Interpreting Individual Classifications of Hierarchical Networks

Size: px
Start display at page:

Download "Interpreting Individual Classifications of Hierarchical Networks"

Transcription

1 Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker Michae D. Thomure Luís M. A. Bettencourt Meanie Mitche Garrett T. Kenyon SFI WORKING PAPER: SFI Working Papers contain accounts of scienti5ic work of the authors) and do not necessariy represent the views of the Santa Fe Institute. We accept papers intended for pubication in peer- reviewed ournas or proceedings voumes, but not papers that have aready appeared in print. Except for papers by our externa facuty, papers must be based on work done at SFI, inspired by an invited visit to or coaboration at SFI, or funded by an SFI grant. NOTICE: This working paper is incuded by permission of the contributing authors) as a means to ensure timey distribution of the schoary and technica work on a non- commercia basis. Copyright and a rights therein are maintained by the authors). It is understood that a persons copying this information wi adhere to the terms and constraints invoked by each author's copyright. These works may be reposted ony with the expicit permission of the copyright hoder. SANTA FE INSTITUTE

2 Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science Portand State University Santa Fe Institute Abstract Hierarchica networks are known to achieve high cassification accuracy on difficut machine-earning tasks. For many appications, a cear expanation of why the data was cassified a certain way is ust as important as the cassification itsef. However, the compexity of hierarchica networks makes them i-suited for existing expanation methods. We propose a new method, contribution propagation, that gives per-instance expanations of a trained network s cassifications. We give theoretica foundations for the proposed method, and evauate its correctness empiricay. Finay, we use the resuting expanations to revea unexpected behavior of networks that achieve high accuracy on visua obect-recognition tasks using we-known data sets. I. INTRODUCTION In machine earning, a mode is earned from structure in the data. When using machine-earning techniques, one hopes that the earned structure generaizes we to yet-unseen data. However, many machine-earning techniques resut in backbox modes, making it difficut to understand the nature of the earned structure. With interpretabe methods that expain the interactions between data and mode, we can ensure that our earned modes have earned reevant structure from the data, rather than spurious statistics. This paper focuses on a famiy of hierarchica networks in which the operations computed at each ayer aternate between some type of pattern matching e.g., convoution, radia basis function) and subsamping e.g., mean, maximum). Such networks have been used extensivey in the machine earning community, and are known to achieve high cassification accuracy on a variety of tasks such as phoneme recognition [1], text document cassification [2], and visua obect recognition [3]. Due to their compexity, such networks are often treated as back boxes, giving accurate soutions to difficut probems without expaining how their soutions were found. However, for hierarchica networks to be used for appications in which each cassification carries high risk e.g., medica diagnosis or financia decisions), it may be necessary for these networks to expain the evidence for each cassification. More generay, for any cassification method, it is important bettencourt@santafe.edu Los Aamos Nationa Laboratory {gkenyon, brumby}@an.gov to verify that the network s resuts are due not to anomaies or accidenta correations in particuar data sets, but to features of the data that make sense for the genera task at hand. Given an instance x = x 1, x 2,..., x n ) cassified as ŷx) {1, 1}, we seek a method to expain the reative importance of each input x i to the instance s cassification. Pouin et a. [4] offer such an expanation method for the case of additive cassifiers. For an additive cassifier ŷx) = sgn [ n i=1 f ix i ) + b], Pouin et a. define the contribution of feature x i to be f i x i ). However, the cassifications of hierarchica networks cannot be expained with this method: even if the features cacuated by the network are cassified by an additive cassifier, the higheve features themseves are generay nonadditive functions of the network s ow-eve inputs. We address this imitation with a new method caed contribution propagation. In short, we cacuate contributions of high-eve features as in Pouin et a. [4], and then work backward from the features to the network s input, determining the reative contribution of each node to its parent nodes. This process gives us a we-founded expanation for individua cassifications: given a singe cassified datum, our method expains how important each part of the datum i.e., each entry in the input vector) was to that cassification. In what foows, we review the iterature reated to this research, and in Section II, we introduce notation and review the architecture of hierarchica networks. Section III gives the detais of the contribution-propagation method. Section IV discusses the impementation detais of our network, and we give experimenta resuts in Section V. We concude with directions for further research and open questions. A. Reated Work Rue extraction refers to a famiy of methods that expain the genera rues used by a network by anayzing the network s interna weights [5]. Simiary, one can visuaize the network topoogy in order to understand the overa strategies that might be used [6]. The extracted rues are not specific to the mode s decision for any particuar datum. Rather, they describe the genera behavior of the mode over a arge set c 2013 IEEE Symposium Series on Computationa Inteigence To appear in Computationa Inteigence and Data Mining CIDM) 2013

3 of data. Thus, rue extraction does not provide the type of information we seek: a fine-grained expanation of what caused a singe datum s cassification. In an attempt to provide such expanations, recent research has treated the entire cassification system as a singe back box in order to provide cassifier-independent expanations [7]. These methods avoid deaing with the interna cacuations of the system at the expense of samping from an exponentiay arge set of possibe inputs. For cassifiers with arge input spaces, as is often the case with hierarchica networks, these methods introduce unwanted dependencies on samping. The gradient approach is one way to expain individua cassifications [8]. Given an instance x = x 1, x 2,...) and its cassification ŷx) = sgn [fx)], this approach defines the importance of feature x i to be f x i. Intuitivey, x i is important if f is sensitive to sma changes in x i. However, the gradient approach fais to te us how much each feature contributed to the output. Consider the simpe exampe of a inear cassifier fx) = w x, where w = 2, 2). An input x = x 1, x 2 ) = 3, 1) gives output fx) = ) = 6 2 = 4. A different input x = x 1, x 2) = 1, 3) gives output fx ) = 2 1) = = 4. The gradient approach woud te us that our function f is equay sensitive to a inputs in both cases f x i = 2). However, this anaysis fais to te us that in the first case, the positive output of f is due to the first feature x 1 ; and in the second case, the positive output of f is due to the second feature x 2. The contribution approach of Pouin et a. [4], on the other hand, perfecty captures this information. Using this approach, we woud determine that for the first exampe, the contributions of x 1 and x 2 are 6 and -2, respectivey. For the second exampe, the contributions of x 1 and x 2 are -2 and 6, respectivey. Thus contributions which we expore in more detai beow) give us fine-grained expanations of the degree to which each input contributed the output, whie the gradient approach oses much usefu information about the cassification. A. Notation II. PRELIMINARIES We use itaicized etters to denote rea numbers and bod etters to denote rea vectors, such as x = x 1,..., x n ) R n. The L2 norm of a vector, denoted x, is cacuated as n i=1 x2 i. A node is a rea-vaued function. Capita etters X refer to the identity of a node, the function cacuated by that node, or the vaue returned by the node s function. The intended use wi be cear from context. For a given hierarchica network, X i refers to the ith node in the th ayer. The vector X = X 1, X 2,...) denotes a nodes in ayer. We write X to mean some node in the th ayer of the network, or merey X to denote any particuar node in the network. The chidren of node X, denoted ch X ), are the set of nodes that are the inputs to node X. In a sight abuse of notation, we sometimes treat ch X ) as a vector; the intended use wi be cear by context. Simiary, the parents of node X, denoted pa X ), are the set or vector) of nodes that receive X as input. In what foows, we wi restrict the inputs of any node to come from ony the preceding ayer. Thus X 1 ch X ) and X +1 pa X ). A network has L ayers [1,..., L]). Thus the output of the network, often caed the feature vector, is X L. For convenience, the input to the network is denoted simpy x. Lasty, et x R n, and for any node Xi 1 in the network s first ayer, ch ) Xi 1 x. B. Hierarchica Networks Hierarchica networks comprise a arge famiy of machineearning modes such as HMAX [3], [9], convoutiona neura networks [2], and others. In order to make our anaysis concrete, in this work we focus on the we-known famiy of hierarchica networks described by HMAX. However, it shoud be noted that our contribution propagation method is appicabe to the more genera cass of feed-forward hierarchica networks. We briefy review the architecture of HMAX-ike networks here. Detais of our impementation are given in the Methods section. In a trained network, a node Xk in an odd-numbered ayer computes the radia basis function RBF) X k = exp β ch X k) P k 2 ), where P k and β are parameters of the mode. We refer to P k as the kerne of node Xk. Foowing Serre et a. [3], we refer to these ayers as S simpe ce) ayers, with S1 being the first S ayer, and so on. Nodes X +1 h in even ayers compute a maximum of their inputs: X +1 h = max Xk chx+1 h ) X k. Again foowing Serre et a. [3], we refer to these ayers as C compex ce) ayers. Figure 1 shows a hierarchica network with two S ayers and two C ayers, whose input x consists of the gray-scae pixe vaues of an image. The output of the network i.e., the output of the C2 ayer) is the feature vector X L, which is given to a trainabe cassifier in this case, a inear support vector machine SVM)). III. METHODS Given an instance x = x 1, x 2,..., x n ), its corresponding feature vector X L i.e., the fina ayer of the network), and the feature vector s binary cassification ŷx L ) = sgn[fx L )] {1, 1}, we ask what portion of the vaue fx L ) came from input x i? In this work we assume that the score fx L ) is an estimate of the cassifier s confidence in its cassification of X L [10]. Rather than answer this question for the entire cassifier and network as one arge back box, our approach is to anayze each node as we as the cassifier) sequentiay. Working from the cassifier back to the inputs, we determine the contributions of the nodes in ayer L to the cassifier, then the contributions of the nodes in ayer L 1 to the nodes in ayer L, and so on unti we have cacuated the contribution of the inputs e.g., the contribution of each pixe in the image of Figure 1). This process, which we ca contribution propagation, is idea for interpreting the cassifications made by compex networks

4 A. The Contribution-Propagation Agorithm The purpose of the contribution-propagation agorithm is to provide an interpretabe expanation of which components of the input were responsibe and to what degree) for a given datum s cassification. When the cassification is the resut of many simpe cacuations, as is the case with hierarchica networks, we form an overa description of an input s importance i.e., this pixe was important to the cassification) by anayzing the interna cacuations of the network i.e., node Xi was important to node X +1 ). The centra idea of contribution propagation is that a node was important to the cassification if it was important to its parents, and its parents were important to the cassification. Mathematicay, C X i ) def = X +1 pax i ) C X i X +1 ) ) C X +1. 1) In Equation 1, C ) Xi is the contribution of node X i to the cassification; simiary, C X +1 ) is the contribution of node X +1 to the cassification. Finay, C ) Xi X+1 is the partia contribution of node Xi to its parent node X+1. Informay, this vaue represents how important Xi was to X+1. We wi give expicit definitions for these terms in ater sections; for the moment, we compete our genera discussion of the agorithm. The contribution-propagation agorithm starts by cacuating the contribution C ) Xi L of each top-eve feature X L i to the cassifier. The agorithm then iterativey descends through the ayers of the network, determining the contribution of each node to its parent nodes. This process is described in Figure 2. Fig. 1. A hierarchica network taking an image as input. Ony a sma subset of each ayer is shown. Each sma square is a node in the network. Computation fows from top Image) to bottom SVM). Dashed arrows iustrate the oca connectivity of the network: a sma subset of each ayer gray group of nodes) is fed as input to a singe node back) in the foowing ayer. The vector consisting of each C2 output is the feature vector used for training and testing the SVM. which are too arge and compicated to interpret directy, yet each individua cacuation i.e., cacuating the vaue output by any singe node in the network) is simpe. It is crucia to note that our contribution-propagation agorithm is used ony in expaining a mode s cassification. The cassification itsef is performed by a trained hierarchica mode of the user s choosing. Separation between the cassification and expanation agorithms aows our expanation method to be used in a variety of settings with a variety of modes. Pseudocode for our agorithm is given in Figure 2. In the remainder of this section, we describe the contribution-propagation agorithm at a reativey high eve. We then discuss how to appy the agorithm to the particuar type of hierarchica network discussed in Section II-B. This invoves deriving equations specific to the inear SVM, RBF, and maximum operator. // Given instance x = x 1, x 2,..., x n), for = L 1 do for a i do Cacuate C ) Xi // cacuate contribution of each network node for a do Cacuate C x ) // cacuate contribution of each input return C x 1 ), C x 2 ),..., C x n )) Fig. 2. The contribution-propagation agorithm. C X i ) is the tota contribution of node X i. Reca that x = x 1,..., x n) is the input to the network, thus C x ) is the tota contribution of input x. In order to compete the description of contribution propagation, we need ony derive the equations for C ) Xk L the contribution of the network s output nodes) and C ) Xi X+1 the partia contribution of interna nodes to their parents). We have previousy stated that C ) Xi X+1 represents how important Xi was to X+1. To make this idea more concrete and we-founded, we impose the foowing constraints: C Xi X +1 ) = 1 2) X i chx+1 ) and 0 C X i X +1 ) 1. 3)

5 In other words, we require that C ) Xi X+1 be a distribution over ch X +1 ). The meaning of this distribution is the fraction of the vaue X +1 that is due to Xi. With this in mind, we can see that each individua summand from Equation 1, C ) ) Xi X+1 C X +1, is the portion of the contribution of X +1 that is due to Xi. Thus Equation 1 in its entirety tes us that a node s contribution C ) Xi is equa to a of the contributions in the parent s ayer for which Xi is responsibe. We now derive C ) Xi X+1 for RBF and maximum functions the two types of nodes in our network). We wi concude with the definition of C ) Xk L, the contribution of the network outputs. This wi compete our derivation of the contribution-propagation agorithm. B. Contribution to Radia Basis Function Consider a node X +1 in an S-ayer. For convenience, et X = ch X +1 ) and P = P +1. Then the function computed by X +1 is the RBF X +1 = exp β X P 2 ). 4) Our goa is to define a function C RBF X i X +1 ) which is a distribution over ch X +1 ) and which accuratey describes the degree to which Xi was responsibe for the vaue of X+1. Equation 4 is a measure of distance between the vectors X and P. A coser distance yieds a arger RBF vaue, and a further distance yieds a smaer vaue. Thus we want C RBF X i X +1 ) to be higher if X i is coser to P i, meaning when Xi P i) 2 is smaer. Moreover, the distance cacuated by the RBF is tuned by the function sx) = exp βx). Thus, we define C RBF X i X +1 ) as: C RBF X i X +1 ) def = exp βx i P i) 2 ), 5) Z where Z is a normaization term. Recaing the constraints in Equations 2 and 3, we note that the constraint of Equation 3 impies that Z > exp βxi P i ) 2 ). To make C RBF X i X +1 ) satisfy the constraint in Equation 2, it must be normaized so that i C RBF X i X +1 ) = 1. Thus we simpy set the denominator Z in Equation 5 to equa the sum over a chidren of the RBF, and we arrive at the fu definition: C RBF X i X +1 ) def = exp βxi P i) 2 ) Xk chx+1 ) exp βx k P k) 2 ). 6) Equation 6 agrees with our intuition: those chidren X i that are cose to their target P i have a higher contribution. C. Contribution to Maximum Function A node X +1 in a C-ayer cacuates the maximum of its chidren, X +1 = max Xi chx+1 ) X i. 7) As before, our goa is to define the function C MAX X i X +1 ) which is a distribution over Xi and which accuratey describes the degree to which Xi was responsibe for the vaue of X+1. To this end, we note that an input to a max function was important to the function if that input was itsef the maximum vaue. Thus we view the max function as a type of switch, and we define { C MAX X i X +1 ) def 1/r if X = i M 8) 0 o.w. where M = {Xi ch X +1 ) : X i = X +1 }, and M contains r eements. That is, we divide the contribution equay among those inputs that shared the maximum vaue; those chidren who were not the maximum did not contribute. D. Contribution to an Additive Cassifier Given a feature vector X L cassified with an additive cassifier as ŷx L ) = sgn [ i f ixi L) + b], we define the contribution of feature Xi L to be f i Xi L ) as in Pouin et a. [4]. We denote the feature s contribution by writing C Xi L ) def = f i Xi L ). 9) Here we assume the additive cassifier is a inear SVM [11]. Given the set V of support vectors, a inear SVM cacuates ŷx L ) = sgn [ V V α v V, X L + b ] = sgn [ i XL i V V α ) ] vv i + b, where, denotes the dot product. In this case, Equation 9 becomes C SVM X L i ) def = X L i ) α v V i. 10) V V That is, Equation 10 gives the contribution of node Xi L to the SVM s cassification of feature vector X L. A positive vaue gives the amount to which node Xi L contributes to a positive cassification or away from a negative cassification); simiary a negative vaue gives the degree of Xi L s contribution towards a negative or away from a positive) cassification. IV. HIERARCHICAL NETWORK IMPLEMENTATION We impement a four-ayer network Figure 1), based on the network of Serre et a. [3]. The input image is preprocessed to form a gray-scae image with oca contrast enhancement. An S1 kerne is an pixe Gabor fiter. Using Equation 4, we appy a battery of Gabors at 8 orientations, 2 phases, and 4 scaes, with β = 1.0 for a S1 nodes. For each Gabor configuration, we subsampe by centering an S1 node at every other pixe, resuting in a set of 64 S1 output maps, each of size A C1 node poos over the two phases and a 5 5 spatia neighborhood of S1 outputs. We again subsampe in the same way, resuting in 32 C1 output maps, each of size For an S2 node, the input is a 7 7 neighborhood of C1 nodes at a orientations, but at a singe scae. The input vector and the kerne of each S2 node are each scaed to unit ength X = P = 1). We set β = 5.0 for every S2 node. For each kerne, there is a corresponding S2 node centered at every other C1 node, resuting in mutipe S2 output maps, one for each kerne and scae. Finay, a C2 node appies a max operation to a ocations and a scaes of a singe kerne s

6 S2 map. Thus the output of the C2 ayer is a vector with one component per S2 kerne. This feature vector is passed to the inear SVM. We use the SVM ight package [11] with an unbiased SVM b = 0). This aows a simper derivation of our method without impacting the accuracy of the network. V. RESULTS We appy our contribution-propagation method in order to expain the cassifications of hierarchica networks that are trained on different tasks. The first experiment is intentionay simpe and controed, and demonstrates that our approach accuratey expains the network s cassifications. The second experiment, which uses a we-known, rea-word data set, shows how contribution propagation gives new insight into the network s performance. A. Simpe Shapes In our first experiment, we use a simpe artificia visua cassification task to verify that our method s expanations are correct and understandabe. Each training image contains a simpe shape, either an L shape Figure 3B, positive cass) or an inverted L shape Figure 3C, negative cass). Noise is added by rotating the shape uniformy randomy within ±5 degrees and transating the shape to a random ocation, and 1/f noise is added to the background. The noise ensures that the earned cassifier is nontrivia. Figure 3A shows the two earned S2 kernes around the vertex of the L and inverted L shapes. We input 20 training images 10 positive and 10 negative) to the network, and use the resuting feature vectors to train the SVM. Our test images contain 9 possibe shapes Fig. 3 D), incuding both an L and inverted L, each paced at a random position in a 3 3 grid and rotated randomy within ±5 degrees. Again, 1/f noise is added to the background. Note that because both the positive and negative obects are present in the test image, we do not expect one cassification over the other. The test images were designed to iustrate the authenticity of the contribution-propagation agorithm rather than to test the cassification accuracy of the hierarchica network accuracy wi be addressed in the next section). A test images in this toy exampe were very near the decision boundary, which is reasonabe given that both the positive and negative casses are present in each test image. Using contribution propagation, we expain a test image s cassification using fase coor as foows. First, we trace down through the ayers of the network Fig. 3E-H) using the agorithm presented in Figure 2. Thus Figure 2E shows the contribution of each node in the S2 ayer, Figure 2F shows the contribution of each node in the C1 ayer, and so on. This resuts in the cacuation of the contribution C x i ) of each pixe x i Fig. 3H). Pixes drawn in red contributed to a positive cassification L ); pixes drawn in bue contributed to a negative cassification inverted L ); pixes that did not contribute to the cassification are drawn in green. We see in this visuaization Figure 3H) that our contribution-propagation agorithm correcty coored the pixes surrounding the area matching the earned kernes red around the L shape, and bue around the inverted L shape). Our agorithm thus expains the cassification of undecided : there was a neary equa pu between the pixes surrounding the L toward positive cassification) and those surrounding the inverted L toward negative cassification). This pixe-eve expanation of how the image is interpreted by the network and cassifier was provided automaticay by our contributionpropagation agorithm, and gives evidence for the correctness of our agorithm. B. Rea-Word Images Next, we use the Catech101 data set [12] to train the network and a inear, unbiased SVM in a binary cassification task using categories of chair positive cass, corresponding to red in the visuaizations) and damatian negative cass, corresponding to bue). The categories contain 60 images each. Using 10 spits for cross vaidation, we randomy choose 30 training images and 30 test images from each category. Foowing Serre et a. [3], the network imprints 1000 S2 kernes randomy from the S2 inputs of the training set, and the SVM is trained on the resuting network s output for each training image. Test images are cassified with an average accuracy of 94%, with a 3% standard deviation a biased SVM achieved 93% accuracy with 1.2% standard deviation). In Figure 4, we see that some images A, C) are correcty cassified primariy due to the pixes of the obect itsef B, D). However, our method aso reveas some surprising behavior of the network and cassifier F, H): it appears that some images were correcty cassified due to features extracted primariy from the image s background. In Figure 4F, this may be ess surprising as the background is quite simiar to the damatian. However, in Figure 4H, it is uncear why the background dark red) was taken as evidence for the presence of a chair or, possiby, absence of a damatian). Such an unexpected expanation offered by the contribution-propagation method can be usefu to the user who is trying to create a system that wi generaize we; the user can see that, at east in some cases, the network is basing its cassification on features that are not reevant to the genera task, due to either deficiencies in the network or spurious correations in the data set. A natura question is how often a correct cassification is surprising that is to say, a correcty cassified image where the background appears to contribute more than the obect). Formuating a metric to define such a surprising cassification is beyond the scope of the present work. However, a subective visua inspection of the cassified images reveas 5 of the 60 cassifications of test images to be of this nature. As a fina test of the cassification expanations provided by the contribution-propagation agorithm, we edit an image to incude both a damatian and a chair Figure 4I). This image was cassified by the network as negative damatian), and the contribution propagation agorithm expains this cassification. Figure 4 J) shows that, athough there were features associated with the chair cass on the right side of the image yeow, ight red), the features extracted from the pixes beonging to the damatian were weighted more heaviy deep bue). Some readers may fee that the sma number of training images used may cast doubt on the vaidity of the trained cassifier. However, note that researchers often benchmark their computer-vision system by measuring its performance on the

7 Training and testing network A) Imprinted kernes B) Positive training images C) Negative training images D) Test image Expaining the cassification of D) through the ayers of the network E) C XS2 F) C XC1 G) C XS1 H) C x) I) Coor egend for visuaizations in E - H Fig. 3. Figure best viewed in coor.) Visuaizing the binary cassification of images containing simpe shapes. The contribution of the nodes in each ayer verifies the correctness of our agorithm. Two S2 kernes are used shaded squares, A). A inear SVM is trained on images containing either an L shape B, positive cass) or an inverted L C, negative cass). We present a test image D), and use contribution propagation to visuaize the contribution of a ayers E-H). Note that the image is drawn in the background of E-H) in order to better expain the contribution of each region. Coors correspond to the pixe s contribution, as shown in the egend I). These visuaizations give evidence for the correctness of our contribution propagation agorithm. Test images A) C) E) G) I) Expaining the cassifications of test images B) D) F) H) J) Fig. 4. Figure best viewed in coor.) Visuaizations from the cassification of chairs positive) vs. damatians negative), from the Catech101 database. Coors correspond to the egend in Figure 3 I): positive contribution toward chair) is denoted with red, and negative contribution toward damatian) with bue. Some images A, C) are correcty cassified because of the contribution of pixes that beong to the obect being cassified B, bue on damatian; D, red on chair). Other images that contain confusing patterns in the background E, G) are sti correcty cassified, but partiay due to the contribution of background pixes F, bue on background; H, red on background). An image manipuated to contain both obects I) is cassified as damatian, and this cassification is intuitivey expained by the contribution-propagation agorithm J).

8 Catech101 dataset using 30 images per cass as training data [13]. Thus our experiment was designed to mimic a benchmarking process famiiar to many computer-vision researchers. In this ight, the surprising resuts presented in Figure 4 hint at an important question to the computer-vision community: does high performance on this dataset indicate a system s capacity for obect recognition, or merey for earning spurious statistica background) cues? The prevaence of this dataset makes this question a the more pressing. VI. CONCLUSIONS We presented a nove method for expaining the cassifications of hierarchica networks with additive cassifiers, having reviewed why traditiona approaches such as a sensitivity anaysis fai to give satisfactory expanations. Our method extends the contribution-based expanations of Pouin et a. [4], and determines the contribution of each input based on the interna cacuations of the network. We empiricay vaidate our method s expanations with a simpe obect-recognition task using artificia data. We appy our method to a binary cassification task using a we-known set of natura images, reveaing surprising artifacts in the way that some images are cassified. In particuar, we see that some images are correcty cassified because of the contribution of pixes beonging to the image s background Figure 4 F, H). This behavior is surprising when the task is competed with high accuracy, but it is aso very usefu to the user of the machine-earning agorithm. Such information provided by our method can hep the user to tune the agorithm for better generaizabiity, as we as to create data sets without artifacts in the background. In order to visuaize our method s expanations, we cassify with an unbiased SVM. Athough the ack of bias may, in some cases, ead to ower cassification accuracy, it did not for any task we impemented. We stress that the ack of bias was chosen merey for visuaization, and that the contributionpropagation method can be impemented with biased functions as we. In future work, the contribution-propagation method may aso be appied to different types of hierarchica networks, for exampe those using convoutions or different subsamping methods. [2] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, Gradient-based earning appied to document recognition, Proceedings of the IEEE, vo. 86, no. 11, [3] T. Serre, A. Oiva, and T. Poggio, A feedforward architecture accounts for rapid categorization, Proceedings of the Nationa Academy of Sciences, vo. 104, no. 15, [4] B. Pouin, R. Eisner, D. Szafron, P. Lu, R. Greiner, D. Wishart, A. Fyshe, B. Pearcy, C. MAcDone, and J. Anvik, Visua expanation of evidence in additive cassifiers, in Proceedings of 18th Conference on Innovative Appications of Artificia Inteigence. IAAI, Juy [5] L. Fu, Rue generation from neura networks, IEEE Transactions on Systems, Man and Cybernetics, vo. 24, no. 8, [6] T. Masqueier and S. Thorpe, Unsupervised earning of visua features through spike timing dependent pasticity, PLoS Comp. Bio., vo. 3, no. 2, [7] E. Strumbe and I. Kononenko, An efficient expanation of individua cassifications using game theory, Journa of Machine Learning Research, vo. 11, no. 1, [8] D. Baehrens, T. Schroeter, S. Harmeing, M. Kawanabe, K. Hansen, and K. Müer, How to expain individua cassification decisions, Journa of Machine Learning Research, vo. 11, pp , [9] M. Riesenhuber and T. Poggio, Hierarchica modes of obect recognition in cortex, Nature Neuroscience, vo. 2, no. 11, [10] M. Dredze, K. Crammer, and F. Pereira, Confidence-weighted inear cassification, in Internationa Conference on Machine Learning, [11] T. Joachims, Making arge-scae SVM earning practica. in Advances in Kerne Methods - Support Vector Learning, B. Schökopf, C. Burges, and A. Smoa, Eds. MIT Press, [12] L. Fei-Fei, R. Fergus, and P. Perona, Learning generative visua modes from few training exampes: an incrementa Bayesian approach tested on 101 obect categories, in IEEE. CVPR 2004, Workshop on Generative-Mode Based Vision, [13] A. Bosch, A. Zisserman, and X. Munoz, Representing shape with a spatia pyramid kerne, in Proceedings of the 6th ACM internationa conference on Image and video retrieva, ACKNOWLEDGMENTS This materia is based upon work supported by the Nationa Science Foundation under Grant Nos and , as we as the Laboratory Directed Research and Deveopment program at Los Aamos Nationa Laboratory Proect DR). Any opinions, findings, concusions or recommendations expressed in this materia are those of the authors and do not necessariy refect the views of the funding agencies. REFERENCES [1] R. Rifkin, J. Bouvrie, K. Schutte, S. Chikkerur, M. Kouh, T. Ezzat, and T. Poggio, Phonetic cassification using hierarchica, feed-forward, spectro-tempora patch-based architectures, Massachusetts Institute of Technoogy, Tech. Rep. MIT-CSAIL-TR , 2007.

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

ONE of the most challenging problems addressed by the

ONE of the most challenging problems addressed by the IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

Discounted Cash Flow Analysis (aka Engineering Economy)

Discounted Cash Flow Analysis (aka Engineering Economy) Discounted Cash Fow Anaysis (aka Engineering Economy) Objective: To provide economic comparison of benefits and costs that occur over time Assumptions: Future benefits and costs can be predicted A Benefits,

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

PENALTY TAXES ON CORPORATE ACCUMULATIONS

PENALTY TAXES ON CORPORATE ACCUMULATIONS H Chapter Six H PENALTY TAXES ON CORPORATE ACCUMULATIONS INTRODUCTION AND STUDY OBJECTIVES The accumuated earnings tax and the persona hoding company tax are penaty taxes designed to prevent taxpayers

More information

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey by Linda Drazga Maxfied and Virginia P. Rena* Using data from the New Beneficiary Survey, this artice examines

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar

More information

7. Dry Lab III: Molecular Symmetry

7. Dry Lab III: Molecular Symmetry 0 7. Dry Lab III: Moecuar Symmetry Topics: 1. Motivation. Symmetry Eements and Operations. Symmetry Groups 4. Physica Impications of Symmetry 1. Motivation Finite symmetries are usefu in the study of moecues.

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations.

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations. c r o s os r oi a d s REDISCOVERING THE ROLE OF BUSINESS SCHOOLS The current crisis has highighted the need to redefine the roe of senior managers in organizations. JORDI CANALS Professor and Dean, IESE

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

Budgeting Loans from the Social Fund

Budgeting Loans from the Social Fund Budgeting Loans from the Socia Fund tes sheet Pease read these notes carefuy. They expain the circumstances when a budgeting oan can be paid. Budgeting Loans You may be abe to get a Budgeting Loan if:

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

The Basel II Risk Parameters. Second edition

The Basel II Risk Parameters. Second edition The Base II Risk Parameters Second edition . Bernd Engemann Editors Robert Rauhmeier The Base II Risk Parameters Estimation, Vaidation, Stress Testing with Appications to Loan Risk Management Editors Dr.

More information

Books on Reference and the Problem of Library Science

Books on Reference and the Problem of Library Science Practicing Reference... Learning from Library Science * Mary Whisner ** Ms. Whisner describes the method and some of the resuts reported in a recenty pubished book about the reference interview written

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Spherical Correlation of Visual Representations for 3D Model Retrieval

Spherical Correlation of Visual Representations for 3D Model Retrieval Noname manuscript No. (wi be inserted by the editor) Spherica Correation of Visua Representations for 3D Mode Retrieva Ameesh Makadia Kostas Daniiidis the date of receipt and acceptance shoud be inserted

More information

Automatic Structure Discovery for Large Source Code

Automatic Structure Discovery for Large Source Code Automatic Structure Discovery for Large Source Code By Sarge Rogatch Master Thesis Universiteit van Amsterdam, Artificia Inteigence, 2010 Automatic Structure Discovery for Large Source Code Page 1 of 130

More information

FLAC Legal Divorce v2 band_layout 1 26/06/2014 20:01 Page 1 July 2014 divorce

FLAC Legal Divorce v2 band_layout 1 26/06/2014 20:01 Page 1 July 2014 divorce Juy 2014 divorce Divorce has been avaiabe in the Repubic of Ireand since 1997. Once a divorce is obtained, the parties (the ex-spouses) are free to remarry or enter into a civi partnership. Famiy Law (Divorce)

More information

Breakeven analysis and short-term decision making

Breakeven analysis and short-term decision making Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt

More information

Packet Classification with Network Traffic Statistics

Packet Classification with Network Traffic Statistics Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on

More information

We focus on systems composed of entities operating with autonomous control, such

We focus on systems composed of entities operating with autonomous control, such Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,

More information

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58 Vita Steps A cooperative feasibiity study guide U.S. Department of Agricuture Rura Business-Cooperative Service Service Report 58 Abstract This guide provides rura residents with information about cooperative

More information

Nordic Ecolabelling of Copy and printing paper - supplementary module

Nordic Ecolabelling of Copy and printing paper - supplementary module rdic Ecoabeing of Copy and printing paper - suppementary modue Version 4.1 22 June 2011 30 June 2016 rdic Ecoabeing Content What is rdic Ecoabeed copy and printing paper? 3 Why choose the rdic Ecoabe?

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Tackling external fraud

Tackling external fraud Good practice in tacking externa fraud Xxxxxxxxxxx GOOD PRACTICE GUIDE Tacking externa fraud Good practice in tacking externa fraud Xxxxxxxxxxx The Nationa Audit Office scrutinises pubic spending on behaf

More information

The width of single glazing. The warmth of double glazing.

The width of single glazing. The warmth of double glazing. Therma Insuation CI/SfB (31) Ro5 (M5) September 2012 The width of singe gazing. The warmth of doube gazing. Pikington Spacia Revoutionary vacuum gazing. Image courtesy of Lumen Roofight Ltd. Pikington

More information

THERMAL REMOTE SENSING: CONCEPTS, ISSUES AND APPLICATIONS

THERMAL REMOTE SENSING: CONCEPTS, ISSUES AND APPLICATIONS THERMAL REMOTE SENSING: CONCEPTS, ISSUES AND APPLICATIONS Anupma PRAKASH ITC, Geoogica Survey Division prakash@itc.n Working Group WG VII / 3 KEY WORDS: Therma infrared, radiant temperature, emissivity,

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Financial Management

Financial Management Financia Management Paper-20 M Com (Fina) Directorate of Distance Education Maharshi Dayanand University ROHTAK 124 001 2 jktuhfr fokku Copyright 2004, Maharshi Dayanand University, ROHTAK A Rights Reserved.

More information

Federal Financial Management Certificate Program

Federal Financial Management Certificate Program MANAGEMENT CONCEPTS Federa Financia Management Certificate Program Training to hep you achieve the highest eve performance in: Accounting // Auditing // Budgeting // Financia Management ENROLL TODAY! Contract

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Understanding. nystagmus. RCOphth

Understanding. nystagmus. RCOphth Understanding nystagmus RCOphth RNIB s understanding series The understanding series is designed to hep you, your friends and famiy understand a itte bit more about your eye condition. Other tites in the

More information

STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA

STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA By Martin M. Rauba A THESIS Submitted in Partia Fufiment of the Requirements for the Degree of Master of Science (in Spatia Information Science and Engineering)

More information

July 2014. separation

July 2014. separation Juy 2014 separation When a marriage breaks down, the coupe can arrange for a forma separation. The coupe may eventuay decide to divorce (see separate information eafet on Divorce). There are two different

More information

Teaching fractions in elementary school: A manual for teachers

Teaching fractions in elementary school: A manual for teachers Teaching fractions in eementary schoo: A manua for teachers H. Wu Apri 0, 998 [Added December, 200] I have decided to resurrect this fie of 998 because, as a reativey short summary of the basic eements

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Older people s assets: using housing equity to pay for health and aged care

Older people s assets: using housing equity to pay for health and aged care Key words: aged care; retirement savings; reverse mortgage; financia innovation; financia panning Oder peope s assets: using housing equity to pay for heath and aged care The research agenda on the ageing

More information

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1 IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan

More information

International classification of financial reporting

International classification of financial reporting 3 Internationa cassification of financia reporting Christopher Nobes CONTENTS 3.1 Introduction 3.2 The nature of cassification 3.3 Cassifications by socia scientists 3.4 Cassifications in accounting 3.5

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Preschool Services Under IDEA

Preschool Services Under IDEA Preschoo Services Under IDEA W e don t usuay think of Specific Learning Disabiities in connection with chidren beow schoo age. When we think about chidren age birth to six, we think first of their earning

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

Large-Scale Optimization of Hierarchical Features for Saliency Prediction in Natural Images

Large-Scale Optimization of Hierarchical Features for Saliency Prediction in Natural Images Large-Scae Optimization of Hierarchica Features for Saiency Prediction in Natura Images Eeonora Vig Harvard University vig@fas.harvard.edu Michae Dorr Harvard Medica Schoo michae.dorr@schepens.harvard.edu

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

Figure 1. A Simple Centrifugal Speed Governor.

Figure 1. A Simple Centrifugal Speed Governor. ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems

More information

A 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Applications

A 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Applications Internationa Journa of esearch Studies in Science, Engineering and Technoogy Voume 2, Issue 7, Juy 2015, PP 102-110 ISSN 2349-4751 (Print) & ISSN 2349-476X (Onine) A 3D Motion Trajectory Signature Identification

More information

Efficient and Effective Clustering Methods for Spatial Data Mining

Efficient and Effective Clustering Methods for Spatial Data Mining Efficient and Effective Custering Methods for Spatia Data Mining Raymond T. Ng Department of Computer Science University of British Coumbia Vancouver, B.C., V6T 124, Canada rng@cs.ubc.ca Jiawei Han Schoo

More information

History of Stars and Rain Education Institute for Autism (Stars and Rain)

History of Stars and Rain Education Institute for Autism (Stars and Rain) History of Education Institute for Autism () Estabished:: March 15. 1993 in Beijing Founder:: Ms. Tian Huiping (mother of a boy with autism) STARS AND RAIN was founded in 1993 by a parent and is China

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate

More information