Revisiting Output Coding for Sequential Supervised Learning Guohua Hao & Alan Fern School of Electrical Engineering and Computer Science Oregon State University.

Slides:



Advertisements
Similar presentations
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Advertisements

Document Summarization using Conditional Random Fields Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng Chen IJCAI 2007 Hao-Chin Chang Department of Computer.
Local Computation Algorithms
Machine Learning and Data Mining Linear regression
Search-Based Structured Prediction
CPSC 502, Lecture 15Slide 1 Introduction to Artificial Intelligence (AI) Computer Science cpsc502, Lecture 15 Nov, 1, 2011 Slide credit: C. Conati, S.
Kshitij Judah, Alan Fern, Tom Dietterich TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: School of EECS, Oregon State.
Learning for Structured Prediction Overview of the Material TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A.
John Lafferty, Andrew McCallum, Fernando Pereira
Profiles for Sequences
Lecture 15 Hidden Markov Models Dr. Jianjun Hu mleg.cse.sc.edu/edu/csce833 CSCE833 Machine Learning University of South Carolina Department of Computer.
Logistics Course reviews Project report deadline: March 16 Poster session guidelines: – 2.5 minutes per poster (3 hrs / 55 minus overhead) – presentations.
Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.
1 Jun Wang, 2 Sanjiv Kumar, and 1 Shih-Fu Chang 1 Columbia University, New York, USA 2 Google Research, New York, USA Sequential Projection Learning for.
Learning to Predict Structures with Applications to Natural Language Processing Ivan Titov TexPoint fonts used in EMF. Read the TexPoint manual before.
Learning from Observations Copyright, 1996 © Dale Carnegie & Associates, Inc. Chapter 18 Fall 2004.
Conditional Random Fields
Forward-backward algorithm LING 572 Fei Xia 02/23/06.
Student: Hsu-Yung Cheng Advisor: Jenq-Neng Hwang, Professor
Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Part-of-Speech Tagging and Chunking with Maximum Entropy Model Sandipan Dandapat.
Imputation-based local ancestry inference in admixed populations Ion Mandoiu Computer Science and Engineering Department University of Connecticut Joint.
Hidden Markov Models David Meir Blei November 1, 1999.
INTRODUCTION TO Machine Learning ETHEM ALPAYDIN © The MIT Press, Lecture Slides for.
Online Learning Algorithms
STRUCTURED PERCEPTRON Alice Lai and Shi Zhi. Presentation Outline Introduction to Structured Perceptron ILP-CRF Model Averaged Perceptron Latent Variable.
1 Sequence Labeling Raymond J. Mooney University of Texas at Austin.
Artificial Intelligence Lecture No. 28 Dr. Asad Ali Safi ​ Assistant Professor, Department of Computer Science, COMSATS Institute of Information Technology.
Design Challenges and Misconceptions in Named Entity Recognition Lev Ratinov and Dan Roth The Named entity recognition problem: identify people, locations,
Graphical models for part of speech tagging
1 CS546: Machine Learning and Natural Language Multi-Class and Structured Prediction Problems Slides from Taskar and Klein are used in this lecture TexPoint.
Learning a Fast Emulator of a Binary Decision Process Center for Machine Perception Czech Technical University, Prague ACCV 2007, Tokyo, Japan Jan Šochman.
Benk Erika Kelemen Zsolt
CS 6961: Structured Prediction Fall 2014 Course Information.
Sequential and Spatial Supervised Learning Guohua Hao, Rongkun Shen, Dan Vega, Yaroslav Bulatov and Thomas G. Dietterich Guohua Hao, Rongkun Shen,, Dan.
CS774. Markov Random Field : Theory and Application Lecture 19 Kyomin Jung KAIST Nov
Thomas G. Dietterich Department of Computer Science Oregon State University Corvallis, Oregon Machine Learning for Sequential.
Multifactor GPs Suppose now we wish to model different mappings for different styles. We will add a latent style vector s along with x, and define the.
Indirect Supervision Protocols for Learning in Natural Language Processing II. Learning by Inventing Binary Labels This work is supported by DARPA funding.
IE with Dictionaries Cohen & Sarawagi. Announcements Current statistics: –days with unscheduled student talks: 2 –students with unscheduled student talks:
Learning with AdaBoost
Hidden Markov Models & POS Tagging Corpora and Statistical Methods Lecture 9.
Deep Learning for Efficient Discriminative Parsing Niranjan Balasubramanian September 2 nd, 2015 Slides based on Ronan Collobert’s Paper and video from.
Support vector machine LING 572 Fei Xia Week 8: 2/23/2010 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A 1.
Machine Learning and Data Mining Clustering (adapted from) Prof. Alexander Ihler TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Ensemble Methods in Machine Learning
Imputation-based local ancestry inference in admixed populations
John Lafferty Andrew McCallum Fernando Pereira
Prediction of Protein Binding Sites in Protein Structures Using Hidden Markov Support Vector Machine.
PoS tagging and Chunking with HMM and CRF
Conditional Markov Models: MaxEnt Tagging and MEMMs
Wireless Communication Research Lab. CGU What is Convolution Code? 指導教授:黃文傑 博士 學生:吳濟廷
… Algo 1 Algo 2 Algo 3 Algo N Meta-Learning Algo.
Structured learning: overview Sunita Sarawagi IIT Bombay TexPoint fonts used in EMF. Read the TexPoint manual before.
Reinforcement Learning for Mapping Instructions to Actions S.R.K. Branavan, Harr Chen, Luke S. Zettlemoyer, Regina Barzilay Computer Science and Artificial.
Sequential Off-line Learning with Knowledge Gradients Peter Frazier Warren Powell Savas Dayanik Department of Operations Research and Financial Engineering.
SUPERVISED AND UNSUPERVISED LEARNING Presentation by Ege Saygıner CENG 784.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
Conditional Random Fields & Table Extraction Dongfang Xu School of Information.
Neural networks (2) Reminder Avoiding overfitting Deep neural network Brief summary of supervised learning methods.
Graphical Models for Segmenting and Labeling Sequence Data Manoj Kumar Chinnakotla NLP-AI Seminar.
Dan Roth University of Illinois, Urbana-Champaign 7 Sequential Models Tutorial on Machine Learning in Natural.
Structured prediction
Lecture 3: Linear Regression (with One Variable)
CIS 700 Advanced Machine Learning Structured Machine Learning:   Theory and Applications in Natural Language Processing Shyam Upadhyay Department of.
Basic machine learning background with Python scikit-learn
INTRODUCTION TO Machine Learning
Klein and Manning on CRFs vs CMMs
ADABOOST(Adaptative Boosting)
Ensemble learning Reminder - Bagging of Trees Random Forest
Linear regression with one variable
Presentation transcript:

Revisiting Output Coding for Sequential Supervised Learning Guohua Hao & Alan Fern School of Electrical Engineering and Computer Science Oregon State University Corvallis, OR, U.S.A. TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A AA

Scalability in CRF Training Linear Chain CRF model Inference in Training  partition function : forward-backward algorithm  Maximizing over label sequences: Viterbi algorithm  Complexity of both: Repeated inference in training  Computationally demanding  Can not scale to large label sets y t-1 y t+1 ytyt X t-1 X t+1 XtXt

Recent Work of Focus Sequential Error Correcting Output Coding (SECOC)  Error Correcting Output Coding (ECOC) ClassCode Word b1b1 b2b2 …bnbn C1C1 10…1 C2C2 00…0 ………...… CmCm 01…1 classifierh1h1 h2h2 hnhn

 Extension to CRF model x t-1 xtxt x t+1 y t-1 ytyt y t+1 y t-1 k ytkytk y t+1 k  Decoding y t-1 1 yt1yt1 y t+1 1 y t-1 n ytnytn y t+1 n

Representational Capacity of SECOC Intuitively, it feels that training each binary CRF independently will not be able to capture rich transition structure Counter-example to independent training Our hypothesis: when the transition structure is critical, independent training will not do as well 1 32 Y = b 1 (Y) = b 1 (Y)* = b 2 (Y) = b 3 (Y) = yb1b1 b2b2 b3b

Our Method—Cascaded SECOC Help capture the transition structure For problems where a transition model is critical, we hope to see cascade training outperform independent training For problem where a observation model is more informative but the sliding window is small. Large sliding window will dominate the effect of cascade training Previous binary predictions

Experimental Results Base CRF training algorithms  Gradient Tree Boosting (GTB)  Voted Perceptron (VP) Methods for comparison  iid-- Non sequential ECOC  i-SECOC--Independent SECOC  c-SECOC (h)--Cascaded SECOC w/ history length h  Beam search Synthetic Data Sets  Generation by HMM  “Transition” Data Set  “Both” Data Set

Nettalk Data Set (134 labels)

Noun Phrase Chunking (NPC) (121 labels) Synthetic Data Sets (40 labels)

Comparing to Beam Search

Summary i-SECOC can perform poorly when explicitly capturing complex transition models is critical c-SECOC can improve accuracy in such situations by using cascade features Performance of c-SECOC can depends strongly on the base CRF algorithm; Algorithms capable of capturing complex (non-linear) feature interactions are preferred When using less powerful base CRF learning algorithms, other approaches (e.g. beam search) can outperform c- SECOC

Future Directions Efficient validation procedure for selecting cascade history length Incremental generation of code words Wide comparison of methods for dealing with large label ses Acknowledgements We thank John Langford for discussion of the counter example to independent SECOC and Thomas Dietterich for his support. This work was supported by NSF grant IIS