• Low Rank Variation Dictionary and Inverse Projection Group Sparse Representation Model for Breast Tumor Classification
• Variance Networks: When Expectation Does Not Meet Your Expectations
• Two comments on balls in vertex transitive graphs
• Dealing with Unknown Unknowns: Identification and Selection of Minimal Sensing for Fractional Dynamics with Unknown Inputs
• Unsupervised Learning of Monocular Depth Estimation and Visual Odometry with Deep Feature Reconstruction
• Optimal Estimators in Misspecified Linear Regression Model
• Soft-Robust Actor-Critic Policy-Gradient
• Fractional L-intersecting families
• Style Aggregated Network for Facial Landmark Detection
• Mott glass from localization and confinement
• Scalable Algorithms for Learning High-Dimensional Linear Mixed Models
• Memory Models for C/C++ Programmers
• (FPT-)Approximation Algorithms for the Virtual Network Embedding Problem
• Dissimilarity-based representation for radiomics applications
• False Discovery Rate Control via Debiased Lasso
• Spatial Graph Convolutions for Drug Discovery
• A Cycle Traversability Theorem for Claw-free Graphs
• Predicting Crime Using Spatial Features
• Accuracy-Reliability Cost Function for Empirical Variance Estimation
• Correction by Projection: Denoising Images with Generative Adversarial Networks
• Machine Learning Harnesses Molecular Dynamics to Discover New $μ$ Opioid Chemotypes
• Pathwise moderate deviations for option pricing
• Adaptive two-stage sequential double sampling
• Poisson Kernel-Based Clustering on the Sphere: Convergence Properties, Identifiability, and a Method of Sampling
• Probabilistic and Regularized Graph Convolutional Networks
• Particle Identification In Camera Image Sensors Using Computer Vision
• Gradient Augmented Information Retrieval with Autoencoders and Semantic Hashing
• On finite-population Bayesian inferences for $2^K$ factorial designs with binary outcomes
• On improving Neymanian analysis for $2^K$ factorial designs with binary outcomes
• Graph Algorithms for Topology Identification using Power Grid Probing
• Sorting by Swaps with Noisy Comparisons
• Asynchronous Crash-Tolerant Consensus in Directed Graphs: Randomization and Topology Knowledge
• Similar but Different: Exploiting Users’ Congruity for Recommendation Systems
• Some limit laws for quantum walks with applications to a version of the Parrondo paradox
• Event-based Moving Object Detection and Tracking
• Well-posedness of Hamilton-Jacobi equations in population dynamics and applications to large deviations
• On sufficient conditions for mixed monotonicity
• The $r$-derangement numbers
• Massive Multiple Input Massive Multiple Output for 5G Wireless Backhauling
• Analysis of spectral clustering algorithms for community detection: the general bipartite setting
• Ergodicity in Stationary Graph Processes: A Weak Law of Large Numbers
• Multi-Sensor Conflict Measurement and Information Fusion
• Luby–Veličković–Wigderson revisited: Improved correlation bounds and pseudorandom generators for depth-two circuits
• Reactive Proximity Data Structures for Graphs
• Measuring Conflict in a Multi-Source Environment as a Normal Measure
• Empirical Wavelet-based Estimation for Non-linear Additive Regression Models
• Weighted Bayesian Bootstrap for Scalable Bayes
• HypDB: Detect, Explain And Resolve Bias in OLAP
• Learning to recognize Abnormalities in Chest X-Rays with Location-Aware Dense Networks
• Compact Convolutional Neural Networks for Classification of Asynchronous Steady-state Visual Evoked Potentials
• On $L^1$-estimates for probability solutions to Fokker-Planck-Kolmogorov equations
• Sharp inequalities for linear combinations of orthogonal martingales
• Bayesian optimization for computationally extensive probability distributions
• Spanning Trees With Edge Conflicts and Wireless Connectivity
• It was the training data pruning too!
• Deep Bayesian Supervised Learning given Hypercuboidally-shaped, Discontinuous Data, using Compound Tensor-Variate & Scalar-Variate Gaussian Processes
• Sensitivity Based Thevenin Index for Voltage Stability Assessment Considering N-1 Contingency
• Categorizing Variants of Goodhart’s Law
• Constrained Optimal Consensus in Dynamical Networks
• Automatic Detection of Online Jihadist Hate Speech
• A stability-reversibility map unifies elasticity, plasticity, yielding and jamming in hard sphere glasses
• Image Segmentation and Processing for Efficient Parking Space Analysis
• The power of the largest player
• Learning to Maintain Natural Image Statistics
• Tight Piecewise Convex Relaxations for Global Optimization of Optimal Power Flow
• TOM-Net: Learning Transparent Object Matting from a Single Image
• On higher energy decompositions and the sum-product phenomenon
• A New Simulation Algorithm for Absorbing Receiver in Molecular Communication
• Correct Undetected Errors with List Decoding in ARQ Error-control Systems
• Bayesian Detection of Abnormal ADS in Mutant Caenorhabditis elegans Embryos
• On Cryptographic Attacks Using Backdoors for SAT
• Compressive Sensing Based User Clustering for Downlink NOMA Systems with Decoding Power
• Simulation and Calibration of a Fully Bayesian Marked Multidimensional Hawkes Process with Dissimilar Decays
• A note on polyomino chains with extremum general sum-connectivity index
• Revisiting Radius, Diameter, and all Eccentricity Computation in Graphs through Certificates
• Binary Matrix Completion Using Unobserved Entries
• Pure Exploration in Infinitely-Armed Bandit Models with Fixed-Confidence
• Dynamic Vision Sensors for Human Activity Recognition
• Polyhedral Predictive Regions For Power System Applications
• Characterizations of robust and stable duality for linearly perturbed uncertain optimization problems
• Hierarchical Reinforcement Learning: Approximating Optimal Discounted TSP Using Local Policies
• Multivariate Prediction Intervals for Photovoltaic Power Generation
• Multi-Frame Quality Enhancement for Compressed Video
• Noncoherent Detection for Physical Layer Network Coding
• Multimodal Recurrent Neural Networks with Information Transfer Layers for Indoor Scene Labeling
• Mean-field optimal control as Gamma-limit of finite agent controls
• Policy Search in Continuous Action Domains: an Overview
• Hierarchical Learning of Cross-Language Mappings through Distributed Vector Representations for Code
• Two conjectures in Ramsey-Turán theory
• Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features
• Anomalous scaling of the optimal cost in the one-dimensional random assignment problem
• Storage and Repair Bandwidth Tradeoff for Distributed Storage Systems with Clusters and Separate Nodes
• Gas, Dust, Stars, Star Formation and their Evolution in M33 at Giant Molecular Cloud Scales
• Objective Procedure for Reconstructing Couplings in Complex Systems
• Effective Reparameterized Importance Sampling for Spatial Generalized Linear Mixed Models with Parametric Links
• Arrow of Time in Active Fluctuations
• On Integer Programming and Convolution
• A Vizing-type result for semi-total domination
• Electric Vehicle Charge Scheduling Mechanism to Maximize Cost Efficiency and User Convenience
• Microeconomic Analysis of Multiperiod Energy Markets: Intertemporal Pricing of Dispatchable Generators, Storage Batteries, and Uncertain Renewable Resources
• A pseudo-quasi-polynomial algorithm for solving mean-payoff parity games
• Monitoring Targeted Hate in Online Environments
• Video Based Reconstruction of 3D People Models
• A case for multiple and parallel RRAMs as synaptic model for training SNNs
• Learning Monocular 3D Human Pose Estimation from Multi-view Images
• One-bit massive MIMO precoding via a minimum symbol-error probability design
• Enhanced Word Representations for Bridging Anaphora Resolution
• Topological structures are consistently overestimated in functional complex networks
• A Branch-Price-and-Cut Algorithm for Optimal Decoding of LDPC Codes
• Introduction to the declination function for gerrymanders
• Characterizing face and flag vector pairs for polytopes
• A SMB approach for pressure representation in amenable virtually orderable groups
• Discussion of ‘The power of monitoring’
• Random walks on dynamic configuration models: a trichotomy
• Low-Rank Boolean Matrix Approximation by Integer Programming
• A Learning-Based Visual Saliency Fusion Model for High Dynamic Range Video (LBVS-HDR)
• Integration with respect to the non-commutative fractional Brownian motion
• 3D Video Quality Assessment
• Resource aware design of a deep convolutional-recurrent neural network for speech recognition through audio-visual sensor fusion
• A Learning-Based Visual Saliency Prediction Model for Stereoscopic 3D Video (LBVS-3D)
• Local optimality of Zaks-Perles-Wills simplices
• Regularized hazard estimation for age-period-cohort analysis
• Expert identification of visual primitives used by CNNs during mammogram classification
• On moments of exponential functionals of additive processes
• Mathematical models and search algorithms for the capacitated $p$-center problem
• Using Convolutional Neural Network for Determining Reticulocyte Percentage in Cats
• A General Class of Score-Driven Smoothers
• A machine learning-based approach for estimating and testing associations with multivariate outcomes
• First passage upwards for state dependent-killed spectrally negative Lévy processes
• Planar anti-Ramsey numbers of matchings
• Inverse source problem in a forced network
• Explosion in weighted Hyperbolic Random Graphs and Geometric Inhomogeneous Random Graphs
• Optimal Transport for Multi-source Domain Adaptation under Target Shift
• Nonstationary Gaussian Process Emulators with Kernel Mixtures
• Quantization of Fully Convolutional Networks for Accurate Biomedical Image Segmentation
• Low complexity algorithms in knot theory
• Data-Driven Distributionally Robust Optimal Power Flow for Distribution Systems
• On non-commutativity in quantum theory (I): from classical to quantum probability
• On non-commutativity in quantum theory (II): toy models for non-commutative kinematics
• Connectivity properties of the adjacency graph of SLE$_κ$ bubbles for $κ\in (4,8)$
• Dense Limit of the Dawid-Skene Model for Crowdsourcing and Regions of Sub-optimality of Message Passing Algorithms
• Active Reinforcement Learning with Monte-Carlo Tree Search
• An Agent-Based Simulation of Residential Location Choice of Tenants in Tehran, Iran
• A polynomial ideal associated to any $t$-$(v,k,λ)$ design
• Impacts of transport development on residence choice of renter households: An agent-based evaluation
• An agent-based evaluation of impacts of transport developments on the modal shift in Tehran, Iran
• Nearly Optimal Time Bounds for kPath in Hypergraphs
• Automatic Pixelwise Object Labeling for Aerial Imagery Using Stacked U-Nets
• Spanning trees in randomly perturbed graphs
• The Value of State Dependent Control in Ridesharing Systems
A model-based approach to forecasting chaotic dynamical systems utilizes knowledge of the physical processes governing the dynamics to build an approximate mathematical model of the system. In contrast, machine learning techniques have demonstrated promising results for forecasting chaotic systems purely from past time series measurements of system state variables (training data), without prior knowledge of the system dynamics. The motivation for this paper is the potential of machine learning for filling in the gaps in our underlying mechanistic knowledge that cause widely-used knowledge-based models to be inaccurate. Thus we here propose a general method that leverages the advantages of these two approaches by combining a knowledge-based model and a machine learning technique to build a hybrid forecasting scheme. Potential applications for such an approach are numerous (e.g., improving weather forecasting). We demonstrate and test the utility of this approach using a particular illustrative version of a machine learning known as reservoir computing, and we apply the resulting hybrid forecaster to a low-dimensional chaotic system, as well as to a high-dimensional spatiotemporal chaotic system. These tests yield extremely promising results in that our hybrid technique is able to accurately predict for a much longer period of time than either its machine-learning component or its model-based component alone.
The availability of a large amount of electronic health records (EHR) provides huge opportunities to improve health care service by mining these data. One important application is clinical endpoint prediction, which aims to predict whether a disease, a symptom or an abnormal lab test will happen in the future according to patients’ history records. This paper develops deep learning techniques for clinical endpoint prediction, which are effective in many practical applications. However, the problem is very challenging since patients’ history records contain multiple heterogeneous temporal events such as lab tests, diagnosis, and drug administrations. The visiting patterns of different types of events vary significantly, and there exist complex nonlinear relationships between different events. In this paper, we propose a novel model for learning the joint representation of heterogeneous temporal events. The model adds a new gate to control the visiting rates of different events which effectively models the irregular patterns of different events and their nonlinear correlations. Experiment results with real-world clinical data on the tasks of predicting death and abnormal lab tests prove the effectiveness of our proposed approach over competitive baselines.
We present the Structural Agnostic Model (SAM), a framework to estimate end-to-end non-acyclic causal graphs from observational data. In a nutshell, SAM implements an adversarial game in which a separate model generates each variable, given real values from all others. In tandem, a discriminator attempts to distinguish between the joint distributions of real and generated samples. Finally, a sparsity penalty forces each generator to consider only a small subset of the variables, yielding a sparse causal graph. SAM scales easily to hundreds variables. Our experiments show the state-of-the-art performance of SAM on discovering causal structures and modeling interventions, in both acyclic and non-acyclic graphs.
Deep neural networks (DNNs) have a wide range of applications, and software employing them must be thoroughly tested, especially in safety critical domains. However, traditional software testing methodology, including test coverage criteria and test case generation algorithms, cannot be applied directly to DNNs. This paper bridges this gap. First, inspired by the traditional MC/DC coverage criterion, we propose a set of four test criteria that are tailored to the distinct features of DNNs. Our novel criteria are incomparable and complement each other. Second, for each criterion, we give an algorithm for generating test cases based on linear programming (LP). The algorithms produce a new test case (i.e., an input to the DNN) by perturbing a given one. They encode the test requirement and a fragment of the DNN by fixing the activation pattern obtained from the given input example, and then minimize the difference between the new and the current inputs. Finally, we validate our method on a set of networks trained on the MNIST dataset. The utility of our method is shown experimentally with four objectives: (1)~bug finding; (2)~DNN safety statistics; (3)~testing efficiency and (4)~DNN internal structure analysis.
New ideas in distributed systems (algorithms or protocols) are commonly tested by simulation, because experimenting with a prototype deployed on a realistic platform is cumbersome. However, a prototype not only measures performance but also verifies assumptions about the underlying system. We developed dfuntest – a testing framework for distributed applications that defines abstractions and test structure, and automates experiments on distributed platforms. Dfuntest aims to be jUnit’s analogue for distributed applications; a framework that enables the programmer to write robust and flexible scenarios of experiments. Dfuntest requires minimal bindings that specify how to deploy and interact with the application. Dfuntest’s abstractions allow execution of a scenario on a single machine, a cluster, a cloud, or any other distributed infrastructure, e.g. on PlanetLab. A scenario is a procedure; thus, our framework can be used both for functional tests and for performance measurements. We show how to use dfuntest to deploy our DHT prototype on 60 PlanetLab nodes and verify whether the prototype maintains a correct topology.
This paper provides an overview of prominent deep learning toolkits and, in particular, reports on recent publications that contributed open source software for implementing tasks that are common in intelligent user interfaces (IUI). We provide a scientific reference for researchers and software engineers who plan to utilise deep learning techniques within their IUI research and development projects.
Gated recurrent networks such as those composed of Long Short-Term Memory (LSTM) nodes have recently been used to improve state of the art in many sequential processing tasks such as speech recognition and machine translation. However, the basic structure of the LSTM node is essentially the same as when it was first conceived 25 years ago. Recently, evolutionary and reinforcement learning mechanisms have been employed to create new variations of this structure. This paper proposes a new method, evolution of a tree-based encoding of the gated memory nodes, and shows that it makes it possible to explore new variations more effectively than other methods. The method discovers nodes with multiple recurrent paths and multiple memory cells, which lead to significant improvement in the standard language modeling benchmark task. The paper also shows how the search process can be speeded up by training an LSTM network to estimate performance of candidate structures, and by encouraging exploration of novel solutions. Thus, evolutionary design of complex neural network structures promises to improve performance of deep learning architectures beyond human ability to do so.
A good clustering algorithm should not only be able to discover clusters of arbitrary shapes (global view) but also provide additional information, which can be used to gain more meaningful insights into the internal structure of the clusters (local view). In this work we use the mathematical framework of factor graphs and message passing algorithms to optimize a pairwise similarity based cost function, in the same spirit as was done in Affinity Propagation. Using this framework we develop two variants of a new clustering algorithm, EAP and SHAPE. EAP/SHAPE can not only discover clusters of arbitrary shapes but also provide a rich local view in the form of meaningful local representatives (exemplars) and connections between these local exemplars. We discuss how this local information can be used to gain various insights about the clusters including varying relative cluster densities and indication of local strength in different regions of a cluster . We also discuss how this can help an analyst in discovering and resolving potential inconsistencies in the results. The efficacy of EAP/SHAPE is shown by applying it to various synthetic and real world benchmark datasets.
There has been a drastic growth of research in Generative Adversarial Nets (GANs) in the past few years. Proposed in 2014, GAN has been applied to various applications such as computer vision and natural language processing, and achieves impressive performance. Among the many applications of GAN, image synthesis is the most well-studied one, and research in this area has already demonstrated the great potential of using GAN in image synthesis. In this paper, we provide a taxonomy of methods used in image synthesis, review different models for text-to-image synthesis and image-to-image translation, and discuss some evaluation metrics as well as possible future research directions in image synthesis with GAN.
The increasing ease of data capture and storage has led to a corresponding increase in the choice of data, the type of analysis performed on that data, and the complexity of the analysis performed. The main contribution of this paper is to show that the subjective choice of data and analysis methodology substantially impacts the identification of factors and outcomes of observational studies. This subjective variability of inference is at the heart of recent discussions around irreproducibility in scientific research. To demonstrate this subjective variability, data is taken from an existing study, where interest centres on understanding the factors associated with a young adult’s propensity to fall into the category of `not in employment, education or training’ (NEET). A fully probabilistic analysis is performed, set in a Bayesian framework and implemented using Reversible Jump Markov chain Monte Carlo (RJMCMC). The results show that different techniques lead to different inference but that models consisting of different factors often have the same predictive performance, whether the analysis is frequentist or Bayesian, making inference problematic. We demonstrate how the use of prior distributions in Bayesian techniques can be used to as a tool for assessing a factor’s importance.
Although there is an emerging trend towards generating embeddings for primarily unstructured data, and recently for structured data, there is not yet any systematic suite for measuring the quality of embeddings. This deficiency is further sensed with respect to embeddings generated for structured data because there are no concrete evaluation metrics measuring the quality of encoded structure as well as semantic patterns in the embedding space. In this paper, we introduce a framework containing three distinct tasks concerned with the individual aspects of ontological concepts: (i) the categorization aspect, (ii) the hierarchical aspect, and (iii) the relational aspect. Then, in the scope of each task, a number of intrinsic metrics are proposed for evaluating the quality of the embeddings. Furthermore, w.r.t. this framework multiple experimental studies were run to compare the quality of the available embedding models. Employing this framework in future research can reduce misjudgment and provide greater insight about quality comparisons of embeddings for ontological concepts.
PARAFAC2 has demonstrated success in modeling irregular tensors, where the tensor dimensions vary across one of the modes. An example scenario is jointly modeling treatments across a set of patients with varying number of medical encounters, where the alignment of events in time bears no clinical meaning, and it may also be impossible to align them due to their varying length. Despite recent improvements on scaling up unconstrained PARAFAC2, its model factors are usually dense and sensitive to noise which limits their interpretability. As a result, the following open challenges remain: a) various modeling constraints, such as temporal smoothness, sparsity and non-negativity, are needed to be imposed for interpretable temporal modeling and b) a scalable approach is required to support those constraints efficiently for large datasets. To tackle these challenges, we propose a COnstrained PARAFAC2 (COPA) method, which carefully incorporates optimization constraints such as temporal smoothness, sparsity, and non-negativity in the resulting factors. To efficiently support all those constraints, COPA adopts a hybrid optimization framework using alternating optimization and alternating direction method of multiplier (AO-ADMM). As evaluated on large electronic health record (EHR) datasets with hundreds of thousands of patients, COPA achieves significant speedups (up to 36x faster) over prior PARAFAC2 approaches that only attempt to handle a subset of the constraints that COPA enables. Overall, our method outperforms all the baselines attempting to handle a subset of the constraints in terms of speed, while achieving the same level of accuracy.
While state-of-the-art general object detectors are getting better and better, there are not many systems specifically designed to take advantage of the instance detection problem. For many applications, such as household robotics, a system may need to recognize a few very specific instances at a time. Speed can be critical in these applications, as can the need to recognize previously unseen instances. We introduce a Target Driven Instance Detector(TDID), which modifies existing general object detectors for the instance recognition setting. TDID not only improves performance on instances seen during training, with a fast runtime, but is also able to generalize to detect novel instances.
We study the application of the Thompson Sampling (TS) methodology to the stochastic combinatorial multi-armed bandit (CMAB) framework. We analyze the standard TS algorithm for the general CMAB, and obtain the first distribution-dependent regret bound of for TS under general CMAB, where is the number of arms, is the time horizon, and is the minimum gap between the expected reward of the optimal solution and any non-optimal solution. We also show that one can not use an approximate oracle in TS algorithm for even MAB problems. Then we expand the analysis to matroid bandit, a special case of CMAB. Finally, we use some experiments to show the comparison of regrets of CUCB and CTS algorithms.
Latent Dirichlet Allocation(LDA) is a popular topic model. Given the fact that the input corpus of LDA algorithms consists of millions to billions of tokens, the LDA training process is very time-consuming, which may prevent the usage of LDA in many scenarios, e.g., online service. GPUs have benefited modern machine learning algorithms and big data analysis as they can provide high memory bandwidth and computation power. Therefore, many frameworks, e.g. TensorFlow, Caffe, CNTK, support to use GPUs for accelerating the popular machine learning data-intensive algorithms. However, we observe that LDA solutions on GPUs are not satisfying. In this paper, we present CuLDA_CGS, a GPU-based efficient and scalable approach to accelerate large-scale LDA problems. CuLDA_CGS is designed to efficiently solve LDA problems at high throughput. To it, we first delicately design workload partition and synchronization mechanism to exploit the benefits of mul- tiple GPUs. Then, we offload the LDA sampling process to each individual GPU by optimizing from the sampling algorithm, par- allelization, and data compression perspectives. Evaluations show that compared with state-of-the-art LDA solutions, CuLDA_CGS outperforms them by a large margin (up to 7.3X) on a single GPU. CuLDA_CGS is able to achieve extra 3.0X speedup on 4 GPUs. The source code is publicly available on https://…/cuMF CuLDA_CGS.
Embedding a web-scale information network into a low-dimensional vector space facilitates tasks such as link prediction, classification, and visualization. Past research has addressed the problem of extracting such embeddings by adopting methods from words to graphs, without defining a clearly comprehensible graph-related objective. Yet, as we show, the objectives used in past works implicitly utilize similarity measures among graph nodes. In this paper, we carry the similarity orientation of previous works to its logical conclusion; we propose VERtex Similarity Embeddings (VERSE), a simple, versatile, and memory-efficient method that derives graph embeddings explicitly calibrated to preserve the distributions of a selected vertex-to-vertex similarity measure. VERSE learns such embeddings by training a single-layer neural network. While its default, scalable version does so via sampling similarity information, we also develop a variant using the full information per vertex. Our experimental study on standard benchmarks and real-world datasets demonstrates that VERSE, instantiated with diverse similarity measures, outperforms state-of-the-art methods in terms of precision and recall in major data mining tasks and supersedes them in time and space efficiency, while the scalable sampling-based variant achieves equally good results as the non-scalable full variant.
Deep neural networks (DNNs) enable innovative applications of machine learning like image recognition, machine translation, or malware detection. However, deep learning is often criticized for its lack of robustness in adversarial settings (e.g., vulnerability to adversarial inputs) and general inability to rationalize its predictions. In this work, we exploit the structure of deep learning to enable new learning-based inference and decision strategies that achieve desirable properties such as robustness and interpretability. We take a first step in this direction and introduce the Deep k-Nearest Neighbors (DkNN). This hybrid classifier combines the k-nearest neighbors algorithm with representations of the data learned by each layer of the DNN: a test input is compared to its neighboring training points according to the distance that separates them in the representations. We show the labels of these neighboring points afford confidence estimates for inputs outside the model’s training manifold, including on malicious inputs like adversarial examples–and therein provides protections against inputs that are outside the models understanding. This is because the nearest neighbors can be used to estimate the nonconformity of, i.e., the lack of support for, a prediction in the training data. The neighbors also constitute human-interpretable explanations of predictions. We evaluate the DkNN algorithm on several datasets, and show the confidence estimates accurately identify inputs outside the model, and that the explanations provided by nearest neighbors are intuitive and useful in understanding model failures.
Recurrent neural networks (RNNs) have been widely used for processing sequential data. However, RNNs are commonly difficult to train due to the well-known gradient vanishing and exploding problems and hard to learn long-term patterns. Long short-term memory (LSTM) and gated recurrent unit (GRU) were developed to address these problems, but the use of hyperbolic tangent and the sigmoid action functions results in gradient decay over layers. Consequently, construction of an efficiently trainable deep network is challenging. In addition, all the neurons in an RNN layer are entangled together and their behaviour is hard to interpret. To address these problems, a new type of RNN, referred to as independently recurrent neural network (IndRNN), is proposed in this paper, where neurons in the same layer are independent of each other and they are connected across layers. We have shown that an IndRNN can be easily regulated to prevent the gradient exploding and vanishing problems while allowing the network to learn long-term dependencies. Moreover, an IndRNN can work with non-saturated activation functions such as relu (rectified linear unit) and be still trained robustly. Multiple IndRNNs can be stacked to construct a network that is deeper than the existing RNNs. Experimental results have shown that the proposed IndRNN is able to process very long sequences (over 5000 time steps), can be used to construct very deep networks (21 layers used in the experiment) and still be trained robustly. Better performances have been achieved on various tasks by using IndRNNs compared with the traditional RNN and LSTM.
We present a novel architecture, In-Database Entity Linking (IDEL), in which we integrate the analytics-optimized RDBMS MonetDB with neural text mining abilities. Our system design abstracts core tasks of most neural entity linking systems for MonetDB. To the best of our knowledge, this is the first defacto implemented system integrating entity-linking in a database. We leverage the ability of MonetDB to support in-database-analytics with user defined functions (UDFs) implemented in Python. These functions call machine learning libraries for neural text mining, such as TensorFlow. The system achieves zero cost for data shipping and transformation by utilizing MonetDB’s ability to embed Python processes in the database kernel and exchange data in NumPy arrays. IDEL represents text and relational data in a joint vector space with neural embeddings and can compensate errors with ambiguous entity representations. For detecting matching entities, we propose a novel similarity function based on joint neural embeddings which are learned via minimizing pairwise contrastive ranking loss. This function utilizes a high dimensional index structures for fast retrieval of matching entities. Our first implementation and experiments using the WebNLG corpus show the effectiveness and the potentials of IDEL.
Takeuchi’s Information Criteria (TIC) is a linearization of maximum likelihood estimator bias which shrinks the model parameters towards the maximum entropy distribution, even when the model is mis-specified. In statistical machine learning, regularization (a.k.a. ridge regression) also introduces a parameterized bias term with the goal of minimizing out-of-sample entropy, but generally requires a numerical solver to find the regularization parameter. This paper presents a novel regularization approach based on TIC; the approach does not assume a data generation process and results in a higher entropy distribution through more efficient sample noise suppression. The resulting objective function can be directly minimized to estimate and select the best model, without the need to select a regularization parameter, as in ridge regression. Numerical results applied to a synthetic high dimensional dataset generated from a logistic regression model demonstrate superior model performance when using the TIC based regularization over a and a penalty term.