Improved Hidden Clique Detection by Optimal Linear Fusion of Multiple Adjacency Matrices
|
|
- Justin Carter
- 5 years ago
- Views:
Transcription
1 Iproed Hidden Clique Detection by Optial Linear Fusion of Multiple Adjacency Matrices Hianshu Nayar, Benjain A. Miller, Kelly Geyer, Rajonda S. Caceres, Steen T. Sith, and Raj Rao Nadakuditi Departent of Electrical Engineering and Coputer Science, Uniersity of Michigan Ann Arbor, Michigan 4809 Lincoln Laboratory, Massachusetts Institute of Technology Lexington, MA Abstract Graph fusion has eerged as a proising research area for addressing challenges associated with noisy, uncertain, ulti-source data. While any ad-hoc graph fusion techniques exist in the current literature, an analytical approach for analyzing the fundaentals of the graph fusion proble is lacking. We consider the setting where we are gien ultiple Erdős-Rényi odeled adjacency atrices containing a coon hidden or planted clique. The objectie is to cobine the linearly so that the principal eigenectors of the resulting atrix best reeal the ertices associated with the clique. We utilize recent results fro rando atrix theory to derie the optial weighting coefficients and use these insights to deelop a data-drien fusion algorith. We deonstrate the iproed perforance of the algorith relatie to other siple heuristics. I. INTRODUCTION In a wide ariety of applications, iportant data take the for of connections, relationships, or interactions between discrete entities. This relational structure proides additional context, iproing situational awareness and enhancing the inforation that can be inferred fro the data. A dataset rich in relational inforation is represented atheatically as a graph. One particular proble of interest when working with graph-based data is subgraph detection []. Gien a graph, the objectie is to deterine whether the relationships obsered are consistent with noral behaior in the network, or if there is a subset of ertices coprising a subgraph within the oerall graph that exhibits a topology that is contrary to the expectation. Seeral applications are focused on finding denser-than-usual subgraphs within larger graphs, such as detecting counities in social networks [2] and finding highly interactie subsets aong proteins [3]. A siplified for of this proble is planted clique detection, where the objectie is to detect a fully connected subgraph placed within a larger graph with edges that occur with equal probability. This subset of the ore general subgraph detection proble The Lincoln Laboratory portion of this work is sponsored by the Assistant Secretary of Defense for Research & Engineering under Air Force Contract FA C Opinions, interpretations, conclusions and recoendations are those of the authors and are not necessarily endorsed by the United States Goernent. The Uniersity of Michigan portion of this work was sponsored by the Office of the Assistant Secretary of Defense for Research and Engineering. proides atheatical tractability that enables analysis of the fundaental liits of subgraph detectability. Planted clique detection has a long history within theoretical coputer science. Algoriths hae been deeloped using a ariety of techniques, including cobinatorial search ethods [4], spectral ethods [5], and statistical query ethods [6]. Recent work has focused on deriing analytical bounds for subgraph detectability, including technique-independent bounds [7], and bounds on detection using spectral techniques [8]. Spectral ethods are particularly interesting, since they are coputationally efficient and yield principled analytical bounds using rando atrix theory. Siilar bounds for the planted partition odel hae also been shown to predict a detectability phase transition in other efficient detection ethods [9]. While the planted clique proble has traditionally been studied in the context of detection within a single graph, in practice, a network is often the result of fused inforation fro ultiple disparate sources. Understanding the iplications that the algoriths for a single obseration hae on ulti-source data is extreely iportant as data analysts are increasingly required to ake decisions in this setting. The objectie of this paper is to extend the recent spectral detection bounds to cases where ultiple graphs are obsered. In this setting, the clique exists in each graph, each of which has a different edge probability. We adopt a linear fusion odel in which we analyze a conex cobination of the adjacency atrices of the graphs. Within this context, we deonstrate that the optial fusion ethod is highly intuitie: weighting the graphs in inerse proportion to their expected background degrees. In a set of experients on rando graphs, we test subgraph detectability at seeral leels of difficulty, arying the relatie density of the background graphs, the clique size, and the weights. In all cases, the optiality of the solution we derie is erified. The reainder of this paper is organized as follows. In Section II, we define the proble odel and foralize the atheatical context in which the graphs are fused. Section III proides a deriation of the forula for optial fusion within this context. In Section IV, we outline seeral experients that epirically alidate the deried optial fusion ethod /5/$ IEEE 520 Asiloar 205
2 Section V concludes the paper with a brief suary and directions for future work. A. Planted Clique Detection II. PROBLEM MODEL In the planted clique proble, we are gien a graph G = (V,E), where V is the set of ertices (representing the entities) and E is the set of edges (representing connections). We will denote N = V and M = E. The degree of a ertex is the nuber of edges connected to it. We will denote the aerage degree of the graph by c. A subset of ertices, V S V, coprise the clique, eaning that for all, u 2 V S, there is an edge between and u in E. We will denote the clique size by k = V S. In this paper, we will only consider graphs that are undirected (so edges are unordered pairs of ertices) and unweighted (so edges either exist or not, with no notion of connection strength). If either /2 V S or u/2 V S, then an edge exists between and u with probability p, which is constant across all pairs of ertices and independent of the existence of other edges. Spectral ethods ake use of atrix representations of a graph. The ost basic atrix representation of a graph is the adjacency atrix. For an unweighted, undirected graph, the adjacency atrix A = {a ij } is an N N binary atrix where a ij = if there is an edge between ertices i and j, and a ij =0otherwise. (This requires an arbitrary labeling of ertices with integers fro to N.) Since we consider undirected graphs, A will be syetric. A odification of the adjacency atrix used for counity detection is the odularity atrix [0]. The odularity atrix is a residuals atrix: the obsered adjacency atrix inus its expected alue. Since the planted clique proble assues a background with equal probability, we use the odularity atrix with respect to the Erdős-Rényi odel: B := A p N N. () This technique cancels out the effects of typical background behaior and allows the detection of deiations fro the expectation; in this case the planted clique. The for of () is a rank- perturbation of a Wigner atrix, and recent work has defined a sharp threshold for detectability of such a perturbation []. This analysis was applied to planted clique detection in [8], where a siple algorith was used to detect the clique: copute the (unit-noralized) principal eigenector of B, denoted by u. Since the entries in the principal eigenector of a Wigner atrix appear norally distributed, u is thresholded, with a false alar rate based on this distribution, and the estiate of the clique ertices is gien by: ˆV S = n i : p Nu i >F N (0,) o, (2) 2 where F N (0,) is the inerse cuulatie density function of a standard noral distribution and is the desired false alar probability. Using this algorith, the following bound was deried. Clai 2. (Nadakuditi [8]): Consider a k-ertex clique planted in an N-ertex graph with edge probability p, where the clique ertices are identified using (2) for a significance leel. Then, for fixed p, as k, N such that k/ p N 2 (0, ) we hae P(clique discoered) a.s. B. Multi-Source Graph Fusion ( if > crit. := otherwise. q p p Our objectie is to derie a bound analogous to Clai 2. for fusion of ultiple graphs. For the ulti-source setting, we assue we hae graphs G i =(V,E i ) for apple i apple. Note that the ertex set is the sae for all graphs (and, in atrix for, the indices are consistent across obserations). The nonclique edges are generated independently in each graph. To analyze the ultigraph in the sae context as the clai, we cobine the adjacency atrices of the graphs into a single atrix, and copute the principal eigenector of its residuals. We take a linear cobination of the adjacency atrices A i with weights w i to create a fused adjacency atrix: à = (3) w i A i. (4) We consider only positie weights that su to, eaning that à is a conex cobination of the adjacency atrices. Using this conention, the alue on the edges between clique ertices reains, since these edges exist in each obseration. Applying the sae weighting to the expected alues (p i being the background edge probability for G i ), we aintain a residuals atrix where the ajority of the entries (all of those not part of the clique) hae the sae zero-ean distribution. The fused residuals atrix is gien by: B := (A i p i N N )=à w i p i N N. (5) By applying the algorith defined in Section II-A to the principal eigenector of B, we can iproe detection perforance oer what would be possible with a single obseration. As deonstrated in the next section, we can derie analytically optial weights in this setting by iniizing the ariance of the entries. III. OPTIMAL LINEAR FUSION We begin by odeling the fused adjacency atrix à in a way that enables rando atrix theoretic analysis. Without 52
3 loss of generality, we can perute the ertex indices so that the clique ertices hae indices to k. We hae: apple à = w k k B k N 0(p i ) i B N 0 k(p i ) B N 0 N 0(p (6) apple P = w P P i k k w ib k N 0(p i ) w P ib N 0 k(p i ) w ib N 0 N 0(p (7) apple P = w P i k k w ip i k N 0 P w P ip i N 0 k w (8) ip i N 0 N apple P P k k w ib c k N 0(p w ib c N 0 k (p P w ib c N 0 N 0(p (9) i =E hã + X, (0) where B N N 2 (p) is an N N 2 atrix of Bernoulli rando ariables, each drawn independently with probability p, B c N N 2 (p) is the centered ersion of this atrix, where the rando ariables hae had their expected alue subtracted. For conenience, we define X to be the rando deiations fro the ean fro the atrix on line (9). Thus, E[Ã] is a rank-2 atrix, and à is a rando deiation fro this lowrank structure. The rando entries in X (i.e., those outside of the clique) hae ariance P w2 i p i( p i ). If k grows ore slowly than N, then X will tend toward a Wigner atrix, where the support of the eigenalue distribution (which deterines the noise power, and, thus, the detectability of the clique) scales with the standard deiation of these entries. Subtracting the expected alue of the fused atrix, we are left with a rank- perturbation of the P rando atrix. This rank- perturbation has alues of w ip i in the entries where both ertices are part of the clique, and 0 elsewhere. The nonzero eigenalue of this atrix is: = k w i p i. At this point, we hae a siilar setting as in [8]. In this case, the Wigner atrix has an eigenalue distribution that tends to a seicircle with radius: u X R = t 4N wi 2p u X i ( p i )= t 4 wi 2c i ( p i ), () whereas in the single-source case the radius is p 4Np( p). The rank- perturbation in the new setting is rather than siply k( p). We can apply siilar reasoning to deelop a new bound for planted clique detection using the fused odularity atrix with gien weights. First, we introduce an approxiation that will enhance the interpretability of the result. As graphs grow large, their density tends to decrease. That is, the aerage degree of the ertices grows slowly, not proportionally to N as it would if p reained constant. Thus, we will focus on a case where p 0 as N. Specifically, we consider the case where the aerage degree c reains constant. This allows us to express the detectability bound in ters of the aerage degrees of the graphs, c i, for large alues of N. The relationship between the axiu eigenalue of the rank- perturbation and the radius of the seicircle in Clai 2. is: k( p) > p Np( p). Thus, in the siilar setting for fused graphs, we want > R/2. Since we are assuing c i reains constant, we can use ( p i ) to approxiate the quantities of interest as k and R/2 p P w2 i c i. Since the approxiate eigenalue of the rank- perturbation is independent of the weights, the objectie to axiize detectability is equialent to that of iniizing R. To incorporate the constraint that the weights su to, we optiize the Lagrange function: ux L(w, )= t wi 2c i + w i. (2) j to zero yields: ux w j c j = t wi 2c i. (3) Since the right hand side of (3) is constant across weights, this critical point exists where each weight is inersely proportional to the aerage degree of its associated graph. Thus, the optial weighting schee for iniizing the support of the eigenalues is gien by: w j = /c P j /c = i + P i6=j c. (4) j/c i This result proides a atheatical justification for what would be an intuitie heuristic: giing the obserations that are noisier a proportionally lower weight. For exaple, if all graphs hae equal aerage degree, then they will be weighted equally. Conersely, if one graph has a uch saller aerage degree than the others, its weight will be close to while the others will be close to 0. In conjunction with the alue of R, this also deonstrates how additional inforation iproes detectability. Indeed, if G i has substantially lower degree than the other graphs, the detection threshold will reain approxiately p c i, since the other inforation is uch noisier and ost of the ephasis will be placed on the graph with the sparsest background. On the other hand, if all of the graphs hae equal aerage degree, the detection threshold will be reduced by p. As we show in the next section, the optiality of this weighting schee is erified by epirical detection perforance. IV. SIMULATION RESULTS In each of the following experients, we fuse two Erdős- Rényi graphs, each with a planted clique. The graphs each hae 0,000 ertices, and we ary the clique size, the aerage degrees of the backgrounds, and the weights to deonstrate the optiality of the solution deried in Section III. In each case, we set the false alars rate fro (2) to 0.05, and 522
4 Fig.. Probability of detection for a clique of arying size, ebedded into one graph with aerage degree 70 and one with aerage degree that aries. The optiized weights are used to fuse the graphs. The detection probability is shown on a base-0 logarithic scale, and the detection threshold is drawn in white. copute the epirical probability of detection of the clique ertices when thresholding the principal eigenector of B at the corresponding leel. We begin by deonstrating that the iproed bound correctly predicts where the clique becoes detectable. In this experient, we set the aerage degree of one graph to 70, and ary the aerage degree of the other graph fro 0 to 20. We independently ary the size of the clique fro 2 to 2. For each trial, the optiized weights fro (4) are used. The epirical probability of detection is shown in Fig.. Probability of detection is copared to the detectability threshold: q k = w 2c + w2 2c 2. Once k becoes larger than the threshold, its detectability begins to increase until the probability of detection eentually reaches. Using only the graph with arying degree, the detection threshold would be the square root of the aerage degree on the horizontal axis (e.g., a clique of size 0 at an aerage degree of 00). Using the additional inforation proided by the other graph, the detection threshold is substantially lowered on the right side of the plot, where the graph with ariable aerage degree is the densest. Our second experient deonstrates the optiality of the deried solution. We again fix the aerage degree of one of the graphs (in this case c 2 = 80), and now fix the clique size to k = 7. We then ary the aerage degree of G and its corresponding weight w = w 2. We consider c 2 {20, 40, 60, 80}. Probability of detection is shown in Fig. 2, where the epirical results are copared to the deried optial weight w =/(+(c /70)). For all alues of c, the epirical detection rate is axiized at the deried weight. This is true when c is sall, and ost of the weight is placed on w, and when c is large and the weights are approxiately equal. This behaior holds for arious clique sizes. Fig. 3 illustrates detection probability for three cases. In each case, two graphs Fig. 2. Probability of detection for a 7-ertex clique, ebedded into one graph with aerage degree 80 and one with aerage degree that aries. The weights used for fusion are aried to deonstrate optiality of the deried solution, which is drawn in white. are fused, with a planted clique whose size is at the detection threshold for the sparser graph (i.e., k = p c, where c apple c 2 ). We choose a case where the optial weighting has w =0.5, one with w =0.7, and one with w =0.9. By siply aeraging the graphs, we would achiee the detection probability at w =0.5, and the only case where this is optial is the case where the aerage degrees are equal. In the other cases, while the iproeent oer only considering the sparser graph (the detection probability achieed at the extree right of the plot), is ore subtle, there is a substantial iproeent that is axiized at the theoretically deterined weighting. Finally, we consider a case where we ary the aerage degrees of both graphs independently, and use the optial weighting. In this experient, the size of the planted clique is k =9. Detection probabilities are shown in Fig. 4. First, note that the probability of detection increases as either graph gets sparser. Cures indicating the detection thresholds for cliques of size 5 to 8 are oerlayed in the plot. These cures follow the forula: c 2 = /k 2. /c As we expect, at the thresholds for saller cliques, the 9- ertex clique is ore likely to be detected. It is also noteworthy that, along the cure where the threshold is the sae, the epirical detection probability reains consistent. This proides additional alidation that the optial weighting is correct: Using the optial weighting at a gien threshold gies a consistent detection probability, regardless of the densities of the indiidual graphs. V. CONCLUSION This paper extends recent spectral bounds for planted clique detection to cases where ultiple graphs are obsered. Operating in a ulti-source setting has becoe extreely iportant in recent years, as correlating obserations fro ultiple datasets has becoe ore coon. We deonstrate that the intuitie approach of weighting each graph in inerse proportion to its aerage degree is, in fact, the optial technique 523
5 Fig. 3. Probability of detection with respect to the weight of G in three scenarios. In each case, the theoretically optial weighting is indicated by a ertical dashed line of the sae color as the cure. beneficial. Fig. 4. Probability of detection for a 9-ertex clique, ebedded into two graphs of arying degree. Optiized weights are used to fuse the graphs. Detection thresholds for saller cliques (5 to 8 ertices) are drawn in white. under a linear weighting schee. Epirical results confir the theory in a wide range of settings. There are any possible future directions for this work. A siple extension of the result to dense subgraphs, rather than cliques, follows rather directly. Extending results to ore coplicated background odels such as Chung-Lu odels, with arbitrary aerage degree, or stochastic blockodels, with inherent counity structure would be another natural progression. This could also apply to cases where the subgraph changes oer the obserations, as in [2]. As data are often correlated across sources, extending to a setting where there are dependencies across the obserations would also be REFERENCES [] B. A. Miller, M. S. Beard, P. J. Wolfe, and N. T. Bliss, A spectral fraework for anoalous subgraph detection, IEEE Trans. Signal Process., ol. 63, no. 6, pp , Aug 205. [2] M. E. J. Newan and M. Giran, Finding and ealuating counity structure in networks, Phys. Re. E, ol. 69, no. 2, [3] D. Bu, Y. Zhao, L. Cai, H. Xue, X. Zhu, H. Lu, J. Zhang, S. Sun, L. Ling, N. Zhang, G. Li, and R. Chen, Topological structure analysis of the protein protein interaction network in budding yeast, Nucleic Acids Research, ol. 3, no. 9, pp , [4] M. Jerru, Large cliques elude the Metropolis process, Rando Structures & Algoriths, ol. 3, pp , 992. [5] N. Alon, M. Krieleich, and B. Sudako, Finding a large hidden clique in a rando graph, in Proc. ACM-SIAM Syp. Discrete Algoriths, 998, pp [6] V. Feldan, E. Grigorescu, L. Reyzin, S. Vepala, and Y. Xiao, Statistical algoriths and a lower bound for detecting planted clique, 205, preprint: arxi.org: [7] E. Arias-Castro and N. Verzelen, Counity detection in rando networks, 203, preprint: arxi.org: [8] R. R. Nadakuditi, On hard liits of eigen-analysis based planted clique detection, in Proc. IEEE Statistical Signal Process. Workshop, 202, pp [9] R. R. Nadakuditi and M. E. J. Newan, Graph spectra and the detectability of counity structure in networks, Phys. Re. Lett., ol. 08, p. 8870, May 202. [Online]. Aailable: [0] M. E. J. Newan, Finding counity structure in networks using the eigenectors of atrices, Phys. Re. E, ol. 74, no. 3, [] F. Benaych-Georges and R. R. Nadakuditi, The eigenalues and eigenectors of finite, low rank perturbations of large rando atrices, Adances in Math., ol. 227, no., pp , May 20. [2] B. A. Miller and N. T. Bliss, Toward atched filter optiization for subgraph detection in dynaic networks, in Proc. IEEE Statistical Signal Process. Workshop, 202, pp
Kinetic Molecular Theory of Ideal Gases
Lecture -3. Kinetic Molecular Theory of Ideal Gases Last Lecture. IGL is a purely epirical law - solely the consequence of experiental obserations Explains the behaior of gases oer a liited range of conditions.
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationKinetic Molecular Theory of. IGL is a purely empirical law - solely the
Lecture -3. Kinetic Molecular Theory of Ideal Gases Last Lecture. IGL is a purely epirical law - solely the consequence of experiental obserations Explains the behaior of gases oer a liited range of conditions.
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationA nonstandard cubic equation
MATH-Jan-05-0 A nonstandard cubic euation J S Markoitch PO Box West Brattleboro, VT 050 Dated: January, 05 A nonstandard cubic euation is shown to hae an unusually econoical solution, this solution incorporates
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationSF Chemical Kinetics.
SF Cheical Kinetics. Lecture 5. Microscopic theory of cheical reaction inetics. Microscopic theories of cheical reaction inetics. basic ai is to calculate the rate constant for a cheical reaction fro first
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationarxiv: v1 [stat.me] 1 Aug 2016
Null Models and Modularity Based Counity Detection in Multi-Layer Networks Subhadeep Paul and Yuguo Chen University of Illinois at Urbana-Chapaign Abstract arxiv:168.623v1 [stat.me] 1 Aug 16 Multi-layer
More informationHORIZONTAL MOTION WITH RESISTANCE
DOING PHYSICS WITH MATLAB MECHANICS HORIZONTAL MOTION WITH RESISTANCE Ian Cooper School of Physics, Uniersity of Sydney ian.cooper@sydney.edu.au DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS ec_fr_b. This script
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationSequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,
Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:
More informationUpper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition
Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationCorrelated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits
Correlated Bayesian odel Fusion: Efficient Perforance odeling of Large-Scale unable Analog/RF Integrated Circuits Fa Wang and Xin Li ECE Departent, Carnegie ellon University, Pittsburgh, PA 53 {fwang,
More informationFractional Order Ship Tracking Correlation Algorithm
2894 JOURNAL OF SOFTWARE VOL. 7 NO. 12 DECEMBER 2012 Fractional Order Ship Tracking Correlation Algorith Mingliang Hou School of Coputer Engineering /Huaihai Institute of Technology LianyungangChina Eail:
More informationIn this chapter, we consider several graph-theoretic and probabilistic models
THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationFast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns
Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationA Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)
1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu
More informationCompressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements
1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More informationA Link Between Integrals and Higher-Order Integrals of SPN Ciphers
Link Between Integrals and Higher-Order Integrals of SPN Ciphers Ruilin Li, Bing Sun, and Chao Li Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationOrder Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples
Order Recursion Introduction Order versus Tie Updates Matrix Inversion by Partitioning Lea Levinson Algorith Interpretations Exaples Introduction Rc d There are any ways to solve the noral equations Solutions
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationTabu Programming for Multiobjective Optimization Problems
44 IJCSNS International Journal of Coputer Science and Network Security, VOL.7 No.0, October 2007 Tabu Prograing for Multiobjectie Optiization Probles Jerzy Balicki, Naal Uniersity of Gdynia, ul. Sidowicza
More informationPULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE
PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.
More informationError Exponents in Asynchronous Communication
IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,
More informationPattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition
More informationA Smoothed Boosting Algorithm Using Probabilistic Output Codes
A Soothed Boosting Algorith Using Probabilistic Output Codes Rong Jin rongjin@cse.su.edu Dept. of Coputer Science and Engineering, Michigan State University, MI 48824, USA Jian Zhang jian.zhang@cs.cu.edu
More informationGaussians. Andrew W. Moore Professor School of Computer Science Carnegie Mellon University.
Note to other teachers and users of these slides. Andrew would be delighted if you found this source aterial useful in giing your own lectures. Feel free to use these slides erbati, or to odify the to
More informationA spectral Turán theorem
A spectral Turán theorem Fan Chung Abstract If all nonzero eigenalues of the (normalized) Laplacian of a graph G are close to, then G is t-turán in the sense that any subgraph of G containing no K t+ contains
More informationExtension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels
Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique
More informationLecture 2: Differential-Delay equations.
Lecture : Differential-Delay equations. D. Gurarie A differential equation, or syste:, ; of the syste:, 0 0 0 0 y f y t y t y, predicts a (near) future state 0 0 y t dt y f y t dt, fro its current state,
More informationA remark on a success rate model for DPA and CPA
A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance
More informationDue to Fabrication Errors in AWGs
An Estiation of Perforance Degradation Due to Fabrication Errors in AWGs Thoas Kaalais, Thoas Sphicopoulos and Diitris Syridis The authors are with the departent of Inforatics and Telecounications of the
More informationCondition Monitoring and Fault Detection of Railway Vehicle Suspension using Multiple-Model Approach
Proceedings of the 17th World Congress The International Federation of Autoatic Control Condition Monitoring and Fault Detection of Railway Vehicle Suspension using Multiple-Model Approach Hitoshi Tsunashia
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationIntelligent Systems: Reasoning and Recognition. Artificial Neural Networks
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationOBJECTIVES INTRODUCTION
M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and
More informationHybrid System Identification: An SDP Approach
49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The
More informationTEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES
TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,
More informationPrediction by random-walk perturbation
Prediction by rando-walk perturbation Luc Devroye School of Coputer Science McGill University Gábor Lugosi ICREA and Departent of Econoics Universitat Popeu Fabra lucdevroye@gail.co gabor.lugosi@gail.co
More informationLONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES
Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,
More informationResearch Article On the Isolated Vertices and Connectivity in Random Intersection Graphs
International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More information3.3 Variational Characterization of Singular Values
3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and
More informationEnsemble Based on Data Envelopment Analysis
Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807
More informationCombining Classifiers
Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationBoosting with log-loss
Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationWhen Short Runs Beat Long Runs
When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long
More informationMaximizing Modularity Density for Exploring Modular Organization of Protein Interaction Networks
The Third International Syposiu on Optiization and Systes Biology (OSB 09) Zhangjiajie, China, Septeber 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 361 370 Maxiizing Modularity Density for Exploring Modular
More informationESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics
ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents
More informationOptical Properties of Plasmas of High-Z Elements
Forschungszentru Karlsruhe Techni und Uwelt Wissenschaftlishe Berichte FZK Optical Properties of Plasas of High-Z Eleents V.Tolach 1, G.Miloshevsy 1, H.Würz Project Kernfusion 1 Heat and Mass Transfer
More informationGraphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes
Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109
More informationNotes on Linear Minimum Mean Square Error Estimators
Notes on Linear Minimum Mean Square Error Estimators Ça gatay Candan January, 0 Abstract Some connections between linear minimum mean square error estimators, maximum output SNR filters and the least square
More informationCSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13
CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016/2017 Lessons 9 11 Jan 2017 Outline Artificial Neural networks Notation...2 Convolutional Neural Networks...3
More informationFokker-Planck Description of Conductance-Based Integrate-and-Fire Neuronal Networks
Fokker-Planck Description of Conductance-Based Integrate-and-Fire Neuronal Networks Gregor Koačič, Louis Tao, Aaditya V. Rangan, 3 and Daid Cai 3,4 Matheatical Sciences Departent, Rensselaer Polytechnic
More informationGeneralized Alignment Chain: Improved Converse Results for Index Coding
Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,
More informationCommunity detection in complex networks has attracted a lot
Resolution liit in counity detection Santo Fortunato and Marc Barthéley School of Inforatics and Center for Biocoplexity, Indiana University, Blooington, IN 47406; Fakultät für Physik, Universität Bielefeld,
More informationA method to determine relative stroke detection efficiencies from multiplicity distributions
A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,
More informationarxiv: v2 [cs.lg] 30 Mar 2017
Batch Renoralization: Towards Reducing Minibatch Dependence in Batch-Noralized Models Sergey Ioffe Google Inc., sioffe@google.co arxiv:1702.03275v2 [cs.lg] 30 Mar 2017 Abstract Batch Noralization is quite
More informationOptimizing energy potentials for success in protein tertiary structure prediction Ting-Lan Chiu 1 and Richard A Goldstein 1,2
Research Paper 223 Optiizing energy potentials for success in protein tertiary structure prediction Ting-Lan Chiu 1 and Richard A Goldstein 1,2 Background: Success in solving the protein structure prediction
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationMixed Robust/Average Submodular Partitioning
Mixed Robust/Average Subodular Partitioning Kai Wei 1 Rishabh Iyer 1 Shengjie Wang 2 Wenruo Bai 1 Jeff Biles 1 1 Departent of Electrical Engineering, University of Washington 2 Departent of Coputer Science,
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationAlgebraic Montgomery-Yang problem: the log del Pezzo surface case
c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang
More informationLow-complexity, Low-memory EMS algorithm for non-binary LDPC codes
Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering
More information