scalable machine learning
play

Scalable Machine Learning 6. Kernels Alex Smola Yahoo! Research - PowerPoint PPT Presentation

Scalable Machine Learning 6. Kernels Alex Smola Yahoo! Research and ANU http://alex.smola.org/teaching/berkeley2012 Stat 260 SP 12 6. Kernels Outline Kernels Hilbert Spaces Regularization theory Kernels on strings,


  1. Soft Margin Loss Original Optimization Problem m 1 2 k w k 2 + C X minimize ξ i w, ξ i =1 subject to y i f ( x i ) � 1 � ξ i and ξ i � 0 for all 1  i  m Regularization Functional m λ 2 k w k 2 + X minimize max(0 , 1 � y i f ( x i )) w i =1 For fixed f , clearly ξ i � max(0 , 1 � y i f ( x i )) . For ξ > max(0 , 1 � y i f ( x i )) we can decrease it such that the bound is matched and improve the objective function. Both methods are equivalent.

  2. Why Regularization? What we really wanted . . . Find some such that the expected loss f ( x ) E [ c ( x, y, f ( x ))] is small. What we ended up doing . . . Find some f ( x ) such that the empirical average of the expected loss E emp [ c ( x, y, f ( x ))] is small. m E emp [ c ( x, y, f ( x ))] = 1 X c ( x i , y i , f ( x i )) m i =1 However, just minimizing the empirical average does not guarantee anything for the expected loss (overfitting). Safeguard against overfitting We need to constrain the class of functions f ∈ F some- how. Adding Ω [ f ] as a penalty does exactly that.

  3. Some regularization ideas Small Derivatives We want to have a function f which is smooth on the entire domain. In this case we could use Z k ∂ x f ( x ) k 2 dx = h ∂ x f, ∂ x f i . Ω [ f ] = X Small Function Values If we have no further knowledge about the domain X , minimizing k f k 2 might be sensible, i.e., Ω [ f ] = k f k 2 = h f, f i . Splines Here we want to find f such that both k f k 2 and k ∂ 2 x f k 2 are small. Hence we can minimize Ω [ f ] = k f k 2 + k ∂ 2 x f k 2 = h ( f, ∂ 2 x f ) , ( f, ∂ 2 x f ) i

  4. Regularization Regularization Operators We map f into some Pf , which is small for desirable f and large otherwise, and minimize Ω [ f ] = k Pf k 2 = h Pf, Pf i . For all previous examples we can find such a P . Function Expansion for Regularization Operator Using a linear function expansion of f in terms of some X f i , that is for f ( x ) = α i f i ( x ) we can compute i * + X X X Ω [ f ] = α i f i ( x ) , P α j f i ( x ) = α i α j h Pf i , Pf j i . P i j i,j

  5. Regularization and Kernels Regularization for Ω [ f ] = 1 2 k w k 2 ) k w k 2 = X X w = α i Φ ( x i ) = α i α j k ( x i , x j ) i i,j This looks very similar to h Pf i , Pf j i . Key Idea So if we could find a P and k such that k ( x, x 0 ) = h Pk ( x, · ) , Pk ( x 0 , · ) i we could show that using a kernel means that we are minimizing the empirical risk plus a regularization term. Solution: Greens Functions A sufficient condition is that k is the Greens Function of P ⇤ P , that is h P ⇤ Pk ( x, · ) , f ( · ) i = f ( x ) . One can show that this is necessary and sufficient.

  6. Building Kernels Kernels from Regularization Operators: Given an operator P ⇤ P , we can find k by solving the self consistency equation h Pk ( x, · ) , Pk ( x 0 , · ) i = k > ( x, · )( P ⇤ P ) k ( x 0 , · ) = k ( x, x 0 ) and take f to be the span of all k ( x, · ) . So we can find k for a given measure of smoothness. Regularization Operators from Kernels: Given a kernel k , we can find some P ⇤ P for which the self consistency equation is satisfied. So we can find a measure of smoothness for a given k .

  7. Spectrum and Kernels Effective Function Class Keeping Ω [ f ] small means that f ( x ) cannot take on arbi- trary function values. Hence we study the function class � ⇢ � 1 � F C = 2 h Pf, Pf i  C f � � Example α i k ( x i , x ) this implies 1 X 2 α > K α  C. For f = i Kernel Matrix Coefficients Function Values  � 5 2 K = 2 1

  8. Fourier Regularization Goal Find measure of smoothness that depends on the fre- quency properties of f and not on the position of f . A Hint: Rewriting k f k 2 + k ∂ x f k 2 Notation: ˜ f ( ω ) is the Fourier transform of f . Z k f k 2 + k ∂ x f k 2 = | f ( x ) | 2 + | ∂ x f ( x ) | 2 dx Z f ( ω ) | 2 + ω 2 | ˜ | ˜ f ( ω ) | 2 d ω = Z | ˜ f ( ω ) | 2 1 p ( ω ) d ω where p ( ω ) = = 1 + ω 2 . Idea Z | ˆ f ( ω ) | 2 Generalize to arbitrary p ( ω ) , i.e. Ω [ f ] := 1 p ( ω ) d ω 2 Alexander J. Smola: An Introduction to Support Vectors and Regularization, Page 13

  9. Greens Function Theorem Z | ˆ f ( ω ) | 2 For regularization functionals Ω [ f ] := 1 p ( ω ) d ω the 2 self-consistency condition h Pk ( x, · ) , Pk ( x 0 , · ) i = k > ( x, · )( P ⇤ P ) k ( x 0 , · ) = k ( x, x 0 ) is satisfied if k has p ( ω ) as its Fourier transform, i.e., Z k ( x, x 0 ) = exp( � i h ω , ( x � x 0 ) i ) p ( ω ) d ω Consequences small p ( ω ) correspond to high penalty (regularization). Ω [ f ] is translation invariant, that is Ω [ f ( · )] = Ω [ f ( · � x )] .

  10. Examples Laplacian Kernel k ( x, x 0 ) = exp( �k x � x 0 k ) p ( ω ) / (1 + k ω k 2 ) � 1 Gaussian Kernel 2 σ � 2 k x � x 0 k 2 k ( x, x 0 ) = e � 1 p ( ω ) / e � 1 2 σ 2 k ω k 2 Fourier transform of k shows regularization properties. The more rapidly p ( ω ) decays, the more high frequencies are filtered out.

  11. Rules of thumb Fourier transform is sufficient to check whether k ( x, x 0 ) satisfies Mercer’s condition: only check if ˜ k ( ω ) � 0 . Example: k ( x, x 0 ) = sinc( x � x 0 ) . ˜ k ( ω ) = χ [ � π , π ] ( ω ) , hence k is a proper kernel. Width of kernel often more important than type of kernel (short range decay properties matter). Convenient way of incorporating prior knowledge, e.g.: for speech data we could use the autocorrelation func- tion. Sum of derivatives becomes polynomial in Fourier space.

  12. Polynomial Kernels Functional Form k ( x, x 0 ) = κ ( h x, x 0 i ) Series Expansion Polynomial kernels admit an expansion in terms of Leg- endre polynomials ( L N n : order n in R N ). 1 k ( x, x 0 ) = X b n L n ( h x, x 0 i ) n =0 Consequence: L n (and their rotations) form an orthonormal basis on the unit sphere, P ⇤ P is rotation invariant, and P ⇤ P is diago- nal with respect to L n . In other words ( P ⇤ P ) L n ( h x, · i ) = b � 1 n L n ( h x, · i )

  13. Polynomial Kernels Decay properties of b n determine smoothness of func- tions specified by k ( h x, x 0 i ) . n but x n vanish, hence a Taylor For N ! 1 all terms of L N i a i h x, x 0 i i gives a good guess. series k ( x, x 0 ) = P Inhomogeneous Polynomial k ( x, x 0 ) = ( h x, x 0 i + 1) p ✓ p ◆ if n  p a n = n Vovk’s Real Polynomial k ( x, x 0 ) = 1 � h x, x 0 i p 1 � ( h x, x 0 i ) a n = 1 if n < p

  14. Mini Summary Regularized Risk Functional From Optimization Problems to Loss Functions Regularization Safeguard against Overfitting Regularization and Kernels Examples of Regularizers Regularization Operators Greens Functions and Self Consistency Condition Fourier Regularization Translation Invariant Regularizers Regularization in Fourier Space Kernel is inverse Fourier Transformation of Weight Polynomial Kernels and Series Expansions

  15. String Kernel (pre)History � END � B 1 �� 1 �� 1 �� � AB � 1 �� 1 A � 1 �� 1 START

  16. The Kernel Perspective • Design a kernel implementing good features X k ( x, x 0 ) = h φ ( x ) , φ ( x 0 ) i and f ( x ) = h φ ( x ) , w i = α i k ( x i , x ) i • Many variants • Bag of words (AT&T labs 1995, e.g. Vapnik) • Matching substrings (Haussler, Watkins 1998) • Spectrum kernel (Leslie, Eskin, Noble, 2000) • Suffix tree (Vishwanathan, Smola, 2003) • Suffix array (Teo, Vishwanathan, 2006) • Rational kernels (Mohri, Cortes, Haffner, 2004 ...)

  17. Bag of words • At least since 1995 known in AT&T labs X X k ( x, x 0 ) = n w ( x ) n w ( x 0 ) and f ( x ) = ω w n w ( x 0 ) w w (to be or not to be) (be:2, or:1, not:1, to:2) • Joachims 1998: Use sparse vectors • Haffner 2001: Inverted index for faster training • Lots of work on feature weighting (TF/IDF) • Variants of it deployed in many spam filters

  18. Substring (mis)matching • Watkins 1998+99 (dynamic alignment, etc) • Haussler 1999 (convolution kernels) � END � B 1 �� 1 �� 1 �� � X X k ( x, x 0 ) = κ ( w, w 0 ) AB � w 0 2 x 0 w 2 x 1 �� 1 A � 1 �� 1 START • In general O(x x’) runtime (e.g. Cristianini, Shawe-Taylor, Lodhi, 2001) • Dynamic programming solution for pair-HMM

  19. Spectrum Kernel • Leslie, Eskin, Noble & coworkers, 2002 • Key idea is to focus on features directly • Linear time operation to get features • Limited amount of mismatch (exponential in number of missed chars) • Explicit feature construction (good & fast for DNA sequences)

  20. Suffix Tree Kernel • Vishwanathan & Smola, 2003 (O(x + x’) time) • Mismatch-free kernel + arbitrary weights X k ( x, x 0 ) = ω w n w ( x ) n w ( x 0 ) w • Linear time construction (Ukkonen, 1995) • Find matches for second string in linear time (Chang & Lawler, 1994) • Precompute weights on path

  21. Are we done? • Large vocabulary size • Need to build dictionary • Approximate matches are still a problem • Suffix tree/array is storage inefficient (40-60x) • Realtime computation • Memory constraints (keep in RAM) • Difficult to implement stay tuned

  22. Graph Kernels

  23. Graphs Basic Definitions Connectivity matrix W where W ij = 1 if there is an edge from vertex i to j ( W ij = 0 otherwise). For undirected graphs W ii = 0 . In this talk only undirected, un- weighted graphs: W ij ∈ { 0 , 1 } instead of R + 0 . Graph Laplacian L := D − 1 2 LD − 1 2 = D − 1 2 WD − 1 L := W − D and ˜ 2 − 1 j W ij . This talk only ˜ where D = diag( L ~ 1) , i.e., D ii = P L

  24. Graph Segmentation Cuts and Associations X cut( A, B ) = W ij i 2 A,j 2 B cut( A, B ) tells us how well A and B are connected. Normalized Cut Ncut( A, B ) = cut( A, B ) cut( A, V ) + cut( A, B ) cut( B, V ) Connection to Normalized Graph Laplacian y > ( D � W ) y A [ B = V Ncut( A, B ) = min min y > Dy y 2 {± 1 } m Proof idea: straightforward algebra Approximation: use eigenvectors / eigenvalues in- stead

  25. Eigensystem of the Graph Laplacian The spectrum of ˜ L lies in [0 , 2] (via Gerschgorin’s Theo- rem) Smallest eigenvalue/vector is ( � 1 , v 1 ) = (0 , ~ 1) Second smallest ( � 2 , v 2 ) is Fiedler vector, which seg- ments graph using approximate min-cut (cf. tutorials). Larger � i correspond to v i which vary more clusters. For grids ˜ L is the discretization of the conventional Laplace Operator PQRS WVUT WVUT PQRS ONML HIJK WVUT PQRS x − 2 δ x − δ x + δ x Key Idea: use the v i to build a hierarchy of increasingly complex functions on the graph.

  26. Eigenvectors

  27. Regularization operator on graph Functions on the Graph Since we have only exactly n vertices, all f are f 2 R n . Regularization Operator M := P ⇤ P is therefore a matrix M 2 R n ⇥ n . Choosing the v i as complexity hierarchy we set M i and hence M = r (˜ X r ( � i ) v i v > M = L ) i Consequently, for f = P i � i v i we have Mf = P i r ( � i ) v i . Some Choices for r r ( � ) = � + ✏ (Regularized Laplacian) r ( � ) = exp( �� ) (Diffusion on Graphs) r ( � ) = ( a � � ) � p ( p -Step Random Walk)

  28. Kernels Self Consistency Equation Matrix notation for k > ( x, · )( P ⇤ P ) k ( x 0 , · ) = k ( x, x 0 ) : KM � 1 K = K and hence K = M � 1 Here we take the pseudoinverse if M � 1 does not exist. Regularized Laplacian r ( � ) = � + ✏ , hence M = ˜ L + ✏ 1 and K = (˜ L + ✏ 1 ) � 1 . Work with K � 1 ! Diffusion on Graphs r ( � ) = exp( �� ) , hence M = exp( � ˜ L ) and K = exp( � � ˜ L ) . Here K ij is the probability of reaching i from j . p -Step Random Walk For r ( � ) = ( a � � ) � p we have K = ( a 1 � ˜ L ) p . Weighted combination over several random walk steps.

  29. Graph Laplacian Kernel

  30. Diffusion Kernel

  31. 4-Step Random Walk

  32. Fast computation • Primal space computation • Weisfeiler-Lehman hash • Heat equation

  33. Watson, Bessel Functions

  34. Midterm Project Presentations • Midterm project presentations • March 13, 4-7pm • Send the PDF (+supporting material) to Dapo by March 12, midnight • Questions to answer • What (you will do, what you have already done) • Why (it matters) • How (you’re going to achieve it) • Rules • 10 minutes per team (6 slides maximum) • 10 pages supporting material (maximum)

  35. Regularization Summary

  36. Regularization • Feature space Expansion l ( y i , [ X β ] i ) + λ 2 k β k 2 X minimize β i • Kernel Expansion + λ X y i , [ XX > α ] i 2 α > XX > α � � minimize l α i • Function Expansion l ( y i , f i ) + λ X 2 f > ( XX > ) � 1 f minimize α i f = X β = X > X α

  37. Feature Space Expansion l ( y i , [ X β ] i ) + λ 2 k β k 2 X minimize β i • Linear methods • Design feature space • Solve problem there • Fast ‘primal space’ methods for SVM solvers • Stochastic gradient descent solvers

  38. Kernel Expansion + λ X y i , [ XX > α ] i 2 α > XX > α � � minimize l α i • Using the kernel trick l ( y i , [ K α ] i ) + λ X 2 α > K α minimize α i • Optimization via • Interior point solvers • Coefficient-wise updates (e.g. SMO) • Fast matrix vector products in K

  39. Function Expansion l ( y i , f i ) + λ X 2 f > ( XX > ) � 1 f minimize α i • Using the kernel trick yields Gaussian Process l ( y i , f i ) + λ X 2 f > K � 1 f minimize α i • Inference via • Fast inverse kernel matrix (e.g. graph kernel) • Low-rank approximation of K • Occasionally useful for distributed inference

  40. Optimization Algorithms

  41. Efficient Optimization • Dual Space Solve the original SVM dual problem efficiently (SMO, LibLinear, SVMLight, ...) • Subspace Find a subspace that contains a good approximation to the solution (Nystrom, SGMA, Pivoting, Reduced Set) • Function values Explicit expansion of regularization operator (graphs, strings, Weisfeiler-Lehman) • Parameter space Efficient linear parametrization without projection (hashing, random kitchen sinks, multipole)

  42. Dual Space

  43. Support Vector Machine dual problem {x | <w x> + b = + 1 } , 1 , {x | <w x> + b = − 1 } Note: 2 α > K α − 1 > α minimize ◆ , <w x 1 > + b = +1 α , <w x 2 > + b = − 1 y i = +1 ❍ x 1 ◆ X ❍ subject to α i y i = 0 x 2 , => <w (x 1 − x 2 )> = 2 ◆ i w , > 2 < y i = − 1 , w => (x 1 − x 2 ) = α i ∈ [0 , C ] ||w|| ◆ ||w|| ❍ K ij = y i y j h x i , x j i ❍ , {x | <w x> + b = 0 } ❍ X w = α i y i x i i 1 2 k w k 2 + C X minimize ξ i w,b i subject to y i [ h w, x i i + b ] � 1 � ξ i and ξ i � 0

  44. Problems • Kernel matrix may be huge • Cannot store it in memory • Expensive to compute • Expensive to evaluate linear functions • Quadratic program is too large Cubic cost for naive Interior Point solution • Only evaluate rows • Cache values • Cache linear function values • Solve subsets of the problem and iterate

  45. Subproblem Full problem (using ¯ K ij := y i y j k ( x i , x j ) ) m m minimize 1 X α i α j ¯ X K ij � α i 2 i,j =1 i =1 m X subject to α i y i = 0 and α i 2 [0 , C ] for all 1  i  m i =1 Constrained problem: pick subset S 2 3 minimize 1 X α i α j ¯ X X 5 + const . 4 1 � K ij � K ij α j α i 2 i,j 2 S i 2 S j 62 S X X subject to α i y i and α i 2 [0 , C ] for all i 2 S α i y i = � i 2 S i 62 S

  46. Active set strategy solve along this line

  47. Active set strategy solve along this line

  48. Subset Selection Strategies often fastest

  49. Improved Sequential Minimal Optimization Dual Cached Loops

  50. Storage Speeds System Capacity Bandwidth IOP/s 10 2 Disk 3TB 150MB/s 5 · 10 4 SSD 256GB 500MB/s 10 8 RAM 16GB 30GB/s 10 9 Cache 16MB 100GB/s • Algorithms iterating data from disk are disk bound • Increasing number of cores makes this worse • True for full memory hierarchy (10x per level) Key Idea: recycle data once we load it in memory

  51. Dataflow Reading Thread Training Thread Read Load Read (Sequential (Random (Random Access) Access) Access) Update Disk RAM RAM Cached Data Weight Vector Dataset (Working Set)

  52. Convex Optimization • SVM optimization problem (without b) n 1 2 k w k 2 + C X max { 0 , 1 � w > y i x i } minimize w 2 R d i =1 no equality constraint • Dual problem D ( α ) := 1 2 α > Q α � α > 1 minimize α subject to 0  α  C 1 . • Coordinate descent (SMO style - really simple) D ( α t + ( α i t � α t α t +1 = argmin i t ) e i t ) ( i t 0  α it  C

  53. Algorithm - 2 loops Reader at disk speed while not converged do read example ( x, y ) from disk if bu ff er full then evict random ( x 0 , y 0 ) from memory insert new ( x, y ) into ring bu ff er in memory end while at RAM speed Trainer while not converged do randomly pick example ( x, y ) from memory update dual parameter α update weight vector w if deemed to be uninformative then evict ( x, y ) from memory margin criterion end while

  54. Advantages • Extensible to general loss functions (simply use convex conjugate) • Extensible to other regularizers (again using convex conjugate) X minimize l ∗ ( z i , y i ) + λ Ω ∗ ( α ) for z = X α α i • Parallelization by oversample, distribute & average (Murata, Amari, Yoshizawa theorem) • Convergence proof via Luo-Tseng

  55. Results • 12 core Opteron (currently not all cores used) • Datasets dataset n d s (%) Datasize SBM Blocks BM Blocks Ω n + : n − 3.5 M 1156 100 0.96 45.28 GB 150,000 40 20 ocr 50 M 800 25 3e − 3 63.04 GB 700,000 60 30 dna 0.35 M 16.61 M 0.022 1.54 20.03 GB 15,000 20 10 webspam-t 20.01 M 29.89 M 1e-4 6.18 4.75 GB 2,000,000 6 3 kddb • Variable amounts of cache • Comparison to Chih-Jen Lin’s KDD’11 prize winning LibLinear solver (SBM) and simple block minimization (BM) • Kyoto cabinet for caching (suboptimal)

  56. Convergence (DNA, different C) · 10 0 10 − 1 Relative Function Value Di ff erence Relative Objective Function Value 10 − 3 10 − 1 10 − 5 much better 10 − 7 dna C = 100 . 0 dna C = 1 . 0 StreamSVM StreamSVM 10 − 2 for large C 10 − 9 SBM SBM BM BM 10 − 11 0 0 . 5 1 1 . 5 0 1 2 3 4 · 10 5 · 10 4 Wall Clock Time (sec) Wall Clock Time (sec) 10 0 70h on 10 − 1 Relative Function Value Di ff erence Relative Objective Function Value 1machine 10 − 3 10 − 5 10 − 1 10 − 7 dna C = 10 . 0 dna C = 1000 . 0 StreamSVM 10 − 9 StreamSVM SBM SBM BM BM 10 − 11 0 0 . 2 0 . 4 0 . 6 0 . 8 1 1 . 2 1 . 4 1 . 6 0 0 . 2 0 . 4 0 . 6 0 . 8 1 1 . 2 1 . 4 1 . 6 · 10 5 · 10 5 Wall Clock Time (sec) Wall Clock Time (sec)

  57. Convergence (C=1, different datasets) · 10 0 10 0 kddb C = 1 . 0 webspam-t C = 1 . 0 Relative Function Value Di ff erence Relative Function Value Di ff erence 10 − 1 StreamSVM StreamSVM 10 − 1 SBM SBM 10 − 2 BM BM 10 − 2 10 − 3 10 − 3 10 − 4 10 − 4 10 − 5 10 − 5 10 − 6 10 − 6 10 − 7 0 1 2 3 4 0 0 . 5 1 1 . 5 2 · 10 4 · 10 4 Wall Clock Time (sec) Wall Clock Time (sec) ocr C = 1 . 0 Relative Function Value Di ff erence 10 − 1 StreamSVM SBM BM 10 − 3 Faster on all datasets 10 − 5 10 − 7 10 − 9 0 1 2 3 4 · 10 4 Wall Clock Time (sec)

  58. Effect of caching · 10 0 10 0 ocr C = 1 . 0 dna C = 1 . 0 Relative Function Value Di ff erence Relative Function Value Di ff erence 256 MB 256 MB 10 − 1 10 − 1 1 GB 1 GB 4 GB 4 GB 10 − 2 10 − 2 16 GB 16 GB 10 − 3 10 − 3 10 − 4 10 − 4 10 − 5 10 − 5 10 − 6 10 − 6 0 0 . 2 0 . 4 0 . 6 0 . 8 1 1 . 2 1 . 4 1 . 6 0 0 . 5 1 1 . 5 2 · 10 4 · 10 4 Wall Clock Time (sec) Wall Clock Time (sec) 10 0 10 0 kddb C = 1 . 0 webspam-t C = 1 . 0 Relative Function Value Di ff erence Relative Function Value Di ff erence 256 MB 10 − 1 256 MB 10 − 1 1 GB 1 GB 10 − 2 4 GB 4 GB 10 − 2 16 GB 16 GB 10 − 3 10 − 3 10 − 4 10 − 4 10 − 5 10 − 6 10 − 5 10 − 7 0 0 . 5 1 1 . 5 2 2 . 5 0 1 , 000 2 , 000 3 , 000 4 , 000 5 , 000 · 10 4 Wall Clock Time (sec) Wall Clock Time (sec)

  59. Subspace

  60. Basic Idea • Solution lies is in low-dimensional subspace of data (approximately) • Find a sparse linear expansion • Before solving the problem (Sparse greedy, pivoting) Find solution in low-dimensional subspace • After solving the problem (Reduced set) Need to sparsify existing solution

  61. Linear Approximation • Project data into lower-dimensional space • Data in feature space x → φ ( x ) • Set of basis functions { φ ( x 1 ) , . . . φ ( x n ) } • Projection problem 2 � � n � � X minimize � φ ( x ) − φ ( x i ) � � � � β � i =1 • Solution β = K ( X, X ) − 1 K ( X, x ) 2 2 � � � � n n • Residual = k φ ( x ) k 2 � � � � � X X � φ ( x ) � φ ( x i ) φ ( x i ) � � � � � � � � � � � i =1 i =1 = k ( x, x ) � K ( x, X ) K ( X, X ) − 1 K ( X, x )

  62. Subspace Finding • Incomplete Cholesky factorization K = [ φ ( x 1 ) , . . . , φ ( x m )] > [ φ ( x 1 ) , . . . , φ ( x m )] ≈ K > mn K � 1 nn K mn ⇤ > K nn K � 1 K � 1 ⇥ ⇥ ⇤ = nn K mn nn K mn

  63. Subspace Finding • Incomplete Cholesky factorization K = [ φ ( x 1 ) , . . . , φ ( x m )] > [ φ ( x 1 ) , . . . , φ ( x m )] ≈ K > mn K � 1 nn K mn ⇤ > K nn K � 1 K � 1 ⇥ ⇥ ⇤ = nn K mn nn K mn i > h � 1 � 1 h i = K nn K mn 2 K nn K mn 2

  64. Picking the Subset • Variant 1 (‘Nystrom’ Method) Pick random directions (not so great accuracy) • Variant 2 (Brute force) Try out all directions (very expensive) • Variant 3 (Tails) Pick 59 random candidates. Keep best (better) • Variant 4 (Positive diagonal pivoting) Pick term with largest residual. As good (or better) than 59 random terms, much chaper

  65. Function values

  66. Basic Idea • Exploit matrix vector operations • In some kernels is cheap K α • In others kernel inverse is easy to compute (e.g. inverse graph Laplacian) K − 1 y • Variable substitution in terms of y • Solve decomposing optimization problem (this can be orders of magnitude faster) • Example - spam filtering on webgraph. Assume that linked sites have related spam scores.

  67. Motivation: Multitask Learning

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend