Data Mining
Gaussian-process factor analysis for low-dimensional single-trial analysis of neural population activity
Yu, Byron M., Cunningham, John P., Santhanam, Gopal, Ryu, Stephen I., Shenoy, Krishna V., Sahani, Maneesh
We consider the problem of extracting smooth low-dimensional ``neural trajectories'' that summarize the activity recorded simultaneously from tens to hundreds of neurons on individual experimental trials. Beyond the benefit of visualizing the high-dimensional noisy spiking activity in a compact denoised form, such trajectories can offer insight into the dynamics of the neural circuitry underlying the recorded activity. Current methods for extracting neural trajectories involve a two-stage process: the data are first ``denoised'' by smoothing over time, then a static dimensionality reduction technique is applied. We first describe extensions of the two-stage methods that allow the degree of smoothing to be chosen in a principled way, and account for spiking variability that may vary both across neurons and across time. We then present a novel method for extracting neural trajectories, Gaussian-process factor analysis (GPFA), which unifies the smoothing and dimensionality reduction operations in a common probabilistic framework. We applied these methods to the activity of 61 neurons recorded simultaneously in macaque premotor and motor cortices during reach planning and execution. By adopting a goodness-of-fit metric that measures how well the activity of each neuron can be predicted by all other recorded neurons, we found that GPFA provided a better characterization of the population activity than the two-stage methods. From the extracted single-trial neural trajectories, we directly observed a convergence in neural state during motor planning, an effect suggestive of attractor dynamics that was shown indirectly by previous studies.
Algorithms for Infinitely Many-Armed Bandits
Wang, Yizao, Audibert, Jean-yves, Munos, Rémi
We consider multi-armed bandit problems where the number of arms is larger than the possible number of experiments. We make a stochastic assumption on the mean-reward of a new selected arm which characterizes its probability of being anear-optimal arm. Our assumption is weaker than in previous works. We describe algorithms based on upper-confidence-bounds applied to a restricted set of randomly selected arms and provide upper-bounds on the resulting expected regret. We also derive a lower-bound which matches (up to a logarithmic factor) the upper-bound in some cases.
Dimensionality Reduction for Data in Multiple Feature Representations
Lin, Yen-yu, Liu, Tyng-luh, Fuh, Chiou-shann
In solving complex visual learning tasks, adopting multiple descriptors to more precisely characterize the data has been a feasible way for improving performance. These representations are typically high dimensional and assume diverse forms. Thus finding a way to transform them into a unified space of lower dimension generally facilitates the underlying tasks, such as object recognition or clustering. We describe an approach that incorporates multiple kernel learning with dimensionality reduction (MKL-DR). While the proposed framework is flexible in simultaneously tackling data in various feature representations, the formulation itself is general in that it is established upon graph embedding. It follows that any dimensionality reduction techniques explainable by graph embedding can be generalized by our method to consider data in multiple feature representations.
Similarit\'e en intension vs en extension : \`a la crois\'ee de l'informatique et du th\'e\^atre
Bonardi, Alain, Rousseaux, Francis
Traditional staging is based on a formal approach of similarity leaning on dramaturgical ontologies and instanciation variations. Inspired by interactive data mining, that suggests different approaches, we give an overview of computer science and theater researches using computers as partners of the actor to escape the a priori specification of roles.
Discovering general partial orders in event streams
Achar, Avinash, Laxman, Srivatsan, Viswanathan, Raajay, Sastry, P. S.
Frequent episode discovery is a popular framework for pattern discovery in event streams. An episode is a partially ordered set of nodes with each node associated with an event type. Efficient (and separate) algorithms exist for episode discovery when the associated partial order is total (serial episode) and trivial (parallel episode). In this paper, we propose efficient algorithms for discovering frequent episodes with general partial orders. These algorithms can be easily specialized to discover serial or parallel episodes. Also, the algorithms are flexible enough to be specialized for mining in the space of certain interesting subclasses of partial orders. We point out that there is an inherent combinatorial explosion in frequent partial order mining and most importantly, frequency alone is not a sufficient measure of interestingness. We propose a new interestingness measure for general partial order episodes and a discovery method based on this measure, for filtering out uninteresting partial orders. Simulations demonstrate the effectiveness of our algorithms.
A Trend Pattern Approach to Forecasting Socio-Political Violence
Rohloff, Kurt (BBN Technologies) | Battle, Rob (BBN Technologies) | Chatigny, Jim (BBN Technologies) | Schantz, Rick (BBN Technologies) | Asal, Victor (SUNY Albany)
We present an approach to identifying concurrent patterns of behavior in in-sample temporal factor training data that precede Events of Interest (EoIs). We also present how to use discovered patterns to forecast EoIs in out-of-sample test data. The forecasting methodology is based on matching entities' observed behaviors to patterns discovered in retrospective data. This pattern concept is a generalization of previous pattern definitions. The new pattern concept, based around patterns observed in trends of factor data is based on a finite-state model where observed, sustained trends in a factor map to pattern states. Discovered patterns can be used as a diagnostic tool to better understand the dynamic conditions leading up to specific Event of Interest occurrences and hint at underlying causal structures leading to onsets and terminations of socio-political violence. We present a computationally efficient data-mining method to discover trend patterns. We give an example of using our pattern forecasting methodology to correctly forecast the advent and cessation of ethnic-religious violence in nation states with a low false-alarm rate.
The Cyborg Astrobiologist: Testing a Novelty-Detection Algorithm on Two Mobile Exploration Systems at Rivas Vaciamadrid in Spain and at the Mars Desert Research Station in Utah
McGuire, P. C., Gross, C., Wendt, L., Bonnici, A., Souza-Egipsy, V., Ormo, J., Diaz-Martinez, E., Foing, B. H., Bose, R., Walter, S., Oesker, M., Ontrup, J., Haschke, R., Ritter, H.
(ABRIDGED) In previous work, two platforms have been developed for testing computer-vision algorithms for robotic planetary exploration (McGuire et al. 2004b,2005; Bartolo et al. 2007). The wearable-computer platform has been tested at geological and astrobiological field sites in Spain (Rivas Vaciamadrid and Riba de Santiuste), and the phone-camera has been tested at a geological field site in Malta. In this work, we (i) apply a Hopfield neural-network algorithm for novelty detection based upon color, (ii) integrate a field-capable digital microscope on the wearable computer platform, (iii) test this novelty detection with the digital microscope at Rivas Vaciamadrid, (iv) develop a Bluetooth communication mode for the phone-camera platform, in order to allow access to a mobile processing computer at the field sites, and (v) test the novelty detection on the Bluetooth-enabled phone-camera connected to a netbook computer at the Mars Desert Research Station in Utah. This systems engineering and field testing have together allowed us to develop a real-time computer-vision system that is capable, for example, of identifying lichens as novel within a series of images acquired in semi-arid desert environments. We acquired sequences of images of geologic outcrops in Utah and Spain consisting of various rock types and colors to test this algorithm. The algorithm robustly recognized previously-observed units by their color, while requiring only a single image or a few images to learn colors as familiar, demonstrating its fast learning capability.
Articulation and Clarification of the Dendritic Cell Algorithm
Greensmith, Julie, Aickelin, Uwe, Twycross, Jamie
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.
Reports of the AAAI 2009 Spring Symposia
Bao, Jie (Rensselaer Polytechnic Institute) | Bojars, Uldis (National University of Ireland) | Choudhury, Ranzeem (Dartmouth College) | Ding, Li (Rensselaer Polytechnic Institute) | Greaves, Mark (Vulcan Inc.) | Kapoor, Ashish (Microsoft Research) | Louchart, Sandy (Heriot-Watt University) | Mehta, Manish (Georgia Institute of Technology) | Nebel, Bernhard (Albert-Ludwigs University Freiburg) | Nirenburg, Sergei (University of Maryland Baltimore County) | Oates, Tim (University of Maryland Baltimore County) | Roberts, David L. (Georgia Institute of Technology) | Sanfilippo, Antonio (Pacific Northwest National Laboratory) | Stojanovic, Nenad (University of Karlsruhe) | Stubbs, Kristen (iRobot Corportion) | Thomaz, Andrea L. (Georgia Institute of Technology) | Tsui, Katherine (University of Massachusetts Lowell) | Woelfl, Stefan (Albert-Ludwigs University Freiburg)
The Association for the Advancement of Artificial Intelligence, in cooperation with Stanford University's Department of Computer Science, was pleased to present the 2009 Spring Symposium Series, held Monday through Wednesday, March 23–25, 2009 at Stanford University. The titles of the nine symposia were Agents that Learn from Human Teachers, Benchmarking of Qualitative Spatial and Temporal Reasoning Systems, Experimental Design for Real-World Systems, Human Behavior Modeling, Intelligent Event Processing, Intelligent Narrative Technologies II, Learning by Reading and Learning to Read, Social Semantic Web: Where Web 2.0 Meets Web 3.0, and Technosocial Predictive Analytics. The goal of the Agents that Learn from Human Teachers was to investigate how we can enable software and robotics agents to learn from real-time interaction with an everyday human partner. The aim of the Benchmarking of Qualitative Spatial and Temporal Reasoning Systems symposium was to initiate the development of a problem repository in the field of qualitative spatial and temporal reasoning and identify a graded set of challenges for future midterm and long-term research. The Experimental Design symposium discussed the challenges of evaluating AI systems. The Human Behavior Modeling symposium explored reasoning methods for understanding various aspects of human behavior, especially in the context of designing intelligent systems that interact with humans. The Intelligent Event Processing symposium discussed the need for more AI-based approaches in event processing and defined a kind of research agenda for the field, coined as intelligent complex event processing (iCEP). The Intelligent Narrative Technologies II AAAI symposium discussed innovations, progress, and novel techniques in the research domain. The Learning by Reading and Learning to Read symposium explored two aspects of making natural language texts semantically accessible to, and processable by, machines. The Social Semantic Web symposium focused on the real-world grand challenges in this area. Finally, the Technosocial Predictive Analytics symposium explored new methods for anticipatory analytical thinking that provide decision advantage through the integration of human and physical models.
An Immune Inspired Approach to Anomaly Detection
Twycross, Jamie, Aickelin, Uwe
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artificial systems being based on too simplistic a view of the immune system. We present here a second generation artificial immune system for process anomaly detection. It improves on earlier systems by having different artificial cell types that process information. Following detailed information about how to build such second generation systems, we find that communication between cells types is key to performance. Through realistic testing and validation we show that second generation artificial immune systems are capable of anomaly detection beyond generic system policies. The paper concludes with a discussion and outline of the next steps in this exciting area of computer security.