Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








288 Hits in 4.5 sec

Extracting Latent Behavior Patterns of People from Probe Request Data: A Non-negative Tensor Factorization Approach

Kaito Oka, Masaki Igarashi, Atsushi Shimada, Rin-ichiro Taniguchi
2017 Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods  
To make the extracted patterns understandable, we apply a Non-negative Tensor Factorization with a sparsity constraint and initialization with prior knowledge to the analysis.  ...  Although people flow analysis is widely studied because of its importance, there are some difficulties with previous methods, such as the cost of sensors, person re-identification, and the spread of smartphone  ...  ., Ltd. for supporting our research.  ... 
doi:10.5220/0006193901570164 dblp:conf/icpram/OkaIST17 fatcat:s7mas2eevrhjjpge2stri3zl7y

The heterogeneous feature selection with structural sparsity for multimedia annotation and hashing: a survey

Fei Wu, Yahong Han, Xiang Liu, Jian Shao, Yueting Zhuang, Zhongfei Zhang
2012 International Journal of Multimedia Information Retrieval  
Therefore, the selection of limited discriminative features for certain semantics is hence crucial to make the understanding of multimedia more interpretable.  ...  There is a rapid growth of the amount of multimedia data from real-world multimedia sharing web sites, such as Flickr and Youtube.  ...  The CP decomposition factorizes a tensor into a sum of component rankone tensors. An interesting property of tensor decompositions by CP is the uniqueness under a weak condition.  ... 
doi:10.1007/s13735-012-0001-9 fatcat:4ihorofn6zbg3mzqnifihgcydm

Author Index

2010 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition  
by Batch Mode Re-Tagging Tsuji, Akira Silhouette Transformation based on Walking Speed for Gait Identification Tsumura, Norimichi Workshop: Precomputed ROMP for Light Transport Acquisition Tu, Zhuowen  ...  Fast Sparse Representation with Prototypes Huang, Junzhou Automatic Image Annotation Using Group Sparsity Huang, Kaiqi Visual Tracking via Incremental Self-tuning Particle Filtering on the Affine Group  ... 
doi:10.1109/cvpr.2010.5539913 fatcat:y6m5knstrzfyfin6jzusc42p54

Provable Convex Co-clustering of Tensors

Eric C Chi, Brian R Gaines, Will Wei Sun, Hua Zhou, Jian Yang
2020 Journal of machine learning research  
Moreover, there is a gap between statistical guarantees and computational efficiency for existing tensor clustering solutions due to the nature of their non-convex formulations.  ...  Cluster analysis is a fundamental tool for pattern discovery of complex heterogeneous data.  ...  Acknowledgments The authors thank Xu Han for his help with the simulation experiments during the revision of this work.  ... 
pmid:33312074 pmcid:PMC7731944 fatcat:bjrmicvonfcupkwzctaprj44tq

Smart at what cost? Characterising Mobile Deep Neural Networks in the wild [article]

Mario Almeida, Stefanos Laskaridis, Abhinav Mehrotra, Lukasz Dudziak, Ilias Leontiadis, Nicholas D. Lane
2021 arXiv   pre-print
On the other hand, the strive to maximise the accuracy of a task is supported by deeper and wider neural networks, making mobile deployment of state-of-the-art DNNs a moving target.  ...  Simultaneously, we measure the models' energy footprint, as a core cost dimension of any mobile deployment.  ...  Heat dissipation of the open design, cross-manufacturer configurations and low-level configuration of the Android Scheduler can all be contributing factors.  ... 
arXiv:2109.13963v1 fatcat:bwoxnnfsjbh6rgjxcrooijfthi

Incremental light bundle adjustment for structure from motion and robotics

Vadim Indelman, Richard Roberts, Frank Dellaert
2015 Robotics and Autonomous Systems  
The resulting cost function is formulated in terms of three-view constraints instead of re-projection errors and only the camera poses are optimized.  ...  First, the number of variables in the optimization is reduced by algebraic elimination of observed 3D points, leading to a structureless BA.  ...  Stephen Williams, College of Computing, Georgia Institute of Technology, for insightful discussions.  ... 
doi:10.1016/j.robot.2015.03.009 fatcat:oghrdkkfqbdyzefuogeocnfozm

Learning Graph Structure from Convolutional Mixtures [article]

Max Wasserman, Saurabh Sihag, Gonzalo Mateos, Alejandro Ribeiro
2022 arXiv   pre-print
Furthermore, we demonstrate the robustness and representation power of GDNs on real world neuroimaging and social network datasets.  ...  However, when said graphs are (partially) unobserved, noisy, or dynamic, the problem of inferring graph structure from data becomes relevant.  ...  identification.  ... 
arXiv:2205.09575v1 fatcat:6w3fuemrcnesfaean5vvcp4bvq

Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey [article]

Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
2021 arXiv   pre-print
In this paper, we provide a comprehensive survey on machine learning technologies for the identification of IoT devices along with the detection of compromised or falsified ones from the viewpoint of passive  ...  Meanwhile, we discuss various ML-related enabling technologies for this purpose.  ...  Their features are as follows: • Network pruning: Network pruning algorithms use group sparsity regularizers [158] to remove unimportant connections from a regularly trained network.  ... 
arXiv:2101.10181v1 fatcat:in5x7tp5fbdernmlzyvv52muke

Privacy in trajectory micro-data publishing : a survey [article]

Marco Fiore, Panagiota Katsikouli, Elli Zavou, Mathieu Cunche, Françoise Fessant, Dominique Le Hello, Ulrich Matchi Aivodji, Baptiste Olivier, Tony Quertier, Razvan Stanica
2020 arXiv   pre-print
directions for research.  ...  We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks  ...  Acknowledgements The authors would like to thank Emilie Sirvent-Hien and Marc-Olivier Killijian for the constructive discussions.  ... 
arXiv:1903.12211v3 fatcat:kyz7k56e6bcunkzmsdz7xdx5ri

Towards Time-Aware Context-Aware Deep Trust Prediction in Online Social Networks [article]

Seyed Mohssen Ghafari
2020 arXiv   pre-print
This process faces many challenges, such as the sparsity of user-specified trust relations, the context-awareness of trust and changes in trust values over time.  ...  There are several applications for trust in Online Social Networks (OSNs), including social spammer detection, fake news detection, retweet behaviour detection and recommender systems.  ...  Instead, tensors are one of the most favoured representations for trust relations as they can store data in several dimensions.  ... 
arXiv:2003.09543v1 fatcat:4ghgxbpepzaaxl3ed2gies7xr4

Enabling Cost-Effective Population Health Monitoring By Exploiting Spatiotemporal Correlation: An Empirical Study [article]

Dawei Chen, Jiangtao Wang, Wenjie Ruan, Qiang Ni, Sumi Helal
2020 arXiv   pre-print
collection in the traditional way, while leveraging inherent spatial correlations of neighboring regions to perform data inference for the rest of the area.  ...  To verify whether the idea of CPH is feasible, we conduct an in-depth study based on spatiotemporal morbidity rates of chronic diseases in more than 500 regions around London for over ten years.  ...  By reviewing these literature and re-examining the problem in this paper, we believe that the spatiotemporal correlations might partially be explained in the perspectives of these factors.  ... 
arXiv:2005.01423v1 fatcat:p2e43aaogfcczlr7iryz2hepke

Program

2019 2019 International Conference on Control, Automation and Information Sciences (ICCAIS)  
In this paper, We proposed the cross-combination neural network called CCNet for the feature extraction module in person re-identification.  ...  In this paper, we employ the Tensor Train decomposition with sparsity constraint for the compression of both convolutional layers and the fully connected layers.  ...  In this paper, we develop an intelligent video surveillance and state identification system for elevator cabs, in which the information such as the state of cab door, the behavior of human body, as well  ... 
doi:10.1109/iccais46528.2019.9074650 fatcat:f3libdixzvez3kaeyb5dubekrq

A Survey on Deep Learning for Human Mobility [article]

Massimiliano Luca, Gianni Barlacchi, Bruno Lepri, Luca Pappalardo
2021 arXiv   pre-print
At the same time, it helps deep learning scientists and practitioners understand the fundamental concepts and the open challenges of the study of human mobility.  ...  The proliferation of digital mobility data, such as phone records, GPS traces, and social media posts, combined with the predictive power of artificial intelligence, triggered the application of deep learning  ...  A synthetic trajectory may resemble a real one and a malicious adversary may use this information for re-identification.  ... 
arXiv:2012.02825v2 fatcat:r7navzojwnaojncfsx3sbnfsze

LLM Inference Unveiled: Survey and Roofline Model Insights [article]

Zhihang Yuan, Yuzhang Shang, Yang Zhou, Zhen Dong, Zhe Zhou, Chenhao Xue, Bingzhe Wu, Zhikai Li, Qingyi Gu, Yong Jae Lee, Yan Yan, Beidi Chen (+2 others)
2024 arXiv   pre-print
The analyze tool, LLM-Viewer, is open-sourced.  ...  new to the field as well as for those seeking to deepen their understanding of efficient LLM deployment.  ...  and dense computation, to implement the GPU Tensor Core's sophisticated support for unstructured sparsity.  ... 
arXiv:2402.16363v6 fatcat:xxlbrecjqnfsbn4uko3xkyvtfe

IEEE Access Special Section Editorial: AI-Driven Big Data Processing: Theory, Methodology, and Applications

Zhanyu Ma, Sunwoo Kim, Pascual Martinez-Gomez, Jalil Taghia, Yi-Zhe Song, Huiji Gao
2020 IEEE Access  
The sparsity of data is one of the main factors restricting the performance of recommender systems.  ...  In the article ''Coupled tensor decomposition for user clustering in mobile Internet traffic interaction pattern,'' by Yu et al., the authors focus on the interaction pattern between mobile users and servers  ...  Therefore, the calculation of each data point's local outlier factor only needs to be performed inside the small cluster.  ... 
doi:10.1109/access.2020.3035461 fatcat:rt7ejtponrfexigie4cfpt7gd4
« Previous Showing results 1 — 15 out of 288 results