-
GPU Based Differential Evolution: New Insights and Comparative Study
Authors:
Dylan Janssen,
Wayne Pullan,
Alan Wee-Chung Liew
Abstract:
Differential Evolution (DE) is a highly successful population based global optimisation algorithm, commonly used for solving numerical optimisation problems. However, as the complexity of the objective function increases, the wall-clock run-time of the algorithm suffers as many fitness function evaluations must take place to effectively explore the search space. Due to the inherently parallel natu…
▽ More
Differential Evolution (DE) is a highly successful population based global optimisation algorithm, commonly used for solving numerical optimisation problems. However, as the complexity of the objective function increases, the wall-clock run-time of the algorithm suffers as many fitness function evaluations must take place to effectively explore the search space. Due to the inherently parallel nature of the DE algorithm, graphics processing units (GPU) have been used to effectively accelerate both the fitness evaluation and DE algorithm. This work reviews the main architectural choices made in the literature for GPU based DE algorithms and introduces a new GPU based numerical optimisation benchmark to evaluate and compare GPU based DE algorithms.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Process Mining for Unstructured Data: Challenges and Research Directions
Authors:
Agnes Koschmider,
Milda Aleknonytė-Resch,
Frederik Fonger,
Christian Imenkamp,
Arvid Lepsien,
Kaan Apaydin,
Maximilian Harms,
Dominik Janssen,
Dominic Langhammer,
Tobias Ziolkowski,
Yorck Zisgen
Abstract:
The application of process mining for unstructured data might significantly elevate novel insights into disciplines where unstructured data is a common data format. To efficiently analyze unstructured data by process mining and to convey confidence into the analysis result, requires bridging multiple challenges. The purpose of this paper is to discuss these challenges, present initial solutions an…
▽ More
The application of process mining for unstructured data might significantly elevate novel insights into disciplines where unstructured data is a common data format. To efficiently analyze unstructured data by process mining and to convey confidence into the analysis result, requires bridging multiple challenges. The purpose of this paper is to discuss these challenges, present initial solutions and describe future research directions. We hope that this article lays the foundations for future collaboration on this topic.
△ Less
Submitted 30 November, 2023;
originally announced January 2024.
-
A functionality taxonomy for document search engines
Authors:
Rik D. T. Janssen,
Henderik A. Proper
Abstract:
In this paper a functionality taxonomy for document search engines is proposed. It can be used to assess the features of a search engine, to position search engines relative to each other, or to select which search engine 'fits' a certain situation. One is able to identify areas for improvement. During development, we were guided by the viewpoint of the user. We use the word `search engine' in the…
▽ More
In this paper a functionality taxonomy for document search engines is proposed. It can be used to assess the features of a search engine, to position search engines relative to each other, or to select which search engine 'fits' a certain situation. One is able to identify areas for improvement. During development, we were guided by the viewpoint of the user. We use the word `search engine' in the broadest sense possible, including library and web based (meta) search engines. The taxonomy distinguishes seven functionality areas: an indexing service, user profiling, query composition, query execution, result presentation, result refinement, and history keeping. Each of these relates and provides services to other functionality areas. It can be extended whenever necessary. To illustrate the validity of our taxonomy, it has been used for comparing various document search engines existing today (ACM Digital Library, PiCarta, Copernic, AltaVista, Google, and GuideBeam). It appears that the functionality aspects covered by our taxonomy can be used for describing these search engines.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Developing an Architecture Method Library
Authors:
R. D. T. Janssen,
H. A. Proper,
H. Bosma,
D. Verhoef,
S. J. B. A. Hoppenbrouwers
Abstract:
Today, there are millions of professionals worldwide acting as a designer, architect or engineer in the design, realization, and implementation of information systems. At this moment there is no well established and clearly identified body of knowledge that defines their profession in a "standard" way. In this article, we present the idea of developing an architecture method library. Such a librar…
▽ More
Today, there are millions of professionals worldwide acting as a designer, architect or engineer in the design, realization, and implementation of information systems. At this moment there is no well established and clearly identified body of knowledge that defines their profession in a "standard" way. In this article, we present the idea of developing an architecture method library. Such a library could play a pivotal role to further professionalize the field. The library contains project experiences, reference architectures, literature, proven methods, tools, etc. Access mechanisms allow the professional to use this body of knowledge. By giving it an open nature, it can be filled by professionals from different fields. Feedback mechanisms are possible to improve the contents of the library, for example by giving feedback on the method components in the library.
△ Less
Submitted 19 May, 2021; v1 submitted 16 May, 2021;
originally announced May 2021.
-
Quantifying the Re-identification Risk of Event Logs for Process Mining
Authors:
S. Nuñez von Voigt,
S. A. Fahrenkrog-Petersen,
D. Janssen,
A. Koschmider,
F. Tschorsch,
F. Mannhardt,
O. Landsiedel,
M. Weidlich
Abstract:
Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back…
▽ More
Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through background information and cross-correlation. We therefore argue that, when publishing event logs, the risk of such re-identification attacks must be considered. In this paper, we show how to quantify the re-identification risk with measures for the individual uniqueness in event logs. We also report on a large-scale study that explored the individual uniqueness in a collection of publicly available event logs. Our results suggest that potentially up to all of the cases in an event log may be re-identified, which highlights the importance of privacy-preserving techniques in process mining.
△ Less
Submitted 19 June, 2020; v1 submitted 24 March, 2020;
originally announced March 2020.
-
Comparing deep neural networks against humans: object recognition when the signal gets weaker
Authors:
Robert Geirhos,
David H. J. Janssen,
Heiko H. Schütt,
Jonas Rauber,
Matthias Bethge,
Felix A. Wichmann
Abstract:
Human visual object recognition is typically rapid and seemingly effortless, as well as largely independent of viewpoint and object orientation. Until very recently, animate visual systems were the only ones capable of this remarkable computational feat. This has changed with the rise of a class of computer vision algorithms called deep neural networks (DNNs) that achieve human-level classificatio…
▽ More
Human visual object recognition is typically rapid and seemingly effortless, as well as largely independent of viewpoint and object orientation. Until very recently, animate visual systems were the only ones capable of this remarkable computational feat. This has changed with the rise of a class of computer vision algorithms called deep neural networks (DNNs) that achieve human-level classification performance on object recognition tasks. Furthermore, a growing number of studies report similarities in the way DNNs and the human visual system process objects, suggesting that current DNNs may be good models of human visual object recognition. Yet there clearly exist important architectural and processing differences between state-of-the-art DNNs and the primate visual system. The potential behavioural consequences of these differences are not well understood. We aim to address this issue by comparing human and DNN generalisation abilities towards image degradations. We find the human visual system to be more robust to image manipulations like contrast reduction, additive noise or novel eidolon-distortions. In addition, we find progressively diverging classification error-patterns between humans and DNNs when the signal gets weaker, indicating that there may still be marked differences in the way humans and current DNNs perform visual object recognition. We envision that our findings as well as our carefully measured and freely available behavioural datasets provide a new useful benchmark for the computer vision community to improve the robustness of DNNs and a motivation for neuroscientists to search for mechanisms in the brain that could facilitate this robustness.
△ Less
Submitted 11 December, 2018; v1 submitted 21 June, 2017;
originally announced June 2017.