2013
Autores
Gama, J; Kosina, P; Almeida, E;
Publicação
DISCOVERY SCIENCE
Abstract
The presence of anomalies in data compromises data quality and can reduce the effectiveness of learning algorithms. Standard data mining methodologies refer to data cleaning as a pre-processing before the learning task. The problem of data cleaning is exacerbated when learning in the computational model of data streams. In this paper we present a streaming algorithm for learning classification rules able to detect contextual anomalies in the data. Contextual anomalies are surprising attribute values in the context defined by the conditional part of the rule. For each example we compute the degree of anomaliness based on the probability of the attribute-values given the conditional part of the rule covering the example. The examples with high degree of anomaliness are signaled to the user and not used to train the classifier. The experimental evaluation in real-world data sets shows the ability to discover anomalous examples in the data. The main advantage of the proposed method is the ability to inform the context and explain why the anomaly occurs.
2013
Autores
Clemente, FM; Couceiro, MS; Martins, FML; Dias, G; Mendes, R;
Publicação
JOURNAL OF HUMAN KINETICS
Abstract
The performance of football players within game context can be analyzed based on their ability to break or (re)balance the attacker-defender dyad. In this context, the analysis of each sub-phase (e.g., 1v1, 2v2) presents a feature that needs to be taken into account in sports analysis. This study aims to investigate the interpersonal dynamics dyad formed by the attacker and the defender in 1v1 situations with a goalkeeper. A sample of 11 football male players (age: 17.91 +/- 1.04 years) with 8.6 +/- 1.52 years of practice experience participated in the study. Analyzing the 1v1 sub-phase, results show that the distance, speed and angular amplitude between the attacker and the defender increases, especially when the attacker attempts to overtake the defender (i.e., score a goal). We conclude that decision-making emerges from the perception that players draw from the action, actively and consistently interacting to find solutions to emerging problems within the game context.
2013
Autores
Ali, HIAA; Pinho, LM; Akesson, B;
Publicação
2013 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA)
Abstract
Designing cost-efficient multi-core real-time systems requires efficient techniques to allocate applications to cores while satisfying their timing constraints. However, existing approaches typically allocate using a First-Fit algorithm, which does not consider the execution time and potential parallelism of paths in the applications, resulting in over-dimensioned systems. This work addresses this problem by proposing a new heuristic algorithm, Critical-Path-First, for the allocation of real-time streaming applications modeled as dataflow graphs on 2D mesh multi-core processors. The main criteria of the algorithm is to allocate paths that have the highest impact on the execution time of the application first. It is also able to exploit parallelism in the application by allocating parallel paths on different cores. Experimental evaluation shows that the proposed heuristic improves the resource utilization by allocating up to 7% more applications and it minimizes the average end-to-end worst-case response time of the allocated applications by up to 31%.
2013
Autores
Wellings, A; Pinho, LM;
Publicação
Ada User Journal
Abstract
The second session on the topic of Multiprocessor Issues reviewed and evaluated the efficacy of the Ada 2012 support in the area of multiprocessor resource control. Andy Wellings, the Chair presented a proposal of an API that allowed controlling and extending the queue locks, and implementing the access control protocols. In the second part of the session, Miguel Pinho started by presenting an overview of Transactional Memory (TM), providing a quick overview of how in this approach atomic sections are executed concurrently and speculatively, in isolation. In the third topic of the session, the Chair started by providing an overview of the Reference Manual wordings concerning the access and control protocols for Protected Objects, noting that both the RM and the Annotated Reference Manual (ARM) do not fully define the access protocol for a protected object on a multiprocessor system. Finally, in the last topic (parallel barriers in Protected Objects), the workshop concluded that this would be a good mechanism to have, but that a suitable approach needs further investigation.
2013
Autores
Oliveira, JB;
Publicação
IFAC Proceedings Volumes
Abstract
2013
Autores
Cordeiro, J; Dias, G; Brazdil, P;
Publicação
PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2013
Abstract
Sentence Reduction has recently received a great attention from the research community of Automatic Text Summarization. Sentence Reduction consists in the elimination of sentence components such as words, part-of-speech tags sequences or chunks without highly deteriorating the information contained in the sentence and its grammatical correctness. In this paper, we present an unsupervised scalable methodology for learning sentence reduction rules. Paraphrases are first discovered within a collection of automatically crawled Web News Stories and then textually aligned in order to extract interchangeable text fragment candidates, in particular reduction cases. As only positive examples exist, Inductive Logic Programming (ILP) provides an interesting learning paradigm for the extraction of sentence reduction rules. As a consequence, reduction cases are transformed into first order logic clauses to supply a massive set of suitable learning instances and an ILP learning environment is defined within the context of the Aleph framework. Experiments evidence good results in terms of irrelevancy elimination, syntactical correctness and reduction rate in a real-world environment as opposed to other methodologies proposed so far.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.