Information Technology
Generalized Higher-Order Tensor Decomposition via Parallel ADMM
Shang, Fanhua (The Chinese University of Hong Kong) | Liu, Yuanyuan (The Chinese University of Hong Kong) | Cheng, James (The Chinese University of Hong Kong)
Higher-order tensors are becoming prevalent in many scientific areas such as computer vision, social network analysis, data mining and neuroscience. Traditional tensor decomposition approaches face three major challenges: model selecting, gross corruptions and computational efficiency. To address these problems, we first propose a parallel trace norm regularized tensor decomposition method, and formulate it as a convex optimization problem. This mehtod does not require the rank of each mode to be specified beforehand, and can automaticaly determine the number of factors in each mode through our optimization scheme. By considering the low-rank structure of the observed tensor, we analyze the equivalent relationship of the trace norm between a low-rank tensor and its core tensor. Then, we cast a non-convex tensor decomposition model into a weighted combination of multiple much smaller-scale matrix trace norm minimization. Finally, we develop two parallel alternating direction methods of multipliers (ADMM) to solve our problems. Experimental results verify that our regularized formulation is effective, and our methods are robust to noise or outliers.
On Hair Recognition in the Wild by Machine
Roth, Joseph (Michigan State University) | Liu, Xiaoming (Michigan State University)
We present an algorithm for identity verification using only information from the hair. Face recognition in the wild (i.e., unconstrained settings) is highly useful in a variety of applications, but performance suffers due to many factors, e.g., obscured face, lighting variation, extreme pose angle, and expression. It is well known that humans utilize hair for identification under many of these scenarios due to either the consistent hair appearance of the same subject or obvious hair discrepancy of different subjects, but little work exists to replicate this intelligence artificially. We propose a learned hair matcher using shape, color, and texture features derived from localized patches through an AdaBoost technique with abstaining weak classifiers when features are not present in the given location. The proposed hair matcher achieves 71.53% accuracy on the LFW View 2 dataset. Hair also reduces the error of a Commercial Off-The-Shelf (COTS) face matcher through simple score-level fusion by 5.7%.
Delivering Guaranteed Display Ads under Reach and Frequency Requirements
Hojjat, Ali (University of California, Irvine) | Turner, John (University of California, Irvine) | Cetintas, Suleyman (Yahoo Labs) | Yang, Jian (Yahoo Labs)
We propose a novel idea in the allocation and serving of online advertising. We show that by using predetermined fixed-length streams of ads (which we call patterns) to serve advertising, we can incorporate a variety of interesting features into the ad allocation optimization problem. In particular, our formulation optimizes for representativeness as well as user-level diversity and pacing of ads, under reach and frequency requirements. We show how the problem can be solved efficiently using a column generation scheme in which only a small set of best patterns are kept in the optimization problem. Our numerical tests suggest that with parallelization of the pattern generation process, the algorithm has a promising run time and memory usage.
The Semantic Interpretation of Trust in Multiagent Interactions
Kalia, Anup Kumar (North Carolina State University)
We provide an approach to estimate trust between agents from their interactions. Our approach takes a probabilistic model of trust founded on commitments. We assume commitments to estimate trust because a commitment describes what an agent may expect of another. Therefore, the satisfaction or violation of a commitment provides a natural basis for determining how much to trust another agent. We evaluate our approach empirically. In one study, 30 subjects read emails extracted from the Enron dataset augmented with some synthetic emails to capture commitment operations missing in the Enron corpus. The subjects estimated trust between each pair of communicating participants. We trained model parameters for each subject with respect to our automated analysis of the emails, showing that our trained parameters yield a lower prediction error of a subject's trust rating given automatically inferred commitments than fixed parameters.
Event Recommendation in Event-Based Social Networks
Qiao, Zhi (Chinese Academy of Sciences) | Zhang, Peng (Chinese Academy of Sciences) | Zhou, Chuan (Chinese Academy of Sciences) | Cao, Yanan (Chinese Academy of Sciences) | Guo, Li (Chinese Academy of Sciences) | Zhang, Yanchuan (Victoria University)
With the rapid growth of event-based social networks, the demand of event recommendation becomes increasingly important. Different from classic recommendation problems, event recommendation generally faces the problems of heterogenous online and offline social relationships among users and implicit feedback data. In this paper, we present a baysian probability model that can fully unleash the power of heterogenous social relations and efficiently tackle with implicit feedback characteristic for event recommendation. Experimental results on several real-world datasets demonstrate the utility of our method.
Improving Domain-independent Cloud-Based Speech Recognition with Domain-Dependent Phonetic Post-Processing
Twiefel, Johannes (University of Hamburg) | Baumann, Timo (University of Hamburg) | Heinrich, Stefan (University of Hamburg) | Wermter, Stefan (University of Hamburg)
Automatic speech recognition (ASR) technology has been developed to such a level that off-the-shelf distributed speech recognition services are available (free of cost), which allow researchers to integrate speech into their applications with little development effort or expert knowledge leading to better results compared with previously used open-source tools. Often, however, such services do not accept language models or grammars but process free speech from any domain. While results are very good given the enormous size of the search space, results frequently contain out-of-domain words or constructs that cannot be understood by subsequent domain-dependent natural language understanding (NLU) components. We present a versatile post-processing technique based on phonetic distance that integrates domain knowledge with open-domain ASR results, leading to improved ASR performance. Notably, our technique is able to make use of domain restrictions using various degrees of domain knowledge, ranging from pure vocabulary restrictions via grammars or N-Grams to restrictions of the acceptable utterances. We present results for a variety of corpora (mainly from human-robot interaction) where our combined approach significantly outperforms Google ASR as well as a plain open-source ASR solution.
Identifying Domain-Dependent Influential Microblog Users: A Post-Feature Based Approach
Liu, Nian (Wuhan University of Technology) | Li, Lin (Wuhan University of Technology) | Xu, Guandong (University of Technology, Sydney) | Yang, Zhenglu (Nankai University)
Users of a social network like to follow the posts published by influential users. Such posts usually are delivered quickly and thus will produce a strong influence on public opinions. In this paper, we focus on the problem of identifying domain-dependent influential users(or topic experts). Some of traditional approaches are based on the post contents of users userโs to identify influential users, which may be biased by spammers who try to make posts related to some topics through a simple copy and paste. Others make use of user authentication information given by a service platform or user self description (introduction or label) in finding influential users. However, what users have published is not necessarily related to what they have registed and described. In addition, if there is no comments from other users, itโs less objective to assess a userโs post quality. To improve effectiveness of recognizing influential users in a topic of microblogs, we propose a post-feature based approach which is supplementary to post-content based approaches. Our experimental results show that the post-feature based approach produces relatively higher precision than that of the content based approach.
Non-Linear Label Ranking for Large-Scale Prediction of Long-Term User Interests
Djuric, Nemanja (Yahoo! Labs) | Grbovic, Mihajlo (Yahoo! Labs) | Radosavljevic, Vladan (Yahoo! Labs) | Bhamidipati, Narayan (Yahoo! Labs) | Vucetic, Slobodan (Temple University)
We consider the problem of personalization of online services from the viewpoint of ad targeting, where we seek to find the best ad categories to be shown to each user, resulting in improved user experience and increased advertiser's revenue. We propose to address this problem as a task of ranking the ad categories depending on a user's preference, and introduce a novel label ranking approach capable of efficiently learning non-linear, highly accurate models in large-scale settings. Experiments on real-world advertising data set with more than 3.2 million users show that the proposed algorithm outperforms the existing solutions in terms of both rank loss and top-K retrieval performance, strongly suggesting the benefit of using the proposed model on large-scale ranking problems.
LSDH: A Hashing Approach for Large-Scale Link Prediction in Microblogs
Liu, Dawei (Chinese Academy of Sciences) | Wang, Yuanzhuo (Chinese Academy of Sciences) | Jia, Yantao (Chinese Academy of Sciences) | Li, Jingyuan (Chinese Academy of Sciences) | Yu, Zhihua (Chinese Academy of Sciences)
One challenge of link prediction in online social networks is the large scale of many such networks. The measures used by existing work lack a computational consideration in the large scale setting. We propose the notion of social distance in a multi-dimensional form to measure the closeness among a group of people in Microblogs. We proposed a fast hashing approach called Locality-sensitive Social Distance Hashing (LSDH), which works in an unsupervised setup and performs approximate near neighbor search without high-dimensional distance computation. Experiments were applied over a Twitter dataset and the preliminary results testified the effectiveness of LSDH in predicting the likelihood of future associations between people.
Theory of Cooperation in Complex Social Networks
Ranjbar-Sahraei, Bijan (Maastricht University) | Ammar, Haitham Bou (University of Pennsylvania) | Bloembergen, Daan (Maastricht University) | Tuyls, Karl (University of Liverpool) | Weiss, Gerhard (Maastricht University)
This paper presents a theoretical as well as empirical study on the evolution of cooperation on complex social networks, following the continuous action iterated prisoner's dilemma (CAIPD) model. In particular, convergence to network-wide agreement is proven for both evolutionary networks with fixed interaction dynamics, as well as for coevolutionary networks where these dynamics change over time. Moreover, an extension to the CAIPD model is proposed that allows to model influence on the evolution of cooperation in social networks. As such, this work contributes to a better understanding of behavioral change on social networks, and provides a first step towards their active control.