Efficient Projections onto the l 1 -Ball for Learning in High Dimensions
|
|
|
- Teresa Griffith
- 10 years ago
- Views:
Transcription
1 Efficient Projections onto the l 1 -Ball for Learning in High Dimensions John Duchi Google, Mountain View, CA Shai Shalev-Shwartz Toyota Technological Institute, Chicago, IL, Yoram Singer Tushar Chandra Google, Mountain View, CA [email protected] [email protected] [email protected] [email protected] Abstract We describe efficient algorithms for projecting a vector onto the l 1 -ball. We present two methods for projection. The first performs exact projection in O(n) expected time, where n is the dimension of the space. The second works on vectors k of whose elements are perturbed outside the l 1 -ball, projecting in O(k log(n)) time. This setting is especially useful for online learning in sparse feature spaces such as text categorization applications. We demonstrate the merits and effectiveness of our algorithms in numerous batch and online learning tasks. We show that variants of stochastic gradient projection methods augmented with our efficient projection procedures outperform interior point methods, which are considered state-of-the-art optimization techniques. We also show that in online settings gradient updates with l 1 projections outperform the exponentiated gradient algorithm while obtaining models with high degrees of sparsity. 1. Introduction A prevalent machine learning approach for decision and prediction problems is to cast the learning task as penalized convex optimization. In penalized convex optimization we seek a set of parameters, gathered together in a vector w, which minimizes a convex objective function in w with an additional penalty term that assesses the complexity of w. Two commonly used penalties are the 1- norm and the square of the 2-norm of w. An alternative Appearing in Proceedings of the 25 th International Conference on Machine Learning, Helsinki, Finland, Copyright 2008 by the author(s)/owner(s). but mathematically equivalent approach is to cast the problem as a constrained optimization problem. In this setting we seek a minimizer of the objective function while constraining the solution to have a bounded norm. Many recent advances in statistical machine learning and related fields can be explained as convex optimization subject to a 1-norm constraint on the vector of parameters w. Imposing an l 1 constraint leads to notable benefits. First, it encourages sparse solutions, i.e a solution for which many components of w are zero. When the original dimension of w is very high, a sparse solution enables easier interpretation of the problem in a lower dimension space. For the usage of l 1 -based approach in statistical machine learning see for example (Tibshirani, 1996) and the references therein. Donoho (2006b) provided sufficient conditions for obtaining an optimal l 1 -norm solution which is sparse. Recent work on compressed sensing (Candes, 2006; Donoho, 2006a) further explores how l 1 constraints can be used for recovering a sparse signal sampled below the Nyquist rate. The second motivation for using l 1 constraints in machine learning problems is that in some cases it leads to improved generalization bounds. For example, Ng (2004) examined the task of PAC learning a sparse predictor and analyzed cases in which an l 1 constraint results in better solutions than an l 2 constraint. In this paper we re-examine the task of minimizing a convex function subject to an l 1 constraint on the norm of the solution. We are particularly interested in cases where the convex function is the average loss over a training set of m examples where each example is represented as a vector of high dimension. Thus, the solution itself is a high-dimensional vector as well. Recent work on l 2 constrained optimization for machine learning indicates that gradient-related projection algorithms are more efficient in approaching a solution of good generalization than second-order algorithms when the number of examples and
2 the dimension are large. For instance, Shalev-Shwartz et al. (2007) give recent state-of-the-art methods for solving large scale support vector machines. Adapting these recent results to projection methods onto the l 1 ball poses algorithmic challenges. While projections onto l 2 balls are straightforward to implement in linear time with the appropriate data structures, projection onto an l 1 ball is a more involved task. The main contribution of this paper is the derivation of gradient projections with l 1 domain constraints that can be performed almost as fast as gradient projection with l 2 constraints. Our starting point is an efficient method for projection onto the probabilistic simplex. The basic idea is to show that, after sorting the vector we need to project, it is possible to calculate the projection exactly in linear time. This idea was rediscovered multiple times. It was first described in an abstract and somewhat opaque form in the work of Gafni and Bertsekas (1984) and Bertsekas (1999). Crammer and Singer (2002) rediscovered a similar projection algorithm as a tool for solving the dual of multiclass SVM. Hazan (2006) essentially reuses the same algorithm in the context of online convex programming. Our starting point is another derivation of Euclidean projection onto the simplex that paves the way to a few generalizations. First we show that the same technique can also be used for projecting onto the l 1 -ball. This algorithm is based on sorting the components of the vector to be projected and thus requires O(n log(n)) time. We next present an improvement of the algorithm that replaces sorting with a procedure resembling median-search whose expected time complexity is O(n). In many applications, however, the dimension of the feature space is very high yet the number of features which attain non-zero values for an example may be very small. For instance, in our experiments with text classification in Sec. 7, the dimension is two million (the bigram dictionary size) while each example has on average one-thousand non-zero features (the number of unique tokens in a document). Applications where the dimensionality is high yet the number of on features in each example is small render our second algorithm useless in some cases. We therefore shift gears and describe a more complex algorithm that employs redblack trees to obtain a linear dependence on the number of non-zero features in an example and only logarithmic dependence on the full dimension. The key to our construction lies in the fact that we project vectors that are the sum of a vector in the l 1 -ball and a sparse vector they are almost in the l 1 -ball. In conclusion to the paper we present experimental results that demonstrate the merits of our algorithms. We compare our algorithms with several specialized interior point (IP) methods as well as general methods from the literature for solving l 1 -penalized problems on both synthetic and real data (the MNIST handwritten digit dataset and the Reuters RCV1 corpus) for batch and online learning. Our projection based methods outperform competing algorithms in terms of sparsity, and they exhibit faster convergence and lower regret than previous methods. 2. Notation and Problem Setting We start by establishing the notation used throughout the paper. The set of integers 1 through n is denoted by [n]. Scalars are denoted by lower case letters and vectors by lower case bold face letters. We use the notation w b to designate that all of the components of w are greater than b. We use as a shorthand for the Euclidean norm 2. The other norm we use throughout the paper is the 1- norm of the vector, v 1 = n v i. Lastly, we consider order statistics and sorting vectors frequently throughout this paper. To that end, we let v (i) denote the i th order statistic of v, that is, v (1) v (2)... v (n) for v R n. In the setting considered in this paper we are provided with a convex function L : R n R. Our goal is to find the minimum of L(w) subject to an l 1 -norm constraint on w. Formally, the problem we need to solve is minimize L(w) s.t. w w 1 z. (1) Our focus is on variants of the projected subgradient method for convex optimization (Bertsekas, 1999). Projected subgradient methods minimize a function L(w) subject to the constraint that w X, for X convex, by generating the sequence {w (t) } via w (t+1) = Π X (w (t) η t (t)) (2) where (t) is (an unbiased estimate of) the (sub)gradient of L at w (t) and Π X (x) = argmin y { x y y X} is Euclidean projection of x onto X. In the rest of the paper, the main algorithmic focus is on the projection step (computing an unbiased estimate of the gradient of L(w) is straightforward in the applications considered in this paper, as is the modification of w (t) by (t) ). 3. Euclidean Projection onto the Simplex For clarity, we begin with the task of performing Euclidean projection onto the positive simplex; our derivation naturally builds to the more efficient algorithms. As such, the most basic projection task we consider can be formally described as the following optimization problem, minimize w 1 2 w v 2 2 s.t. n w i = z, w i 0. (3)
3 When z = 1 the above is projection onto the probabilistic simplex. The Lagrangian of the problem in Eq. (3) is ( L(w,ζ) = 1 n ) 2 w v 2 + θ w i z ζ w, where θ R is a Lagrange multiplier and ζ R n + is a vector of non-negative Lagrange multipliers. Differentiating with respect to w i and comparing to zero gives the dl optimality condition, dw i = w i v i + θ ζ i = 0. The complementary slackness KKT condition implies that whenever w i > 0 we must have that ζ i = 0. Thus, if w i > 0 we get that w i = v i θ + ζ i = v i θ. (4) All the non-negative elements of the vector w are tied via a single variable, so knowing the indices of these elements gives a much simpler problem. Upon first inspection, finding these indices seems difficult, but the following lemma (Shalev-Shwartz & Singer, 2006) provides a key tool in deriving our procedure for identifying non-zero elements. Lemma 1. Let w be the optimal solution to the minimization problem in Eq. (3). Let s and j be two indices such that v s > v j. If w s = 0 then w j must be zero as well. Denoting by I the set of indices of the non-zero components of the sorted optimal solution, I = {i [n] : v (i) > 0}, we see that Lemma 1 implies that I = [ρ] for some 1 ρ n. Had we known ρ we could have simply used Eq. (4) to obtain that n n ρ ρ ( w i = w (i) = w (i) = v(i) θ ) = z and therefore ( ρ ) θ = 1 v (i) z ρ. (5) Given θ we can characterize the optimal solution for w as w i = max {v i θ, 0}. (6) We are left with the problem of finding the optimal ρ, and the following lemma (Shalev-Shwartz & Singer, 2006) provides a simple solution once we sort v in descending order. Lemma 2. Let w be the optimal solution to the minimization problem given in Eq. (3). Let µ denote the vector obtained by sorting v in a descending order. Then, the number of strictly positive elements in w is { ( j ) } ρ(z,µ) = max j [n] : µ j 1 µ r z > 0 j r=1 The pseudo-code describing the O(n log n) procedure for solving Eq. (3) is given in Fig. 1.. INPUT: A vector v R n and a scalar z > 0 Sort v into µ : µ 1 µ 2... µ { ( p j ) } Find ρ = max j [n] : µ j 1 j µ r z > 0 ( ρ ) r=1 Define θ = 1 ρ µ i z OUTPUT: w s.t. w i = max {v i θ, 0} Figure 1. Algorithm for projection onto the simplex. 4. Euclidean Projection onto the l 1 -Ball We next modify the algorithm to handle the more general l 1 -norm constraint, which gives the minimization problem minimize w R n w v 2 2 s.t. w 1 z. (7) We do so by presenting a reduction to the problem of projecting onto the simplex given in Eq. (3). First, we note that if v 1 z then the solution of Eq. (7) is w = v. Therefore, from now on we assume that v 1 > z. In this case, the optimal solution must be on the boundary of the constraint set and thus we can replace the inequality constraint w 1 z with an equality constraint w 1 = z. Having done so, the sole difference between the problem in Eq. (7) and the one in Eq. (3) is that in the latter we have an additional set of constraints, w 0. The following lemma indicates that each non-zero component of the optimal solution w shares the sign of its counterpart in v. Lemma 3. Let w be an optimal solution of Eq. (7). Then, for all i, w i v i 0. Proof. Assume by contradiction that the claim does not hold. Thus, there exists i for which w i v i < 0. Let ŵ be a vector such that ŵ i = 0 and for all j i we have ŵ j = w j. Therefore, ŵ 1 = w 1 w i z and hence ŵ is a feasible solution. In addition, w v 2 2 ŵ v 2 2 = (w i v i ) 2 (0 v i ) 2 = w 2 i 2w i v i > w 2 i > 0. We thus constructed a feasible solution ŵ which attains an objective value smaller than that of w. This leads us to the desired contradiction. Based on the above lemma and the symmetry of the objective, we are ready to present our reduction. Let u be a vector obtained by taking the absolute value of each component of v, u i = v i. We now replace Eq. (7) with minimize β R n β u 2 2 s.t. β 1 z and β 0. (8) Once we obtain the solution for the problem above we construct the optimal of Eq. (7) by setting w i = sign(v i )β i.
4 INPUT A vector v R n and a scalar z > 0 INITIALIZE U = [n] s = 0 ρ = 0 WHILE U φ PICK k U at random PARTITION U: G = {j U v j v k } L = {j U v j < v k } CALCULATE ρ = G ; s = j Gv j IF (s + s) (ρ + ρ)v k < z s = s + s ; ρ = ρ + ρ ; U L ELSE U G \ {k} SET θ = (s z)/ρ OUTPUT w s.t. v i = max {v i θ, 0} Figure 2. Linear time projection onto the simplex. 5. A Linear Time Projection Algorithm In this section we describe a more efficient algorithm for performing projections. To keep our presentation simple and easy to follow, we describe the projection algorithm onto the simplex. The generalization to the l 1 ball can straightforwardly incorporated into the efficient algorithm by the results from the previous section (we simply work in the algorithm with a vector of the absolute values of v, replacing the solution s components w i with sign(v i ) w i ). For correctness of the following discussion, we add another component to v (the vector to be projected), which we set to 0, thus v n+1 = 0 and v (n+1) = 0. Let us start by examining again Lemma 2. The lemma implies that the index ( ρ is the largest integer that still satisfies v (ρ) 1 ρ ρ r=1 v (r) z ) > 0. After routine algebraic manipulations the above can be rewritten in the following somewhat simpler form: ρ ( ) ρ+1 ( ) v(i) v (ρ) < z and v(i) v (ρ+1) z. (9) Given ρ and v (ρ) we slightly rewrite the value θ as follows, θ = 1 v j z. (10) ρ j:v j v (ρ) The task of projection can thus be distilled to the task of finding θ, which in turn reduces to the task of finding ρ and the pivot element v (ρ). Our problem thus resembles the task of finding an order statistic with an additional complicating factor stemming from the need to compute summations (while searching) of the form given by Eq. (9). Our efficient projection algorithm is based on a modification of the randomized median finding algorithm (Cormen et al., 2001). The algorithm computes partial sums just-in-time and has expected linear time complexity. The algorithm identifies ρ and the pivot value v (ρ) without sorting the vector v by using a divide and conquer procedure. The procedure works in rounds and on each round either eliminates elements shown to be strictly smaller than v (ρ) or updates the partial sum leading to Eq. (9). To do so the algorithm maintains a set of unprocessed elements of v. This set contains the components of v whose relationship to v (ρ) we do not know. We thus initially set U = [n]. On each round of the algorithm we pick at random an index k from the set U. Next, we partition the set U into two subsets G and L. G contains all the indices j U whose components v j > v k ; L contains those j U such that v j is smaller. We now face two cases related to the current summation of entries in v greater than the hypothesized v (ρ) (i.e. v k ). If j:v j v k (v j v k ) < z then by Eq. (9), v k v (ρ). In this case we know that all the elements in G participate in the sum defining θ as given by Eq. (9). We can discard G and set U to be L as we still need to further identify the remaining elements in L. If j:v j v k (v j v k ) z then the same rationale implies that v k < v (ρ). Thus, all the elements in L are smaller than v (ρ) and can be discarded. In this case we can remove the set L and v k and set U to be G \ {k}. The entire process ends when U is empty. Along the process we also keep track of the sum and the number of elements in v that we have found thus far to be no smaller than v (ρ), which is required in order not to recalculate partial sums. The pseudo-code describing the efficient projection algorithm is provided in Fig. 2. We keep the set of elements found to be greater than v (ρ) only implicitly. Formally, at each iteration of the algorithm we maintain a variable s, which is the sum of the elements in the set {v j : j U,v j v (ρ) }, and overload ρ to designate the cardinality of the this set throughout the algorithm. Thus, when the algorithms exits its main while loop, ρ is the maximizer defined in Lemma 1. Once the while loop terminates, we are left with the task of calculating θ using Eq. (10) and performing the actual projection. Since j:v j µ ρ v j is readily available to us as the variable s, we simply set θ to be (s z)/ρ and perform the projection as prescribed by Eq. (6). Though omitted here for lack of space, we can also extend the algorithms to handle the more general constraint that ai w i z for a i Efficient Projection for Sparse Gradients Before we dive into developing a new algorithm, we remind the reader of the iterations the minimization algorithm takes from Eq. (2): we generate a sequence {w (t) }
5 INPUT A balanced tree T and a scalar z > 0 INITIALIZE v =, ρ = n + 1, s = z CALL PIVOTSEARCH(root(T ), 0, 0) PROCEDURE PIVOTSEARCH(v, ρ, s) COMPUTE ˆρ = ρ + r(v) ; ŝ = s + σ(v) IF ŝ < vˆρ + z // v pivot IF v > v v = v ; ρ = ˆρ ; s = ŝ IF leaf T (v) RETURN θ = (s z)/ρ CALL PIVOTSEARCH(left T (v), ˆρ,ŝ) ELSE // v < pivot IF leaf T (v) RETURN θ = (s z)/ρ ( CALL PIVOTSEARCH rightt (v),ρ,s ) ENDPROCEDURE Figure 3. Efficient search of pivot value for sparse feature spaces. by iterating w (t+1) = Π W ( w (t) + g (t)) where g (t) = η t (t), W = {w w 1 z} and Π W is projection onto this set. In many applications the dimension of the feature space is very high yet the number of features which attain a non-zero value for each example is very small (see for instance our experiments on text documents in Sec. 7). It is straightforward to implement the gradient-related updates in time which is proportional to the number of non-zero features, but the time complexity of the projection algorithm described in the previous section is linear in the dimension. Therefore, using the algorithm verbatim could be prohibitively expensive in applications where the dimension is high yet the number of features which are on in each example is small. In this section we describe a projection algorithm that updates the vector w (t) with g (t) and scales linearly in the number of non-zero entries of g (t) and only logarithmically in the total number of features (i.e. non-zeros in w (t) ). The first step in facilitating an efficient projection for sparse feature spaces is to represent the projected vector as a raw vector v by incorporating a global shift that is applied to each non-zero component. Specifically, each projection step amounts to deducting θ from each component of v and thresholding the result at zero. Let us denote by θ t the shift value used on the t th iteration of the algorithm and by Θ t the cumulative sum of the shift values, Θ t = s t θ s. The representation we employ enables us to perform the step in which we deduct θ t from all the elements of the vector implicitly, adhering to the goal of performing a sublinear number of operations. As before, we assume that the goal is to project onto the simplex. Equipped with these variables, the j th component of the projected vector after t projected gradient steps can be written as max{v j Θ t,0}. The second substantial modification to the core algorithm is to keep only the non-zero components of the weight vector in a red-black tree (Cormen et al., 2001). The red-black tree facilitates an efficient search for the pivot element (v (ρ) ) in time which is logarithmic in the dimension, as we describe in the sequel. Once the pivot element is found we implicitly deduct θ t from all the non-zero elements in our weight vector by updating Θ t. We then remove all the components that are less than v (ρ) (i.e. less than Θ t ); this removal is efficient and requires only logarithmic time (Tarjan, 1983). The course of the algorithm is as follows. After t projected gradient iterations we have a vector v (t) whose non-zero elements are stored in a red-black tree T and a global deduction value Θ t which is applied to each non-zero component just-in-time, i.e. when needed. Therefore, each non-zero weight is accessed as v j Θ t while T does not contain the zero elements of the vector. When updating v with a gradient, we modify the vector v (t) by adding to it the gradientbased vector g (t) with k non-zero components. This update is done using k deletions (removing v i from T such that g (t) i 0) followed by k re-insertions of v i = (v i + g (t) i ) into T, which takes O(k log(n)) time. Next we find in O(log(n)) time the value of θ t. Fig. 3 contains the algorithm for this step; it is explained in the sequel. The last step removes all elements of the new raw vector v (t) +g (t) which become zero due to the projection. This step is discussed at the end of this section. In contrast to standard tree-based search procedure, to find θ t we need to find a pair of consecutive values in v that correspond to v (ρ) and v (ρ+1). We do so by keeping track of the smallest element that satisfies the left hand side of Eq. (9) while searching based on the condition given on the right hand side of the same equation. T is keyed on the values of the un-shifted vector v t. Thus, all the children in the left (right) sub-tree of a node v represent values in v t which are smaller (larger) than v. In order to efficiently find θ t we keep at each node the following information: (a) The value of the component, simply denoted as v. (b) The number of elements in the right sub-tree rooted at v, denoted r(v), including the node v. (c) The sum of the elements in the right sub-tree rooted at v, denoted σ(v), including the value v itself. Our goal is to identify the pivot element v (ρ) and its index ρ. In the previous section we described a simple condition for checking whether an element in v is greater or smaller than the pivot value. We now rewrite this expression yet one more time. A component with value v is not
6 smaller than the pivot iff the following holds: v j > {j : v j v} v + z. (11) j:v j v The variables in the red-black tree form the infrastructure for performing efficient recursive computation of Eq. (11). Note also that the condition expressed in Eq. (11) still holds when we do not deduct Θ t from all the elements in v. The search algorithm maintains recursively the number ρ and the sum s of the elements that have been shown to be greater or equal to the pivot. We start the search with the root node of T, and thus initially ρ = 0 and s = 0. Upon entering a new node v, the algorithm checks whether the condition given by Eq. (11) holds for v. Since ρ and s were computed for the parent of v, we need to incorporate the number and the sum of the elements that are larger than v itself. By construction, these variables are r(v) and σ(v), which we store at the node v itself. We let ˆρ = ρ + r(v) and ŝ = s + σ(v), and with these variables handy, Eq. (11) distills to the expression ŝ < vˆρ+z. If the inequality holds, we know that v is either larger than the pivot or it may be the pivot itself. We thus update our current hypothesis for µ ρ and ρ (designated as v and ρ in Fig. 3). We continue searching the left sub-tree (left T (v)) which includes all elements smaller than v. If inequality ŝ < vˆρ + z does not hold, we know that v < µ ρ, and we thus search the right subtree (right T (v)) and keep ρ and s intact. The process naturally terminates once we reach a leaf, where we can also calculate the correct value of θ using Eq. (10). Once we find θ t (if θ t 0) we update the global shift, Θ t+1 = Θ t + θ t. We need to discard all the elements in T smaller than Θ t+1, which we do using Tarjan s (1983) algorithm for splitting a red-black tree. This step is logarithmic in the total number of non-zero elements of v t. Thus, as the additional variables in the tree can be updated in constant time as a function of a node s child nodes in T, each of the operations previously described can be performed in logarthmic time (Cormen et al., 2001), giving us a total update time of O(k log(n)). 7. Experiments We now present experimental results demonstrating the effectiveness of the projection algorithms. We first report results for experiments with synthetic data and then move to experiments with high dimensional natural datasets. In our experiment with synthetic data, we compared variants of the projected subgradient algorithm (Eq. (2)) for l 1 -regularized least squares and l 1 -regularized logistic regression. We compared our methods to a specialized coordinate-descent solver for the least squares problem due to Friedman et al. (2007) and to very fast interior point Coordinate L1 Line L1 Batch IP Approximate Flops x Coordinate L1 Batch IP Approximate Flops x 10 9 Figure 4. Comparison of methods on l 1-regularized least squares. The left has dimension n = 800, the right n = 4000 methods for both least squares and logistic regression (Koh et al., 2007; Kim et al., 2007). The algorithms we use are batch projected gradient, stochastic projected subgradient, and batch projected gradient augmented with a backtracking line search (Koh et al., 2007). The IP and coordinatewise methods both solve regularized loss functions of the form f(w) = L(w) + λ w 1 rather than having an l 1 - domain constraint, so our objectives are not directly comparable. To surmount this difficulty, we first minimize L(w)+λ w 1 and use the 1-norm of the resulting solution w as the constraint for our methods. To generate the data for the least squares problem setting, we chose a w with entries distributed normally with 0 mean and unit variance and randomly zeroed 50% of the vector. The data matrix X R m n was random with entries also normally distributed. To generate target values for the least squares problem, we set y = Xw + ν, where the components of ν were also distributed normally at random. In the case of logistic regression, we generated data X and the vector w identically, but the targets y i were set to be sign(w x i ) with probability 90% and to sign(w x i ) otherwise. We ran two sets of experiments, one each for n = 800 and n = We also set the number of examples m to be equal to n. For the subgradient methods in these experiments and throughout the remainder, we set η t = η 0 / t, choosing η 0 to give reasonable performance. (η 0 too large will mean that the initial steps of the gradient method are not descent directions; the noise will quickly disappear because the step sizes are proportional to 1/ t). Fig. 4 and Fig. 5 contain the results of these experiments and plot f(w) f(w ) as a function of the number of floating point operations. From the figures, we see that the projected subgradient methods are generally very fast at the outset, getting us to an accuracy of f(w) f(w ) 10 2 quickly, but their rate of convergence slows over time. The fast projection algorithms we have developed, however, allow projected-subgradient methods to be very competitive with specialized methods, even on these relatively small problem sizes. On higher-dimension data sets interior point methods are infeasible or very slow. The rightmost graphs in Fig. 4 and Fig. 5 plot f(w) f(w ) as functions of floating point operations for least squares and logistic re-
7 L1 Line L1 Batch IP 10 2 L1 Full EG Full EG Stoch 10 2 L1 1 EG 1 L1 100 EG L1 Batch IP Approximate Flops x Approximate Flops x 10 9 Figure 5. Comparison of methods on l 1-regularized logistic regression. The left has dimension n = 800, the right n = 4000 gression with dimension n = These results indicate that in high dimensional feature spaces, the asymptotically faster convergence of IP methods is counteracted by their quadratic dependence on the dimension of the space. We also ran a series of experiments on two real datasets with high dimensionality: the Reuters RCV1 Corpus (Lewis et al., 2004) and the MNIST handwritten digits database. The Reuters Corpus has 804,414 examples; with simple stemming and stop-wording, there are 112,919 unigram features and 1,946,684 bigram features. With our preprocessing, the unigrams have a sparsity of 1.2% and the bigrams have sparsity of.26%. We performed l 1 -constrained binary logistic regression on the CCAT category from RCV1 (classifying a document as corporate/industrial) using unigrams in a batch setting and bigrams in an online setting. The MNIST dataset consists of 60,000 training examples and a 10,000 example test set and has 10-classes; each image is a gray-scale image, which we represent as x i R 784. Rather than directly use the input x i, however, we learned weights w j using the following Kernel-based similarity function for each class j {1,...,10}: k(x,j) = { 1 if yi = j w ji σ ji K(x i,x), σ ji = 1 otherwise. i S In the above, K is a Gaussian kernel function, so that K(x,y) = exp( x y 2 /25), and S is a 2766 element support set. We put an l 1 constraint on each w j, giving us the following multiclass objective with dimension 27,660: 1 m minimize w m (1 log + ) r y i e k(xi,r) k(xi,yi) s.t. w j 1 z,w j 0. (12) As a comparison to our projected subgradient methods on real data, we used a method known in the literature as either entropic descent, a special case of mirror descent (Beck & Teboulle, 2003), or exponentiated gradient (EG) (Kivinen & Warmuth, 1997). EG maintains a weight vector w subject to the constraint that i w i = z and w 0; it can easily be extended to work with negative weights under a 1-norm constraint by maintaining two vectors w + and w. We compare against EG since it works well in very high di Time (CPU seconds) Time (CPU seconds) Figure 6. EG and projected subgradient methods on RCV1. mensional spaces, and it very quickly identifies and shrinks weights for irrelevant features (Kivinen & Warmuth, 1997). At every step of EG we update w (t+1) i = w(t) i exp ( η t i f(w (t) ) ) (13) Z t where Z t normalizes so that i w(t+1) i = z and i f denotes the i th entry of the gradient of f, the function to be minimized. EG can actually be viewed as a projected subgradient method using generalized relative entropy (D(x y) = i x i log xi y i x i + y i ) as the distance function for projections (Beck & Teboulle, 2003). We can replace i f with ˆ i f in Eq. (13), an unbiased estimator of the gradient of f, to get stochastic EG. A step size η t 1/ t guarantees a convergence rate of O( log n/t). For each experiment with EG, however, we experimented with learning rates proportional to 1/t, 1/ t, and constant, as well as different initial step-sizes; to make EG as competitive as possible, we chose the step-size and rate for which EG performed best on each individual test.. Results for our batch experiments learning a logistic classifier for CCAT on the Reuters corpus can be seen in Fig. 6. The figure plots the binary logistic loss of the different algorithms minus the optimal log loss as a function of CPU time. On the left side Fig. 6, we used projected gradient descent and stochastic gradient descent using 25% of the training data to estimate the gradient, and we used the algorithm of Fig. 2 for the projection steps. We see that l 1 - projections outperform EG both in terms of convergence speed and empirical log-loss. On the right side of the figure, we performed stochastic descent using only 1 training example or 100 training examples to estimate the gradient, using Fig. 3 to project. When the gradient is sparse, updates for EG are O(k) (where k is the number of non-zeros in the gradient), so EG has a run-time advantage over l 1 - projections when the gradient is very sparse. This advantage can be seen in the right side of Fig. 6. For MNIST, with dense features, we ran a similar series of tests to those we ran on the Reuters Corpus. We plot the multiclass logistic loss from Eq. (12) over time (as a function of the number gradient evaluations) in Fig. 7. The left side of Fig. 7 compares EG and gradient descent using
8 EG L1 EG L1 ECAT (versus more than 15% and 20% respectively for EG) Acknowledgments We thank the anonymous reviewers for their helpful and insightful comments. Cumulative Loss Gradient Evaluations Stochastic Subgradient Evaluations Figure 7. MNIST multiclass logistic loss as a function of the number of gradient steps. The left uses true gradients, the right stochastic subgradients x 10 5 EG CCAT EG ECAT L1 CCAT L1 ECAT Training Examples x 10 5 % Sparsity % of Total Features % of Total Seen Training Examples x 10 5 Figure 8. Online learning of bigram classifier on RCV1. Left is the cumulative loss, right shows sparsity over time. the true gradient while the right figure compares stochastic EG and stochastic gradient descent using only 1% of the training set to estimate the gradient. On top of outperforming EG in terms of convergence rate and loss, the l 1 - projection methods also gave sparsity, zeroing out between 10 and 50% of the components of each class vector w j in the MNIST experiments, while EG gives no sparsity. As a last experiment, we ran an online learning test on the RCV1 dataset using bigram features, comparing l 1 - projections to using decreasing step sizes given by Zinkevich (2003) to exponential gradient updates. The l 1 - projections are computationally feasible because of algorithm 3, as the dimension of our feature space is nearly 2 million (using the expected linear-time algorithm of Fig. 2 takes 15 times as long to compute the projection for the sparse updates in online learning). We selected the bound on the 1-norm of the weights to give the best online regret of all our experiments (in our case, the bound was 100). The results of this experiment are in Fig. 8. The left figure plots the cumulative log-loss for the CCAT and ECAT binary prediction problems as a function of the number of training examples, while the right hand figure plots the sparsity of the l 1 -constrained weight vector both as a function of the dimension and as a function of the number of features actually seen. The l 1 -projecting learner maintained an active set with only about 5% non-zero components; the EG updates have no sparsity whatsoever. Our online l 1 -projections outperform EG updates in terms of the online regret (cumulative log-loss), and the l 1 -projection updates also achieve a classification error rate of 11.9% over all the examples on the CCAT task and 14.9% on References Beck, A., & Teboulle, M. (2003). Mirror descent and nonlinear projected subgradient methods for convex optimization. Operations Research Letters, 31, Bertsekas, D. (1999). Nonlinear programming. Athena Scientific. Candes, E. J. (2006). Compressive sampling. Proc. of the Int. Congress of Math., Madrid, Spain. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Introduction to algorithms. MIT Press. Crammer, K., & Singer, Y. (2002). On the learnability and design of output codes for multiclass problems. Machine Learning, 47. Donoho, D. (2006a). Compressed sensing. Technical Report, Stanford University. Donoho, D. (2006b). For most large underdetermined systems of linear equations, the minimal l 1-norm solution is also the sparsest solution. Comm. Pure Appl. Math. 59. Friedman, J., Hastie, T., & Tibshirani, R. (2007). Pathwise coordinate optimization. Annals of Applied Statistics, 1, Gafni, E., & Bertsekas, D. P. (1984). Two-metric projection methods for constrained optimization. SIAM Journal on Control and Optimization, 22, Hazan, E. (2006). Approximate convex optimization by online game playing. Unpublished manuscript. Kim, S.-J., Koh, K., Lustig, M., Boyd, S., & Gorinevsky, D. (2007). An interior-point method for large-scale l 1-regularized least squares. IEEE Journal on Selected Topics in Signal Processing, 4, Kivinen, J., & Warmuth, M. (1997). Exponentiated gradient versus gradient descent for linear predictors. Information and Computation, 132, Koh, K., Kim, S.-J., & Boyd, S. (2007). An interior-point method for large-scale l 1-regularized logistic regression. Journal of Machine Learning Research, 8, Lewis, D., Yang, Y., Rose, T., & Li, F. (2004). Rcv1: A new benchmark collection for text categorization research. Journal of Machine Learning Research, 5, Ng, A. (2004). Feature selection, l 1 vs. l 2 regularization, and rotational invariance. Proceedings of the Twenty-First International Conference on Machine Learning. Shalev-Shwartz, S., & Singer, Y. (2006). Efficient learning of label ranking by soft projections onto polyhedra. Journal of Machine Learning Research, 7 (July), Shalev-Shwartz, S., Singer, Y., & Srebro, N. (2007). Pegasos: Primal estimated sub-gradient solver for SVM. Proceedings of the 24th International Conference on Machine Learning. Tarjan, R. E. (1983). Data structures and network algorithms. Society for Industrial and Applied Mathematics. Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. J. Royal. Statist. Soc B., 58, Zinkevich, M. (2003). Online convex programming and generalized infinitesimal gradient ascent. Proceedings of the Twentieth International Conference on Machine Learning.
Table 1: Summary of the settings and parameters employed by the additive PA algorithm for classification, regression, and uniclass.
Online Passive-Aggressive Algorithms Koby Crammer Ofer Dekel Shai Shalev-Shwartz Yoram Singer School of Computer Science & Engineering The Hebrew University, Jerusalem 91904, Israel {kobics,oferd,shais,singer}@cs.huji.ac.il
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Machine Learning Big Data using Map Reduce
Machine Learning Big Data using Map Reduce By Michael Bowles, PhD Where Does Big Data Come From? -Web data (web logs, click histories) -e-commerce applications (purchase histories) -Retail purchase histories
Big Data - Lecture 1 Optimization reminders
Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Schedule Introduction Major issues Examples Mathematics
Introduction to Online Learning Theory
Introduction to Online Learning Theory Wojciech Kot lowski Institute of Computing Science, Poznań University of Technology IDSS, 04.06.2013 1 / 53 Outline 1 Example: Online (Stochastic) Gradient Descent
The p-norm generalization of the LMS algorithm for adaptive filtering
The p-norm generalization of the LMS algorithm for adaptive filtering Jyrki Kivinen University of Helsinki Manfred Warmuth University of California, Santa Cruz Babak Hassibi California Institute of Technology
Simple and efficient online algorithms for real world applications
Simple and efficient online algorithms for real world applications Università degli Studi di Milano Milano, Italy Talk @ Centro de Visión por Computador Something about me PhD in Robotics at LIRA-Lab,
1 Introduction. 2 Prediction with Expert Advice. Online Learning 9.520 Lecture 09
1 Introduction Most of the course is concerned with the batch learning problem. In this lecture, however, we look at a different model, called online. Let us first compare and contrast the two. In batch
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
Distributed Machine Learning and Big Data
Distributed Machine Learning and Big Data Sourangshu Bhattacharya Dept. of Computer Science and Engineering, IIT Kharagpur. http://cse.iitkgp.ac.in/~sourangshu/ August 21, 2015 Sourangshu Bhattacharya
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
Nonlinear Optimization: Algorithms 3: Interior-point methods
Nonlinear Optimization: Algorithms 3: Interior-point methods INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris [email protected] Nonlinear optimization c 2006 Jean-Philippe Vert,
Online Convex Optimization
E0 370 Statistical Learning heory Lecture 19 Oct 22, 2013 Online Convex Optimization Lecturer: Shivani Agarwal Scribe: Aadirupa 1 Introduction In this lecture we shall look at a fairly general setting
Statistical machine learning, high dimension and big data
Statistical machine learning, high dimension and big data S. Gaïffas 1 14 mars 2014 1 CMAP - Ecole Polytechnique Agenda for today Divide and Conquer principle for collaborative filtering Graphical modelling,
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Support Vector Machines
Support Vector Machines Charlie Frogner 1 MIT 2011 1 Slides mostly stolen from Ryan Rifkin (Google). Plan Regularization derivation of SVMs. Analyzing the SVM problem: optimization, duality. Geometric
Support Vector Machines with Clustering for Training with Very Large Datasets
Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France [email protected] Massimiliano
Making Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University [email protected] [email protected] I. Introduction III. Model The goal of our research
Linear Threshold Units
Linear Threshold Units w x hx (... w n x n w We assume that each feature x j and each weight w j is a real number (we will relax this later) We will study three different algorithms for learning linear
Linear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
Numerisches Rechnen. (für Informatiker) M. Grepl J. Berger & J.T. Frings. Institut für Geometrie und Praktische Mathematik RWTH Aachen
(für Informatiker) M. Grepl J. Berger & J.T. Frings Institut für Geometrie und Praktische Mathematik RWTH Aachen Wintersemester 2010/11 Problem Statement Unconstrained Optimality Conditions Constrained
Support Vector Machine (SVM)
Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Online Lazy Updates for Portfolio Selection with Transaction Costs
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence Online Lazy Updates for Portfolio Selection with Transaction Costs Puja Das, Nicholas Johnson, and Arindam Banerjee Department
A Simple Introduction to Support Vector Machines
A Simple Introduction to Support Vector Machines Martin Law Lecture for CSE 802 Department of Computer Science and Engineering Michigan State University Outline A brief history of SVM Large-margin linear
A Logistic Regression Approach to Ad Click Prediction
A Logistic Regression Approach to Ad Click Prediction Gouthami Kondakindi [email protected] Satakshi Rana [email protected] Aswin Rajkumar [email protected] Sai Kaushik Ponnekanti [email protected] Vinit Parakh
Foundations of Machine Learning On-Line Learning. Mehryar Mohri Courant Institute and Google Research [email protected]
Foundations of Machine Learning On-Line Learning Mehryar Mohri Courant Institute and Google Research [email protected] Motivation PAC learning: distribution fixed over time (training and test). IID assumption.
Large Scale Learning to Rank
Large Scale Learning to Rank D. Sculley Google, Inc. [email protected] Abstract Pairwise learning to rank methods such as RankSVM give good performance, but suffer from the computational burden of optimizing
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
STA 4273H: Statistical Machine Learning
STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! [email protected]! http://www.cs.toronto.edu/~rsalakhu/ Lecture 6 Three Approaches to Classification Construct
Support Vector Machines Explained
March 1, 2009 Support Vector Machines Explained Tristan Fletcher www.cs.ucl.ac.uk/staff/t.fletcher/ Introduction This document has been written in an attempt to make the Support Vector Machines (SVM),
Machine Learning and Pattern Recognition Logistic Regression
Machine Learning and Pattern Recognition Logistic Regression Course Lecturer:Amos J Storkey Institute for Adaptive and Neural Computation School of Informatics University of Edinburgh Crichton Street,
24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725
Duality in General Programs Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: duality in linear programs Given c R n, A R m n, b R m, G R r n, h R r : min x R n c T x max u R m, v R r b T
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
Federated Optimization: Distributed Optimization Beyond the Datacenter
Federated Optimization: Distributed Optimization Beyond the Datacenter Jakub Konečný School of Mathematics University of Edinburgh [email protected] H. Brendan McMahan Google, Inc. Seattle, WA 98103
Solving polynomial least squares problems via semidefinite programming relaxations
Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose
Supporting Online Material for
www.sciencemag.org/cgi/content/full/313/5786/504/dc1 Supporting Online Material for Reducing the Dimensionality of Data with Neural Networks G. E. Hinton* and R. R. Salakhutdinov *To whom correspondence
Lecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
Big Data Analytics: Optimization and Randomization
Big Data Analytics: Optimization and Randomization Tianbao Yang, Qihang Lin, Rong Jin Tutorial@SIGKDD 2015 Sydney, Australia Department of Computer Science, The University of Iowa, IA, USA Department of
Statistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
Class #6: Non-linear classification. ML4Bio 2012 February 17 th, 2012 Quaid Morris
Class #6: Non-linear classification ML4Bio 2012 February 17 th, 2012 Quaid Morris 1 Module #: Title of Module 2 Review Overview Linear separability Non-linear classification Linear Support Vector Machines
Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
10. Proximal point method
L. Vandenberghe EE236C Spring 2013-14) 10. Proximal point method proximal point method augmented Lagrangian method Moreau-Yosida smoothing 10-1 Proximal point method a conceptual algorithm for minimizing
Accelerated Parallel Optimization Methods for Large Scale Machine Learning
Accelerated Parallel Optimization Methods for Large Scale Machine Learning Haipeng Luo Princeton University [email protected] Patrick Haffner and Jean-François Paiement AT&T Labs - Research {haffner,jpaiement}@research.att.com
Linear Programming. April 12, 2005
Linear Programming April 1, 005 Parts of this were adapted from Chapter 9 of i Introduction to Algorithms (Second Edition) /i by Cormen, Leiserson, Rivest and Stein. 1 What is linear programming? The first
Fast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik [email protected] Abstract This paper provides an introduction to the design of augmented data structures that offer
Logistic Regression for Spam Filtering
Logistic Regression for Spam Filtering Nikhila Arkalgud February 14, 28 Abstract The goal of the spam filtering problem is to identify an email as a spam or not spam. One of the classic techniques used
Online Learning. 1 Online Learning and Mistake Bounds for Finite Hypothesis Classes
Advanced Course in Machine Learning Spring 2011 Online Learning Lecturer: Shai Shalev-Shwartz Scribe: Shai Shalev-Shwartz In this lecture we describe a different model of learning which is called online
DUOL: A Double Updating Approach for Online Learning
: A Double Updating Approach for Online Learning Peilin Zhao School of Comp. Eng. Nanyang Tech. University Singapore 69798 [email protected] Steven C.H. Hoi School of Comp. Eng. Nanyang Tech. University
Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016
Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with
Parallel Data Mining. Team 2 Flash Coders Team Research Investigation Presentation 2. Foundations of Parallel Computing Oct 2014
Parallel Data Mining Team 2 Flash Coders Team Research Investigation Presentation 2 Foundations of Parallel Computing Oct 2014 Agenda Overview of topic Analysis of research papers Software design Overview
CSCI567 Machine Learning (Fall 2014)
CSCI567 Machine Learning (Fall 2014) Drs. Sha & Liu {feisha,yanliu.cs}@usc.edu September 22, 2014 Drs. Sha & Liu ({feisha,yanliu.cs}@usc.edu) CSCI567 Machine Learning (Fall 2014) September 22, 2014 1 /
Sub-class Error-Correcting Output Codes
Sub-class Error-Correcting Output Codes Sergio Escalera, Oriol Pujol and Petia Radeva Computer Vision Center, Campus UAB, Edifici O, 08193, Bellaterra, Spain. Dept. Matemàtica Aplicada i Anàlisi, Universitat
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
OPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Lecture 10: Regression Trees
Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Lecture 2: The SVM classifier
Lecture 2: The SVM classifier C19 Machine Learning Hilary 2015 A. Zisserman Review of linear classifiers Linear separability Perceptron Support Vector Machine (SVM) classifier Wide margin Cost function
Lecture 8 February 4
ICS273A: Machine Learning Winter 2008 Lecture 8 February 4 Scribe: Carlos Agell (Student) Lecturer: Deva Ramanan 8.1 Neural Nets 8.1.1 Logistic Regression Recall the logistic function: g(x) = 1 1 + e θt
LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014
LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph
Date: April 12, 2001. Contents
2 Lagrange Multipliers Date: April 12, 2001 Contents 2.1. Introduction to Lagrange Multipliers......... p. 2 2.2. Enhanced Fritz John Optimality Conditions...... p. 12 2.3. Informative Lagrange Multipliers...........
APPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder
APPM4720/5720: Fast algorithms for big data Gunnar Martinsson The University of Colorado at Boulder Course objectives: The purpose of this course is to teach efficient algorithms for processing very large
An Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],
Lecture 6: Logistic Regression
Lecture 6: CS 194-10, Fall 2011 Laurent El Ghaoui EECS Department UC Berkeley September 13, 2011 Outline Outline Classification task Data : X = [x 1,..., x m]: a n m matrix of data points in R n. y { 1,
Large Linear Classification When Data Cannot Fit In Memory
Large Linear Classification When Data Cannot Fit In Memory ABSTRACT Hsiang-Fu Yu Dept. of Computer Science National Taiwan University Taipei 106, Taiwan [email protected] Kai-Wei Chang Dept. of Computer
Several Views of Support Vector Machines
Several Views of Support Vector Machines Ryan M. Rifkin Honda Research Institute USA, Inc. Human Intention Understanding Group 2007 Tikhonov Regularization We are considering algorithms of the form min
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
GI01/M055 Supervised Learning Proximal Methods
GI01/M055 Supervised Learning Proximal Methods Massimiliano Pontil (based on notes by Luca Baldassarre) (UCL) Proximal Methods 1 / 20 Today s Plan Problem setting Convex analysis concepts Proximal operators
Class-specific Sparse Coding for Learning of Object Representations
Class-specific Sparse Coding for Learning of Object Representations Stephan Hasler, Heiko Wersing, and Edgar Körner Honda Research Institute Europe GmbH Carl-Legien-Str. 30, 63073 Offenbach am Main, Germany
STATISTICA Formula Guide: Logistic Regression. Table of Contents
: Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary
Proximal mapping via network optimization
L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Introduction to Logistic Regression
OpenStax-CNX module: m42090 1 Introduction to Logistic Regression Dan Calderon This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Abstract Gives introduction
Programming Exercise 3: Multi-class Classification and Neural Networks
Programming Exercise 3: Multi-class Classification and Neural Networks Machine Learning November 4, 2011 Introduction In this exercise, you will implement one-vs-all logistic regression and neural networks
large-scale machine learning revisited Léon Bottou Microsoft Research (NYC)
large-scale machine learning revisited Léon Bottou Microsoft Research (NYC) 1 three frequent ideas in machine learning. independent and identically distributed data This experimental paradigm has driven
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Nonlinear Programming Methods.S2 Quadratic Programming
Nonlinear Programming Methods.S2 Quadratic Programming Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard A linearly constrained optimization problem with a quadratic objective
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Stochastic gradient methods for machine learning
Stochastic gradient methods for machine learning Francis Bach INRIA - Ecole Normale Supérieure, Paris, France Joint work with Eric Moulines, Nicolas Le Roux and Mark Schmidt - April 2013 Context Machine
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Group Sparse Coding. Fernando Pereira Google Mountain View, CA [email protected]. Dennis Strelow Google Mountain View, CA strelow@google.
Group Sparse Coding Samy Bengio Google Mountain View, CA [email protected] Fernando Pereira Google Mountain View, CA [email protected] Yoram Singer Google Mountain View, CA [email protected] Dennis Strelow
CS/COE 1501 http://cs.pitt.edu/~bill/1501/
CS/COE 1501 http://cs.pitt.edu/~bill/1501/ Lecture 01 Course Introduction Meta-notes These notes are intended for use by students in CS1501 at the University of Pittsburgh. They are provided free of charge
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
On Adaboost and Optimal Betting Strategies
On Adaboost and Optimal Betting Strategies Pasquale Malacaria School of Electronic Engineering and Computer Science Queen Mary, University of London Email: [email protected] Fabrizio Smeraldi School of
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step
Chapter 10: Network Flow Programming
Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,
4.1 Learning algorithms for neural networks
4 Perceptron Learning 4.1 Learning algorithms for neural networks In the two preceding chapters we discussed two closely related models, McCulloch Pitts units and perceptrons, but the question of how to
