The third annual New England Machine Learning Day will be held May 13, 2014, at Microsoft Research New England, One Memorial Drive, Cambridge, MA 02142. The event will bring together local academics and researchers in machine learning and its applications.
9:50 – 10:00
10:00 – 10:30, Polina Golland, MIT
Joint Modeling of Imaging and Genetic Data
We propose a unified Bayesian framework for detecting genetic variants associated with a disease while exploiting image-based features as an intermediate phenotype. Traditionally, imaging genetics methods comprise two separate steps. First, image features are selected based on their relevance to the disease phenotype. Second, a set of genetic variants are identified to explain the selected features. In contrast, our method performs these tasks simultaneously to ultimately assign probabilistic measures of relevance to both genetic and imaging markers. We derive an efficient approximate inference algorithm that handles high dimensionality of imaging genetic data. We evaluate the algorithm on synthetic data and show that it outperforms traditional models. We also illustrate the application of the method in a study of Alzheimer’s disease. Joint work with Kayhan Batmanghelich, Adrian Dalca, Mert Sabuncu.
10:35 – 11:05, David Cox, Harvard | Video
“Perceptual Annotation”: from Biologically Inspired, to Biologically Informed Machine Learning
Many machine learning applications, explicitly or implicitly, attempt to mimic natural human abilities in a machine. Indeed, any setting where human-provided labels are used as ground truth – whether the system aspires to be biologically-inspired or not – is ultimately driven by the human visual and cognitive system and its ability to provide accurate examplar labels. However, human-provided ground-truth labels are in many ways just the tip of the iceberg of the information that can be extracted from human judgments. I will describe a new approach — called “perceptual annotation” — in which we use an advanced online psychometric testing platform to acquire new kinds of human annotation data, and we incorporate these data directly into the formulation of a machine learning algorithm. A key intuition for this approach is that while it may be infeasible to dramatically increase the amount of data and high-quality labels available for the training of a given system, measuring the latent exemplar-by-exemplar landscape of difficulty and patterns of human errors can provide important information for regularizing the solution of the system at hand. Finally, I will conclude by exploring how this approach can be extended to incorporate an even greater diversity of different kinds of biological data.
11:10 – 11:40, Adam Tauman Kalai, Microsoft Research New England | Video
English text today is often machine printed or displayed on screens using the same letters that were carved in stone and handwritten on wax and parchment over two thousand years ago. We consider the problem of developing radically different characters for the same underlying twenty-six letter English alphabet, just as Braille or cursive are alternative representations. We discuss optimizing these letters for multiple criteria using crowdsourcing and machine learning.
11:40 – 1:45
Lunch and posters
1:45 – 2:15, Michael Littman, Brown University | Video
Learning to Act in Multiagent Sequential Environments
From routing to online auctions, many decision-making tasks for learning agents are carried out in the presence of other decision makers. I will give a brief overview of results developed in the context of adapting reinforcement-learning algorithms to work effectively in multiagent environments. Of particular interest is the idea that even simple scenarios, such as the well-known Prisoner’s dilemma, require agents to work together, bearing some individual risk, to arrive at mutually beneficial outcomes.
2:20 – 2:50, Venkatesh Saligrama, Boston University
Signals on Graphs: Efficient Detection & Recovery
Several problems such as network intrusion, community detection, disease outbreak, and cell signaling can be described in terms of an attributed graph with signals associated with nodes and edges. In these applications presence of intrusion, community, disease outbreak, or signal pathway is characterized by novel observations on some unknown connected subgraph. These problems can be formulated in terms of optimization of suitable objectives on connected sub-graphs, a problem which is generally computationally difficult. We overcome the combinatorics of connectivity algebraically through embedding of connected subgraphs into linear matrix inequalities (LMI). Computationally efficient tests are then realized by optimizing convex objective functions subject to these LMI constraints. We show that our tests are minimax optimal for exponential family of distributions and for graphs satisfying polynomial growth property.
2:50 – 3:20
3:20 – 3:50, Carla Brodley, Tufts
Redefining Class Definitions using Constraint-Based Clustering and its Application to Landcover Classification and the AAAI 2014 Keywords
Two aspects are crucial when constructing any real world supervised classification task: the set of classes whose distinction might be useful for the domain expert, and the set of classifications that can actually be distinguished by the data. Often a set of labels is defined with some initial intuition but these are not the best match for the task. For example, labels have been assigned for land cover classification of the Earth but it has been suspected that these labels are not ideal and some classes may be best split into subclasses whereas others should be merged. We present an approach that formalizes this problem using three ingredients: the existing class labels, the underlying separability in the data, and input from the domain expert specifying an LxL matrix of pairwise probabilistic constraints expressing their beliefs as to whether the L classes should be kept separate, merged, or split. We describe how the problem can be solved by casting it as an instance of constraint-based clustering. We present results demonstrating its application to the task of redefining a class taxonomy for land cover classification of the Earth and redefining the set of high-level keywords for AAAI 2014.
3:55 – 4:25, Ben Marlin, University of Massachusetts, Amherst
Machine Learning for Clinical and Mobile Health
The effective analysis of emerging sources of complex clinical and mobile health data represent a key challenge for machine learning. These data often exhibit multiple complicating factors including sparse and irregular sampling, incompleteness, noise, non-stationary temporal dynamics, high levels of between-subjects variability, high volume, high velocity, and significant heterogeneity and multi-modality. In this talk, I will present an overview of some of the machine learning problems my research group is currently working on motivated by ongoing collaborations in both clinical and mobile health. These problems include modeling and prediction of sparse and irregularly sampled physiological time series data from intensive care unit electronic health records, feature extraction and event detection from noisy wearable on-body sensor data, and learning what to sense in the energy and computation constrained mobile device setting.
4:30 – 5:00, Joshua B Tenenbaum, MIT
Towards More Human-Like Machine Learning
How can we build a machine that learns to see the world as a human being does? This question has been at the heart of the fields of AI and machine learning since their inceptions. Recently the question has seen renewed interest from researchers taking various “big data” approaches, such as training many-layered neural networks to find structure in millions of images, or mining the web to build databases of millions of common-sense facts. I will talk about our recent work taking a different approach, based on trying to reverse-engineer the core cognitive capacities and learning mechanisms of young children and infants. In contrast to conventional big-data ML approaches, children parse their experience using rich causally structured generative models, and learn new models from very little evidence; often just a single example is sufficient to grasp a new concept and generalize in richer ways than machine learning systems can typically do even with hundreds or thousands of examples. I will show how we are beginning to capture these perception and learning abilities in computational terms using techniques based on probabilistic programs and program induction, embedded in a broadly Bayesian framework for inference under uncertainty.
|Poster Title||Presenting Author/
Complete List of Authors
|Inferring Multilateral Relations from Dynamic Bilateral Interactions||Aaron Schein / Aaron Schein, Juston Moore, Hanna Wallach|
|Sparse Neural Networks and Random-Access Pixel Cameras for Energy Efficient Mobile Gaze Tracking||Addison Mayberry / Addison Mayberry, Pan Hu, Christopher Salthouse, Benjamin Marlin, Deepak Ganesan|
|Relational Dependency Networks for Anomaly Detection||Amanda Gentzel / Amanda Gentzel, Elisabeth Baseman, Dan Corkill, David Jensen|
|Dynamically Generated CRFs for Morphological Analysis of Noisy ECG Data||Annamalai Natarajan / Annamalai Natarajan, Edward Gaiser, Gustavo Angarita, Robert Malison, Deepak Ganesan, Benjamin Marlin|
|Generative and Discriminative Models for Improving Noisy Training Data for Relation Extraction||Benjamin Roth / Benjamin Roth, Dietrich Klakow|
|Hierarchical Conditional Random Fields for Outlier Detection: An Application to Detecting Epileptogenic Cortical Malformations||Bilal Ahmed / Bilal Ahmed, Thomas Thesen, Karen Blackmon, Orrin Devinsky, Ruben Kuzniecky, and Carla E. Brodley|
|Boundary algorithm for fast online classification and regression||Charles Mathy / Charles Mathy, Nate Derbinsky, Jose Bento, Jonathan Rosenthal, Jonathan Yedidia|
|Best Response Bayesian Reinforcement Learning for Multiagent Systems with State Uncertainty||Chris Amato / Frans A. Oliehoek and Christopher Amato|
|Learning Dirichlet Priors for Affordance Aware Planning||David Abel and Gabriel Barth-Maron / David Abel, Gabriel Barth-Maron, James MacGlashan, Stefanie Tellex|
|Learning with Mixtures of Dependency Networks||David Arbour / David Arbour, David Jensen|
|Employment of Frank-Wolfe algorithm to perform marginal inference in a Gibbs distribution||David Belanger|
|Restricted Memory Online Variational Bayesian Changepoint Detection||Diana Cai / Diana Cai, Ryan Adams|
|Learning Modular Structures from Network Data and Node Variables||Elham Azizi / Elham Azizi, Edoardo M. Airoldi, James E. Galagan|
|Dynamic Statistical Models of Collective Social Network Behavior||Elisabeth Baseman / Elisabeth Baseman, Stephen Judd, Michael Kearns, David Jensen|
|Fast Margin-based Cost-sensitive Classification||Feng Nan / Feng Nan, Joseph Wang, Kirill Trapeznikov, Venkatesh Saligrama|
|Multi-Step Stochastic ADMM in High Dimensions: Applications to Sparse Optimization and Noisy Matrix Decomposition||Hanie Sedghi|
|Augur: a Modeling Language for Data-Parallel Probabilistic Inference||Jean-Baptiste Tristan / Jean-Baptiste Tristan, Daniel Huang, Joseph Tassarotti, Adam Pocock, Stephen J. Green, Guy L. Steele Jr|
|Connected Sub-graph Detection||Jing Qian / Jing Qian, Venkatesh Saligrama, Yuting Chen|
|An information-theoretic analysis of resampling in sequential Monte Carlo||Jonathan Huggins / Jonathan H. Huggins and Daniel M. Roy|
|Text analysis techniques for nominating contact offenders in peer-to-peer file sharing networks||Juston Moore / Juston Moore, Brian Levine, Marc Liberatore, Hanna Wallach, Janis Wolak|
|A Sound and Complete Algorithm for Learning Causal Models from Relational Data||Katerina Marazopoulou / Marc Maier, Katerina Marazopoulou, David Arbour, David Jensen|
|Time Series Analysis of Mobile Data Usage Reveals Geographic Location||Keen Sung / Keen Sung, Erik Learned-Miller, Brian Levine, Marc Liberatore|
|Evaluating Topic Models through Histogram Analysis||Kriste Krstovski / Kriste Krstovski, David A. Smith and Michael J. Kurtz|
|A Graphical Model for Entity-based Document Retrieval||Laura Dietz / Laura Dietz, Jeffrey Dalton, Bruce Croft|
|Classifier-Adjusted Density Estimation for Anomaly Detection and One-Class||Lisa Friedland / Lisa Friedland, Amanda Gentzel, David Jensen|
|Learning of Overcomplete Latent Variable Models: Supervised and Semi-supervised Settings||Majid Janzamin|
|Tensor Factorization for Large-Scale Relational Learning||Maximilian Nickel / Maximilian Nickel, Volker Tresp|
|Person Re-Identification using Kernel-based Metric Learning Methods||Mengran Gou / Fei Xiong, Mengran Gou, Octavia Camps, Mario Sznaier|
|Regression with No Labeled Data||Mohammad Gheshlaghi Azar / Mohammad Gheshlaghi Azar and Konrad Kording|
|Inferring Helpful Actions||Nakul Gopalan / Nakul Gopalan, Izaak Baker, Stefanie Tellex|
|DISCOMAX: Distance Correlation Maximization using Graph Laplacians||Praneeth Vepakomma / Praneeth Vepakomma, Chetan Tonde, Ahmed Elgammal|
|Towards Collaborative Filtering Recommender Systems for Tailored Health Communications||Roy Adams|
|Deterministic Feature Selection for Linear Support Vector Machines||Saurabh Paul / Saurabh Paul, Malik Magdon-Ismail and Petros Drineas|
|The Value of Temporal Data for Learning Influence Networks||Spyros Zoumpoulis / Munther Dahleh, John Tsitsiklis, Spyros Zoumpoulis|
|Co-Planning via Inverse Reinforcement Learning||Stephen Brawner / Stephen Brawner, Lee Painton, Stefanie Tellex, Michael Littman|
|A Kernel-Based Framework for Learning with Irregularly Sampled Physiological Time Series||Steve Li|
|Gradient-based inference for higher-order probabilistic programming languages||Tianlin Shi / Alexey Radul, Vikash K. Mansinghka|
|Sensing-Aware kernel SVMs||Weicong Ding / Weicong Ding, Prakash Ishwar, Venkatesh Saligrama, W. Clem Karl|
|Authorship attribution of unsigned Supreme Court opinions||William Li / William Li, Pablo Azar, David Larochelle, Phil Hill, James Cox, Robert C. Berwick, Andrew W. Lo|
|Modeling and Prediction of Heart-Related Hospitalization Using Electronic Health Records Data||Wuyang Dai / Wuyang Dai, Theodora Brisimi, Venkatesh Saligrama, Ioannis Ch. Paschalidis|
|Learning dynamic spatiotemporal fields using data from mobile sensors||Xiaodong Lan / Xiaodong Lan and Mac Schwager|
|Handling Physician Subjectivity in the Prediction of Disease Course: An Application to Multiple Sclerosis||Yijun Zhao / Yijun Zhao, Carla Brodley, Tanuja Chitnis, Brian C. Healy|
|A Convex Moments-based Approach to Subspace Clustering with Priors||Yin Wang / Yin Wang, Yongfang Cheng, Mario Sznaier, Octavia Camps|
|Formal Methods for Learning and Detection of Anomalous Behavior in Cyber-Physcial Systems||Zhaodan Kong / Zhaodan Kong, Austin Jones, Calin Belta|
For any questions, please contact MLday14@microsoft.com.
Ryan Adams, Computer Science, Harvard
Sham Kakade, Microsoft Research New England
Lorenzo Rosasco, Universita’ di Genova and MIT
Stefanie Tellex, Computer Science, Brown
The steering committee that selects the organizers of ML Day each year consists of Sham Kakade, Adam Kalai, and Joshua Tenenbaum.