Location-Sensitive Resources Recommendation in Social Tagging Systems
|
|
- Felicia Hudson
- 6 years ago
- Views:
Transcription
1 Location-Sensitive Resources Recommendation in Social Tagging Systems Chang Wan Ben Kao David W. Cheung Deartment of Comuter Science, The University of Hong Kong, Pokfulam, Hong Kong {cwan, kao, ABSTRACT In social tagging systems, resources such as images and videos are annotated with descritive words called tags. It has been shown that tag-based resource searching and retrieval is much more effective than content-based retrieval. With the advances in mobile technology, many resources are also geo-tagged with location information. We observe that a traditional tag (word) can carry different semantics at different locations. We study how location information can be used to hel distinguish the different semantics of a resource s tags and thus to imrove retrieval accuracy. Given a search query, we roose a location-artitioning method that artitions all locations into regions such that the user query carries distinguishing semantics in each region. Based on the identified regions, we utilize location information in estimating the ranking scores of resources for the given query. These ranking scores are learned using the Bayesian Personalized Ranking (BPR) framework. Two algorithms, namely, L and, which aly Tucker Decomosition and Pairwise Interaction Tensor Factorization, resectively for modeling the ranking score tensor are roosed. Through exeriments on real datasets, we show that L and outerform other tag-based resource retrieval methods. Categories and Subject Descritors H.3.3 [Information Search and Retrieval]: Retrieval models General Terms Algorithms, Exerimentation, Performance Keywords ranking, resources recommendation, location-sensitive 1. ITRODUCTIO In a social tagging system (e.g., Flickr and YouTube), resources (e.g., hotos and videos) are often annotated with descritive words called tags. Previous studies have shown that searching resources based on their tags leads to very effective and accurate resource retrieval [2, 6]. However, in some cases, tags are ambiguous. For Permission to make digital or hard coies of all or art of this work for ersonal or classroom use is granted without fee rovided that coies are not made or distributed for rofit or commercial advantage and that coies bear this notice and the full citation on the first age. To coy otherwise, to reublish, to ost on servers or to redistribute to lists, requires rior secific ermission and/or a fee. CIKM 12, October 29 ovember 2, 2012, Maui, HI, USA. Coyright 2012 ACM /12/10...$ examle, the word mouse could refer to an animal, a cartoon character (Mickey), or a comuter eriheral device. Tag ambiguity lowers the effectiveness of tag-based search. Over the years, researchers have sent much effort in roosing techniques to deal with the tag-ambiguity roblem [3, 5]. With the advances in mobile technology and the global ositioning system (GPS), resources, esecially images and videos, are geo-tagged with location information. Our observation is that resources location information often rovides useful hints in identifying the semantics of their tags. As an examle, consider a set of hotos that are tagged with the tag sand. Deending on the locations at which these hotos were taken, the semantics of the tag could be inferred. For examle, the tag sand of a hoto taken in the Sahara very likely refers to the concet desert ; for hotos taken in Hawaii and Singaore, the same tag robably refers to beach and the casino hotel Marina Bay Sands, resectively. The semantics of a user query can likewise be inferred. For examle, a user located in the Sahara who issues the query sand is robably looking for hotos of the desert. In the above examle, we suggested that the semantics of a tag or a query could be deduced by the region in which the resource was obtained or the query issuer was located. Intuitively, a region is a set of locations within which a tag or a query carries a unique distinguishing meaning. An interesting question is how these regions (such as The Sahara, Hawaii, and Singaore) be automatically identified. We remark that different tags induce different artitionings of the world into regions: while there are multile regions for the tag sand, there are two regions for the tag football (American football in orth America and soccer anywhere else in the world), and there is only one region (the whole world) for a tag that refers to some globally known concet, such as iphone. Another interesting question is if regions with resect to tags and queries could be identified, how could this information be leveraged in order to achieve good resource retrieval results. The objective of this aer is to address the above two questions. First, given a tag t, we identify the regions induced by t by using machine learning techniques to train a function f t(l), which mas a location l into a region. Second, given a query q issued by a user located at location l, we estimate the ranking scores of resources with resect to q. We extend the BPR framework [9] to include region information in the score estimation. As we will see later in Section 5, our solutions lead to very good resource retrieval results. Here, we summarize our contributions: We roose an algorithm for comuting the region maing function f t(l). We roose algorithms for estimating the ranking scores of resources with resect to a query. 1960
2 We erform an extensive exeriment using real datasets to evaluate the erformance of our algorithms in terms of resource retrieval effectiveness. 2. RELATED WORK is a oular semantic analysis technique that has roven to be very successful in IR. It attemts to overcome the word ambiguity roblem by extracting concets from words in an unstructured text collection, which is realized by erforming Singular Value Decomosition (SVD) on a term-document matrix and by measuring the tag-air similarities so derived. With the extracted concets, one can rank resources w.r.t. a given query by measuring the similarities between resources and the query on the concet level. Bi et al. [3] observes that user information can imrove resource retrieval results. They extend to the Cube method by alying three-dimensional Tucker Decomosition () on a third-order tensor whose dimensions are resources, users, and tags. Besides resource retrieval, tag recommendation is also a oular toic in the study of social tagging systems. Factorization models are a oular method. Rendle et al. [10] model the likelihood score that a user u would tag a resource r with a tag t as a 3D tensor, which is aroximated using. By using AUC (area under the ROC-curve) as the ranking criteria, [10] otimizes the model arameters of to obtain otimal values of the entries in the tensor. [9] extends the work of [10] by alying the Bayesian Personalized Ranking (BPR) framework in model arameter otimization. In [11], the Pairwise Interaction Tensor Factorization () model is roosed, which is shown to be more efficient than the model used in [10]. These techniques for tag recommendation can also be emloyed for solving the resources retrieval roblem. Some studies [8, 4] utilize location information in resource retrieval. Lu, Lu, and Cong [8] resent a hybrid index tree called IUR-tree, which combines location roximity with textual similarity. They further design a branch-and-bound search algorithm to retrieve resources that are the closest and the most relevant to a query. Our method is significantly different from theirs. In articular, we roose a query-driven location artitioning algorithm to transform the location dimension to a region dimension, which significantly imroves searching erformance. 3. PROBLEM STATEMET Our aroach to integrating location information in solving the tag-based resource retrieval roblem consists of two comonents: (1) A location-artitioning scheme that derives a region-maing function f t(l) for each tag t, and (2) a score function that ranks resources in terms of their relevancy to a given query q. In this section we formally define these two roblems. We consider four attributes of a social tagging system: a set of users (taggers) U, asetoftagst, a set of resources R, andaset of locations L 1. We assume that each location l L is reresented by a longitude-latitude air (x l,y l ). Resources in the systems are tagged by users. We assume that the tagging information is reresented by a set S U T R L of tagging records. Each tagging record is a quadrule (u, t, r, l) S, which indicates that auseru assigns a tag t to a resource r. l is the geo-tag location of resource r. Although l is deendent on r, to simlify our discussion, we exlicitly include l in a tagging record. A user query q =(u q,t q,l q) is a trilet which indicates that a user u q,whois located at location l q, issues a query with the tag t q. For simlicity, 1 L includes all ossible locations in the world, not only the locations that are associated with the resources in the social tagging system. we assume that each query consists of only one tag. Our technique can be easily extended to handle multi-tag queries, for examle, by considering all the tags in a multi-tag query as a single comlex tag. Given a tag t,theroblem of location artitioning is to artition L into a set of k t regions H t = {H 1,...,H kt } such that tag t refers to the same concet within each region H i and dissimilar concets in different regions. This artitioning can be reresented by a region maing function (RMF) f t : L [1...k t], which mas a location l L to the region H ft(l) H t. We say that tag t induces the region set H t. Given a query q, we first obtain the RMF f tq.leth q be the set of regions induced by t q. ote that while the query tag t q (such as sand ) can assume different meanings at different locations of the world, it refers to a unique concet within each region H i H q. For notational convenience, we use H q to denote H ftq (l q), which is the region that encomasses the location (l q) of the query. The resource ranking roblem is to derive a score function ŷ(u, t, H, r): U T H q R R, which gives a relevancy score of resource r with resect to a user query issued by user u, who is located in the region H, with the query tag t. Aswewillseelater,wesolve this roblem by reresenting the score function ŷ by a 4D tensor Ŷ,called thescore tensor, such that ŷ(u, t, H, r) is reresented by the entry ŷ of the score tensor. Finally, the to- resources with the highest relevancy scores are returned as the answer set of query q. T(q, ) :=arg max ŷuq,tq,hq,r. (1) r R 4. ALGORITHMS In this section we describe the algorithms for solving the location artitioning roblem and the resource ranking roblem. For the former, we show how to train an RMF f tq for the query tag t q.for the latter, we show how to extend the BPR framework to include region information in estimating the 4D score tensor Ŷ. 4.1 Location Partitioning Our objective is to derive f tq based on the tagging record set S. Our aroach is based on two intuitive assumtions: (1) Users in close roximity are likely to have the same understanding of a tag. (2) If t q s associations (e.g., co-occurrences) with other tags in resources at a certain location l 1 is similar to those at another location l 2,thenl 1 and l 2 should belong to the same region. Procedurally, we first retrieve all the tagging records that involve t q into a set S q, i.e., S q = {(u, t q,r,l) S}. ext, we create a set of training instances X in the following way. Given any tag t and a resource r that is tagged by t q, we define the distance of t from t q w.r.t. r by c(t, r) c(t q,r) d q(t, r) = max{ c(t, r) c(t, (2) i i,r) } where c(t, r) is the number of times resource r is tagged by t. Essentially, d q(t, r) measures the difference in the tagging frequencies of tags t q and t for the resource r, scaled to the range [-1,1]. ext, for each tule (u, t q,r,l) S q, we generate an instance x =(d q(t 1,r),...,d q(t T,r),l) and ut it in X. Based on these instances (observations), we create artitions of X to maximize a osteriori (MAP) estimate of arameters as follows. Suose the instances in X are observations of the mixture of k multivariate normal distributions of T +2dimensions, let z =(z 1,z 2,...,z ) be the latent variables that determine which distributions the observations come from. We have: X (z j = i) d (μ i, Σ i), 1 i k. (3) 1961
3 Let U =[μ i ], Σ =[Σ i],andp (z j = i) =ϕ i such that P k 1. Let ϕ =[ϕ i] R k 1 +. The model arameters to be estimated is denoted by Θ=(ϕ, U, Σ). The likelihood function is: ϕi = Y kx L(Θ; X, z) =P (X, z Θ) = I(z j = i)ϕ i f P (x j ; μ i, Σ i ), (4) j=1 where I is the indicator function and f P is the robability density function of a multivariate normal. We aly exectation-maximization (EM) algorithm to find MAP estimates of Θ with the following equations to udate ϕ, U, Σ: ϕ (t+1) =argmax ϕ Q(Θ Θ(t) ) = arg max ϕ ( X kx j=1 ji log ϕ t i ), (5) μ (t+1) j=1 i = ji x j j=1, (6) ji Σ (t+1) j=1 i = ji (x j μ (t+1) i )(x j μ (t+1) i ) j=1, (7) ji where P ji is the conditional robability of x j belonging to the i-th distribution, given by: ji = P (z j = i x j ;Θ (t) )= ϕ (t) i f P (x j ; μ (t) i, Σ (t) i ) f P (x j ; μ (t) i, Σ (t) i ). (8) P k ϕ(t) i Let L q = {l (u, t q,r,l) S q}. After the EM algorithm is done, for each location l L q, the RMF value f tq ( l) is determined by f tq ( l) = arg max ϕ i if P (x; μ i, Σ i). (9) For other locations l L L q, we first determine the location l L q that gives the smallest Euclidean distance D(l, l ) from l (i.e., l =argmind(l, l)). The region of l is taken as the region l Lq of l, i.e., f tq (l) =f tq ( l ). So far, we have assumed that the number of regions, k, is known. We can determine the value of k by gradually increasing its value from 1 until the likelihood value (Equation 4) stos increasing. Algorithm 1 summarizes the location artitioning algorithm LP. Algorithm 1 LP IPUT t q, S q, L, L q. OUTPUT The RMF f tq. 1: Generate the set of observations X; 2: k =0; 3: reeat 4: k = k +1; 5: Initialize Θ=(ϕ, U, Σ); 6: reeat 7: Udate P ji, ϕ, U, Σ according to Equations 5-8; 8: until convergence 9: until L(Θ; X, z) does not increase 10: l L q, f tq ( l) = arg maxϕ if P (x; μ i, Σ i); i 11: l L L q, l =argmind(l, l); f tq (l) =f tq ( l ); l L q 12: RETUR f tq 4.2 Estimating the Score Tensor Our next task is to estimate the score tensor Ŷ. We generate the values of the elements in Ŷ by assuming a certain model. Let Θ reresents the model s arameters. We determine Θ by first constructing a set of observations Y and then use these observations tofindthe otimal Θ following the Bayesian Personalized Ranking (BPR) framework. In the following, we first give the details of how the training set Y is constructed and how BPR is alied. Then, we show how Ŷ is determined using the Tucker Decomosition () and as two ossible models of First, for each record (u, t, l, r) Ŷ. S, we relace the location l of the record by the region H H q to which l belongs. Let S H = {(u, t, H, r) ((u, t, l, r) S) (H = H ftq (l))}. Suose auseru tags a resource r 1, which is located in region H, with the tag t, then(u, t, H, r 1) S H.Sinceumakes such a tagging, resource r is relevant to the tag t from the ersective of u. On the other hand, if the same user does not tag another resource r 2 with t, thenr 2 is not relevant to t according to u. Inotherwords, ŷ 1 should be large and ŷ 2 should be small. Define Δŷ(u, t, H, r 1,r 2)=ŷ 1 ŷ 2. We construct the set Y as Y = {(u, t, H, r 1,r 2 ) ((u, t, H, r 1 ) S H ) ((u, t, H, r 2 ) / S H )}. (10) Given a model and its arameters Θ, we follow [9] in estimating Θ. Secifically, based on Bayes theorem, (Ŷ Y) (Y Ŷ )(Ŷ ). (11) For each observation w =(u, t, H, r 1,r 2) Y, the robability (w Ŷ ) is estimated by, ((u, t, H, r 1,r 2) Ŷ )=σ(δŷ(u, t, H, r1,r2)), (12) 1 where σ is the logistic function σ(x) =. We assume 1+e ( x) that model arameters are drawn from a normal distribution Θ (0,σΘI). 2 Letλ Θ be the regularization constant of σ Θ and α be the learning rate of BPR. Algorithm 2 shows the model otimization rocedure BPR-OPT for training model arameters Θ. Algorithm 2 Model Otimization Using Bayesian Theorem and MAP (BPR-OPT) IPUT Y, λ Θ, α OUTPUT the redictive model arameters Θ. 1: Initialize Θ; 2: reeat 3: Draw (u, t, H, r 1,r 2) from Y; 4: Θ Θ+ α((1 σ(δŷ(u, t, H, r 1,r 2))) λ ΘΘ); 5: until convergence 6: RETUR Θ Θ Δŷ(u, t, H, r1,r2) Factorization models are very oular models in recommendation systems and resource searching systems. We use and as two models for redicting the score tensor Ŷ. We show how these models arameters can be learned using BPR-OPT. [Tucker Decomosition ()] factorizes a high-order cube Ŷ into a core tensor Ĉ Ru t h r and four factor matrices Û R U u, ˆT R T t, Ĥ R Hq h and ˆR R R r, where u, t, h,and r are arameters which control the sizes of Ĉ s dimensions. Each entry in Ŷ can be formulated as: ŷ = ĉũ,,,ûu,ũˆt t,ĥh, ˆrr,. (13) ũ 1962
4 The model arameters Θ include all the entries of Ĉ, Û, ˆT, Ĥ, and ˆR. For learning the model arameters using BPR-OPT, the gradients used in Algorithm 2 are: θŷ ŷ ĉũ,,, ŷ = X û u,ũ ŷ = X ˆt t, ũ ŷ ĤH, =û u,ũˆt t,ĥh, ˆrr, = X ũ ŷ = X ˆr r, ũ ĉũ,,,ˆt t,ĥh, ˆrr, ĉũ,,,ûu,ũĥh, ˆrr, ĉũ,,,ûu,ũˆt t,ˆr r, ĉũ,,,ûu,ũˆt t,ĥh,. (14) We call our solution of estimating Ŷ using, L.Thecomlexity of L is O( u t h r). [Pairwise Interaction Tensor Factorization] () The time comlexity of is high. To imrove efficiency, is roosed in [11], which only considers two-way interactions between r and other dimensions. We extend to a 4D version to include the region dimension H. We factorize Ŷ into four factor matrices Û R U, ˆT R T, Ĥ R Hq and ˆR R R,where is a arameter that controls the size of the matrices. Each entry in Ŷ can be formulated as: ŷ = X û u, ˆr r, U + X ˆt t, ˆr r, T + X Ĥ H, ˆr r, H (15) BPR-OPT can then be alied in a way similar to that of, with the following gradients: ŷ û u, ŷ ˆr U r, =ˆr U r,, ŷ ˆt t, =û u,, ŷ ˆr T r, =ˆr r,, T ŷ ĤH, =ˆr H r,, (16) = ˆt t,, ŷ = ˆr ĤH,. r, H We call the resulting solution, whose comlexity is O(). 5. EXPERIMETS In this section we comare the effectiveness of our algorithms in ranking resources for answering search queries. 5.1 Datasets We conducted exeriments on data collected from two social tagging systems: Flickr and Picasa. They are hoto sharing systems that allow users to annotate hotos with tags. Since the raw data is very noisy and sarse, we erformed some cleaning and rerocessing. First, we removed system-generated tags such as "uloaded:by=instagram". Also, to eliminate outliers, any user, tag, or resource that has aeared in less than 10 records of S are removed. Table 1 shows some statistics of the two datasets after cleaning. 5.2 Metrics Let Q be a set of queries. For each query q Q, a ranking algorithm returns a ranked list of resources. We evaluate the effectiveness of a ranking algorithm by three metrics, namely, Mean Recirocal Rank (MRR), Precision (P@), and ormalized Discounted Cumulative Gain (GCG@). Dataset U T R S Flickr 8,199 28,049 26, ,527 Picasa 509 1,545 1,041 18,135 Table 1: Data Statistics The recirocal rank of a ranked list is the multilicative inverse of the rank of the first relevant resource in the list. The MRR score of an algorithm A is the average recirocal rank obtained by the ranked lists given by A w.r.t. the query set Q. Formally, MRR = 1 X 1, (17) rank i where rank i is the rank of the first relevant resource in the ranked list for the i-th query. The Precision of a ranked list is the fraction of the resources in the list that are relevant to the corresonding query. The Precision score of an algorithm is the average recision of its ranked lists, which is given by: = 1 X q Q P rel (q, i), (18) where rel (q, i) is an indicator function whose value is 1 if the i th - ranked resource in the list for query q is relevant and 0 otherwise. Finally, the DCG score [7] is comuted as follows: DCG@ = 1 X q Q X Z q (2 rel (q,i) 1) log(i +1)!, where Z q is a normalization factor (see [7] for details). We invited 10 judges to articiate in the exeriments. We randomly selected 100 tagging records in S to generate the query set Q. For each selected record (u, t, r, l), we created a query q =(u, t, l). We then alied the various ranking algorithms to return their ranked lists for each query. Each judge was given 10 queries and was asked to judge whether each returned resource was relevant to the corresonding query. The judge was not told which algorithm s ranked list did a resource aear. The results were then used to comute the scores for the various metrics. 5.3 Algorithms and Settings Besides L and, we evaluate four other algorithms for ranking resources. They are [3], Cube [3], [9] and [11]. Due to sace limitations, readers are referred to the references for details. In the exeriments, the BPR-OPT arameters are α = 0.05 and λ θ = For LP s initialization ste (Algorithm 1, Line 5), we first erform k-means to cluster the instances in X into k clusters 2. This result is used to initialize U and Σ. Also,weset ϕ i = cluster(i),wherecluster(i) is the i-th cluster of the k-means result. The model arameters of,, L, and are all initialized with (0, 0.01). Also,weset = u = t = h = r = Results Figures 1-3 show the scores DCG@, P@, and MRR, resectively, of the algorithms when they are alied to the two datasets. From the figures, we see that, which considers only the dimensions tag and resource erforms worst. The three algorithms Cube,, and, which consider the user dimension as 2 The l dimension of x is reresented by a longitude dimension and a latitude dimension, both of them are normalized to the [-1,1] range. 1963
5 5 5 L Cube 5 5 L Cube DCG@ 5 5 L Figure 1: DCG@ P@ Cube 5 5 Figure 2: L Cube well erform better than. These three algorithms give comarable erformances among themselves. By considering the location dimension and extending the 3D tensor to 4D, L and clearly outerform the other four algorithms. The erformance of L and is very similar, desite the fact that uses a simler factorization model. Given that is much more efficient than L, is the algorithm of choice for solving the resource ranking roblem. 5.5 Parameter Sensitivity The arameters, u, t, h,and r control the sizes of the core tensor and the factorization matrices of and. These values affect the accuracy of our aroximation of the score tensor Ŷ.We have conducted an exeriment varying the values of these arameters. We observe that in general, setting them to 64 is enough for Ŷ to converge. Therefore, in our erformance exeriment, we set those arameters to COCLUSIO In this aer we studied the imact of location information on resource recommendation. We addressed two roblems, namely, the location artitioning roblem and the resource ranking roblem. We roosed the LP algorithm which comutes a region maing function to solve the location artitioning roblem. We also roosed the L algorithm and the algorithm for estimating the score tensor for ranking resources. Through an exerimental study on real datasets, we showed that our location-sensitive algorithms outerform other cometitors. Acknowledgements This roject is suorted by HKU Research Grant REFERECES [1] SIGMOD 2011, Athens, Greece, June 12-16, ACM, [2] S.Bao,G.-R.Xue,X.Wu,Y.Yu,B.Fei,andZ.Su. Otimizing web search using social annotations. In WWW, ages ACM, [3] B. Bi, S. D. Lee, B. Kao, and R. Cheng. Cube: An effective and efficient method for searching resources in social tagging systems. In ICDE, ages IEEE Comuter Society, [4] X. Cao, G. Cong, C. S. Jensen, and B. C. Ooi. Collective satial keyword querying. In SIGMOD Conference [1], ages [5] S.C.Deerwester,S.T.Dumais,T.K.Landauer,G.W. Furnas, and R. A. Harshman. Indexing by latent semantic analysis. JASIS, 41(6): , [6] P. Heymann, G. Koutrika, and H. Garcia-Molina. Can social bookmarking imrove web search? In WSDM, ages ACM, [7] K. Järvelin and J. Kekäläinen. Cumulated gain-based evaluation of IR techniques. ACM Trans. Inf. Syst., 20(4): , [8] J. Lu, Y. Lu, and G. Cong. Reverse satial and textual k nearest neighbor search. In SIGMOD Conference [1], ages [9] S. Rendle, C. Freudenthaler, Z. Gantner, and L. Schmidt-Thieme. BPR: Bayesian Personalized Ranking from Imlicit Feedback. In UAI, ages AUAI Press, [10] S. Rendle, L. B. Marinho, A. anooulos, and L. Schmidt-Thieme. Learning otimal ranking with tensor factorization for tag recommendation. In KDD, ages ACM, [11] S. Rendle and L. Schmidt-Thieme. Pairwise interaction tensor factorization for ersonalized tag recommendation. In WSDM, ages ACM, Figure 3: MRR 1964
4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationNamed Entity Recognition using Maximum Entropy Model SEEM5680
Named Entity Recognition using Maximum Entroy Model SEEM5680 Named Entity Recognition System Named Entity Recognition (NER): Identifying certain hrases/word sequences in a free text. Generally it involves
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationSTA 250: Statistics. Notes 7. Bayesian Approach to Statistics. Book chapters: 7.2
STA 25: Statistics Notes 7. Bayesian Aroach to Statistics Book chaters: 7.2 1 From calibrating a rocedure to quantifying uncertainty We saw that the central idea of classical testing is to rovide a rigorous
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationMetrics Performance Evaluation: Application to Face Recognition
Metrics Performance Evaluation: Alication to Face Recognition Naser Zaeri, Abeer AlSadeq, and Abdallah Cherri Electrical Engineering Det., Kuwait University, P.O. Box 5969, Safat 6, Kuwait {zaery, abeer,
More informationDETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS
Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationXReason: A Semantic Approach that Reasons with Patterns to Answer XML Keyword Queries
XReason: A Semantic Aroach that Reasons with Patterns to Answer XML Keyword Queries Cem Aksoy 1, Aggeliki Dimitriou 2, Dimitri Theodoratos 1, Xiaoying Wu 3 1 New Jersey Institute of Technology, Newark,
More informationOn parameter estimation in deformable models
Downloaded from orbitdtudk on: Dec 7, 07 On arameter estimation in deformable models Fisker, Rune; Carstensen, Jens Michael Published in: Proceedings of the 4th International Conference on Pattern Recognition
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationFig. 4. Example of Predicted Workers. Fig. 3. A Framework for Tackling the MQA Problem.
217 IEEE 33rd International Conference on Data Engineering Prediction-Based Task Assignment in Satial Crowdsourcing Peng Cheng #, Xiang Lian, Lei Chen #, Cyrus Shahabi # Hong Kong University of Science
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationCollaborative Place Models Supplement 1
Collaborative Place Models Sulement Ber Kaicioglu Foursquare Labs ber.aicioglu@gmail.com Robert E. Schaire Princeton University schaire@cs.rinceton.edu David S. Rosenberg P Mobile Labs david.davidr@gmail.com
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationAge of Information: Whittle Index for Scheduling Stochastic Arrivals
Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationUncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition
TNN-2007-P-0332.R1 1 Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers
More informationUse of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek
Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.
More informationFAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
More informationGIVEN an input sequence x 0,..., x n 1 and the
1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements
More informationEE 508 Lecture 13. Statistical Characterization of Filter Characteristics
EE 508 Lecture 3 Statistical Characterization of Filter Characteristics Comonents used to build filters are not recisely redictable L C Temerature Variations Manufacturing Variations Aging Model variations
More informationPublished: 14 October 2013
Electronic Journal of Alied Statistical Analysis EJASA, Electron. J. A. Stat. Anal. htt://siba-ese.unisalento.it/index.h/ejasa/index e-issn: 27-5948 DOI: 1.1285/i275948v6n213 Estimation of Parameters of
More informationFinding recurrent sources in sequences
Finding recurrent sources in sequences Aristides Gionis Deartment of Comuter Science Stanford University Stanford, CA, 94305, USA gionis@cs.stanford.edu Heikki Mannila HIIT Basic Research Unit Deartment
More informationAKRON: An Algorithm for Approximating Sparse Kernel Reconstruction
: An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla
More informationFuzzy Automata Induction using Construction Method
Journal of Mathematics and Statistics 2 (2): 395-4, 26 ISSN 1549-3644 26 Science Publications Fuzzy Automata Induction using Construction Method 1,2 Mo Zhi Wen and 2 Wan Min 1 Center of Intelligent Control
More informationLearning Optimal Ranking with Tensor Factorization for Tag Recommendation
Learning Optimal Ranking with Tensor Factorization for Tag Recommendation Steffen Rendle, Leandro Balby Marinho, Alexandros Nanopoulos, Lars Schmidt-Thieme Information Systems and Machine Learning Lab
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationEXACTLY PERIODIC SUBSPACE DECOMPOSITION BASED APPROACH FOR IDENTIFYING TANDEM REPEATS IN DNA SEQUENCES
EXACTLY ERIODIC SUBSACE DECOMOSITION BASED AROACH FOR IDENTIFYING TANDEM REEATS IN DNA SEUENCES Ravi Guta, Divya Sarthi, Ankush Mittal, and Kuldi Singh Deartment of Electronics & Comuter Engineering, Indian
More informationarxiv: v2 [stat.ml] 7 May 2015
Semi-Orthogonal Multilinear PCA with Relaxed Start Qiuan Shi and Haiing Lu Deartment of Comuter Science Hong Kong Batist University, Hong Kong, China csshi@com.hkbu.edu.hk, haiing@hkbu.edu.hk arxiv:1504.08142v2
More information216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are
Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More informationON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING
8th Euroean Signal Processing Conference (EUSIPCO-2) Aalborg, Denmark, August 23-27, 2 ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING Vahid Abolghasemi, Saideh Ferdowsi, Bahador Makkiabadi,2,
More informationChapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population
Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection
More informationAdaptive estimation with change detection for streaming data
Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment
More informationFinite Mixture EFA in Mplus
Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered
More informationUncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition
Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers Sr. Deartment of
More informationPrivacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data
Privacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data Jianjie Ma and Krishnamoorthy Sivakumar School of EECS, Washington State University, Pullman, WA 9964-75, USA Telehone:
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationMobility-Induced Service Migration in Mobile. Micro-Clouds
arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationDistributed K-means over Compressed Binary Data
1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationPARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin
PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH Luoluo Liu, Trac D. Tran, and Sang Peter Chin Det. of Electrical and Comuter Engineering, Johns Hokins Univ., Baltimore, MD 21218, USA {lliu69,trac,schin11}@jhu.edu
More informationCovariance Matrix Estimation for Reinforcement Learning
Covariance Matrix Estimation for Reinforcement Learning Tomer Lancewicki Deartment of Electrical Engineering and Comuter Science University of Tennessee Knoxville, TN 37996 tlancewi@utk.edu Itamar Arel
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationFactorization Models for Context-/Time-Aware Movie Recommendations
Factorization Models for Context-/Time-Aware Movie Recommendations Zeno Gantner Machine Learning Group University of Hildesheim Hildesheim, Germany gantner@ismll.de Steffen Rendle Machine Learning Group
More informationImproved Bounds on Bell Numbers and on Moments of Sums of Random Variables
Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating
More informationPER-PATCH METRIC LEARNING FOR ROBUST IMAGE MATCHING. Sezer Karaoglu, Ivo Everts, Jan C. van Gemert, and Theo Gevers
PER-PATCH METRIC LEARNING FOR ROBUST IMAGE MATCHING Sezer Karaoglu, Ivo Everts, Jan C. van Gemert, and Theo Gevers Intelligent Systems Lab, Amsterdam, University of Amsterdam, 1098 XH Amsterdam, The Netherlands
More informationPairwise active appearance model and its application to echocardiography tracking
Pairwise active aearance model and its alication to echocardiograhy tracking S. Kevin Zhou 1, J. Shao 2, B. Georgescu 1, and D. Comaniciu 1 1 Integrated Data Systems, Siemens Cororate Research, Inc., Princeton,
More informationEstimation of Separable Representations in Psychophysical Experiments
Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)
More informationSemi-Orthogonal Multilinear PCA with Relaxed Start
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015) Semi-Orthogonal Multilinear PCA with Relaxed Start Qiuan Shi and Haiing Lu Deartment of Comuter Science
More informationConstruction of High-Girth QC-LDPC Codes
MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationComputations in Quantum Tensor Networks
Comutations in Quantum Tensor Networks T Huckle a,, K Waldherr a, T Schulte-Herbrüggen b a Technische Universität München, Boltzmannstr 3, 85748 Garching, Germany b Technische Universität München, Lichtenbergstr
More informationSpectral Clustering based on the graph p-laplacian
Sectral Clustering based on the grah -Lalacian Thomas Bühler tb@cs.uni-sb.de Matthias Hein hein@cs.uni-sb.de Saarland University Comuter Science Deartment Camus E 663 Saarbrücken Germany Abstract We resent
More informationPlotting the Wilson distribution
, Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationOnline homotopy algorithm for a generalization of the LASSO
This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization
More informationHidden Predictors: A Factor Analysis Primer
Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationResearch Note REGRESSION ANALYSIS IN MARKOV CHAIN * A. Y. ALAMUTI AND M. R. MESHKANI **
Iranian Journal of Science & Technology, Transaction A, Vol 3, No A3 Printed in The Islamic Reublic of Iran, 26 Shiraz University Research Note REGRESSION ANALYSIS IN MARKOV HAIN * A Y ALAMUTI AND M R
More informationLearning Sequence Motif Models Using Gibbs Sampling
Learning Sequence Motif Models Using Gibbs Samling BMI/CS 776 www.biostat.wisc.edu/bmi776/ Sring 2018 Anthony Gitter gitter@biostat.wisc.edu These slides excluding third-arty material are licensed under
More informationAlgorithms for Air Traffic Flow Management under Stochastic Environments
Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises
More informationProximal methods for the latent group lasso penalty
Proximal methods for the latent grou lasso enalty The MIT Faculty has made this article oenly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Villa,
More informationVariable Selection and Model Building
LINEAR REGRESSION ANALYSIS MODULE XIII Lecture - 38 Variable Selection and Model Building Dr. Shalabh Deartment of Mathematics and Statistics Indian Institute of Technology Kanur Evaluation of subset regression
More informationEstimating function analysis for a class of Tweedie regression models
Title Estimating function analysis for a class of Tweedie regression models Author Wagner Hugo Bonat Deartamento de Estatística - DEST, Laboratório de Estatística e Geoinformação - LEG, Universidade Federal
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationarxiv: v3 [physics.data-an] 23 May 2011
Date: October, 8 arxiv:.7v [hysics.data-an] May -values for Model Evaluation F. Beaujean, A. Caldwell, D. Kollár, K. Kröninger Max-Planck-Institut für Physik, München, Germany CERN, Geneva, Switzerland
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationCOMMUNICATION BETWEEN SHAREHOLDERS 1
COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationRobust Solutions to Markov Decision Problems
Robust Solutions to Markov Decision Problems Arnab Nilim and Laurent El Ghaoui Deartment of Electrical Engineering and Comuter Sciences University of California, Berkeley, CA 94720 nilim@eecs.berkeley.edu,
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationSolved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.
Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the
More informationTensor-Based Sparsity Order Estimation for Big Data Applications
Tensor-Based Sarsity Order Estimation for Big Data Alications Kefei Liu, Florian Roemer, João Paulo C. L. da Costa, Jie Xiong, Yi-Sheng Yan, Wen-Qin Wang and Giovanni Del Galdo Indiana University School
More informationScaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling
Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering
More informationy p 2 p 1 y p Flexible System p 2 y p2 p1 y p u, y 1 -u, y 2 Component Breakdown z 1 w 1 1 y p 1 P 1 P 2 w 2 z 2
ROBUSTNESS OF FLEXIBLE SYSTEMS WITH COMPONENT-LEVEL UNCERTAINTIES Peiman G. Maghami Λ NASA Langley Research Center, Hamton, VA 368 Robustness of flexible systems in the resence of model uncertainties at
More informationChapter 1: PROBABILITY BASICS
Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.
More informationThe Value of Even Distribution for Temporal Resource Partitions
The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number
More informationProspect Theory Explains Newsvendor Behavior: The Role of Reference Points
Submitted to Management Science manuscrit (Please, rovide the mansucrit number! Authors are encouraged to submit new aers to INFORMS journals by means of a style file temlate, which includes the journal
More information