Re: [Nmlrg] Machine Learning in network - solicitation for use cases

Jérôme François <jerome.francois@inria.fr> Fri, 18 September 2015 12:50 UTC

Return-Path: <jerome.francois@inria.fr>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 576491B2B7D for <nmlrg@ietfa.amsl.com>; Fri, 18 Sep 2015 05:50:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.26
X-Spam-Level:
X-Spam-Status: No, score=-6.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_FR=0.35, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zawnDKdMvg0M for <nmlrg@ietfa.amsl.com>; Fri, 18 Sep 2015 05:50:24 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B7151B2B7B for <nmlrg@irtf.org>; Fri, 18 Sep 2015 05:50:24 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.17,552,1437429600"; d="scan'208";a="178247398"
Received: from marly.loria.fr (HELO [152.81.8.41]) ([152.81.8.41]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES128-SHA; 18 Sep 2015 14:50:22 +0200
Message-ID: <55FC088E.30709@inria.fr>
Date: Fri, 18 Sep 2015 14:50:22 +0200
From: =?UTF-8?B?SsOpcsO0bWUgRnJhbsOnb2lz?= <jerome.francois@inria.fr>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: nmlrg@irtf.org
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com> <D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com> <D211D160.26495%dacheng.zdc@alibaba-inc.com> <D211D7F2.2651C%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com> <55EC9987.9030002@gmail.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D65D@nkgeml512-mbx.china.huawei.com> <55ED09ED.3090406@gmail.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2DD75@nkgeml512-mbx.china.huawei.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C227BE52@nkgeml506-mbx.china.huawei.com> <55EE6648.4040804@gmail.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C227CF25@nkgeml506-mbx.china.huawei.com> <011F781F-9409-44D6-A006-C899A39053A1@sabt.net> <8AE0F17B87264D4CAC7DE0AA6C406F45C22A99F2@nkgeml506-mbx.china.huawei.com>
In-Reply-To: <8AE0F17B87264D4CAC7DE0AA6C406F45C22A99F2@nkgeml506-mbx.china.huawei.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/EWjCKbAiJsn4Ehzw_uENWE8hdoc>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Sep 2015 12:50:26 -0000

Hi Bing,

Le 18/09/2015 05:48, Liubing (Leo) a écrit :
>
> [Bing] Indeed. The trick/art is in feature selection.
> However, feature selection is basically made by man who understands both the application and the machine learning well. We were always wondering, is there any possibility that machine can select features by itself dynamically according to some general/universal methods.
Automated selection of features could work on very generic features I
guess like byte values, bytelength... but avoiding the expert with
knowledge to design targeted features is still very challenging. But I
think most of the time, there are some desciption of the data format we
are relying which is already a good basis to decompose in
attributes/features. Then, feature selection algortihms can be applied.
>
jerome