-
DeepCPCFG: Deep Learning and Context Free Grammars for End-to-End Information Extraction
Authors:
Freddy C. Chua,
Nigel P. Duffy
Abstract:
We address the challenge of extracting structured information from business documents without detailed annotations. We propose Deep Conditional Probabilistic Context Free Grammars (DeepCPCFG) to parse two-dimensional complex documents and use Recursive Neural Networks to create an end-to-end system for finding the most probable parse that represents the structured information to be extracted. This…
▽ More
We address the challenge of extracting structured information from business documents without detailed annotations. We propose Deep Conditional Probabilistic Context Free Grammars (DeepCPCFG) to parse two-dimensional complex documents and use Recursive Neural Networks to create an end-to-end system for finding the most probable parse that represents the structured information to be extracted. This system is trained end-to-end with scanned documents as input and only relational-records as labels. The relational-records are extracted from existing databases avoiding the cost of annotating documents by hand. We apply this approach to extract information from scanned invoices achieving state-of-the-art results despite using no hand-annotations.
△ Less
Submitted 5 June, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
Collective Semi-Supervised Learning for User Profiling in Social Media
Authors:
Richard J. Oentaryo,
Ee-Peng Lim,
Freddy Chong Tat Chua,
Jia-Wei Low,
David Lo
Abstract:
The abundance of user-generated data in social media has incentivized the development of methods to infer the latent attributes of users, which are crucially useful for personalization, advertising and recommendation. However, the current user profiling approaches have limited success, due to the lack of a principled way to integrate different types of social relationships of a user, and the relia…
▽ More
The abundance of user-generated data in social media has incentivized the development of methods to infer the latent attributes of users, which are crucially useful for personalization, advertising and recommendation. However, the current user profiling approaches have limited success, due to the lack of a principled way to integrate different types of social relationships of a user, and the reliance on scarcely-available labeled data in building a prediction model. In this paper, we present a novel solution termed Collective Semi-Supervised Learning (CSL), which provides a principled means to integrate different types of social relationship and unlabeled data under a unified computational framework. The joint learning from multiple relationships and unlabeled data yields a computationally sound and accurate approach to model user attributes in social media. Extensive experiments using Twitter data have demonstrated the efficacy of our CSL approach in inferring user attributes such as account type and marital status. We also show how CSL can be used to determine important user features, and to make inference on a larger user population.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
Stringer: Balancing Latency and Resource Usage in Service Function Chain Provisioning
Authors:
Freddy C. Chua,
Julie Ward,
Ying Zhang,
Puneet Sharma,
Bernardo A. Huberman
Abstract:
Network Functions Virtualization, or NFV, enables telecommunications infrastructure providers to replace special-purpose networking equipment with commodity servers running virtualized network functions (VNFs). A service provider utilizing NFV technology faces the SFC provisioning problem of assigning VNF instances to nodes in the physical infrastructure (e.g., a datacenter), and routing Service F…
▽ More
Network Functions Virtualization, or NFV, enables telecommunications infrastructure providers to replace special-purpose networking equipment with commodity servers running virtualized network functions (VNFs). A service provider utilizing NFV technology faces the SFC provisioning problem of assigning VNF instances to nodes in the physical infrastructure (e.g., a datacenter), and routing Service Function Chains (sequences of functions required by customers, a.k.a. SFCs) in the physical network. In doing so, the provider must balance between various competing goals of performance and resource usage. We present an approach for SFC provisioning, consisting of three elements. The first element is a fast, scalable round-robin heuristic. The second element is a Mixed Integer Programming (MIP) based approach. The third element is a queueing-theoretic model to estimate the average latency associated with any SFC provisioning solution. Combined, these elements create an approach that generates a set of SFC provisioning solutions, reflecting different tradeoffs between resource usage and performance.
△ Less
Submitted 9 June, 2016; v1 submitted 28 April, 2016;
originally announced April 2016.
-
A Bayesian Approach to the Partitioning of Workflows
Authors:
Freddy C. Chua,
Bernardo A. Huberman
Abstract:
When partitioning workflows in realistic scenarios, the knowledge of the processing units is often vague or unknown. A naive approach to addressing this issue is to perform many controlled experiments for different workloads, each consisting of multiple number of trials in order to estimate the mean and variance of the specific workload. Since this controlled experimental approach can be quite cos…
▽ More
When partitioning workflows in realistic scenarios, the knowledge of the processing units is often vague or unknown. A naive approach to addressing this issue is to perform many controlled experiments for different workloads, each consisting of multiple number of trials in order to estimate the mean and variance of the specific workload. Since this controlled experimental approach can be quite costly in terms of time and resources, we propose a variant of the Gibbs Sampling algorithm that uses a sequence of Bayesian inference updates to estimate the processing characteristics of the processing units. Using the inferred characteristics of the processing units, we are able to determine the best way to split a workflow for processing it in parallel with the lowest expected completion time and least variance.
△ Less
Submitted 2 November, 2015;
originally announced November 2015.
-
Partitioning Uncertain Workflows
Authors:
Bernardo A. Huberman,
Freddy C. Chua
Abstract:
It is common practice to partition complex workflows into separate channels in order to speed up their completion times. When this is done within a distributed environment, unavoidable fluctuations make individual realizations depart from the expected average gains. We present a method for breaking any complex workflow into several workloads in such a way that once their outputs are joined, their…
▽ More
It is common practice to partition complex workflows into separate channels in order to speed up their completion times. When this is done within a distributed environment, unavoidable fluctuations make individual realizations depart from the expected average gains. We present a method for breaking any complex workflow into several workloads in such a way that once their outputs are joined, their full completion takes less time and exhibit smaller variance than when running in only one channel. We demonstrate the effectiveness of this method in two different scenarios; the optimization of a convex function and the transmission of a large computer file over the Internet.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
Using Linear Dynamical Topic Model for Inferring Temporal Social Correlation in Latent Space
Authors:
Freddy Chong Tat Chua,
Richard J. Oentaryo,
Ee-Peng Lim
Abstract:
The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among use…
▽ More
The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among users in latent space instead of the original data space. We devise a Linear Dynamical Topic Model (LDTM) that can capture the dynamics of the users' items adoption behaviors in latent (topic) space. Using the time series of temporal topic distributions learned by LDTM, we conduct Granger causality tests to measure the social correlation relationships between pairs of users. We call the combination of our LDTM and Granger causality tests as Temporal Social Correlation. By conducting extensive experiments on bibliographic data, where authors are analogous to users, we show that the ordering of authors' name on their publications plays a statistically significant role in the interaction of research topics among the authors. We also present a case study to illustrate the correlational relationships between pairs of authors.
△ Less
Submitted 6 January, 2015;
originally announced January 2015.
-
Detecting Flow Anomalies in Distributed Systems
Authors:
Freddy Chong Tat Chua,
Ee-Peng Lim,
Bernardo A. Huberman
Abstract:
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and cou…
▽ More
Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank them using a proposed metric within distributed systems. We evaluate our approach on passengers' records of an urbanized city's public transportation system and correlate our findings with passengers' postings on social media microblogs. Our experiments show that the metric derived using our localization algorithm gives a better ranking of anomalies as compared to standard deviation measures from statistical models. Our case studies also demonstrate that transportation events reported in social media microblogs matches the locations of our detect anomalies, suggesting that our algorithm performs well in locating the anomalies within distributed systems.
△ Less
Submitted 8 December, 2014; v1 submitted 22 July, 2014;
originally announced July 2014.