Unnamed: 0.1
int64 0
113k
 Unnamed: 0
float64 0
113k
⌀  title
stringlengths 7
246
 abstract
stringlengths 6
3.31k


100  100  Dependence Structure Estimation via Copula  Dependence strucuture estimation is one of the important problems in machine
learning domain and has many applications in different scientific areas. In
this paper, a theoretical framework for such estimation based on copula and
copula entropy  the probabilistic theory of representation and measurement of
statistical dependence, is proposed. Graphical models are considered as a
special case of the copula framework. A method of the framework for estimating
maximum spanning copula is proposed. Due to copula, the method is irrelevant to
the properties of individual variables, insensitive to outlier and able to deal
with nonGaussianity. Experiments on both simulated data and real dataset
demonstrated the effectiveness of the proposed method.

101  101  Introduction to Relational Networks for Classification  The use of computational intelligence techniques for classification has been
used in numerous applications. This paper compares the use of a Multi Layer
Perceptron Neural Network and a new Relational Network on classifying the HIV
status of women at antenatal clinics. The paper discusses the architecture of
the relational network and its merits compared to a neural network and most
other computational intelligence classifiers. Results gathered from the study
indicate comparable classification accuracies as well as revealed relationships
between data features in the classification data. Much higher classification
accuracies are recommended for future research in the area of HIV
classification as well as missing data estimation.

102  102  The Effect of Structural Diversity of an Ensemble of Classifiers on
Classification Accuracy  This paper aims to showcase the measure of structural diversity of an
ensemble of 9 classifiers and then map a relationship between this structural
diversity and accuracy. The structural diversity was induced by having
different architectures or structures of the classifiers The Genetical
Algorithms (GA) were used to derive the relationship between diversity and the
classification accuracy by evolving the classifiers and then picking 9
classifiers out on an ensemble of 60 classifiers. It was found that as the
ensemble became diverse the accuracy improved. However at a certain diversity
measure the accuracy began to drop. The KohaviWolpert variance method is used
to measure the diversity of the ensemble. A method of voting is used to
aggregate the results from each classifier. The lowest error was observed at a
diversity measure of 0.16 with a mean square error of 0.274, when taking 0.2024
as maximum diversity measured. The parameters that were varied were: the number
of hidden nodes, learning rate and the activation function.

103  103  A Quadratic Loss MultiClass SVM  Using a support vector machine requires to set two types of hyperparameters:
the soft margin parameter C and the parameters of the kernel. To perform this
model selection task, the method of choice is crossvalidation. Its
leaveoneout variant is known to produce an estimator of the generalization
error which is almost unbiased. Its major drawback rests in its time
requirement. To overcome this difficulty, several upper bounds on the
leaveoneout error of the pattern recognition SVM have been derived. Among
those bounds, the most popular one is probably the radiusmargin bound. It
applies to the hard margin pattern recognition SVM, and by extension to the
2norm SVM. In this report, we introduce a quadratic loss MSVM, the MSVM^2,
as a direct extension of the 2norm SVM to the multiclass case. For this
machine, a generalized radiusmargin bound is then established.

104  104  On Recovery of Sparse Signals via $\ell_1$ Minimization  This article considers constrained $\ell_1$ minimization methods for the
recovery of high dimensional sparse signals in three settings: noiseless,
bounded error and Gaussian noise. A unified and elementary treatment is given
in these noise settings for two $\ell_1$ minimization methods: the Dantzig
selector and $\ell_1$ minimization with an $\ell_2$ constraint. The results of
this paper improve the existing results in the literature by weakening the
conditions and tightening the error bounds. The improvement on the conditions
shows that signals with larger support can be recovered accurately. This paper
also establishes connections between restricted isometry property and the
mutual incoherence property. Some results of Candes, Romberg and Tao (2006) and
Donoho, Elad, and Temlyakov (2006) are extended.

105  105  Online Learning of an Unlearnable True Teacher through Mobile Ensemble
Teachers  Online learning of a hierarchical learning model is studied by a method from
statistical mechanics. In our model a student of a simple perceptron learns
from not a true teacher directly, but ensemble teachers who learn from the true
teacher with a perceptron learning rule. Since the true teacher and the
ensemble teachers are expressed as nonmonotonic perceptron and simple ones,
respectively, the ensemble teachers go around the unlearnable true teacher with
the distance between them fixed in an asymptotic steady state. The
generalization performance of the student is shown to exceed that of the
ensemble teachers in a transient state, as was shown in similar
ensembleteachers models. Further, it is found that moving the ensemble
teachers even in the steady state, in contrast to the fixed ensemble teachers,
is efficient for the performance of the student.

106  106  Rollout Sampling Approximate Policy Iteration  Several researchers have recently investigated the connection between
reinforcement learning and classification. We are motivated by proposals of
approximate policy iteration schemes without value functions which focus on
policy representation using classifiers and address policy learning as a
supervised learning problem. This paper proposes variants of an improved policy
iteration scheme which addresses the core sampling problem in evaluating a
policy through simulation as a multiarmed bandit machine. The resulting
algorithm offers comparable performance to the previous algorithm achieved,
however, with significantly less computational effort. An order of magnitude
improvement is demonstrated experimentally in two standard reinforcement
learning domains: inverted pendulum and mountaincar.

107  107  An optimization problem on the sphere  We prove existence and uniqueness of the minimizer for the average geodesic
distance to the points of a geodesically convex set on the sphere. This implies
a corresponding existence and uniqueness result for an optimal algorithm for
halfspace learning, when data and target functions are drawn from the uniform
distribution.

108  108  A Kernel Method for the TwoSample Problem  We propose a framework for analyzing and comparing distributions, allowing us
to design statistical tests to determine if two samples are drawn from
different distributions. Our test statistic is the largest difference in
expectations over functions in the unit ball of a reproducing kernel Hilbert
space (RKHS). We present two tests based on large deviation bounds for the test
statistic, while a third is based on the asymptotic distribution of this
statistic. The test statistic can be computed in quadratic time, although
efficient linear time approximations are available. Several classical metrics
on distributions are recovered when the function space used to compute the
difference in expectations is allowed to be more general (eg. a Banach space).
We apply our twosample tests to a variety of problems, including attribute
matching for databases using the Hungarian marriage method, where they perform
strongly. Excellent performance is also obtained when comparing distributions
over graphs, for which these are the first such tests.

109  109  The Margitron: A Generalised Perceptron with Margin  We identify the classical Perceptron algorithm with margin as a member of a
broader family of large margin classifiers which we collectively call the
Margitron. The Margitron, (despite its) sharing the same update rule with the
Perceptron, is shown in an incremental setting to converge in a finite number
of updates to solutions possessing any desirable fraction of the maximum
margin. Experiments comparing the Margitron with decomposition SVMs on tasks
involving linear kernels and 2norm soft margin are also reported.

110  110  Sample Selection Bias Correction Theory  This paper presents a theoretical analysis of sample selection bias
correction. The sample bias correction technique commonly used in machine
learning consists of reweighting the cost of an error on each training point of
a biased sample to more closely reflect the unbiased distribution. This relies
on weights derived by various estimation techniques based on finite samples. We
analyze the effect of an error in that estimation on the accuracy of the
hypothesis returned by the learning algorithm for two estimation techniques: a
clusterbased estimation technique and kernel mean matching. We also report the
results of sample bias correction experiments with several data sets using
these techniques. Our analysis is based on the novel concept of distributional
stability which generalizes the existing concept of pointbased stability. Much
of our work and proof techniques can be used to analyze other importance
weighting techniques and their effect on accuracy when using a distributionally
stable algorithm.

111  111  Learning LowDensity Separators  We define a novel, basic, unsupervised learning problem  learning the lowest
density homogeneous hyperplane separator of an unknown probability
distribution. This task is relevant to several problems in machine learning,
such as semisupervised learning and clustering stability. We investigate the
question of existence of a universally consistent algorithm for this problem.
We propose two natural learning paradigms and prove that, on input unlabeled
random samples generated by any member of a rich family of distributions, they
are guaranteed to converge to the optimal separator for that distribution. We
complement this result by showing that no learning algorithm for our task can
achieve uniform learning rates (that are independent of the data generating
distribution).

112  112  From Data Topology to a Modular Classifier  This article describes an approach to designing a distributed and modular
neural classifier. This approach introduces a new hierarchical clustering that
enables one to determine reliable regions in the representation space by
exploiting supervised information. A multilayer perceptron is then associated
with each of these detected clusters and charged with recognizing elements of
the associated cluster while rejecting all others. The obtained global
classifier is comprised of a set of cooperating neural networks and completed
by a Knearest neighbor classifier charged with treating elements rejected by
all the neural networks. Experimental results for the handwritten digit
recognition problem and comparison with neural and statistical nonmodular
classifiers are given.

113  113  Utilisation des grammaires probabilistes dans les t\^aches de
segmentation et d'annotation prosodique  Nous pr\'esentons dans cette contribution une approche \`a la fois symbolique
et probabiliste permettant d'extraire l'information sur la segmentation du
signal de parole \`a partir d'information prosodique. Nous utilisons pour ce
faire des grammaires probabilistes poss\'edant une structure hi\'erarchique
minimale. La phase de construction des grammaires ainsi que leur pouvoir de
pr\'ediction sont \'evalu\'es qualitativement ainsi que quantitativement.

Methodologically oriented, the present work sketches an approach for prosodic
information retrieval and speech segmentation, based on both symbolic and
probabilistic information. We have recourse to probabilistic grammars, within
which we implement a minimal hierarchical structure. Both the stages of
probabilistic grammar building and its testing in prediction are explored and
quantitatively and qualitatively evaluated.

114  114  Belief Propagation and Beyond for Particle Tracking  We describe a novel approach to statistical learning from particles tracked
while moving in a random environment. The problem consists in inferring
properties of the environment from recorded snapshots. We consider here the
case of a fluid seeded with identical passive particles that diffuse and are
advected by a flow. Our approach rests on efficient algorithms to estimate the
weighted number of possible matchings among particles in two consecutive
snapshots, the partition function of the underlying graphical model. The
partition function is then maximized over the model parameters, namely
diffusivity and velocity gradient. A Belief Propagation (BP) scheme is the
backbone of our algorithm, providing accurate results for the flow parameters
we want to learn. The BP estimate is additionally improved by incorporating
Loop Series (LS) contributions. For the weighted matching problem, LS is
compactly expressed as a Cauchy integral, accurately estimated by a saddle
point approximation. Numerical experiments show that the quality of our
improved BP algorithm is comparable to the one of a fully polynomial randomized
approximation scheme, based on the Markov Chain Monte Carlo (MCMC) method,
while the BPbased scheme is substantially faster than the MCMC scheme.

115  115  Decoding BetaDecay Systematics: A Global Statistical Model for Beta^
Halflives  Statistical modeling of nuclear data provides a novel approach to nuclear
systematics complementary to established theoretical and phenomenological
approaches based on quantum theory. Continuing previous studies in which global
statistical modeling is pursued within the general framework of machine
learning theory, we implement advances in training algorithms designed to
improved generalization, in application to the problem of reproducing and
predicting the halflives of nuclear ground states that decay 100% by the beta^
mode. More specifically, fullyconnected, multilayer feedforward artificial
neural network models are developed using the LevenbergMarquardt optimization
algorithm together with Bayesian regularization and crossvalidation. The
predictive performance of models emerging from extensive computer experiments
is compared with that of traditional microscopic and phenomenological models as
well as with the performance of other learning systems, including earlier
neural network models as well as the support vector machines recently applied
to the same problem. In discussing the results, emphasis is placed on
predictions for nuclei that are far from the stability line, and especially
those involved in the rprocess nucleosynthesis. It is found that the new
statistical models can match or even surpass the predictive performance of
conventional models for betadecay systematics and accordingly should provide a
valuable additional tool for exploring the expanding nuclear landscape.

116  116  Learning Graph Matching  As a fundamental problem in pattern recognition, graph matching has
applications in a variety of fields, from computer vision to computational
biology. In graph matching, patterns are modeled as graphs and pattern
recognition amounts to finding a correspondence between the nodes of different
graphs. Many formulations of this problem can be cast in general as a quadratic
assignment problem, where a linear term in the objective function encodes node
compatibility and a quadratic term encodes edge compatibility. The main
research focus in this theme is about designing efficient algorithms for
approximately solving the quadratic assignment problem, since it is NPhard. In
this paper we turn our attention to a different question: how to estimate
compatibility functions such that the solution of the resulting graph matching
problem best matches the expected solution that a human would manually provide.
We present a method for learning graph matching: the training examples are
pairs of graphs and the `labels' are matches between them. Our experimental
results reveal that learning can substantially improve the performance of
standard graph matching algorithms. In particular, we find that simple linear
assignment with such a learning scheme outperforms Graduated Assignment with
bistochastic normalisation, a stateoftheart quadratic assignment relaxation
algorithm.

117  117  Statistical Learning of Arbitrary Computable Classifiers  Statistical learning theory chiefly studies restricted hypothesis classes,
particularly those with finite VapnikChervonenkis (VC) dimension. The
fundamental quantity of interest is the sample complexity: the number of
samples required to learn to a specified level of accuracy. Here we consider
learning over the set of all computable labeling functions. Since the
VCdimension is infinite and a priori (uniform) bounds on the number of samples
are impossible, we let the learning algorithm decide when it has seen
sufficient samples to have learned. We first show that learning in this setting
is indeed possible, and develop a learning algorithm. We then show, however,
that bounding sample complexity independently of the distribution is
impossible. Notably, this impossibility is entirely due to the requirement that
the learning algorithm be computable, and not due to the statistical nature of
the problem.

118  118  Agnostically Learning Juntas from Random Walks  We prove that the class of functions g:{1,+1}^n > {1,+1} that only depend
on an unknown subset of k<<n variables (socalled kjuntas) is agnostically
learnable from a random walk in time polynomial in n, 2^{k^2}, epsilon^{k},
and log(1/delta). In other words, there is an algorithm with the claimed
running time that, given epsilon, delta > 0 and access to a random walk on
{1,+1}^n labeled by an arbitrary function f:{1,+1}^n > {1,+1}, finds with
probability at least 1delta a kjunta that is (opt(f)+epsilon)close to f,
where opt(f) denotes the distance of a closest kjunta to f.

119  119  On Sequences with NonLearnable Subsequences  The remarkable results of Foster and Vohra was a starting point for a series
of papers which show that any sequence of outcomes can be learned (with no
prior knowledge) using some universal randomized forecasting algorithm and
forecastdependent checking rules. We show that for the class of all
computationally efficient outcomeforecastbased checking rules, this property
is violated. Moreover, we present a probabilistic algorithm generating with
probability close to one a sequence with a subsequence which simultaneously
miscalibrates all partially weakly computable randomized forecasting
algorithms. %subsequences nonlearnable by each randomized algorithm.
According to the Dawid's prequential framework we consider partial recursive
randomized algorithms.

120  120  Prediction with Expert Advice in Games with Unbounded OneStep Gains  The games of prediction with expert advice are considered in this paper. We
present some modification of Kalai and Vempala algorithm of following the
perturbed leader for the case of unrestrictedly large onestep gains. We show
that in general case the cumulative gain of any probabilistic prediction
algorithm can be much worse than the gain of some expert of the pool.
Nevertheless, we give the lower bound for this cumulative gain in general case
and construct a universal algorithm which has the optimal performance; we also
prove that in case when onestep gains of experts of the pool have ``limited
deviations'' the performance of our algorithm is close to the performance of
the best expert.

121  121  Computationally Efficient Estimators for Dimension Reductions Using
Stable Random Projections  The method of stable random projections is a tool for efficiently computing
the $l_\alpha$ distances using low memory, where $0<\alpha \leq 2$ is a tuning
parameter. The method boils down to a statistical estimation task and various
estimators have been proposed, based on the geometric mean, the harmonic mean,
and the fractional power etc.
This study proposes the optimal quantile estimator, whose main operation is
selecting, which is considerably less expensive than taking fractional power,
the main operation in previous estimators. Our experiments report that the
optimal quantile estimator is nearly one order of magnitude more
computationally efficient than previous estimators. For largescale learning
tasks in which storing and computing pairwise distances is a serious
bottleneck, this estimator should be desirable.
In addition to its computational advantages, the optimal quantile estimator
exhibits nice theoretical properties. It is more accurate than previous
estimators when $\alpha>1$. We derive its theoretical error bounds and
establish the explicit (i.e., no hidden constants) sample complexity bound.

122  122  On Approximating the Lp Distances for p>2  Applications in machine learning and data mining require computing pairwise
Lp distances in a data matrix A. For massive highdimensional data, computing
all pairwise distances of A can be infeasible. In fact, even storing A or all
pairwise distances of A in the memory may be also infeasible. This paper
proposes a simple method for p = 2, 4, 6, ... We first decompose the l_p (where
p is even) distances into a sum of 2 marginal norms and p1 ``inner products''
at different orders. Then we apply normal or subGaussian random projections to
approximate the resultant ``inner products,'' assuming that the marginal norms
can be computed exactly by a linear scan. We propose two strategies for
applying random projections. The basic projection strategy requires only one
projection matrix but it is more difficult to analyze, while the alternative
projection strategy requires p1 projection matrices but its theoretical
analysis is much easier. In terms of the accuracy, at least for p=4, the basic
strategy is always more accurate than the alternative strategy if the data are
nonnegative, which is common in reality.

123  123  On empirical meaning of randomness with respect to a real parameter  We study the empirical meaning of randomness with respect to a family of
probability distributions $P_\theta$, where $\theta$ is a real parameter, using
algorithmic randomness theory. In the case when for a computable probability
distribution $P_\theta$ an effectively strongly consistent estimate exists, we
show that the Levin's a priory semicomputable semimeasure of the set of all
$P_\theta$random sequences is positive if and only if the parameter $\theta$
is a computable real number. The different methods for generating
``meaningful'' $P_\theta$random sequences with noncomputable $\theta$ are
discussed.

124  124  Sparse Online Learning via Truncated Gradient  We propose a general method called truncated gradient to induce sparsity in
the weights of online learning algorithms with convex loss functions. This
method has several essential properties: The degree of sparsity is continuous
 a parameter controls the rate of sparsification from no sparsification to
total sparsification. The approach is theoretically motivated, and an instance
of it can be regarded as an online counterpart of the popular
$L_1$regularization method in the batch setting. We prove that small rates of
sparsification result in only small additional regret with respect to typical
online learning guarantees. The approach works well empirically. We apply the
approach to several datasets and find that for datasets with large numbers of
features, substantial sparsity is discoverable.

125  125  Graph Kernels  We present a unified framework to study graph kernels, special cases of which
include the random walk graph kernel \citep{GaeFlaWro03,BorOngSchVisetal05},
marginalized graph kernel \citep{KasTsuIno03,KasTsuIno04,MahUedAkuPeretal04},
and geometric kernel on graphs \citep{Gaertner02}. Through extensions of linear
algebra to Reproducing Kernel Hilbert Spaces (RKHS) and reduction to a
Sylvester equation, we construct an algorithm that improves the time complexity
of kernel computation from $O(n^6)$ to $O(n^3)$. When the graphs are sparse,
conjugate gradient solvers or fixedpoint iterations bring our algorithm into
the subcubic domain. Experiments on graphs from bioinformatics and other
application domains show that it is often more than a thousand times faster
than previous approaches. We then explore connections between diffusion kernels
\citep{KonLaf02}, regularization on graphs \citep{SmoKon03}, and graph kernels,
and use these connections to propose new graph kernels. Finally, we show that
rational kernels \citep{CorHafMoh02,CorHafMoh03,CorHafMoh04} when specialized
to graphs reduce to the random walk graph kernel.

126  126  Catching Up Faster by Switching Sooner: A Prequential Solution to the
AICBIC Dilemma  Bayesian model averaging, model selection and its approximations such as BIC
are generally statistically consistent, but sometimes achieve slower rates og
convergence than other methods such as AIC and leaveoneout crossvalidation.
On the other hand, these other methods can br inconsistent. We identify the
"catchup phenomenon" as a novel explanation for the slow convergence of
Bayesian methods. Based on this analysis we define the switch distribution, a
modification of the Bayesian marginal distribution. We show that, under broad
conditions,model selection and prediction based on the switch distribution is
both consistent and achieves optimal convergence rates, thereby resolving the
AICBIC dilemma. The method is practical; we give an efficient implementation.
The switch distribution has a data compression interpretation, and can thus be
viewed as a "prequential" or MDL method; yet it is different from the MDL
methods that are usually considered in the literature. We compare the switch
distribution to Bayes factor model selection and leaveoneout
crossvalidation.

127  127  Algorithm Selection as a Bandit Problem with Unbounded Losses  Algorithm selection is typically based on models of algorithm performance,
learned during a separate offline training sequence, which can be prohibitively
expensive. In recent work, we adopted an online approach, in which a
performance model is iteratively updated and used to guide selection on a
sequence of problem instances. The resulting explorationexploitation tradeoff
was represented as a bandit problem with expert advice, using an existing
solver for this game, but this required the setting of an arbitrary bound on
algorithm runtimes, thus invalidating the optimal regret of the solver. In this
paper, we propose a simpler framework for representing algorithm selection as a
bandit problem, with partial information, and an unknown bound on losses. We
adapt an existing solver to this game, proving a bound on its expected regret,
which holds also for the resulting algorithm selection technique. We present
preliminary experiments with a set of SAT solvers on a mixed SATUNSAT
benchmark.

128  128  MultiInstance Learning by Treating Instances As NonI.I.D. Samples  Multiinstance learning attempts to learn from a training set consisting of
labeled bags each containing many unlabeled instances. Previous studies
typically treat the instances in the bags as independently and identically
distributed. However, the instances in a bag are rarely independent, and
therefore a better performance can be expected if the instances are treated in
an noni.i.d. way that exploits the relations among instances. In this paper,
we propose a simple yet effective multiinstance learning method, which regards
each bag as a graph and uses a specific kernel to distinguish the graphs by
considering the features of the nodes as well as the features of the edges that
convey some relations among instances. The effectiveness of the proposed method
is validated by experiments.

129  129  Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio  We study the problem of dynamic spectrum sensing and access in cognitive
radio systems as a partially observed Markov decision process (POMDP). A group
of cognitive users cooperatively tries to exploit vacancies in primary
(licensed) channels whose occupancies follow a Markovian evolution. We first
consider the scenario where the cognitive users have perfect knowledge of the
distribution of the signals they receive from the primary users. For this
problem, we obtain a greedy channel selection and access policy that maximizes
the instantaneous reward, while satisfying a constraint on the probability of
interfering with licensed transmissions. We also derive an analytical universal
upper bound on the performance of the optimal policy. Through simulation, we
show that our scheme achieves good performance relative to the upper bound and
improved performance relative to an existing scheme.
We then consider the more practical scenario where the exact distribution of
the signal from the primary is unknown. We assume a parametric model for the
distribution and develop an algorithm that can learn the true distribution,
still guaranteeing the constraint on the interference probability. We show that
this algorithm outperforms the naive design that assumes a worst case value for
the parameter. We also provide a proof for the convergence of the learning
algorithm.

130  130  On Probability Distributions for Trees: Representations, Inference and
Learning  We study probability distributions over free algebras of trees. Probability
distributions can be seen as particular (formal power) tree series [Berstel et
al 82, Esik et al 03], i.e. mappings from trees to a semiring K . A widely
studied class of tree series is the class of rational (or recognizable) tree
series which can be defined either in an algebraic way or by means of
multiplicity tree automata. We argue that the algebraic representation is very
convenient to model probability distributions over a free algebra of trees.
First, as in the string case, the algebraic representation allows to design
learning algorithms for the whole class of probability distributions defined by
rational tree series. Note that learning algorithms for rational tree series
correspond to learning algorithms for weighted tree automata where both the
structure and the weights are learned. Second, the algebraic representation can
be easily extended to deal with unranked trees (like XML trees where a symbol
may have an unbounded number of children). Both properties are particularly
relevant for applications: nondeterministic automata are required for the
inference problem to be relevant (recall that Hidden Markov Models are
equivalent to nondeterministic string automata); nowadays applications for Web
Information Extraction, Web Services and document processing consider unranked
trees.

131  131  Universal Denoising of Discretetime ContinuousAmplitude Signals  We consider the problem of reconstructing a discretetime signal (sequence)
with continuousvalued components corrupted by a known memoryless channel. When
performance is measured using a persymbol loss function satisfying mild
regularity conditions, we develop a sequence of denoisers that, although
independent of the distribution of the underlying `clean' sequence, is
universally optimal in the limit of large sequence length. This sequence of
denoisers is universal in the sense of performing as well as any sliding window
denoising scheme which may be optimized for the underlying clean signal. Our
results are initially developed in a ``semistochastic'' setting, where the
noiseless signal is an unknown individual sequence, and the only source of
randomness is due to the channel noise. It is subsequently shown that in the
fully stochastic setting, where the noiseless sequence is a stationary
stochastic process, our schemes universally attain optimum performance. The
proposed schemes draw from nonparametric density estimation techniques and are
practically implementable. We demonstrate efficacy of the proposed schemes in
denoising grayscale images in the conventional additive white Gaussian noise
setting, with additional promising results for less conventional noise
distributions.

132  132  Positive factor networks: A graphical framework for modeling
nonnegative sequential data  We present a novel graphical framework for modeling nonnegative sequential
data with hierarchical structure. Our model corresponds to a network of coupled
nonnegative matrix factorization (NMF) modules, which we refer to as a
positive factor network (PFN). The data model is linear, subject to
nonnegativity constraints, so that observation data consisting of an additive
combination of individually representable observations is also representable by
the network. This is a desirable property for modeling problems in
computational auditory scene analysis, since distinct sound sources in the
environment are often wellmodeled as combining additively in the corresponding
magnitude spectrogram. We propose inference and learning algorithms that
leverage existing NMF algorithms and that are straightforward to implement. We
present a target tracking example and provide results for synthetic observation
data which serve to illustrate the interesting properties of PFNs and motivate
their potential usefulness in applications such as music transcription, source
separation, and speech recognition. We show how a target process characterized
by a hierarchical state transition model can be represented as a PFN. Our
results illustrate that a PFN which is defined in terms of a single target
observation can then be used to effectively track the states of multiple
simultaneous targets. Our results show that the quality of the inferred target
states degrades gradually as the observation noise is increased. We also
present results for an example in which meaningful hierarchical features are
extracted from a spectrogram. Such a hierarchical representation could be
useful for music transcription and source separation applications. We also
propose a network for language modeling.

133  133  Mutual information is copula entropy  We prove that mutual information is actually negative copula entropy, based
on which a method for mutual information estimation is proposed.

134  134  Building an interpretable fuzzy rule base from data using Orthogonal
Least Squares Application to a depollution problem  In many fields where human understanding plays a crucial role, such as
bioprocesses, the capacity of extracting knowledge from data is of critical
importance. Within this framework, fuzzy learning methods, if properly used,
can greatly help human experts. Amongst these methods, the aim of orthogonal
transformations, which have been proven to be mathematically robust, is to
build rules from a set of training data and to select the most important ones
by linear regression or rank revealing techniques. The OLS algorithm is a good
representative of those methods. However, it was originally designed so that it
only cared about numerical performance. Thus, we propose some modifications of
the original method to take interpretability into account. After recalling the
original algorithm, this paper presents the changes made to the original
method, then discusses some results obtained from benchmark problems. Finally,
the algorithm is applied to a realworld fault detection depollution problem.

135  135  MultiInstance MultiLabel Learning  In this paper, we propose the MIML (MultiInstance MultiLabel learning)
framework where an example is described by multiple instances and associated
with multiple class labels. Compared to traditional learning frameworks, the
MIML framework is more convenient and natural for representing complicated
objects which have multiple semantic meanings. To learn from MIML examples, we
propose the MimlBoost and MimlSvm algorithms based on a simple degeneration
strategy, and experiments show that solving problems involving complicated
objects with multiple semantic meanings in the MIML framework can lead to good
performance. Considering that the degeneration process may lose information, we
propose the DMimlSvm algorithm which tackles MIML problems directly in a
regularization framework. Moreover, we show that even when we do not have
access to the real objects and thus cannot capture more information from real
objects by using the MIML representation, MIML is still useful. We propose the
InsDif and SubCod algorithms. InsDif works by transforming singleinstances
into the MIML representation for learning, while SubCod works by transforming
singlelabel examples into the MIML representation for learning. Experiments
show that in some tasks they are able to achieve better performance than
learning the singleinstances or singlelabel examples directly.

136  136  A gametheoretic version of Oakes' example for randomized forecasting  Using the gametheoretic framework for probability, Vovk and Shafer. have
shown that it is always possible, using randomization, to make sequential
probability forecasts that pass any countable set of wellbehaved statistical
tests. This result generalizes work by other authors, who consider only tests
of calbration.
We complement this result with a lower bound. We show that Vovk and Shafer's
result is valid only when the forecasts are computed with unrestrictedly
increasing degree of accuracy.
When some level of discreteness is fixed, we present a gametheoretic
generalization of Oakes' example for randomized forecasting that is a test
failing any given method of deferministic forecasting; originally, this example
was presented for deterministic calibration.

137  137  A Variational Inference Framework for SoftInSoftOut Detection in
Multiple Access Channels  We propose a unified framework for deriving and studying softinsoftout
(SISO) detection in interference channels using the concept of variational
inference. The proposed framework may be used in multipleaccess interference
(MAI), intersymbol interference (ISI), and multipleinput multipleoutpu
(MIMO) channels. Without loss of generality, we will focus our attention on
turbo multiuser detection, to facilitate a more concrete discussion. It is
shown that, with some loss of optimality, variational inference avoids the
exponential complexity of a posteriori probability (APP) detection by
optimizing a closelyrelated, but much more manageable, objective function
called variational free energy. In addition to its systematic appeal, there are
several other advantages to this viewpoint. First of all, it provides unified
and rigorous justifications for numerous detectors that were proposed on
radically different grounds, and facilitates convenient joint detection and
decoding (utilizing the turbo principle) when errorcontrol codes are
incorporated. Secondly, efficient joint parameter estimation and data detection
is possible via the variational expectation maximization (EM) algorithm, such
that the detrimental effect of inaccurate channel knowledge at the receiver may
be dealt with systematically. We are also able to extend BPSKbased SISO
detection schemes to arbitrary square QAM constellations in a rigorous manner
using a variational argument.

138  138  A Uniform Approach to Analogies, Synonyms, Antonyms, and Associations  Recognizing analogies, synonyms, antonyms, and associations appear to be four
distinct tasks, requiring distinct NLP algorithms. In the past, the four tasks
have been treated independently, using a wide variety of algorithms. These four
semantic classes, however, are a tiny sample of the full range of semantic
phenomena, and we cannot afford to create ad hoc algorithms for each semantic
phenomenon; we need to seek a unified approach. We propose to subsume a broad
range of phenomena under analogies. To limit the scope of this paper, we
restrict our attention to the subsumption of synonyms, antonyms, and
associations. We introduce a supervised corpusbased machine learning algorithm
for classifying analogous word pairs, and we show that it can solve
multiplechoice SAT analogy questions, TOEFL synonym questions, ESL
synonymantonym questions, and similarassociatedboth questions from cognitive
psychology.

139  139  Quantum classification  Quantum classification is defined as the task of predicting the associated
class of an unknown quantum state drawn from an ensemble of pure states given a
finite number of copies of this state. By recasting the state discrimination
problem within the framework of Machine Learning (ML), we can use the notion of
learning reduction coming from classical ML to solve different variants of the
classification task, such as the weighted binary and the multiclass versions.

140  140  Principal Graphs and Manifolds  In many physical, statistical, biological and other investigations it is
desirable to approximate a system of points by objects of lower dimension
and/or complexity. For this purpose, Karl Pearson invented principal component
analysis in 1901 and found 'lines and planes of closest fit to system of
points'. The famous kmeans algorithm solves the approximation problem too, but
by finite sets instead of lines and planes. This chapter gives a brief
practical introduction into the methods of construction of general principal
objects, i.e. objects embedded in the 'middle' of the multidimensional data
set. As a basis, the unifying framework of mean squared distance approximation
of finite datasets is selected. Principal graphs and manifolds are constructed
as generalisations of principal components and kmeans principal points. For
this purpose, the family of expectation/maximisation algorithms with nearest
generalisations is presented. Construction of principal graphs with controlled
complexity is based on the graph grammar approach.

141  141  Entropy Concentration and the Empirical Coding Game  We give a characterization of Maximum Entropy/Minimum Relative Entropy
inference by providing two `strong entropy concentration' theorems. These
theorems unify and generalize Jaynes' `concentration phenomenon' and Van
Campenhout and Cover's `conditional limit theorem'. The theorems characterize
exactly in what sense a prior distribution Q conditioned on a given constraint,
and the distribution P, minimizing the relative entropy D(P Q) over all
distributions satisfying the constraint, are `close' to each other. We then
apply our theorems to establish the relationship between entropy concentration
and a gametheoretic characterization of Maximum Entropy Inference due to
Topsoe and others.

142  142  A New Framework of Multistage Estimation  In this paper, we have established a unified framework of multistage
parameter estimation. We demonstrate that a wide variety of statistical
problems such as fixedsamplesize interval estimation, point estimation with
error control, boundedwidth confidence intervals, interval estimation
following hypothesis testing, construction of confidence sequences, can be cast
into the general framework of constructing sequential random intervals with
prescribed coverage probabilities. We have developed exact methods for the
construction of such sequential random intervals in the context of multistage
sampling. In particular, we have established inclusion principle and coverage
tuning techniques to control and adjust the coverage probabilities of
sequential random intervals. We have obtained concrete sampling schemes which
are unprecedentedly efficient in terms of sampling effort as compared to
existing procedures.

143  143  Predictive Hypothesis Identification  While statistics focusses on hypothesis testing and on estimating (properties
of) the true sampling distribution, in machine learning the performance of
learning algorithms on future data is the primary issue. In this paper we
bridge the gap with a general principle (PHI) that identifies hypotheses with
best predictive performance. This includes predictive point and interval
estimation, simple and composite hypothesis testing, (mixture) model selection,
and others as special cases. For concrete instantiations we will recover
wellknown methods, variations thereof, and new ones. PHI nicely justifies,
reconciles, and blends (a reparametrization invariant variation of) MAP, ML,
MDL, and moment estimation. One particular feature of PHI is that it can
genuinely deal with nested hypotheses.

144  144  Exploring Large Feature Spaces with Hierarchical Multiple Kernel
Learning  For supervised and unsupervised learning, positive definite kernels allow to
use large and potentially infinite dimensional feature spaces with a
computational cost that only depends on the number of observations. This is
usually done through the penalization of predictor functions by Euclidean or
Hilbertian norms. In this paper, we explore penalizing by sparsityinducing
norms such as the l1norm or the block l1norm. We assume that the kernel
decomposes into a large sum of individual basis kernels which can be embedded
in a directed acyclic graph; we show that it is then possible to perform kernel
selection through a hierarchical multiple kernel learning framework, in
polynomial time in the number of selected kernels. This framework is naturally
applied to non linear variable selection; our extensive simulations on
synthetic datasets and datasets from the UCI repository show that efficiently
exploring the large feature space through sparsityinducing norms leads to
stateoftheart predictive performance.

145  145  When is there a representer theorem? Vector versus matrix regularizers  We consider a general class of regularization methods which learn a vector of
parameters on the basis of linear measurements. It is well known that if the
regularizer is a nondecreasing function of the inner product then the learned
vector is a linear combination of the input data. This result, known as the
{\em representer theorem}, is at the basis of kernelbased methods in machine
learning. In this paper, we prove the necessity of the above condition, thereby
completing the characterization of kernel methods based on regularization. We
further extend our analysis to regularization methods which learn a matrix, a
problem which is motivated by the application to multitask learning. In this
context, we study a more general representer theorem, which holds for a larger
class of regularizers. We provide a necessary and sufficient condition for
these class of matrix regularizers and highlight them with some concrete
examples of practical importance. Our analysis uses basic principles from
matrix theory, especially the useful notion of matrix nondecreasing function.

146  146  Low congestion online routing and an improved mistake bound for online
prediction of graph labeling  In this paper, we show a connection between a certain online lowcongestion
routing problem and an online prediction of graph labeling. More specifically,
we prove that if there exists a routing scheme that guarantees a congestion of
$\alpha$ on any edge, there exists an online prediction algorithm with mistake
bound $\alpha$ times the cut size, which is the size of the cut induced by the
label partitioning of graph vertices. With previous known bound of $O(\log n)$
for $\alpha$ for the routing problem on trees with $n$ vertices, we obtain an
improved prediction algorithm for graphs with high effective resistance.
In contrast to previous approaches that move the graph problem into problems
in vector space using graph Laplacian and rely on the analysis of the
perceptron algorithm, our proof are purely combinatorial. Further more, our
approach directly generalizes to the case where labels are not binary.

147  147  Clustered MultiTask Learning: A Convex Formulation  In multitask learning several related tasks are considered simultaneously,
with the hope that by an appropriate sharing of information across tasks, each
task may benefit from the others. In the context of learning linear functions
for supervised classification or regression, this can be achieved by including
a priori information about the weight vectors associated with the tasks, and
how they are expected to be related to each other. In this paper, we assume
that tasks are clustered into groups, which are unknown beforehand, and that
tasks within a group have similar weight vectors. We design a new spectral norm
that encodes this a priori assumption, without the prior knowledge of the
partition of tasks into groups, resulting in a new convex optimization
formulation for multitask learning. We show in simulations on synthetic
examples and on the IEDB MHCI binding dataset, that our approach outperforms
wellknown convex methods for multitask learning, as well as related non
convex methods dedicated to the same problem.

148  148  Algorithmic information theory  We introduce algorithmic information theory, also known as the theory of
Kolmogorov complexity. We explain the main concepts of this quantitative
approach to defining `information'. We discuss the extent to which Kolmogorov's
and Shannon's information theory have a common purpose, and where they are
fundamentally different. We indicate how recent developments within the theory
allow one to formally distinguish between `structural' (meaningful) and
`random' information as measured by the Kolmogorov structure function, which
leads to a mathematical formalization of Occam's razor in inductive inference.
We end by discussing some of the philosophical implications of the theory.

149  149  Predicting Abnormal Returns From News Using Text Classification  We show how text from news articles can be used to predict intraday price
movements of financial assets using support vector machines. Multiple kernel
learning is used to combine equity returns with text as predictive features to
increase classification performance and we develop an analytic center cutting
plane method to solve the kernel learning problem efficiently. We observe that
while the direction of returns is not predictable using either text or returns,
their size is, with text features producing significantly better performance
than historical returns alone.

150  150  A New Framework of Multistage Hypothesis Tests  In this paper, we have established a general framework of multistage
hypothesis tests which applies to arbitrarily many mutually exclusive and
exhaustive composite hypotheses. Within the new framework, we have constructed
specific multistage tests which rigorously control the risk of committing
decision errors and are more efficient than previous tests in terms of average
sample number and the number of sampling operations. Without truncation, the
sample numbers of our testing plans are absolutely bounded.

151  151  Generalized Prediction Intervals for Arbitrary Distributed
HighDimensional Data  This paper generalizes the traditional statistical concept of prediction
intervals for arbitrary probability density functions in highdimensional
feature spaces by introducing significance level distributions, which provides
intervalindependent probabilities for continuous random variables. The
advantage of the transformation of a probability density function into a
significance level distribution is that it enables oneclass classification or
outlier detection in a direct manner.

152  152  Robust NearIsometric Matching via Structured Learning of Graphical
Models  Models for nearrigid shape matching are typically based on distancerelated
features, in order to infer matches that are consistent with the isometric
assumption. However, real shapes from image datasets, even when expected to be
related by "almost isometric" transformations, are actually subject not only to
noise but also, to some limited degree, to variations in appearance and scale.
In this paper, we introduce a graphical model that parameterises appearance,
distance, and angle features and we learn all of the involved parameters via
structured prediction. The outcome is a model for nearrigid shape matching
which is robust in the sense that it is able to capture the possibly limited
but still important scale and appearance variations. Our experimental results
reveal substantial improvements upon recent successful models, while
maintaining similar running times.

153  153  Learning Hidden Markov Models using NonNegative Matrix Factorization  The BaumWelsh algorithm together with its derivatives and variations has
been the main technique for learning Hidden Markov Models (HMM) from
observational data. We present an HMM learning algorithm based on the
nonnegative matrix factorization (NMF) of higher order Markovian statistics
that is structurally different from the BaumWelsh and its associated
approaches. The described algorithm supports estimation of the number of
recurrent states of an HMM and iterates the nonnegative matrix factorization
(NMF) algorithm to improve the learned HMM parameters. Numerical examples are
provided as well.

154  154  Surrogate Learning  An Approach for SemiSupervised Classification  We consider the task of learning a classifier from the feature space
$\mathcal{X}$ to the set of classes $\mathcal{Y} = \{0, 1\}$, when the features
can be partitioned into classconditionally independent feature sets
$\mathcal{X}_1$ and $\mathcal{X}_2$. We show the surprising fact that the
classconditional independence can be used to represent the original learning
task in terms of 1) learning a classifier from $\mathcal{X}_2$ to
$\mathcal{X}_1$ and 2) learning the classconditional distribution of the
feature set $\mathcal{X}_1$. This fact can be exploited for semisupervised
learning because the former task can be accomplished purely from unlabeled
samples. We present experimental evaluation of the idea in two real world
applications.

155  155  MultiArmed Bandits in Metric Spaces  In a multiarmed bandit problem, an online algorithm chooses from a set of
strategies in a sequence of trials so as to maximize the total payoff of the
chosen strategies. While the performance of bandit algorithms with a small
finite strategy set is quite well understood, bandit problems with large
strategy sets are still a topic of very active investigation, motivated by
practical applications such as online auctions and web advertisement. The goal
of such research is to identify broad and natural classes of strategy sets and
payoff functions which enable the design of efficient solutions. In this work
we study a very general setting for the multiarmed bandit problem in which the
strategies form a metric space, and the payoff function satisfies a Lipschitz
condition with respect to the metric. We refer to this problem as the
"Lipschitz MAB problem". We present a complete solution for the multiarmed
problem in this setting. That is, for every metric space (L,X) we define an
isometry invariant which bounds from below the performance of Lipschitz MAB
algorithms for X, and we present an algorithm which comes arbitrarily close to
meeting this bound. Furthermore, our technique gives even better results for
benign payoff functions.

156  156  Thresholded Basis Pursuit: An LP Algorithm for Achieving Optimal Support
Recovery for Sparse and Approximately Sparse Signals from Noisy Random
Measurements  In this paper we present a linear programming solution for sign pattern
recovery of a sparse signal from noisy random projections of the signal. We
consider two types of noise models, input noise, where noise enters before the
random projection; and output noise, where noise enters after the random
projection. Sign pattern recovery involves the estimation of sign pattern of a
sparse signal. Our idea is to pretend that no noise exists and solve the
noiseless $\ell_1$ problem, namely, $\min \\beta\_1 ~ s.t. ~ y=G \beta$ and
quantizing the resulting solution. We show that the quantized solution
perfectly reconstructs the sign pattern of a sufficiently sparse signal.
Specifically, we show that the sign pattern of an arbitrary ksparse,
ndimensional signal $x$ can be recovered with $SNR=\Omega(\log n)$ and
measurements scaling as $m= \Omega(k \log{n/k})$ for all sparsity levels $k$
satisfying $0< k \leq \alpha n$, where $\alpha$ is a sufficiently small
positive constant. Surprisingly, this bound matches the optimal
\emph{MaxLikelihood} performance bounds in terms of $SNR$, required number of
measurements, and admissible sparsity level in an orderwise sense. In contrast
to our results, previous results based on LASSO and MaxCorrelation techniques
either assume significantly larger $SNR$, sublinear sparsity levels or
restrictive assumptions on signal sets. Our proof technique is based on noisy
perturbation of the noiseless $\ell_1$ problem, in that, we estimate the
maximum admissible noise level before sign pattern recovery fails.

157  157  BiasVariance Techniques for Monte Carlo Optimization: Crossvalidation
for the CE Method  In this paper, we examine the CE method in the broad context of Monte Carlo
Optimization (MCO) and Parametric Learning (PL), a type of machine learning. A
wellknown overarching principle used to improve the performance of many PL
algorithms is the biasvariance tradeoff. This tradeoff has been used to
improve PL algorithms ranging from Monte Carlo estimation of integrals, to
linear estimation, to general statistical estimation. Moreover, as described
by, MCO is very closely related to PL. Owing to this similarity, the
biasvariance tradeoff affects MCO performance, just as it does PL performance.
In this article, we exploit the biasvariance tradeoff to enhance the
performance of MCO algorithms. We use the technique of crossvalidation, a
technique based on the biasvariance tradeoff, to significantly improve the
performance of the Cross Entropy (CE) method, which is an MCO algorithm. In
previous work we have confirmed that other PL techniques improve the perfomance
of other MCO algorithms. We conclude that the many techniques pioneered in PL
could be investigated as ways to improve MCO algorithms in general, and the CE
method in particular.

158  158  Blind Cognitive MAC Protocols  We consider the design of cognitive Medium Access Control (MAC) protocols
enabling an unlicensed (secondary) transmitterreceiver pair to communicate
over the idle periods of a set of licensed channels, i.e., the primary network.
The objective is to maximize data throughput while maintaining the
synchronization between secondary users and avoiding interference with licensed
(primary) users. No statistical information about the primary traffic is
assumed to be available apriori to the secondary user. We investigate two
distinct sensing scenarios. In the first, the secondary transmitter is capable
of sensing all the primary channels, whereas it senses one channel only in the
second scenario. In both cases, we propose MAC protocols that efficiently learn
the statistics of the primary traffic online. Our simulation results
demonstrate that the proposed blind protocols asymptotically achieve the
throughput obtained when prior knowledge of primary traffic statistics is
available.

159  159  A Gaussian Belief Propagation Solver for Large Scale Support Vector
Machines  Support vector machines (SVMs) are an extremely successful type of
classification and regression algorithms. Building an SVM entails solving a
constrained convex quadratic programming problem, which is quadratic in the
number of training samples. We introduce an efficient parallel implementation
of an support vector regression solver, based on the Gaussian Belief
Propagation algorithm (GaBP).
In this paper, we demonstrate that methods from the complex system domain
could be utilized for performing efficient distributed computation. We compare
the proposed algorithm to previously proposed distributed and singlenode SVM
solvers. Our comparison shows that the proposed algorithm is just as accurate
as these solvers, while being significantly faster, especially for large
datasets. We demonstrate scalability of the proposed algorithm to up to 1,024
computing nodes and hundreds of thousands of data points using an IBM Blue Gene
supercomputer. As far as we know, our work is the largest parallel
implementation of belief propagation ever done, demonstrating the applicability
of this algorithm for large scale distributed computing systems.

160  160  Faster and better: a machine learning approach to corner detection  The repeatability and efficiency of a corner detector determines how likely
it is to be useful in a realworld application. The repeatability is importand
because the same scene viewed from different positions should yield features
which correspond to the same realworld 3D locations [Schmid et al 2000]. The
efficiency is important because this determines whether the detector combined
with further processing can operate at frame rate.
Three advances are described in this paper. First, we present a new heuristic
for feature detection, and using machine learning we derive a feature detector
from this which can fully process live PAL video using less than 5% of the
available processing time. By comparison, most other detectors cannot even
operate at frame rate (Harris detector 115%, SIFT 195%). Second, we generalize
the detector, allowing it to be optimized for repeatability, with little loss
of efficiency. Third, we carry out a rigorous comparison of corner detectors
based on the above repeatability criterion applied to 3D scenes. We show that
despite being principally constructed for speed, on these stringent tests, our
heuristic detector significantly outperforms existing feature detectors.
Finally, the comparison demonstrates that using machine learning produces
significant improvements in repeatability, yielding a detector that is both
very fast and very high quality.

161  161  A Simple Linear Ranking Algorithm Using Query Dependent Intercept
Variables  The LETOR website contains three information retrieval datasets used as a
benchmark for testing machine learning ideas for ranking. Algorithms
participating in the challenge are required to assign score values to search
results for a collection of queries, and are measured using standard IR ranking
measures (NDCG, precision, MAP) that depend only the relative scoreinduced
order of the results. Similarly to many of the ideas proposed in the
participating algorithms, we train a linear classifier. In contrast with other
participating algorithms, we define an additional free variable (intercept, or
benchmark) for each query. This allows expressing the fact that results for
different queries are incomparable for the purpose of determining relevance.
The cost of this idea is the addition of relatively few nuisance parameters.
Our approach is simple, and we used a standard logistic regression library to
test it. The results beat the reported participating algorithms. Hence, it
seems promising to combine our approach with other more complex ideas.

162  162  The many faces of optimism  Extended version  The explorationexploitation dilemma has been an intriguing and unsolved
problem within the framework of reinforcement learning. "Optimism in the face
of uncertainty" and model building play central roles in advanced exploration
methods. Here, we integrate several concepts and obtain a fast and simple
algorithm. We show that the proposed algorithm finds a nearoptimal policy in
polynomial time, and give experimental evidence that it is robust and efficient
compared to its ascendants.

163  163  The use of entropy to measure structural diversity  In this paper entropy based methods are compared and used to measure
structural diversity of an ensemble of 21 classifiers. This measure is mostly
applied in ecology, whereby species counts are used as a measure of diversity.
The measures used were Shannon entropy, Simpsons and the Berger Parker
diversity indexes. As the diversity indexes increased so did the accuracy of
the ensemble. An ensemble dominated by classifiers with the same structure
produced poor accuracy. Uncertainty rule from information theory was also used
to further define diversity. Genetic algorithms were used to find the optimal
ensemble by using the diversity indices as the cost function. The method of
voting was used to aggregate the decisions.

164  164  A Minimum Relative Entropy Principle for Learning and Acting  This paper proposes a method to construct an adaptive agent that is universal
with respect to a given class of experts, where each expert is an agent that
has been designed specifically for a particular environment. This adaptive
control problem is formalized as the problem of minimizing the relative entropy
of the adaptive agent from the expert that is most suitable for the unknown
environment. If the agent is a passive observer, then the optimal solution is
the wellknown Bayesian predictor. However, if the agent is active, then its
past actions need to be treated as causal interventions on the I/O stream
rather than normal probability conditions. Here it is shown that the solution
to this new variational problem is given by a stochastic controller called the
Bayesian control rule, which implements adaptive behavior as a mixture of
experts. Furthermore, it is shown that under mild assumptions, the Bayesian
control rule converges to the control law of the most suitable expert.

165  165  Quantum reinforcement learning  The key approaches for machine learning, especially learning in unknown
probabilistic environments are new representations and computation mechanisms.
In this paper, a novel quantum reinforcement learning (QRL) method is proposed
by combining quantum theory and reinforcement learning (RL). Inspired by the
state superposition principle and quantum parallelism, a framework of value
updating algorithm is introduced. The state (action) in traditional RL is
identified as the eigen state (eigen action) in QRL. The state (action) set can
be represented with a quantum superposition state and the eigen state (eigen
action) can be obtained by randomly observing the simulated quantum state
according to the collapse postulate of quantum measurement. The probability of
the eigen action is determined by the probability amplitude, which is
parallelly updated according to rewards. Some related characteristics of QRL
such as convergence, optimality and balancing between exploration and
exploitation are also analyzed, which shows that this approach makes a good
tradeoff between exploration and exploitation using the probability amplitude
and can speed up learning through the quantum parallelism. To evaluate the
performance and practicability of QRL, several simulated experiments are given
and the results demonstrate the effectiveness and superiority of QRL algorithm
for some complex problems. The present work is also an effective exploration on
the application of quantum computation to artificial intelligence.

166  166  Efficient Exact Inference in Planar Ising Models  We give polynomialtime algorithms for the exact computation of lowestenergy
(ground) states, worst margin violators, log partition functions, and marginal
edge probabilities in certain binary undirected graphical models. Our approach
provides an interesting alternative to the wellknown graph cut paradigm in
that it does not impose any submodularity constraints; instead we require
planarity to establish a correspondence with perfect matchings (dimer
coverings) in an expanded dual graph. We implement a unified framework while
delegating complex but wellunderstood subproblems (planar embedding,
maximumweight perfect matching) to established algorithms for which efficient
implementations are freely available. Unlike graph cut methods, we can perform
penalized maximumlikelihood as well as maximummargin parameter estimation in
the associated conditional random fields (CRFs), and employ marginal posterior
probabilities as well as maximum a posteriori (MAP) states for prediction.
Maximummargin CRF parameter estimation on image denoising and segmentation
problems shows our approach to be efficient and effective. A C++ implementation
is available from http://nic.schraudolph.org/isinf/

167  167  Learning Isometric Separation Maps  Maximum Variance Unfolding (MVU) and its variants have been very successful
in embedding datamanifolds in lower dimensional spaces, often revealing the
true intrinsic dimension. In this paper we show how to also incorporate
supervised class information into an MVUlike method without breaking its
convexity. We call this method the Isometric Separation Map and we show that
the resulting kernel matrix can be used as a binary/multiclass Support Vector
Machinelike method in a semisupervised (transductive) framework. We also show
that the method always finds a kernel matrix that linearly separates the
training data exactly without projecting them in infinite dimensional spaces.
In traditional SVMs we choose a kernel and hope that the data become linearly
separable in the kernel space. In this paper we show how the hyperplane can be
chosen adhoc and the kernel is trained so that data are always linearly
separable. Comparisons with Large Margin SVMs show comparable performance.

168  168  A Novel Clustering Algorithm Based on a Modified Model of Random Walk  We introduce a modified model of random walk, and then develop two novel
clustering algorithms based on it. In the algorithms, each data point in a
dataset is considered as a particle which can move at random in space according
to the preset rules in the modified model. Further, this data point may be also
viewed as a local control subsystem, in which the controller adjusts its
transition probability vector in terms of the feedbacks of all data points, and
then its transition direction is identified by an eventgenerating function.
Finally, the positions of all data points are updated. As they move in space,
data points collect gradually and some separating parts emerge among them
automatically. As a consequence, data points that belong to the same class are
located at a same position, whereas those that belong to different classes are
away from one another. Moreover, the experimental results have demonstrated
that data points in the test datasets are clustered reasonably and efficiently,
and the comparison with other algorithms also provides an indication of the
effectiveness of the proposed algorithms.

169  169  A Theory of Truncated Inverse Sampling  In this paper, we have established a new framework of truncated inverse
sampling for estimating mean values of nonnegative random variables such as
binomial, Poisson, hypergeometrical, and bounded variables. We have derived
explicit formulas and computational methods for designing sampling schemes to
ensure prescribed levels of precision and confidence for point estimators.
Moreover, we have developed interval estimation methods.

170  170  A branchandbound feature selection algorithm for Ushaped cost
functions  This paper presents the formulation of a combinatorial optimization problem
with the following characteristics: i.the search space is the power set of a
finite set structured as a Boolean lattice; ii.the cost function forms a
Ushaped curve when applied to any lattice chain. This formulation applies for
feature selection in the context of pattern recognition. The known approaches
for this problem are branchandbound algorithms and heuristics, that explore
partially the search space. Branchandbound algorithms are equivalent to the
full search, while heuristics are not. This paper presents a branchandbound
algorithm that differs from the others known by exploring the lattice structure
and the Ushaped chain curves of the search space. The main contribution of
this paper is the architecture of this algorithm that is based on the
representation and exploration of the search space by new lattice properties
proven here. Several experiments, with well known public data, indicate the
superiority of the proposed method to SFFS, which is a popular heuristic that
gives good results in very short computational time. In all experiments, the
proposed method got better or equal results in similar or even smaller
computational time.

171  171  Temporal Difference Updating without a Learning Rate  We derive an equation for temporal difference learning from statistical
principles. Specifically, we start with the variational principle and then
bootstrap to produce an updating rule for discounted state value estimates. The
resulting equation is similar to the standard equation for temporal difference
learning with eligibility traces, so called TD(lambda), however it lacks the
parameter alpha that specifies the learning rate. In the place of this free
parameter there is now an equation for the learning rate that is specific to
each state transition. We experimentally test this new learning rule against
TD(lambda) and find that it offers superior performance in various settings.
Finally, we make some preliminary investigations into how to extend our new
temporal difference algorithm to reinforcement learning. To do this we combine
our update equation with both Watkins' Q(lambda) and Sarsa(lambda) and find
that it again offers superior performance without a learning rate parameter.

172  172  On the Possibility of Learning in Reactive Environments with Arbitrary
Dependence  We address the problem of reinforcement learning in which observations may
exhibit an arbitrary form of stochastic dependence on past observations and
actions, i.e. environments more general than (PO)MDPs. The task for an agent is
to attain the best possible asymptotic reward where the true generating
environment is unknown but belongs to a known countable family of environments.
We find some sufficient conditions on the class of environments under which an
agent exists which attains the best asymptotic reward for any environment in
the class. We analyze how tight these conditions are and how they relate to
different probabilistic assumptions known in reinforcement learning and related
fields, such as Markov Decision Processes and mixing conditions.

173  173  Entropy, Perception, and Relativity  In this paper, I expand Shannon's definition of entropy into a new form of
entropy that allows integration of information from different random events.
Shannon's notion of entropy is a special case of my more general definition of
entropy. I define probability using a socalled performance function, which is
de facto an exponential distribution. Assuming that my general notion of
entropy reflects the true uncertainty about a probabilistic event, I understand
that our perceived uncertainty differs. I claim that our perception is the
result of two opposing forces similar to the two famous antagonists in Chinese
philosophy: Yin and Yang. Based on this idea, I show that our perceived
uncertainty matches the true uncertainty in points determined by the golden
ratio. I demonstrate that the wellknown sigmoid function, which we typically
employ in artificial neural networks as a nonlinear threshold function,
describes the actual performance. Furthermore, I provide a motivation for the
time dilation in Einstein's Special Relativity, basically claiming that
although time dilation conforms with our perception, it does not correspond to
reality. At the end of the paper, I show how to apply this theoretical
framework to practical applications. I present recognition rates for a pattern
recognition problem, and also propose a network architecture that can take
advantage of general entropy to solve complex decision problems.

174  174  Effect of Tuned Parameters on a LSA MCQ Answering Model  This paper presents the current state of a work in progress, whose objective
is to better understand the effects of factors that significantly influence the
performance of Latent Semantic Analysis (LSA). A difficult task, which consists
in answering (French) biology Multiple Choice Questions, is used to test the
semantic properties of the truncated singular space and to study the relative
influence of main parameters. A dedicated software has been designed to fine
tune the LSA semantic space for the Multiple Choice Questions task. With
optimal parameters, the performances of our simple model are quite surprisingly
equal or superior to those of 7th and 8th grades students. This indicates that
semantic spaces were quite good despite their low dimensions and the small
sizes of training data sets. Besides, we present an original entropy global
weighting of answers' terms of each question of the Multiple Choice Questions
which was necessary to achieve the model's success.

175  175  Adaptive Base Class Boost for Multiclass Classification  We develop the concept of ABCBoost (Adaptive Base Class Boost) for
multiclass classification and present ABCMART, a concrete implementation of
ABCBoost. The original MART (Multiple Additive Regression Trees) algorithm has
been very successful in largescale applications. For binary classification,
ABCMART recovers MART. For multiclass classification, ABCMART considerably
improves MART, as evaluated on several public data sets.

176  176  Stability Bound for Stationary Phimixing and Betamixing Processes  Most generalization bounds in learning theory are based on some measure of
the complexity of the hypothesis class used, independently of any algorithm. In
contrast, the notion of algorithmic stability can be used to derive tight
generalization bounds that are tailored to specific learning algorithms by
exploiting their particular properties. However, as in much of learning theory,
existing stability analyses and bounds apply only in the scenario where the
samples are independently and identically distributed. In many machine learning
applications, however, this assumption does not hold. The observations received
by the learning algorithm often have some inherent temporal dependence.
This paper studies the scenario where the observations are drawn from a
stationary phimixing or betamixing sequence, a widely adopted assumption in
the study of noni.i.d. processes that implies a dependence between
observations weakening over time. We prove novel and distinct stabilitybased
generalization bounds for stationary phimixing and betamixing sequences.
These bounds strictly generalize the bounds given in the i.i.d. case and apply
to all stable learning algorithms, thereby extending the use of
stabilitybounds to noni.i.d. scenarios.
We also illustrate the application of our phimixing generalization bounds to
general classes of learning algorithms, including Support Vector Regression,
Kernel Ridge Regression, and Support Vector Machines, and many other kernel
regularizationbased and relative entropybased regularization algorithms.
These novel bounds can thus be viewed as the first theoretical basis for the
use of these algorithms in noni.i.d. scenarios.

177  177  Robust Regression and Lasso  Lasso, or $\ell^1$ regularized least squares, has been explored extensively
for its remarkable sparsity properties. It is shown in this paper that the
solution to Lasso, in addition to its sparsity, has robustness properties: it
is the solution to a robust optimization problem. This has two important
consequences. First, robustness provides a connection of the regularizer to a
physical property, namely, protection from noise. This allows a principled
selection of the regularizer, and in particular, generalizations of Lasso that
also yield convex optimization problems are obtained by considering different
uncertainty sets.
Secondly, robustness can itself be used as an avenue to exploring different
properties of the solution. In particular, it is shown that robustness of the
solution explains why the solution is sparse. The analysis as well as the
specific results obtained differ from standard sparsity results, providing
different geometric intuition. Furthermore, it is shown that the robust
optimization formulation is related to kernel density estimation, and based on
this approach, a proof that Lasso is consistent is given using robustness
directly. Finally, a theorem saying that sparsity and algorithmic stability
contradict each other, and hence Lasso is not stable, is presented.

178  178  Land Cover Mapping Using Ensemble Feature Selection Methods  Ensemble classification is an emerging approach to land cover mapping whereby
the final classification output is a result of a consensus of classifiers.
Intuitively, an ensemble system should consist of base classifiers which are
diverse i.e. classifiers whose decision boundaries err differently. In this
paper ensemble feature selection is used to impose diversity in ensembles. The
features of the constituent base classifiers for each ensemble were created
through an exhaustive search algorithm using different separability indices.
For each ensemble, the classification accuracy was derived as well as a
diversity measure purported to give a measure of the inensemble diversity. The
correlation between ensemble classification accuracy and diversity measure was
determined to establish the interplay between the two variables. From the
findings of this paper, diversity measures as currently formulated do not
provide an adequate means upon which to constitute ensembles for land cover
mapping.

179  179  A Spectral Algorithm for Learning Hidden Markov Models  Hidden Markov Models (HMMs) are one of the most fundamental and widely used
statistical tools for modeling discrete time series. In general, learning HMMs
from data is computationally hard (under cryptographic assumptions), and
practitioners typically resort to search heuristics which suffer from the usual
local optima issues. We prove that under a natural separation condition (bounds
on the smallest singular value of the HMM parameters), there is an efficient
and provably correct algorithm for learning HMMs. The sample complexity of the
algorithm does not explicitly depend on the number of distinct (discrete)
observationsit implicitly depends on this quantity through spectral
properties of the underlying HMM. This makes the algorithm particularly
applicable to settings with a large number of observations, such as those in
natural language processing where the space of observation is sometimes the
words in a language. The algorithm is also simple, employing only a singular
value decomposition and matrix multiplications.

180  180  Learning ClassLevel Bayes Nets for Relational Data  Many databases store data in relational format, with different types of
entities and information about links between the entities. The field of
statisticalrelational learning (SRL) has developed a number of new statistical
models for such data. In this paper we focus on learning classlevel or
firstorder dependencies, which model the general database statistics over
attributes of linked objects and links (e.g., the percentage of A grades given
in computer science classes). Classlevel statistical relationships are
important in themselves, and they support applications like policy making,
strategic planning, and query optimization. Most current SRL methods find
classlevel dependencies, but their main task is to support instancelevel
predictions about the attributes or links of specific entities. We focus only
on classlevel prediction, and describe algorithms for learning classlevel
models that are orders of magnitude faster for this task. Our algorithms learn
Bayes nets with relational structure, leveraging the efficiency of singletable
nonrelational Bayes net learners. An evaluation of our methods on three data
sets shows that they are computationally feasible for realistic table sizes,
and that the learned structures represent the statistical information in the
databases well. After learning compiles the database statistics into a Bayes
net, querying these statistics via Bayes net inference is faster than with SQL
queries, and does not depend on the size of the database.

181  181  kmeans requires exponentially many iterations even in the plane  The kmeans algorithm is a wellknown method for partitioning n points that
lie in the ddimensional space into k clusters. Its main features are
simplicity and speed in practice. Theoretically, however, the best known upper
bound on its running time (i.e. O(n^{kd})) can be exponential in the number of
points. Recently, Arthur and Vassilvitskii [3] showed a superpolynomial
worstcase analysis, improving the best known lower bound from \Omega(n) to
2^{\Omega(\sqrt{n})} with a construction in d=\Omega(\sqrt{n}) dimensions. In
[3] they also conjectured the existence of superpolynomial lower bounds for any
d >= 2.
Our contribution is twofold: we prove this conjecture and we improve the
lower bound, by presenting a simple construction in the plane that leads to the
exponential lower bound 2^{\Omega(n)}.

182  182  Approximation Algorithms for Bregman Coclustering and Tensor Clustering  In the past few years powerful generalizations to the Euclidean kmeans
problem have been made, such as Bregman clustering [7], coclustering (i.e.,
simultaneous clustering of rows and columns of an input matrix) [9,18], and
tensor clustering [8,34]. Like kmeans, these more general problems also suffer
from the NPhardness of the associated optimization. Researchers have developed
approximation algorithms of varying degrees of sophistication for kmeans,
kmedians, and more recently also for Bregman clustering [2]. However, there
seem to be no approximation algorithms for Bregman co and tensor clustering.
In this paper we derive the first (to our knowledge) guaranteed methods for
these increasingly important clustering settings. Going beyond Bregman
divergences, we also prove an approximation factor for tensor clustering with
arbitrary separable metrics. Through extensive experiments we evaluate the
characteristics of our method, and show that it also has practical impact.

183  183  A Novel Clustering Algorithm Based on Quantum Games  Enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum game with the problem of data
clustering, and then develop a quantumgamebased clustering algorithm, in
which data points in a dataset are considered as players who can make decisions
and implement quantum strategies in quantum games. After each round of a
quantum game, each player's expected payoff is calculated. Later, he uses a
linkremovingandrewiring (LRR) function to change his neighbors and adjust
the strength of links connecting to them in order to maximize his payoff.
Further, algorithms are discussed and analyzed in two cases of strategies, two
payoff matrixes and two LRR functions. Consequently, the simulation results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms have fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.

184  184  Decision trees are PAClearnable from most product distributions: a
smoothed analysis  We consider the problem of PAClearning decision trees, i.e., learning a
decision tree over the ndimensional hypercube from independent random labeled
examples. Despite significant effort, no polynomialtime algorithm is known for
learning polynomialsized decision trees (even trees of any superconstant
size), even when examples are assumed to be drawn from the uniform distribution
on {0,1}^n. We give an algorithm that learns arbitrary polynomialsized
decision trees for {\em most product distributions}. In particular, consider a
random product distribution where the bias of each bit is chosen independently
and uniformly from, say, [.49,.51]. Then with high probability over the
parameters of the product distribution and the random examples drawn from it,
the algorithm will learn any tree. More generally, in the spirit of smoothed
analysis, we consider an arbitrary product distribution whose parameters are
specified only up to a [c,c] accuracy (perturbation), for an arbitrarily small
positive constant c.

185  185  Uncovering protein interaction in abstracts and text using a novel
linear model and word proximity networks  We participated in three of the proteinprotein interaction subtasks of the
Second BioCreative Challenge: classification of abstracts relevant for
proteinprotein interaction (IAS), discovery of protein pairs (IPS) and text
passages characterizing protein interaction (ISS) in full text documents. We
approached the abstract classification task with a novel, lightweight linear
model inspired by spamdetection techniques, as well as an uncertaintybased
integration scheme. We also used a Support Vector Machine and the Singular
Value Decomposition on the same features for comparison purposes. Our approach
to the full text subtasks (protein pair and passage identification) includes a
feature expansion method based on wordproximity networks. Our approach to the
abstract classification task (IAS) was among the top submissions for this task
in terms of the measures of performance used in the challenge evaluation
(accuracy, Fscore and AUC). We also report on a webtool we produced using our
approach: the Protein Interaction Abstract Relevance Evaluator (PIARE). Our
approach to the full text tasks resulted in one of the highest recall rates as
well as mean reciprocal rank of correct passages. Our approach to abstract
classification shows that a simple linear model, using relatively few features,
is capable of generalizing and uncovering the conceptual nature of
proteinprotein interaction from the bibliome. Since the novel approach is
based on a very lightweight linear model, it can be easily ported and applied
to similar problems. In full text problems, the expansion of word features with
wordproximity networks is shown to be useful, though the need for some
improvements is discussed.

186  186  Decomposition Principles and Online Learning in CrossLayer Optimization
for DelaySensitive Applications  In this paper, we propose a general crosslayer optimization framework in
which we explicitly consider both the heterogeneous and dynamically changing
characteristics of delaysensitive applications and the underlying timevarying
network conditions. We consider both the independently decodable data units
(DUs, e.g. packets) and the interdependent DUs whose dependencies are captured
by a directed acyclic graph (DAG). We first formulate the crosslayer design as
a nonlinear constrained optimization problem by assuming complete knowledge of
the application characteristics and the underlying network conditions. The
constrained crosslayer optimization is decomposed into several crosslayer
optimization subproblems for each DU and two master problems. The proposed
decomposition method determines the necessary message exchanges between layers
for achieving the optimal crosslayer solution. However, the attributes (e.g.
distortion impact, delay deadline etc) of future DUs as well as the network
conditions are often unknown in the considered realtime applications. The
impact of current crosslayer actions on the future DUs can be characterized by
a statevalue function in the Markov decision process (MDP) framework. Based on
the dynamic programming solution to the MDP, we develop a lowcomplexity
crosslayer optimization algorithm using online learning for each DU
transmission. This online algorithm can be implemented in realtime in order to
cope with unknown source characteristics, network dynamics and resource
constraints. Our numerical results demonstrate the efficiency of the proposed
online algorithm.

187  187  A Novel Clustering Algorithm Based on Quantum Random Walk  The enormous successes have been made by quantum algorithms during the last
decade. In this paper, we combine the quantum random walk (QRW) with the
problem of data clustering, and develop two clustering algorithms based on the
one dimensional QRW. Then, the probability distributions on the positions
induced by QRW in these algorithms are investigated, which also indicates the
possibility of obtaining better results. Consequently, the experimental results
have demonstrated that data points in datasets are clustered reasonably and
efficiently, and the clustering algorithms are of fast rates of convergence.
Moreover, the comparison with other algorithms also provides an indication of
the effectiveness of the proposed approach.

188  188  Convex Sparse Matrix Factorizations  We present a convex formulation of dictionary learning for sparse signal
decomposition. Convexity is obtained by replacing the usual explicit upper
bound on the dictionary size by a convex rankreducing term similar to the
trace norm. In particular, our formulation introduces an explicit tradeoff
between size and sparsity of the decomposition of rectangular matrices. Using a
large set of synthetic examples, we compare the estimation abilities of the
convex and nonconvex approaches, showing that while the convex formulation has
a single local minimum, this may lead in some cases to performance which is
inferior to the local minima of the nonconvex formulation.

189  189  Characterizing Truthful MultiArmed Bandit Mechanisms  We consider a multiround auction setting motivated by payperclick auctions
for Internet advertising. In each round the auctioneer selects an advertiser
and shows her ad, which is then either clicked or not. An advertiser derives
value from clicks; the value of a click is her private information. Initially,
neither the auctioneer nor the advertisers have any information about the
likelihood of clicks on the advertisements. The auctioneer's goal is to design
a (dominant strategies) truthful mechanism that (approximately) maximizes the
social welfare.
If the advertisers bid their true private values, our problem is equivalent
to the "multiarmed bandit problem", and thus can be viewed as a strategic
version of the latter. In particular, for both problems the quality of an
algorithm can be characterized by "regret", the difference in social welfare
between the algorithm and the benchmark which always selects the same "best"
advertisement. We investigate how the design of multiarmed bandit algorithms
is affected by the restriction that the resulting mechanism must be truthful.
We find that truthful mechanisms have certain strong structural properties 
essentially, they must separate exploration from exploitation  and they incur
much higher regret than the optimal multiarmed bandit algorithms. Moreover, we
provide a truthful mechanism which (essentially) matches our lower bound on
regret.

190  190  Feature Selection By KDDA For SVMBased MultiView Face Recognition  Applications such as face recognition that deal with highdimensional data
need a mapping technique that introduces representation of lowdimensional
features with enhanced discriminatory power and a proper classifier, able to
classify those complex features. Most of traditional Linear Discriminant
Analysis suffer from the disadvantage that their optimality criteria are not
directly related to the classification ability of the obtained feature
representation. Moreover, their classification accuracy is affected by the
"small sample size" problem which is often encountered in FR tasks. In this
short paper, we combine nonlinear kernel based mapping of data called KDDA with
Support Vector machine classifier to deal with both of the shortcomings in an
efficient and cost effective manner. The proposed here method is compared, in
terms of classification accuracy, to other commonly used FR methods on UMIST
face database. Results indicate that the performance of the proposed method is
overall superior to those of traditional FR approaches, such as the Eigenfaces,
Fisherfaces, and DLDA methods and traditional linear classifiers.

191  191  Face Detection Using Adaboosted SVMBased Component Classifier  Recently, Adaboost has been widely used to improve the accuracy of any given
learning algorithm. In this paper we focus on designing an algorithm to employ
combination of Adaboost with Support Vector Machine as weak component
classifiers to be used in Face Detection Task. To obtain a set of effective
SVMweaklearner Classifier, this algorithm adaptively adjusts the kernel
parameter in SVM instead of using a fixed one. Proposed combination outperforms
in generalization in comparison with SVM on imbalanced classification problem.
The proposed here method is compared, in terms of classification accuracy, to
other commonly used Adaboost methods, such as Decision Trees and Neural
Networks, on CMU+MIT face database. Results indicate that the performance of
the proposed method is overall superior to previous Adaboost approaches.

192  192  Binary Classification Based on Potentials  We introduce a simple and computationally trivial method for binary
classification based on the evaluation of potential functions. We demonstrate
that despite the conceptual and computational simplicity of the method its
performance can match or exceed that of standard Support Vector Machine
methods.

193  193  Comparison of Binary Classification Based on Signed Distance Functions
with Support Vector Machines  We investigate the performance of a simple signed distance function (SDF)
based method by direct comparison with standard SVM packages, as well as
Knearest neighbor and RBFN methods. We present experimental results comparing
the SDF approach with other classifiers on both synthetic geometric problems
and five benchmark clinical microarray data sets. On both geometric problems
and microarray data sets, the nonoptimized SDF based classifiers perform just
as well or slightly better than welldeveloped, standard SVM methods. These
results demonstrate the potential accuracy of SDFbased methods on some types
of problems.

194  194  Quantum Predictive Learning and Communication Complexity with Single
Input  We define a new model of quantum learning that we call Predictive Quantum
(PQ). This is a quantum analogue of PAC, where during the testing phase the
student is only required to answer a polynomial number of testing queries.
We demonstrate a relational concept class that is efficiently learnable in
PQ, while in any "reasonable" classical model exponential amount of training
data would be required. This is the first unconditional separation between
quantum and classical learning.
We show that our separation is the best possible in several ways; in
particular, there is no analogous result for a functional class, as well as for
several weaker versions of quantum learning. In order to demonstrate tightness
of our separation we consider a special case of oneway communication that we
call singleinput mode, where Bob receives no input. Somewhat surprisingly,
this setting becomes nontrivial when relational communication tasks are
considered. In particular, any problem with twosided input can be transformed
into a singleinput relational problem of equal classical oneway cost. We show
that the situation is different in the quantum case, where the same
transformation can make the communication complexity exponentially larger. This
happens if and only if the original problem has exponential gap between quantum
and classical oneway communication costs. We believe that these auxiliary
results might be of independent interest.

195  195  Linearly Parameterized Bandits  We consider bandit problems involving a large (possibly infinite) collection
of arms, in which the expected reward of each arm is a linear function of an
$r$dimensional random vector $\mathbf{Z} \in \mathbb{R}^r$, where $r \geq 2$.
The objective is to minimize the cumulative regret and Bayes risk. When the set
of arms corresponds to the unit sphere, we prove that the regret and Bayes risk
is of order $\Theta(r \sqrt{T})$, by establishing a lower bound for an
arbitrary policy, and showing that a matching upper bound is obtained through a
policy that alternates between exploration and exploitation phases. The
phasebased policy is also shown to be effective if the set of arms satisfies a
strong convexity condition. For the case of a general set of arms, we describe
a nearoptimal policy whose regret and Bayes risk admit upper bounds of the
form $O(r \sqrt{T} \log^{3/2} T)$.

196  196  The Offset Tree for Learning with Partial Labels  We present an algorithm, called the Offset Tree, for learning to make
decisions in situations where the payoff of only one choice is observed, rather
than all choices. The algorithm reduces this setting to binary classification,
allowing one to reuse of any existing, fully supervised binary classification
algorithm in this partial information setting. We show that the Offset Tree is
an optimal reduction to binary classification. In particular, it has regret at
most $(k1)$ times the regret of the binary classifier it uses (where $k$ is
the number of choices), and no reduction to binary classification can do
better. This reduction is also computationally optimal, both at training and
test time, requiring just $O(\log_2 k)$ work to train on an example or make a
prediction.
Experiments with the Offset Tree show that it generally performs better than
several alternative approaches.

197  197  Clientserver multitask learning from distributed datasets  A clientserver architecture to simultaneously solve multiple learning tasks
from distributed datasets is described. In such architecture, each client is
associated with an individual learning task and the associated dataset of
examples. The goal of the architecture is to perform information fusion from
multiple datasets while preserving privacy of individual data. The role of the
server is to collect data in realtime from the clients and codify the
information in a common database. The information coded in this database can be
used by all the clients to solve their individual learning task, so that each
client can exploit the informative content of all the datasets without actually
having access to private data of others. The proposed algorithmic framework,
based on regularization theory and kernel methods, uses a suitable class of
mixed effect kernels. The new method is illustrated through a simulated music
recommendation system.

198  198  The Latent Relation Mapping Engine: Algorithm and Experiments  Many AI researchers and cognitive scientists have argued that analogy is the
core of cognition. The most influential work on computational modeling of
analogymaking is Structure Mapping Theory (SMT) and its implementation in the
Structure Mapping Engine (SME). A limitation of SME is the requirement for
complex handcoded representations. We introduce the Latent Relation Mapping
Engine (LRME), which combines ideas from SME and Latent Relational Analysis
(LRA) in order to remove the requirement for handcoded representations. LRME
builds analogical mappings between lists of words, using a large corpus of raw
text to automatically discover the semantic relations among the words. We
evaluate LRME on a set of twenty analogical mapping problems, ten based on
scientific analogies and ten based on common metaphors. LRME achieves
humanlevel performance on the twenty problems. We compare LRME with a variety
of alternative approaches and find that they are not able to reach the same
level of performance.

199  199  Feature Markov Decision Processes  General purpose intelligent learning agents cycle through (complex,nonMDP)
sequences of observations, actions, and rewards. On the other hand,
reinforcement learning is welldeveloped for small finite state Markov Decision
Processes (MDPs). So far it is an art performed by human designers to extract
the right state representation out of the bare observations, i.e. to reduce the
agent setup to the MDP framework. Before we can think of mechanizing this
search for suitable MDPs, we need a formal objective criterion. The main
contribution of this article is to develop such a criterion. I also integrate
the various parts into one learning algorithm. Extensions to more realistic
dynamic Bayesian networks are developed in a companion article.
