• Eye In-Painting with Exemplar Generative Adversarial Networks
• Social Media Writing Style Fingerprint
• Press-Dyson Analysis of Asynchronous, Sequential Prisoner’s Dilemma
• ‘Lion-Man’ and the Fixed Point Property
• Training Ensembles to Detect Adversarial Examples
• Investigation on How Data Volume Affects Transfer Learning Performances in Business Applications
• Detecting Qualia in Natural and Artificial Agents
• A state enumeration of the foil knot
• An asymptotic property of large matrices with identically distributed Boolean independent entries
• Learning Robust Dialog Policies in Noisy Environments
• Diversity Combining via Universal Orthogonal Space-Time Transformations
• How to navigate through obstacles?
• Recursive computation of the invariant distributions of Feller processes: Original applications
• Choose your path wisely: gradient descent in a Bregman distance framework
• Attention networks for image-to-text
• Automan: a simple, Python-based, automation framework for numerical computing
• Cascading Failures as Continuous Phase-Space Transitions
• Many-body synchronization of interacting qubits by engineered ac-driving
• Distinguishing differential susceptibility, diathesis-stress and vantage sensitivity: beyond the single gene and environment model
• A multi-parameter variant of the Erdős distance problem
• Bounds on the Jensen Gap, and Implications for Mean-Concentrated Distributions
• Distributed Bayesian Filtering using Logarithmic Opinion Pool for Dynamic Sensor Networks
• The Eigenoption-Critic Framework
• Tail asymptotics of light-tailed Weibull-like sums
• Diagnosing added value of convection-permitting regional models using precipitation event identification and tracking
• Matroids, antimatroids, and the generalized external order
• Hypergraphs not containing a tight tree with a bounded trunk
• Learning Compressible 360° Video Isomers
• Zero-Modified Poisson-Lindley distribution with applications in zero-inflated and zero-deflated count data
• Systems of Points with Coulomb Interactions
• Normal Convergence Using Malliavin Calculus With Applications and Examples
• Towards a proof of the 24-cell conjecture
• Convergence Rates for Deterministic and Stochastic Subgradient Methods Without Lipschitz Continuity
• Sparse Phase Retrieval via Sparse PCA Despite Model Misspecification: A Simplified and Extended Analysis
• Incremental View Maintenance for Property Graph Queries
• It’s good to be $φ$: a solution to a problem of Gosper and Knuth
• Im2Flow: Motion Hallucination from Static Images for Action Recognition
• Document Generation with Hierarchical Latent Tree Models
• 200x Low-dose PET Reconstruction using Deep Learning
• Performance guarantees for greedy maximization of non-submodular set functions in systems and control
• On the Ergodic Capacity of Composite Fading Channels in Cognitive Radios with the Product of $κ$-$μ$ and $α$-$μ$ Variates
• On the existence of a cherry-picking sequence
• Topology of Privacy: Lattice Structures and Information Bubbles for Inference and Obfuscation
• Attaching leaves and picking cherries to characterise the hybridisation number for a set of phylogenies
• The Gaussian Interference Channel in the Presence of Malicious Jammers
• Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems
• Sequential Prediction of Social Media Popularity with Deep Temporal Context Networks
• Non-Commutative Chern Numbers for Generic Aperiodic Discrete Systems
• A vision based system for underwater docking
• Deep learning enhanced mobile-phone microscopy
• Direction-aware Spatial Context Features for Shadow Detection
• RESIDE: A Benchmark for Single Image Dehazing
• Localization of multiplex networks by the optimized single-layer rewiring
• Information Perspective to Probabilistic Modeling: Boltzmann Machines versus Born Machines
• Transportation analysis of denoising autoencoders: a novel method for analyzing deep neural networks
• A Random Sample Partition Data Model for Big Data Analysis
• Toward `verifying’ a Water Treatment System
• Tracing a Loose Wordhood for Chinese Input Method Engine
• Mining Non-Redundant Sets of Generalizing Patterns from Sequence Databases
• How Better is Distributed SDN? An Analytical Approach
• A Low-Cost Ethics Shaping Approach for Designing Reinforcement Learning Agents
• Backpropagation generalized for output derivatives
• Planar Ising model at criticality: state-of-the-art and perspectives
• Concept Formation and Dynamics of Repeated Inference in Deep Generative Models
• Approximating multivariate posterior distribution functions from Monte Carlo samples for sequential Bayesian inference
• Interactive graph query language for multidimensional data in Collaboration Spotting visual analytics framework
• The Deterministic and Stochastic Shallow Lake Problem
• Dynamic Discrete Tomography
• Identifiability of tree-child phylogenetic networks under a probabilistic recombination-mutation model of evolution
• Piecewise interlacing zeros of polynomials satisfying some recurrence of order two
• On some Graphs with a Unique Perfect Matching
• Common zeros of polynomials satisfying a recurrence of order two
• Ultra valuations
• Approximation of Supremum of Max-Stable Stationary Processes and Pickands Constants
• Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
• On three dimensional multivariate version of q-Normal distribution and probabilistic interpretations of Askey–Wilson, Al-Salam–Chihara and q-ultraspherical polynomials
• Diffusion limits for networks of Markov-modulated infinite-server queues
• Upper bounds for Z$_1$-eigenvalues of generalized Hilbert tensors
• Robustness, Evolvability and Phenotypic Complexity: Insights from Evolving Digital Circuits
• Efficient Approximation Algorithms for String Kernel Based Sequence Classification
• Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-antenna Base Stations
• On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds
• Multi-Speaker Localization Using Convolutional Neural Network Trained with Noise
• Robust Fragmentation Modeling of Hegselmann-Krause-Type Dynamics
• Computational Complexity of the Interleaving Distance
• Regression with genuinely functional errors-in-covariates
• Borel selector for hypergraphons
• Learning Spontaneity to Improve Emotion Recognition In Speech
• The Zero Resource Speech Challenge 2017
• Generating and Estimating Nonverbal Alphabets for Situated and Multimodal Communications
• On McKean’s martingale in the Bovier-Hartung extremal process
• Mean-field approach for frequency synchronization in complex networks of two oscillator types
• Simulated Autonomous Driving on Realistic Road Networks using Deep Reinforcement Learning
• Quantifying a qualitative framework of patients perceptions, attitudes and behavior relevant to oral health related quality of life
• Semi-reflexive polytopes
• Hawkes Processes for Invasive Species Modeling and Management
• An Erdős-Gallai type theorem for vertex colored graphs
• Review. Machine learning techniques for traffic sign detection
• A characterization of colorless anonymous $t$-resilient task computability
• Freeness for 13 lines arrangements is combinatorial
• Android Malware Characterization using Metadata and Machine Learning Techniques
• Statistical estimation in a randomly structured branching population
• Logo Synthesis and Manipulation with Clustered Generative Adversarial Networks
• On the gap between Gamma-limit and pointwise limit for a non-local approximation of the total variation
• Deception Detection in Videos
• Fair valuation of Lévy-type drawdown-drawup contracts with general insured and penalty functions
• Photovoltaic Generation in Distribution Networks: Optimal vs. Random Installation
• Conditional Generative Adversarial Networks for Emoji Synthesis with Word Embedding Manipulation
• Binary Parseval frames from group orbits
• 3D Object Classification via Spherical Projections
• Small-Scale Markets for Bilateral Resource Trading in the Sharing Economy
• Integrated Model and Data Parallelism in Training Neural Networks
• Data Distillation: Towards Omni-Supervised Learning
• Enhancing approximation abilities of neural networks by training derivatives
• Learning a Complete Image Indexing Pipeline
• Image Registration for the Alignment of Digitized Historical Documents
• Topological mixture estimation
• Fingerprint Spoof Buster
• A Data-Driven Sparse-Learning Approach to Model Reduction in Chemical Reaction Networks
• Intra-node Memory Safe GPU Co-Scheduling
• Computational Properties of Slime Trail
• Pixel-Level Statistical Analyses of Prescribed Fire Spread
• Colloquium: Criticality and dynamical scaling in living systems
• Camera Calibration for Daylight Specular-Point Locus
• Face-from-Depth for Head Pose Estimation on Depth Images
• To Refine or Not to Refine: Topology Optimization of Adaptively Refined Infill Structures for Additive Manufacturing
• $k$-Conflict-Free Coloring of String Graphs
• Bursting endemic bubbles in an adaptive network
• Learning Sparse Graphs for Prediction and Filtering of Multivariate Data Processes
• Hierarchical Bloom Filter Trees for Approximate Matching
• Accessible Percolation with Crossing Valleys on $n$-ary Trees
• Minors of two-connected graphs of large path-width
• From a $(p,2)$-Theorem to a Tight $(p,q)$-Theorem
• A bandwidth theorem for approximate decompositions
• Symmetry and other Combinatorial Relations in Strategic Games
• Im2Pano3D: Extrapolating 360 Structure and Semantics Beyond the Field of View
• Fusing Multiple Multiband Images
• Learning From Noisy Singly-labeled Data
• Over the Air Deep Learning Based Radio Signal Classification
• Potential-Function Proofs for First-Order Methods
• Yang-Baxter field for spin Hall-Littlewood symmetric functions
• Bobkov’s inequality via optimal control theory
• Mutual synchronization of spin-torque oscillators consisting of perpendicularly magnetized free layers and in-plane magnetized pinned layers
• Finite-Sample Optimal Estimation and Inference on Average Treatment Effects Under Unconfoundedness
• Fractal dimension and lower bounds for geometric problems
• Consideration on Example 2 of ‘An Algorithm of General Fuzzy InferenceWith The Reductive Property’
• Approximate method for cutting pattern optimization of frame-supported and pneumatic membrane structures
• On the organization of grid and place cells: Neural de-noising via subspace learning
• Multi-focus Attention Network for Efficient Deep Reinforcement Learning
• QLBS: Q-Learner in the Black-Scholes(-Merton) Worlds
Predictive business process monitoring is concerned with the analysis of events produced during the execution of a business process in order to predict as early as possible the final outcome of an ongoing case. Traditionally, predictive process monitoring methods are optimized with respect to accuracy. However, in environments where users make decisions and take actions in response to the predictions they receive, it is equally important to optimize the stability of the successive predictions made for each case. To this end, this paper defines a notion of temporal stability for predictive process monitoring and evaluates existing methods with respect to both temporal stability and accuracy. We find that methods based on XGBoost and LSTM neural networks exhibit the highest temporal stability. We then show that temporal stability can be enhanced by hyperparameter-optimizing random forests and XGBoost classifiers with respect to inter-run stability. Finally, we show that time series smoothing techniques can further enhance temporal stability at the expense of slightly lower accuracy.
In this paper, we propose a mixture of probabilistic partial canonical correlation analysis (MPPCCA) that extracts the Causal Patterns from two multivariate time series. Causal patterns refer to the signal patterns within interactions of two elements having multiple types of mutually causal relationships, rather than a mixture of simultaneous correlations or the absence of presence of a causal relationship between the elements. In multivariate statistics, partial canonical correlation analysis (PCCA) evaluates the correlation between two multivariates after subtracting the effect of the third multivariate. PCCA can calculate the Granger Causal- ity Index (which tests whether a time-series can be predicted from an- other time-series), but is not applicable to data containing multiple partial canonical correlations. After introducing the MPPCCA, we propose an expectation-maxmization (EM) algorithm that estimates the parameters and latent variables of the MPPCCA. The MPPCCA is expected to ex- tract multiple partial canonical correlations from data series without any supervised signals to split the data as clusters. The method was then eval- uated in synthetic data experiments. In the synthetic dataset, our method estimated the multiple partial canonical correlations more accurately than the existing method. To determine the types of patterns detectable by the method, experiments were also conducted on real datasets. The method estimated the communication patterns In motion-capture data. The MP- PCCA is applicable to various type of signals such as brain signals, human communication and nonlinear complex multibody systems.
We report on our experiences of helping staff of the Scottish Longitudinal Study to create synthetic extracts that can be released to users. In particular, we focus on how the synthesis process can be tailored to produce synthetic extracts that will provide users with similar results to those that would be obtained from the original data. We make recommendations for synthesis methods and illustrate how the staff creating synthetic extracts can evaluate their utility at the time they are being produced. We discuss measures of utility for synthetic data and show that one tabular utility measure is exactly equivalent to a measure calculated from a propensity score. The methods are illustrated by using the R package to create synthetic versions of data from the 1901 Census of Scotland.
We investigate star-galaxy classification for astronomical surveys in the context of four methods enabling the interpretation of black-box machine learning systems. The first is outputting and exploring the decision boundaries as given by decision tree based methods, which enables the visualization of the classification categories. Secondly, we investigate how the Mutual Information based Transductive Feature Selection (MINT) algorithm can be used to perform feature pre-selection. If one would like to provide only a small number of input features to a machine learning classification algorithm, feature pre-selection provides a method to determine which of the many possible input properties should be selected. Third is the use of the tree-interpreter package to enable popular decision tree based ensemble methods to be opened, visualized, and understood. This is done by additional analysis of the tree based model, determining not only which features are important to the model, but how important a feature is for a particular classification given its value. Lastly, we use decision boundaries from the model to revise an already existing method of classification, essentially asking the tree based method where decision boundaries are best placed and defining a new classification method. We showcase these techniques by applying them to the problem of star-galaxy separation using data from the Sloan Digital Sky Survey (hereafter SDSS). We use the output of MINT and the ensemble methods to demonstrate how more complex decision boundaries improve star-galaxy classification accuracy over the standard SDSS frames approach (reducing misclassifications by up to ). We then show how tree-interpreter can be used to explore how relevant each photometric feature is when making a classification on an object by object basis.
Recent deep learning (DL) models have moved beyond static network architectures to dynamic ones, handling data where the network structure changes every example, such as sequences of variable lengths, trees, and graphs. Existing dataflow-based programming models for DL—both static and dynamic declaration—either cannot readily express these dynamic models, or are inefficient due to repeated dataflow graph construction and processing, and difficulties in batched execution. We present Cavs, a vertex-centric programming interface and optimized system implementation for dynamic DL models. Cavs represents dynamic network structure as a static vertex function and a dynamic instance-specific graph , and performs backpropagation by scheduling the execution of following the dependencies in . Cavs bypasses expensive graph construction and preprocessing overhead, allows for the use of static graph optimization techniques on pre-defined operations in , and naturally exposes batched execution opportunities over different graphs. Experiments comparing Cavs to two state-of-the-art frameworks for dynamic NNs (TensorFlow Fold and DyNet) demonstrate the efficacy of this approach: Cavs achieves a near one order of magnitude speedup on training of various dynamic NN architectures, and ablations demonstrate the contribution of our proposed batching and memory management strategies.
The performance of optimization algorithms relies crucially on their parameterizations. Finding good parameter settings is called algorithm tuning. Using a simple simulated annealing algorithm, we will demonstrate how optimization algorithms can be tuned using the sequential parameter optimization toolbox (SPOT). SPOT provides several tools for automated and interactive tuning. The underling concepts of the SPOT approach are explained. This includes key techniques such as exploratory fitness landscape analysis and response surface methodology. Many examples illustrate how SPOT can be used for understanding the performance of algorithms and gaining insight into algorithm’s behavior. Furthermore, we demonstrate how SPOT can be used as an optimizer and how a sophisticated ensemble approach is able to combine several meta models via stacking.
Generative adversarial networks (GANs) are innovative techniques for learning generative models of complex data distributions from samples. Despite remarkable recent improvements in generating realistic images, one of their major shortcomings is the fact that in practice, they tend to produce samples with little diversity, even when trained on diverse datasets. This phenomenon, known as mode collapse, has been the main focus of several recent advances in GANs. Yet there is little understanding of why mode collapse happens and why existing approaches are able to mitigate mode collapse. We propose a principled approach to handling mode collapse, which we call packing. The main idea is to modify the discriminator to make decisions based on multiple samples from the same class, either real or artificially generated. We borrow analysis tools from binary hypothesis testing—in particular the seminal result of Blackwell [Bla53]—to prove a fundamental connection between packing and mode collapse. We show that packing naturally penalizes generators with mode collapse, thereby favoring generator distributions with less mode collapse during the training process. Numerical experiments on benchmark datasets suggests that packing provides significant improvements in practice as well.
Recent improvements in deep reinforcement learning have allowed to solve problems in many 2D domains such as Atari games. However, in complex 3D environments, numerous learning episodes are required which may be too time consuming or even impossible especially in real-world scenarios. We present a new architecture to combine external knowledge and deep reinforcement learning using only visual input. A key concept of our system is augmenting image input by adding environment feature information and combining two sources of decision. We evaluate the performances of our method in a 3D partially-observable environment from the Microsoft Malmo platform. Experimental evaluation exhibits higher performance and faster learning compared to a single reinforcement learning model.
Principal component analysis (PCA) is largely adopted for chemical process monitoring and numerous PCA-based systems have been developed to solve various fault detection and diagnosis problems. Since PCA-based methods assume that the monitored process is linear, nonlinear PCA models, such as autoencoder models and kernel principal component analysis (KPCA), has been proposed and applied to nonlinear process monitoring. However, KPCA-based methods need to perform eigen-decomposition (ED) on the kernel Gram matrix whose dimensions depend on the number of training data. Moreover, prefixed kernel parameters cannot be most effective for different faults which may need different parameters to maximize their respective detection performances. Autoencoder models lack the consideration of orthogonal constraints which is crucial for PCA-based algorithms. To address these problems, this paper proposes a novel nonlinear method, called neural component analysis (NCA), which intends to train a feedforward neural work with orthogonal constraints such as those used in PCA. NCA can adaptively learn its parameters through backpropagation and the dimensionality of the nonlinear features has no relationship with the number of training samples. Extensive experimental results on the Tennessee Eastman (TE) benchmark process show the superiority of NCA in terms of missed detection rate (MDR) and false alarm rate (FAR). The source code of NCA can be found in https://…/Neural-Component-Analysis.git.
Directed latent variable models that formulate the joint distribution as have the advantage of fast and exact sampling. However, these models have the weakness of needing to specify , often with a simple fixed prior that limits the expressiveness of the model. Undirected latent variable models discard the requirement that be specified with a prior, yet sampling from them generally requires an iterative procedure such as blocked Gibbs-sampling that may require many steps to draw samples from the joint distribution . We propose a novel approach to learning the joint distribution between the data and a latent code which uses an adversarially learned iterative procedure to gradually refine the joint distribution, , to better match with the data distribution on each step. GibbsNet is the best of both worlds both in theory and in practice. Achieving the speed and simplicity of a directed latent variable model, it is guaranteed (assuming the adversarial game reaches the virtual training criteria global minimum) to produce samples from with only a few sampling iterations. Achieving the expressiveness and flexibility of an undirected latent variable model, GibbsNet does away with the need for an explicit and has the ability to do attribute prediction, class-conditional generation, and joint image-attribute modeling in a single model which is not trained for any of these specific tasks. We show empirically that GibbsNet is able to learn a more complex and show that this leads to improved inpainting and iterative refinement of for dozens of steps and stable generation without collapse for thousands of steps, despite being trained on only a few steps.
Often the challenge associated with tasks like fraud and spam detection is the lack of all likely patterns needed to train suitable supervised learning models. In order to overcome this limitation, such tasks are attempted as outlier or anomaly detection tasks. We also hypothesize that out- liers have behavioral patterns that change over time. Limited data and continuously changing patterns makes learning significantly difficult. In this work we are proposing an approach that detects outliers in large data sets by relying on data points that are consistent. The primary contribution of this work is that it will quickly help retrieve samples for both consistent and non-outlier data sets and is also mindful of new outlier patterns. No prior knowledge of each set is required to extract the samples. The method consists of two phases, in the first phase, consistent data points (non- outliers) are retrieved by an ensemble method of unsupervised clustering techniques and in the second phase a one class classifier trained on the consistent data point set is ap- plied on the remaining sample set to identify the outliers. The approach is tested on three publicly available data sets and the performance scores are competitive.
The search for interpretable reinforcement learning policies is of high academic and industrial interest. Especially for industrial systems, domain experts are more likely to deploy autonomously learned controllers if they are understandable and convenient to evaluate. Basic algebraic equations are supposed to meet these requirements, as long as they are restricted to an adequate complexity. Here we introduce the genetic programming for reinforcement learning (GPRL) approach based on model-based batch reinforcement learning and genetic programming, which autonomously learns policy equations from pre-existing default state-action trajectory samples. GPRL is compared to a straight-forward method which utilizes genetic programming for symbolic regression, yielding policies imitating an existing well-performing, but non-interpretable policy. Experiments on three reinforcement learning benchmarks, i.e., mountain car, cart-pole balancing, and industrial benchmark, demonstrate the superiority of our GPRL approach compared to the symbolic regression method. GPRL is capable of producing well-performing interpretable reinforcement learning policies from pre-existing default trajectory data.
It is a grand challenge to model the emergence of swarm intelligence and many principles or models had been proposed. However, existing models do not catch the nature of swarm intelligence and they are not generic enough to describe various types of emergence phenomena. In this work, we propose a contradiction-centric model for emergence of swarm intelligence, in which individuals’ contradictions dominate their appearances whilst they are associated and interacting to update their contradictions. This model hypothesizes that 1) the emergence of swarm intelligence is rooted in the development of contradictions of individuals and the interactions among associated individuals and 2) swarm intelligence is essentially a combinative reflection of the configurations of contradictions inside individuals and the distributions of contradictions among individuals. To verify the feasibility of the model, we simulate four types of swarm intelligence. As the simulations show, our model is truly generic and can describe the emergence of a variety of swarm intelligence, and it is also very simple and can be easily applied to demonstrate the emergence of swarm intelligence without needing complicated computations.
Kernel Principal Component Analysis (KPCA) is a popular dimensionality reduction technique with a wide range of applications. However, it suffers from the problem of poor scalability. Various approximation methods have been proposed in the past to overcome this problem. The Nystr\’om method, Randomized Nonlinear Component Analysis (RNCA) and Streaming Kernel Principal Component Analysis (SKPCA) were proposed to deal with the scalability issue of KPCA. Despite having theoretical guarantees, their performance in real world learning tasks have not been explored previously. In this work the evaluation of SKPCA, RNCA and Nystr\’om method for the task of classification is done for several real world datasets. The results obtained indicate that SKPCA based features gave much better classification accuracy when compared to the other methods for a very large dataset.
The study of deep recurrent neural networks (RNNs) and, in particular, of deep Reservoir Computing (RC) is gaining an increasing research attention in the neural networks community. The recently introduced deep Echo State Network (deepESN) model opened the way to an extremely efficient approach for designing deep neural networks for temporal data. At the same time, the study of deepESNs allowed to shed light on the intrinsic properties of state dynamics developed by hierarchical compositions of recurrent layers, i.e. on the bias of depth in RNNs architectural design. In this paper, we summarize the advancements in the development, analysis and applications of deepESNs.
Class imbalance classification is a challenging research problem in data mining and machine learning, as most of the real-life datasets are often imbalanced in nature. Existing learning algorithms maximise the classification accuracy by correctly classifying the majority class, but misclassify the minority class. However, the minority class instances are representing the concept with greater interest than the majority class instances in real-life applications. Recently, several techniques based on sampling methods (under-sampling of the majority class and over-sampling the minority class), cost-sensitive learning methods, and ensemble learning have been used in the literature for classifying imbalanced datasets. In this paper, we introduce a new clustering-based under-sampling approach with boosting (AdaBoost) algorithm, called CUSBoost, for effective imbalanced classification. The proposed algorithm provides an alternative to RUSBoost (random under-sampling with AdaBoost) and SMOTEBoost (synthetic minority over-sampling with AdaBoost) algorithms. We evaluated the performance of CUSBoost algorithm with the state-of-the-art methods based on ensemble learning like AdaBoost, RUSBoost, SMOTEBoost on 13 imbalance binary and multi-class datasets with various imbalance ratios. The experimental results show that the CUSBoost is a promising and effective approach for dealing with highly imbalanced datasets.
Running agent-based models (ABMs) is a burdensome computational task, specially so when considering the flexibility ABMs intrinsically provide. This paper uses a bundle of model configuration parameters along with obtained results from a validated ABM to train some Machine Learning methods for socioeconomic optimal cases. A larger space of possible parameters and combinations of parameters are then used as input to predict optimal cases and confirm parameters calibration. Analysis of the parameters of the optimal cases are then compared to the baseline model. This exploratory initial exercise confirms the adequacy of most of the parameters and rules and suggests changing of directions to two parameters. Additionally, it helps highlight metropolitan regions of higher quality of life. Better understanding of ABM mechanisms and parameters’ influence may nudge policy-making slightly closer to optimal level.
Subset selection for multiple linear regression aims to construct a regression model that minimizes errors by selecting a small number of explanatory variables. Once a model is built, various statistical tests and diagnostics are conducted to validate the model and to determine whether regression assumptions are met. Most traditional approaches require human decisions at this step, for example, the user adding or removing a variable until a satisfactory model is obtained. However, this trial-and-error strategy cannot guarantee that a subset that minimizes the errors while satisfying all regression assumptions will be found. In this paper, we propose a fully automated model building procedure for multiple linear regression subset selection that integrates model building and validation based on mathematical programming. The proposed model minimizes mean squared errors while ensuring that the majority of the important regression assumptions are met. When no subset satisfies all of the considered regression assumptions, our model provides an alternative subset that satisfies most of these assumptions. Computational results show that our model yields better solutions (i.e., satisfying more regression assumptions) compared to benchmark models while maintaining similar explanatory power.
Inference in the presence of outliers is an important field of research as outliers are ubiquitous and may arise across a variety of problems and domains. Bayesian optimization is method that heavily relies on probabilistic inference. This allows outstanding sample efficiency because the probabilistic machinery provides a memory of the whole optimization process. However, that virtue becomes a disadvantage when the memory is populated with outliers, inducing bias in the estimation. In this paper, we present an empirical evaluation of Bayesian optimization methods in the presence of outliers. The empirical evidence shows that Bayesian optimization with robust regression often produces suboptimal results. We then propose a new algorithm which combines robust regression (a Gaussian process with Student-t likelihood) with outlier diagnostics to classify data points as outliers or inliers. By using an scheduler for the classification of outliers, our method is more efficient and has better convergence over the standard robust regression. Furthermore, we show that even in controlled situations with no expected outliers, our method is able to produce better results.
The field of deep learning has seen significant advancement in recent years. However, much of the existing work has been focused on real-valued numbers. Recent work has shown that a deep learning system using the complex numbers can be deeper for a set parameter budget compared to its real-valued counterpart. In this work, we explore the benefits of generalizing one step further into the hyper-complex numbers, quaternions specifically, and provide the architecture components needed to build deep quaternion networks. We go over quaternion convolutions, present a quaternion weight initialization scheme, and present algorithms for quaternion batch-normalization. These pieces are tested by end-to-end training on the CIFAR-10 and CIFAR-100 data sets to show the improved convergence to a real-valued network.
Learning customer preferences from an observed behaviour is an important topic in the marketing literature. Structural models typically model forward-looking customers or firms as utility-maximizing agents whose utility is estimated using methods of Stochastic Optimal Control. We suggest an alternative approach to study dynamic consumer demand, based on Inverse Reinforcement Learning (IRL). We develop a version of the Maximum Entropy IRL that leads to a highly tractable model formulation that amounts to low-dimensional convex optimization in the search for optimal model parameters. Using simulations of consumer demand, we show that observational noise for identical customers can be easily confused with an apparent consumer heterogeneity.
In this paper, we provide a Rapid Orthogonal Approximate Slepian Transform (ROAST) for the discrete vector one obtains when collecting a finite set of uniform samples from a baseband analog signal. The ROAST offers an orthogonal projection which is an approximation to the orthogonal projection onto the leading discrete prolate spheroidal sequence (DPSS) vectors (also known as Slepian basis vectors). As such, the ROAST is guaranteed to accurately and compactly represent not only oversampled bandlimited signals but also the leading DPSS vectors themselves. Moreover, the subspace angle between the ROAST subspace and the corresponding DPSS subspace can be made arbitrarily small. The complexity of computing the representation of a signal using the ROAST is comparable to the FFT, which is much less than the complexity of using the DPSS basis vectors. We also give non-asymptotic results to guarantee that the proposed basis not only provides a very high degree of approximation accuracy in a mean-square error sense for bandlimited sample vectors, but also that it can provide high-quality approximations of all sampled sinusoids within the band of interest.