Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2023
Surprise: Result List Truncation via Extreme Value Theory
SIGIR '23: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 2404–2408https://doi.org/10.1145/3539618.3592066Work in information retrieval has largely been centered around ranking and relevance: given a query, return some number of results ordered by relevance to the user. The problem of result list truncation, or where to truncate the ranked list of results, ...
- ArticleApril 2023
Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation
AbstractKey points detection is crucial for signal analysis by marking the identification points of specific events. Deep learning methods have been introduced into key points detection tasks due to their significant representation learning ability. ...
- research-articleNovember 2022
Asymptotically Optimal Control of a Centralized Dynamic Matching Market with General Utilities
The utility of a match in a two-sided matching market often depends on a variety of characteristics of the two agents (e.g., a buyer and a seller) to be matched. In contrast to the matching market literature, this utility may best be modeled by a general ...
We consider a matching market where buyers and sellers arrive according to independent Poisson processes at the same rate and independently abandon the market if not matched after an exponential amount of time with the same mean. In this centralized ...
- research-articleJanuary 2023
Flow-Level Tail Latency Estimation and Verification Based on Extreme Value Theory
CNSM '22: Proceedings of the 18th International Conference on Network and Service ManagementArticle No.: 29, Pages 1–5Modeling extreme latencies in communication networks can contribute information to network planning and flow admission under service level agreements. Extreme Value Theory is such an approach that utilizes real-world measurement data. It is often ...
- research-articleAugust 2022
Beyond Point Prediction: Capturing Zero-Inflated & Heavy-Tailed Spatiotemporal Data with Deep Extreme Mixture Models
KDD '22: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 2020–2028https://doi.org/10.1145/3534678.3539464Zero-inflated, heavy-tailed spatiotemporal data is common across science and engineering, from climate science to meteorology and seismology. A central modeling objective in such settings is to forecast the intensity, frequency, and timing of extreme and ...
-
- research-articleMay 2022
Large Fork-Join Queues with Nearly Deterministic Arrival and Service Times
Mathematics of Operations Research (MOOR), Volume 47, Issue 2Pages 1335–1364https://doi.org/10.1287/moor.2021.1171In this paper, we study an N server fork-join queue with nearly deterministic arrival and service times. Specifically, we present a fluid limit for the maximum queue length as N→∞. This fluid limit depends on the initial number of tasks. In order to prove ...
- research-articleMarch 2022
Tracking clusters and anomalies in evolving data streams
Statistical Analysis and Data Mining (STADM), Volume 15, Issue 2Pages 156–178https://doi.org/10.1002/sam.11552AbstractData‐driven anomaly detection methods typically build a model for the normal behavior of the target system, and score each data instance with respect to this model. A threshold is invariably needed to identify data instances with high (or low) ...
- research-articleApril 2022
Fairness Metrics for Recommender Systems
icWCSN '22: Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor NetworksPages 89–92https://doi.org/10.1145/3514105.3514120Fairness is a hot topic in recommender system research in recent years. Researchers have resorted to regularization and other techniques to reduce fairness problems. However, a lot of research literature adopts classic evaluation metrics for recommender ...
- research-articleDecember 2020
Extreme vocabulary learning
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 14, Issue 6https://doi.org/10.1007/s11704-019-8249-3AbstractRegarding extreme value theory, the unseen novel classes in the open-set recognition can be seen as the extreme values of training classes. Following this idea, we introduce the margin and coverage distribution to model the training classes. A ...
- research-articleNovember 2018
Data streams anomaly detection algorithm based on self-set threshold
ICCIP '18: Proceedings of the 4th International Conference on Communication and Information ProcessingPages 18–26https://doi.org/10.1145/3290420.3290451With the rapid development of big data, smart city and artificial intelligence, anomaly detection technology for data streams has been widely used in big data detection, video surveillance, network intrusion detection, intelligent security analysis and ...
- research-articleMarch 2018
On the Reliability and Tightness of GP and Exponential Models for Probabilistic WCET Estimation
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 23, Issue 3Article No.: 39, Pages 1–27https://doi.org/10.1145/3185154As computer architectures evolve, guaranteeing that Real-Time Systems’ (RTSs’) timing requirements are met through Worst Case Execution Time (WCET) upper bounds becomes increasingly difficult. Techniques such as Measurement-Based Probabilistic Timing ...
- research-articleAugust 2017
Anomaly Detection in Streams with Extreme Value Theory
KDD '17: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data MiningPages 1067–1075https://doi.org/10.1145/3097983.3098144Anomaly detection in time series has attracted considerable attention due to its importance in many real-world applications including intrusion detection, energy management and finance. Most approaches for detecting outliers rely on either manually set ...
- research-articleJune 2017
Measurement-Based Worst-Case Execution Time Estimation Using the Coefficient of Variation
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 22, Issue 4Article No.: 72, Pages 1–29https://doi.org/10.1145/3065924Extreme Value Theory (EVT) has been historically used in domains such as finance and hydrology to model worst-case events (e.g., major stock market incidences). EVT takes as input a sample of the distribution of the variable to model and fits the tail ...
- articleJanuary 2016
One-class classification of point patterns of extremes
Novelty detection or one-class classification starts from a model describing some type of 'normal behaviour' and aims to classify deviations from this model as being either novelties or anomalies.
In this paper the problem of novelty detection for point ...
- research-articleAugust 2015
A Probabilistic Model for Information Retrieval Based on Maximum Value Distribution
SIGIR '15: Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 585–594https://doi.org/10.1145/2766462.2767762The main goal of a retrieval model is to measure the degree of relevance of a document with respect to the given query. Probabilistic models are widely used to measure the likelihood of relevance of a document by combining within document term frequency ...
- research-articleAugust 2015
Predicting Cyber Attack Rates With Extreme Values
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 8Pages 1666–1677https://doi.org/10.1109/TIFS.2015.2422261It is important to understand to what extent, and in what perspectives, cyber attacks can be predicted. Despite its evident importance, this problem was not investigated until very recently, when we proposed using the innovative methodology of gray-box ...
- articleMay 2015
Statistical Regression Analysis of Threshold Excesses with Systematically Missing Covariates
Multiscale Modeling and Simulation (MMS), Volume 13, Issue 2Pages 594–613https://doi.org/10.1137/140972184This work presents a computationally efficient, semiparametric, and nonstationary framework for statistical regression analysis of threshold excesses with systematically missing covariates based on the Generalized Pareto Distribution (GPD). The involved ...
- research-articleMarch 2015
ApproxHadoop: Bringing Approximations to MapReduce Frameworks
ASPLOS '15: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating SystemsPages 383–397https://doi.org/10.1145/2694344.2694351We propose and evaluate a framework for creating and running approximation-enabled MapReduce programs. Specifically, we propose approximation mechanisms that fit naturally into the MapReduce paradigm, including input data sampling, task dropping, and ...
Also Published in:
ACM SIGPLAN Notices: Volume 50 Issue 4ACM SIGARCH Computer Architecture News: Volume 43 Issue 1 - ArticleNovember 2014
Distribution and Dependence of Extremes in Network Sampling Processes
SITIS '14: Proceedings of the 2014 Tenth International Conference on Signal-Image Technology and Internet-Based SystemsPages 331–338https://doi.org/10.1109/SITIS.2014.91We explore the dependence structure in the sampled sequence of complex networks. We consider randomized algorithms to sample the nodes and study external properties in any associated stationary sequence of characteristics of interest like node degrees, ...
- research-articleJuly 2014
Online model racing based on extreme performance
GECCO '14: Proceedings of the 2014 Annual Conference on Genetic and Evolutionary ComputationPages 1351–1358https://doi.org/10.1145/2576768.2598336Racing algorithms are often used for offline model selection, where models are compared in terms of their average performance over a collection of problems. In this paper, we present a new racing algorithm variant, Max-Race, which makes decisions based ...