d ( s I(s P s (X j (where I(t is an indicator function 2 for a subsets s d r=0 P r (F, (6 can be written as the foowing simpe inear form: y(x = sgn s Γ d (X w(s + b. (7 where Γ d (X = d r=0 P r (X. The cassification agorithm given by (7 wi be referred to as PKE. The compexity of PKE is O( Γ d (X = O( X d, independent on the number of support exampes SV Mining Approach to PKE To appy the PKE, we first cacuate Γ d (F degree of vectors w = (w(s 1, w(s 2,..., w(s Γd (F. This cacuation is trivia ony when we use a Quadratic Kerne, since we just project the origina feature space F into F F space, which is sma enough to be cacuated by a naive exhaustive method. However, if we, for instance, use a poynomia kerne of degree 3 or higher, this cacuation becomes not trivia, since the size of feature space exponentiay increases. Here we take the foowing strategy: 1. Instead of using the origina vector w, we use w, an approximation of w. 2. We appy the Subset Mining agorithm to cacuate w efficienty. 2 I(t returns 1 if t is true,returns 0 otherwise. Definition 2 w : An approximation of w An approximation of w is given by w = (w (s 1, w (s 2,..., w (s Γd (F, where w (s is set to 0 if w(s is triviay cose to 0. (i.e., σ neg < w(s < σ pos (σ neg < 0, σ pos > 0, where σ pos and σ neg are predefined threshods. The agorithm PKE is an approximation of the PKB, and changes the fina accuracy according to the seection of threshods σ pos and σ neg. The cacuation of w is formuated as the foowing mining probem: Definition 3 Feature Combination Mining Given a set of support exampes and subset weight c d (r, extract a subsets s and their weights w(s if w(s hods w(s σ pos or w(s σ neg. In this paper, we appy a Sub-Structure Mining agorithm to the feature combination mining probem. Generay speaking, sub-structures mining agorithms efficienty extract frequent sub-structures (e.g., subsets, sub-sequences, sub-trees, or subgraphs from a arge database (set of transactions. In this context, frequent means that there are no ess than ξ transactions which contain a sub-structure. The parameter ξ is usuay referred to as the Minimum Support. Since we must enumerate a subsets of F, we can appy subset mining agorithm, in some times caed as Basket Mining agorithm, to our task. There are many subset mining agorithms proposed, however, we wi focus on the PrefixSpan agorithm, which is an efficient agorithm for sequentia pattern mining, originay proposed by (Pei et a., The PrefixSpan was originay designed to extract frequent sub-sequence (not subset patterns, however, it is a trivia difference since a set can be seen as a specia case of sequences (i.e., by sorting items in a set by exicographic order, the set becomes a sequence. The basic idea of the PrefixSpan is to divide the database by frequent sub-patterns (prefix and to grow the prefix-spanning pattern in a depth-first search fashion. We now modify the PrefixSpan to suit to our feature combination mining. size constraint We ony enumerate up to subsets of size d. when we pan to appy the Poynomia Kerne of degree d.

5 1 Subset weight c d (r In the origina PrefixSpan, the frequency of each subset does not change by its size. However, in our mining task, it changes (i.e., the frequency of subset s is weighted by c d ( s. Here, we process the mining agorithm by assuming that each transaction (support exampe X j has its frequency C d y j α j, where C d = max(c d (1, c d (2,..., c d (d. The weight w(s is cacuated by w(s = ω(s c d ( s /C d, where ω(s is a frequency of s, given by the origina PrefixSpan. Positive/Negative support exampes We first divide the support exampes into positive (y i > 0 and negative (y i < 0 exampes, and process mining independenty. The resut can be obtained by merging these two resuts. Minimum Supports σ pos, σ neg In the origina PrefixSpan, minimum support is an integer. In our mining task, we can give a rea number to minimum support, since each transaction (support exampe X j has possiby non-integer frequency C d y j α j. Minimum supports σ pos and σ neg contro the rate of approximation. For the sake of convenience, we just give one parameter σ, and cacuate σ pos and σ neg as foows ( #of positive exampes σ pos = σ, σ neg = σ #of support exampes ( #of negative exampes #of support exampes After the process of mining, a set of tupes Ω = { s, w(s } is obtained, where s is a frequent subset and w(s is its weight. We use a TRIE to efficienty store the set Ω. The exampe of such TRIE compression is shown in Figure 2. Athough there are many impementations for TRIE, we use a Doube-Array (Aoe, 1989 in our task. The actua cassification of PKE can be examined by traversing the TRIE for a subsets s Γ d (X. 5 Experiments To demonstrate performances of PKI and PKE, we examined three NLP tasks: Engish BaseNP Chunking (EBC, Japanese Word Segmentation (JWS and. s!#"$"&% '(#* '+,'-+. '-+. '0 Figure 2: Ω in TRIE representation Japanese Dependency Parsing (JDP. A more detaied description of each task, training and test data, the system parameters, and feature sets are presented in the foowing subsections. Tabe 1 summarizes the detai information of support exampes (e.g., size of SVs, size of feature set etc.. Our preiminary experiments show that a Quadratic Kerne performs the best in EBC, and a Cubic Kerne performs the best in JWS and JDP. The experiments using a Cubic Kerne are suitabe to evauate the effectiveness of the basket mining approach appied in the PKE, since a Cubic Kerne projects the origina feature space F into F 3 space, which is too arge to be handed ony using a naive exhaustive method. A experiments were conducted under Linux using XEON 2.4 Ghz dua processors and 3.5 Gbyte of main memory. A systems are impemented in C Engish BaseNP Chunking (EBC Text Chunking is a fundamenta task in NLP dividing sentences into non-overapping phrases. BaseNP chunking deas with a part of this task and recognizes the chunks that form noun phrases. Here is an exampe sentence: [He] reckons [the current account deficit] wi narrow to [ony $ 1.8 biion]. A BaseNP chunk is represented as sequence of words between square brackets. BaseNP chunking task is usuay formuated as a simpe tagging task, where we represent chunks with three types of tags: B: beginning of a chunk. I: non-initia word. O: outside of the chunk. In our experiments, we used the same settings as (Kudo and Matsumoto, We use a standard data set (Ramshaw and Marcus, 1995 consisting of sections of the WSJ corpus as training and section 20 as testing.. '-+. +-/. '-(#*

6 5.2 Japanese Word Segmentation (JWS Since there are no expicit spaces between words in Japanese sentences, we must first identify the word boundaries before anayzing deep structure of a sentence. Japanese word segmentation is formaized as a simpe cassification task. Let s = c 1 c 2 c m be a sequence of Japanese characters, t = t 1 t 2 t m be a sequence of Japanese character types 3 associated with each character, and y i {+1, 1}, (i = (1, 2,..., m 1 be a boundary marker. If there is a boundary between c i and c i+1, y i = 1, otherwise y i = 1. The feature set of exampe x i is given by a characters as we as character types in some constant window (e.g., 5: {c i 2, c i 1,, c i+2, c i+3, t i 2, t i 1,, t i+2, t i+3 }. Note that we distinguish the reative position of each character and character type. We use the Kyoto University Corpus (Kurohashi and Nagao, 1997, 7,958 sentences in the artices on January 1st to January 7th are used as training data, and 1,246 sentences in the artices on January 9th are used as the test data. 5.3 Japanese Dependency Parsing (JDP The task of Japanese dependency parsing is to identify a correct dependency of each Bunsetsu (base phrase in Japanese. In previous research, we presented a state-of-the-art SVMs-based Japanese dependency parser (Kudo and Matsumoto, We combined SVMs into an efficient parsing agorithm, Cascaded Chunking Mode, which parses a sentence deterministicay ony by deciding whether the current chunk modifies the chunk on its immediate right hand side. The input for this agorithm consists of a set of the inguistic features reated to the head and modifier (e.g., word, part-of-speech, and infections, and the output from the agorithm is either of the vaue +1 (dependent or -1 (independent. We use a standard data set, which is the same corpus described in the Japanese Word Segmentation. 3 Usuay, in Japanese, word boundaries are highy constrained by character types, such as hiragana and katakana (both are phonetic characters in Japanese, Chinese characters, Engish aphabets and numbers. 5.4 Resuts Tabes 2, 3 and 4 show the execution time, accuracy 4, and Ω (size of extracted subsets, by changing σ from 0.01 to The PKI eads to about 2 to 12 times improvements over the PKB. In JDP, the improvement is significant. This is because B, the average of h(i over a items i F, is reativey sma in JDP. The improvement significanty depends on the sparsity of the given support exampes. The improvements of the PKE are more significant than the PKI. The running time of the PKE is 30 to 300 times faster than the PKB, when we set an appropriate σ, (e.g., σ = for EBC and JWS, σ = for JDP. In these settings, we coud preserve the fina accuracies for test data. 5.5 Frequency-based Pruning The PKE with a Cubic Kerne tends to make Ω arge (e.g., Ω = 2.32 miion for JWS, Ω = 8.26 miion for JDP. To reduce the size of Ω, we examined simpe frequency-based pruning experiments. Our extension is to simpy give a prior threshod ξ(= 1, 2, 3, 4..., and erase a subsets which occur in ess than ξ support exampes. The cacuation of frequency can be simiary conducted by the PrefixSpan agorithm. Tabes 5 and 6 show the resuts of frequency-based pruning, when we fix σ=0.005 for JWS, and σ= for JDP. In JDP, we can make the size of set Ω about one third of the origina size. This reduction gives us not ony a sight speed increase but an improvement of accuracy (89.29% 89.34%. Frequency-based pruning aows us to remove subsets that have arge weight and sma frequency. Such subsets may be generated from errors or specia outiers in the training exampes, which sometimes cause an overfitting in training. In JWS, the frequency-based pruning does not work we. Athough we can reduce the size of Ω by haf, the accuracy is aso reduced (97.94% 97.83%. It impies that, in JWS, features even with frequency of one contribute to the fina decision hyperpane. 4 In EBC, accuracy is evauated using F measure, harmonic mean between precision and reca.

7 Tabe 1: Detais of Data Set Data Set EBC JWS JDP # of exampes 135, , ,355 SV # of SVs 11,690 57,672 34,996 # of positive SVs 5,637 28,440 17,528 # of negative SVs 6,053 29,232 17,468 F (size of feature 17,470 11,643 28,157 Avg. of X j B (Avg. of h(i (Note: In EBC, to hande K-cass probems, we use a pairwise cassification; buiding K (K 1/2 cassifiers considering a pairs of casses, and fina cass decision was given by majority voting. The vaues in this coumn are averages over a pairwise cassifiers. 6 Discussion There have been severa studies for efficient cassification of SVMs. Isozaki et a. propose an XQK (expand the Quadratic Kerne which can make their Named-Entity recognizer drasticay fast (Isozaki and Kazawa, XQK can be subsumed into PKE. Both XQK and PKE share the basic idea; a feature combinations are expicity expanded and we convert the kerne-based cassifier into a simpe inear cassifier. The expicit difference between XQK and PKE is that XQK is designed ony for Quadratic Kerne. It impies that XQK can ony dea with feature combination of size up to two. On the other hand, PKE is more genera and can aso be appied not ony to the Quadratic Kerne but aso to the genera-stye of poynomia kernes (1 + X Y d. In PKE, there are no theoretica constrains to imit the size of combinations. In addition, Isozaki et a. did not mention how to expand the feature combinations. They seem to use a naive exhaustive method to expand them, which is not aways scaabe and efficient for extracting three or more feature combinations. PKE takes a basket mining approach to enumerating effective feature combinations more efficienty than their exhaustive method. 7 Concusion and Future Works We focused on a Poynomia Kerne of degree d, which has been widey appied in many tasks in NLP Tabe 2: Resuts of EBC PKE Time Speedup F1 Ω σ (sec./sent. Ratio ( PKI PKB Tabe 3: Resuts of JWS PKE Time Speedup Acc.(% Ω σ (sec./sent. Ratio ( , , , ,820 PKI PKB Tabe 4: Resuts of JDP PKE Time Speedup Acc.(% Ω σ (sec./sent. Ratio ( , , ,262 PKI PKB Tabe 5: Frequency-based pruning (JWS PKE time Speedup Acc.(% Ω ξ (sec./sent. Ratio ( , PKB Tabe 6: Frequency-based pruning (JDP PKE time Speedup Acc.(% Ω ξ (sec./sent. Ratio ( , , ,360 PKB

8 and can attain feature combination that is crucia to improving the performance of tasks in NLP. Then, we introduced two fast cassification agorithms for this kerne. One is PKI (Poynomia Kerne Inverted, which is an extension of Inverted Index. The other is PKE (Poynomia Kerne Expanded, where a feature combinations are expicity expanded. The concept in PKE can aso be appicabe to kernes for discrete data structures, such as String Kerne (Lodhi et a., 2002 and Tree Kerne (Kashima and Koyanagi, 2002; Coins and Duffy, For instance, Tree Kerne gives a dot product of an ordered-tree, and maps the origina ordered-tree onto its a sub-tree space. To appy the PKE, we must efficienty enumerate the effective sub-trees from a set of support exampes. We can simiary appy a sub-tree mining agorithm (Zaki, 2002 to this probem. Appendix A.: Lemma 1 and its proof c d (r = ( ( d r ( r ( 1 r m m. m =r m=0 Proof. Let X, Y be subsets of F = {1, 2,..., N}. In this case, X Y is same as the dot product of vector x, y, where x = {x 1, x 2,..., x N }, y = {y 1, y 2,..., y N } (x j, y j {0, 1} x j = 1 if j X, x j = 0 otherwise. (1 + X Y d = (1 + x y d can be expanded as foows where τ( = (1 + x y d = k k N = k n 0 = ( ( d N x j y j =0 =0 j=1 ( d τ(! k 1!... k N! (x1y1k 1... (x N y N k N. Note that x k j j is binary (i.e., x k j j {0, 1}, the number of r-size subsets can be given by a coefficient of (x 1 y 1 x 2 y 2... x r y r. Thus, c d (r = =r ( ( k k d r=! k 1!... k r! k n 1,n=1,2,...,r = = =r =r References ( ( d r m=0 ( r (r ( r (r ( ( d r ( ( 1 r m m r. m Junichi Aoe An efficient digita search agorithm by using a doube-array structure. IEEE Transactions on Software Engineering, 15(9. Michae Coins and Nige Duffy Convoution kernes for natura anguage. In Advances in Neura Information Processing Systems 14, Vo.1 (NIPS 2001, pages Hideki Isozaki and Hideto Kazawa Efficient support vector cassifiers for named entity recognition. In Proceedings of the COLING-2002, pages Hisashi Kashima and Teruo Koyanagi Svm kernes for semi-structured data. In Proceedings of the ICML-2002, pages Taku Kudo and Yuji Matsumoto Japanese Dependency Structure Anaysis based on Support Vector Machines. In Proceedings of the EMNLP/VLC-2000, pages Taku Kudo and Yuji Matsumoto Chunking with support vector machines. In Proceedings of the the NAACL, pages Taku Kudo and Yuji Matsumoto Japanese dependency anayisis using cascaded chunking. In Proceedings of the CoNLL-2002, pages Sadao Kurohashi and Makoto Nagao Kyoto University text corpus project. In Proceedings of the ANLP-1997, pages Huma Lodhi, Craig Saunders, John Shawe-Tayor, Neo Cristianini, and Chris Watkins Text cassification using string kernes. Journa of Machine Learning Research, 2. Tetsuji Nakagawa, Taku Kudo, and Yuji Matsumoto Revision earning and its appication to part-of-speech tagging. In Proceedings of the ACL 2002, pages Jian Pei, Jiawei Han, and et a Prefixspan: Mining sequentia patterns by prefix-projected growth. In Proc. of Internationa Conference of Data Engineering, pages Lance A. Ramshaw and Mitche P. Marcus Text chunking using transformation-based earning. In Proceedings of the VLC, pages Vadimir N. Vapnik The Nature of Statistica Learning Theory. Springer. Mohammed Zaki Efficienty mining frequent trees in a forest. In Proceedings of the 8th Internationa Conference on Knowedge Discovery and Data Mining KDD, pages

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

OF SCIENTIFIC DATABASES

OF SCIENTIFIC DATABASES CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

Indexed Block Coordinate Descent for Large-Scale Linear Classification with Limited Memory

Indexed Block Coordinate Descent for Large-Scale Linear Classification with Limited Memory Indexed Bock Coordinate Descent for Large-Scae Linear Cassification with Limited Memory Ian E.H. Yen Chun-Fu Chang Nationa Taiwan University Nationa Taiwan University r0092207@csie.ntu.edu.tw r99725033@ntu.edu.tw

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Modification of Support Vector Machine for Microarray Data Analysis

Modification of Support Vector Machine for Microarray Data Analysis Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs

Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs Learning to Learn Second-Order Bac-Propagation for CNNs Using LSTMs Anirban Roy SRI Internationa Meno Par, USA anirban.roy@sri.com Sinisa Todorovic Oregon State University Corvais, USA sinisa@eecs.oregonstate.edu

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

Relative Positioning from Model Indexing

Relative Positioning from Model Indexing Reative Positioning from Mode Indexing Stefan Carsson Computationa Vision and Active Perception Laboratory (CVAP)* Roya Institute of Technoogy (KTH), Stockhom, Sweden Abstract We show how to determine

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Portand State University PDXSchoar Computer Science Facuty Pubications and Presentations Computer Science 2013 Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker Portand State University,

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Handling Outliers in Non-Blind Image Deconvolution

Handling Outliers in Non-Blind Image Deconvolution Handing Outiers in Non-Bind Image Deconvoution Sunghyun Cho 1 Jue Wang 2 Seungyong Lee 1,2 sodomau@postech.ac.kr juewang@adobe.com eesy@postech.ac.kr 1 POSTECH 2 Adobe Systems Abstract Non-bind deconvoution

More information

Human Action Recognition Using Key Points Displacement

Human Action Recognition Using Key Points Displacement Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Sequential Approximate Multiobjective Optimization using Computational Intelligence

Sequential Approximate Multiobjective Optimization using Computational Intelligence The Ninth Internationa Symposium on Operations Research and Its Appications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 1 12 Sequentia Approximate Mutiobjective

More information

Model-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection

Model-driven Collaboration and Information Integration for Enhancing Video Semantic Concept Detection Mode-driven Coaboration and Information Integration for Enhancing Video Semantic Concept Detection Tao Meng, Mei-Ling Shyu Department of Eectrica and Computer Engineering University of Miami Cora Gabes,

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Quaternion Support Vector Classifier

Quaternion Support Vector Classifier Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

IEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE

IEEE TRANSACTIONS ON CYBERNETICS 1. Shangfei Wang, Senior Member, IEEE, BowenPan, Huaping Chen, and Qiang Ji, Fellow, IEEE This artice has been accepted for incusion in a future issue of this journa. Content is fina as presented, with the exception of pagination. IEEE TRANSACTIONS ON CYBERNETICS 1 Therma Augmented Expression

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

A Discriminative Global Training Algorithm for Statistical MT

A Discriminative Global Training Algorithm for Statistical MT Discriminative Goba Training gorithm for Statistica MT Christoph Timann IBM T.J. Watson Research Center Yorktown Heights, N.Y. 10598 cti@us.ibm.com Tong Zhang Yahoo! Research New York Cit, N.Y. 10011 tzhang@ahoo-inc.com

More information

Large-Scale Modeling of Parametric Surfaces using Spherical Harmonics

Large-Scale Modeling of Parametric Surfaces using Spherical Harmonics Large-Scae Modeing of Parametric Surfaces using Spherica Harmonics Li Shen Dept of Computer and Info Science University of Massachusetts Dartmouth N Dartmouth, MA 2747 shen@umassdedu Moo K Chung Department

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Automatic Program Inversion using Symbolic Transducers

Automatic Program Inversion using Symbolic Transducers Automatic Program Inversion using Symboic Transducers Qinheping Hu University of Wisconsin-Madison qhu8@wisc.edu Loris D Antoni University of Wisconsin-Madison oris@cs.wisc.edu Abstract We propose a fuy-automated

More information

PHASE retrieval has been an active research topic for decades [1], [2]. The underlying goal is to estimate an unknown

PHASE retrieval has been an active research topic for decades [1], [2]. The underlying goal is to estimate an unknown DOLPHIn Dictionary Learning for Phase Retrieva Andreas M. Timann, Yonina C. Edar, Feow, IEEE, and Juien Maira, Member, IEEE arxiv:60.063v [math.oc] 3 Aug 06 Abstract We propose a new agorithm to earn a

More information