Country
TD-DeltaPi: A Model-Free Algorithm for Efficient Exploration
Silva, Bruno C. da (University of Massachusetts Amherst) | Barto, Andrew G. (University of Massachusetts Amherst)
We study the problem of finding efficient exploration policies for the case in which an agent is momentarily not concerned with exploiting, and instead tries to compute a policy for later use. We first formally define the Optimal Exploration Problem as one of sequential sampling and show that its solutions correspond to paths of minimum expected length in the space of policies. We derive a model-free, local linear approximation to such solutions and use it to construct efficient exploration policies. We compare our model-free approach to other exploration techniques, including one with the best known PAC bounds, and show that ours is both based on a well-defined optimization problem and empirically efficient.
Optimization and Controlled Systems: A Case Study on Thermal Aware Workload Dispatching
Bartolini, Andrea (University of Bologna) | Lombardi, Michele (University of Bologna) | Milano, Michela (University of Bologna) | Benini, Luca ( DEIS, University of Bologna )
Although successfully employed on many industrial problems, Combinatorial Optimization still has limited applicability on several real-world domains, often due to modeling difficulties. This is typically the case for systems under the control of an on-line policy: even when the policy itself is well known, capturing its effect on the system in a declarative model is often impossible by conventional means. Such a difficulty is at the root of the classical, sharp separation between off- line and on-line approaches. In this paper, we investigate a general method to model controlled systems, based on the integration of Machine Learning and Constraint Programming (CP). Specifically, we use an Artificial Neural Network (ANN) to learn the behavior of a controlled system (a multicore CPU with thermal con- trollers) and plug it into a CP model by means of Neuron Constraints. The method obtains significantly better results compared to an approach with no ANN guidance. Neuron Constraints were first introduced in [Bartolini et al., 2011b] as a mean to model complex systems: providing evidence of their applicability to controlled systems is a significant step forward, broadening the application field of combinatorial methods and disclosing opportunities for hybrid off-line/on-line optimization.
Symbolic Variable Elimination for Discrete and Continuous Graphical Models
Sanner, Scott (NICTA and Australian National University) | Abbasnejad, Ehsan (Australian National University and NICTA)
Probabilistic reasoning in the real-world often requires inference incontinuous variable graphical models, yet there are few methods for exact, closed-form inference when joint distributions are non-Gaussian. To address this inferential deficit, we introduce SVE -- a symbolic extension of the well-known variable elimination algorithm to perform exact inference in an expressive class of mixed discrete and continuous variable graphical models whose conditional probability functions can be well-approximated as piecewise combinations of polynomials with bounded support. Using this representation, we show that we can compute all of the SVE operations exactly and in closed-form, which crucially includes definite integration w.r.t. multivariate piecewise polynomial functions. To aid in the efficient computation and compact representation of this solution, we use an extended algebraic decision diagram (XADD) data structure that supports all SVE operations. We provide illustrative results for SVE on probabilistic inference queries inspired by robotics localization and tracking applications that mix various continuous distributions; this represents the first time a general closed-form exact solution has been proposed for this expressive class of discrete/continuous graphical models.
Temporally Expressive Planning Based on Answer Set Programming with Constraints
Bao, Forrest Sheng (Texas Tech University) | Zhang, Yuanlin (Texas Tech University)
Recently, a new language AC(C) was proposed to integrate answer set programming (ASP) and constraint logic programming (CLP). In this paper, we show that temporally expressive planning problems in PDDL2.1 can be translated into AC(C) and solved using AC(C) solvers. Compared with existing approaches, the new approach puts less restrictions on the planning problems and is easy to extend with new features like PDDL axioms. It can also leverage the inference engine for AC(C) which has the potential to exploit the best reasoning mechanisms developed in the ASP, SAT and CP communities.
Exacting Social Events for Tweets Using a Factor Graph
Liu, Xiaohua (Harbin Institute of Technology) | Zhou, Xiangyang (icrosoft Research Asia) | Fu, Zhongyang (Shanghai Jiao Tong University) | Wei, Furu (Microsoft Research Asia) | Zhou, Ming (Microsoft Research Asia)
Social events are events that occur between people where at least one person is aware of the other and of the event taking place. Extracting social events can play an important role in a wide range of applications, such as the construction of social network. In this paper, we introduce the task of social event extraction for tweets, an important source of fresh events. One main challenge is the lack of information in a single tweet, which is rooted in the short and noise-prone nature of tweets. We propose to collectively extract social events from multiple similar tweets using a novel factor graph, to harvest the redundance in tweets, i.e., the repeated occurrences of a social event in several tweets. We evaluate our method on a human annotated data set, and show that it outperforms all baselines, with an absolute gain of 21% in F1.
Table Header Detection and Classification
Fang, Jing (Peking University) | Mitra, Prasenjit (The Pennsylvania State University) | Tang, Zhi (Peking University) | Giles, C. Lee (The Pennsylvania State University)
In digital libraries, a table, as a specific document component as well as a condensed way to present structured and relational data, contains rich information and often the only source of .that information. In order to explore, retrieve, and reuse that data, tables should be identified and the data extracted. Table recognition is an old field of research. However, due to the diversity of table styles, the results are still far from satisfactory, and not a single algorithm performs well on all different types of tables. In this paper, we randomly take samples from the CiteSeerX to investigate diverse table styles for automatic table extraction. We find that table headers are one of the main characteristics of complex table styles. We identify a set of features that can be used to segregate headers from tabular data and build a classifier to detect table headers. Our empirical evaluation on PDF documents shows that using a Random Forest classifier achieves an accuracy of 92%.
Transfer Learning with Graph Co-Regularization
Long, Mingsheng (Tsinghua University) | Wang, Jianmin (Tsinghua University) | Ding, Guiguang (Tsinghua University) | Shen, Dou (CityGrid Media) | Yang, Qiang (Hong Kong University of Science and Technology)
Transfer learning proves to be effective for leveraging labeled data in the source domain to build an accurate classifier in the target domain. The basic assumption behind transfer learning is that the involved domains share some common latent factors. Previous methods usually explore these latent factors by optimizing two separate objective functions, i.e., either maximizing the empirical likelihood, or preserving the geometric structure. Actually, these two objective functions are complementary to each other and optimizing them simultaneously can make the solution smoother and further improve the accuracy of the final model. In this paper, we propose a novel approach called Graph co-regularized Transfer Learning (GTL) for this purpose, which integrates the two objective functions seamlessly into one unified optimization problem. Thereafter, we present an iterative algorithm for the optimization problem with rigorous analysis on convergence and complexity. Our empirical study on two open data sets validates that GTL can consistently improve the classification accuracy compared to the state-of-the-art transfer learning methods.
A Parameterized Runtime Analysis of Evolutionary Algorithms for the Euclidean Traveling Salesperson Problem
Sutton, Andrew M. (University of Adelaide) | Neumann, Frank (University of Adelaide)
We contribute to the theoretical understanding of evolutionary algorithms and carry out a parameterized analysis of evolutionary algorithms for the Euclidean traveling salesperson problem (Euclidean TSP). We exploit structural properties related to the optimization process of evolutionary algorithms for this problem and use them to bound the runtime of evolutionary algorithms. Our analysis studies the runtime in dependence of the number of inner points $k$ and shows that simple evolutionary algorithms solve the Euclidean TSP in expected time O( n k(2 k -1)!). Moreover, we show that, under reasonable geometric constraints, a locally optimal 2-opt tour can be found by randomized local search in expected time $O( n 2 k k !).
A Theoretical Framework of the Graph Shift Algorithm
Fan, Xuhui (University of Technology, Sydney) | Cao, Longbing (University of Technology, Sydney)
Since no theoretical foundations for proving the convergence of Graph Shift Algorithm have been reported, we provide a generic framework consisting of three key GS components to fit the Zangwill’s convergence theorem. We show that the sequence set generated by the GS procedures always terminates at a local maximum, or at worst, contains a subsequence which converges to a local maximum of the similarity measure function. What is more, a theoretical framework is proposed to apply our proof to a more general case.
Predicting Disease Transmission from Geo-Tagged Micro-Blog Data
Sadilek, Adam (University of Rochester) | Kautz, Henry (University of Rochester) | Silenzio, Vincent (University of Rochester)
These results far outperform alternative models. This work is an important step towards the development Recent work has demonstrated that micro-blogging data can of automated methods that identify disease vectors, trace the be used to predict a variety of phenomena, including movie transmission between concrete individuals, and ultimately box-office revenues (Asur and Huberman 2010), elections help us understand and predict the spread of infectious diseases (Tumasjan et al. 2010), and flu epidemics (Lampos, De Bie, with fine granularity. It provides a foundation for and Cristianini 2010). Most research to date has focused on research on fundamental questions of public health, such predicting aggregate properties of the population from the as: How does an epidemic on a population scale emerge activity of the bloggers. A different kind of problem one can from low-level interactions between people in the course pose, however, is to predict the behavior or state of particular of their everyday lives? Can we identify a potentially noncooperative individuals within the social network. For instance, one individual who is a vector of a dangerous disease, could try to predict whether a person will go to a movie or i.e., a "Typhoid Mary"? What is the interaction between vote for a particular candidate based on micro-blog data. The friendship, location, and co-location in the spread of individual's own data may or may not be accessible.