data
dict
{ "issue": { "id": "12OmNwGqBqg", "title": "November/December", "year": "2009", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "15", "label": "November/December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygT7f7", "doi": "10.1109/TVCG.2009.146", "abstract": "A widespread use of high-throughput gene expression analysis techniques enabled the biomedical research community to share a huge body of gene expression datasets in many public databases on the web. However, current gene expression data repositories provide static representations of the data and support limited interactions. This hinders biologists from effectively exploring shared gene expression datasets. Responding to the growing need for better interfaces to improve the utility of the public datasets, we have designed and developed a new web-based visual interface entitled GeneShelf (http://bioinformatics.cnmcresearch.org/GeneShelf). It builds upon a zoomable grid display to represent two categorical dimensions. It also incorporates an augmented timeline with expandable time points that better shows multiple data values for the focused time point by embedding bar charts. We applied GeneShelf to one of the largest microarray datasets generated to study the progression and recovery process of injuries at the spinal cord of mice and rats. We present a case study and a preliminary qualitative user study with biologists to show the utility and usability of GeneShelf.", "abstracts": [ { "abstractType": "Regular", "content": "A widespread use of high-throughput gene expression analysis techniques enabled the biomedical research community to share a huge body of gene expression datasets in many public databases on the web. However, current gene expression data repositories provide static representations of the data and support limited interactions. This hinders biologists from effectively exploring shared gene expression datasets. Responding to the growing need for better interfaces to improve the utility of the public datasets, we have designed and developed a new web-based visual interface entitled GeneShelf (http://bioinformatics.cnmcresearch.org/GeneShelf). It builds upon a zoomable grid display to represent two categorical dimensions. It also incorporates an augmented timeline with expandable time points that better shows multiple data values for the focused time point by embedding bar charts. We applied GeneShelf to one of the largest microarray datasets generated to study the progression and recovery process of injuries at the spinal cord of mice and rats. We present a case study and a preliminary qualitative user study with biologists to show the utility and usability of GeneShelf.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A widespread use of high-throughput gene expression analysis techniques enabled the biomedical research community to share a huge body of gene expression datasets in many public databases on the web. However, current gene expression data repositories provide static representations of the data and support limited interactions. This hinders biologists from effectively exploring shared gene expression datasets. Responding to the growing need for better interfaces to improve the utility of the public datasets, we have designed and developed a new web-based visual interface entitled GeneShelf (http://bioinformatics.cnmcresearch.org/GeneShelf). It builds upon a zoomable grid display to represent two categorical dimensions. It also incorporates an augmented timeline with expandable time points that better shows multiple data values for the focused time point by embedding bar charts. We applied GeneShelf to one of the largest microarray datasets generated to study the progression and recovery process of injuries at the spinal cord of mice and rats. We present a case study and a preliminary qualitative user study with biologists to show the utility and usability of GeneShelf.", "title": "GeneShelf: A Web-based Visual Interface for Large Gene Expression Time-Series Data Repositories", "normalizedTitle": "GeneShelf: A Web-based Visual Interface for Large Gene Expression Time-Series Data Repositories", "fno": "ttg2009060905", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Bioinformatics Visualization", "Augmented Timeline", "Animation", "Zoomable Grid", "Gene Expression Profiling" ], "authors": [ { "givenName": "Bohyoung", "surname": "Kim", "fullName": "Bohyoung Kim", "affiliation": "Seoul National University", "__typename": "ArticleAuthorType" }, { "givenName": "Bongshin", "surname": "Lee", "fullName": "Bongshin Lee", "affiliation": "Microsoft Research", "__typename": "ArticleAuthorType" }, { "givenName": "Susan", "surname": "Knoblach", "fullName": "Susan Knoblach", "affiliation": "Children's National Medical Center", "__typename": "ArticleAuthorType" }, { "givenName": "Eric", "surname": "Hoffman", "fullName": "Eric Hoffman", "affiliation": "Children's National Medical Center", "__typename": "ArticleAuthorType" }, { "givenName": "Jinwook", "surname": "Seo", "fullName": "Jinwook Seo", "affiliation": "Seoul National University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2009-11-01 00:00:00", "pubType": "trans", "pages": "905-912", "year": "2009", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ijcbs/2009/3739/0/3739a017", "title": "Investigating Gene and MicroRNA Expression in Glioblastoma", "doi": null, "abstractUrl": "/proceedings-article/ijcbs/2009/3739a017/12OmNAkniWv", "parentPublication": { "id": "proceedings/ijcbs/2009/3739/0", "title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/occbio/2009/3685/0/3685a037", "title": "TIGERA: A New Tool for Illumina Gene Expression Reads Analysis", "doi": null, "abstractUrl": "/proceedings-article/occbio/2009/3685a037/12OmNBzAciy", "parentPublication": { "id": "proceedings/occbio/2009/3685/0", "title": "Bioinformatics, 2009 Ohio Collaborative Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2010/4300/0/4300a540", "title": "Smoothing Gene Expression Using Biological Networks", "doi": null, "abstractUrl": "/proceedings-article/icmla/2010/4300a540/12OmNC3FGjz", "parentPublication": { "id": "proceedings/icmla/2010/4300/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2015/9795/0/9795a553", "title": "GO-based Gene Expression Cluster Validation", "doi": null, "abstractUrl": "/proceedings-article/csci/2015/9795a553/12OmNqG0SYt", "parentPublication": { "id": "proceedings/csci/2015/9795/0", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392675", "title": "Combining gene expression and function in a spatially localized approach", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392675/12OmNrAv3Hc", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2014/4274/0/4274a732", "title": "Mining Top-K Frequent Closed Patterns from Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2014/4274a732/12OmNwudQSu", "parentPublication": { "id": "proceedings/icdmw/2014/4274/0", "title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a023", "title": "Analysis of Multiplex Gene Expression Maps Obtained by Voxelation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a023/12OmNyNzhuX", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/06/07080870", "title": "Mining Gene Regulatory Networks by Neural Modeling of Expression Time-Series", "doi": null, "abstractUrl": "/journal/tb/2015/06/07080870/13rRUwfZBYC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060908", "title": "MulteeSum: A Tool for Comparative Spatial and Temporal Gene Expression Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060908/13rRUyYjKaa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/05/08310030", "title": "Stage-Dependent Gene Expression Profiling in Colorectal Cancer", "doi": null, "abstractUrl": "/journal/tb/2019/05/08310030/13rRUyeCk8E", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2009060897", "articleId": "13rRUEgarsE", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2009060913", "articleId": "13rRUx0xPZw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAmmuQm", "title": "July", "year": "2016", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "38", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUB6Sq1G", "doi": "10.1109/TPAMI.2015.2481415", "abstract": "Psychophysical studies show motion cues inform about shape even with unknown reflectance. Recent works in computer vision have considered shape recovery for an object of unknown BRDF using light source or object motions. This paper proposes a theory that addresses the remaining problem of determining shape from the (small or differential) motion of the camera, for unknown isotropic BRDFs. Our theory derives a differential stereo relation that relates camera motion to surface depth, which generalizes traditional Lambertian assumptions. Under orthographic projection, we show differential stereo may not determine shape for general BRDFs, but suffices to yield an invariant for several restricted (still unknown) BRDFs exhibited by common materials. For the perspective case, we show that differential stereo yields the surface depth for unknown isotropic BRDF and unknown directional lighting, while additional constraints are obtained with restrictions on the BRDF or lighting. The limits imposed by our theory are intrinsic to the shape recovery problem and independent of choice of reconstruction method. We also illustrate trends shared by theories on shape from differential motion of light source, object or camera, to relate the hardness of surface reconstruction to the complexity of imaging setup.", "abstracts": [ { "abstractType": "Regular", "content": "Psychophysical studies show motion cues inform about shape even with unknown reflectance. Recent works in computer vision have considered shape recovery for an object of unknown BRDF using light source or object motions. This paper proposes a theory that addresses the remaining problem of determining shape from the (small or differential) motion of the camera, for unknown isotropic BRDFs. Our theory derives a differential stereo relation that relates camera motion to surface depth, which generalizes traditional Lambertian assumptions. Under orthographic projection, we show differential stereo may not determine shape for general BRDFs, but suffices to yield an invariant for several restricted (still unknown) BRDFs exhibited by common materials. For the perspective case, we show that differential stereo yields the surface depth for unknown isotropic BRDF and unknown directional lighting, while additional constraints are obtained with restrictions on the BRDF or lighting. The limits imposed by our theory are intrinsic to the shape recovery problem and independent of choice of reconstruction method. We also illustrate trends shared by theories on shape from differential motion of light source, object or camera, to relate the hardness of surface reconstruction to the complexity of imaging setup.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Psychophysical studies show motion cues inform about shape even with unknown reflectance. Recent works in computer vision have considered shape recovery for an object of unknown BRDF using light source or object motions. This paper proposes a theory that addresses the remaining problem of determining shape from the (small or differential) motion of the camera, for unknown isotropic BRDFs. Our theory derives a differential stereo relation that relates camera motion to surface depth, which generalizes traditional Lambertian assumptions. Under orthographic projection, we show differential stereo may not determine shape for general BRDFs, but suffices to yield an invariant for several restricted (still unknown) BRDFs exhibited by common materials. For the perspective case, we show that differential stereo yields the surface depth for unknown isotropic BRDF and unknown directional lighting, while additional constraints are obtained with restrictions on the BRDF or lighting. The limits imposed by our theory are intrinsic to the shape recovery problem and independent of choice of reconstruction method. We also illustrate trends shared by theories on shape from differential motion of light source, object or camera, to relate the hardness of surface reconstruction to the complexity of imaging setup.", "title": "The Information Available to a Moving Observer on Shape with Unknown, Isotropic BRDFs", "normalizedTitle": "The Information Available to a Moving Observer on Shape with Unknown, Isotropic BRDFs", "fno": "07274730", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cameras", "Light Sources", "Surface Reconstruction", "Image Reconstruction", "Computer Vision", "Differential Theory", "Surface Reconstruction", "General BRDF", "Multiview Stereo" ], "authors": [ { "givenName": "Manmohan", "surname": "Chandraker", "fullName": "Manmohan Chandraker", "affiliation": "NEC Laboratories America, at Cupertino, CA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2016-07-01 00:00:00", "pubType": "trans", "pages": "1283-1297", "year": "2016", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034a143", "title": "A Variational Study on BRDF Reconstruction in a Structured Light Scanner", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a143/12OmNBfqG3s", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c179", "title": "What Camera Motion Reveals about Shape with Unknown BRDF", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c179/12OmNBqMDzR", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a153", "title": "Efficient BRDF Sampling Using Projected Deviation Vector Parameterization", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a153/12OmNBtUdGa", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995603", "title": "A theory of differential photometric stereo for unknown isotropic BRDFs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995603/12OmNCzb9vc", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457a578", "title": "Robust Energy Minimization for BRDF-Invariant Shape from Light Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457a578/12OmNxdDFFd", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032f372", "title": "Reflectance Capture Using Univariate Sampling of BRDFs", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f372/12OmNz6iOHS", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851f451", "title": "SVBRDF-Invariant Shape and Reflectance Estimation from Light-Field Cameras", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851f451/12OmNzw8jaI", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/03/07875163", "title": "SVBRDF-Invariant Shape and Reflectance Estimation from a Light-Field Camera", "doi": null, "abstractUrl": "/journal/tp/2018/03/07875163/13rRUwbJD6c", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/02/v0126", "title": "Barycentric Parameterizations for Isotropic BRDFs", "doi": null, "abstractUrl": "/journal/tg/2005/02/v0126/13rRUxNEqPC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/12/ttp2013122941", "title": "On Differential Photometric Reconstruction for Unknown, Isotropic BRDFs", "doi": null, "abstractUrl": "/journal/tp/2013/12/ttp2013122941/13rRUygT7oc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07484393", "articleId": "13rRUxDItis", "__typename": "AdjacentArticleType" }, "next": { "fno": "07442841", "articleId": "13rRUxAAT2v", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNz5JC2z", "title": "Nov.", "year": "2017", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxOve9O", "doi": "10.1109/TVCG.2017.2734538", "abstract": "Predicting specularities in images, given the camera pose and scene geometry from SLAM, forms a challenging and open problem. It is nonetheless essential in several applications such as retexturing. A recent geometric model called JOLIMAS partially answers this problem, under the assumptions that the specularities are elliptical and the scene is planar. JOLIMAS models a moving specularity as the image of a fixed 3D quadric. We propose dual JOLIMAS, a new model which raises the planarity assumption. It uses the fact that specularities remain elliptical on convex surfaces and that every surface can be divided in convex parts. The geometry of dual JOLIMAS then uses a 3D quadric per convex surface part and light source, and predicts the specularities by a means of virtual cameras, allowing it to cope with surface's unflatness. We assessed the efficiency and precision of dual JOLIMAS on multiple synthetic and real videos with various objects and lighting conditions. We give results of a retexturing application. Further results are presented as supplementary video material.", "abstracts": [ { "abstractType": "Regular", "content": "Predicting specularities in images, given the camera pose and scene geometry from SLAM, forms a challenging and open problem. It is nonetheless essential in several applications such as retexturing. A recent geometric model called JOLIMAS partially answers this problem, under the assumptions that the specularities are elliptical and the scene is planar. JOLIMAS models a moving specularity as the image of a fixed 3D quadric. We propose dual JOLIMAS, a new model which raises the planarity assumption. It uses the fact that specularities remain elliptical on convex surfaces and that every surface can be divided in convex parts. The geometry of dual JOLIMAS then uses a 3D quadric per convex surface part and light source, and predicts the specularities by a means of virtual cameras, allowing it to cope with surface's unflatness. We assessed the efficiency and precision of dual JOLIMAS on multiple synthetic and real videos with various objects and lighting conditions. We give results of a retexturing application. Further results are presented as supplementary video material.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Predicting specularities in images, given the camera pose and scene geometry from SLAM, forms a challenging and open problem. It is nonetheless essential in several applications such as retexturing. A recent geometric model called JOLIMAS partially answers this problem, under the assumptions that the specularities are elliptical and the scene is planar. JOLIMAS models a moving specularity as the image of a fixed 3D quadric. We propose dual JOLIMAS, a new model which raises the planarity assumption. It uses the fact that specularities remain elliptical on convex surfaces and that every surface can be divided in convex parts. The geometry of dual JOLIMAS then uses a 3D quadric per convex surface part and light source, and predicts the specularities by a means of virtual cameras, allowing it to cope with surface's unflatness. We assessed the efficiency and precision of dual JOLIMAS on multiple synthetic and real videos with various objects and lighting conditions. We give results of a retexturing application. Further results are presented as supplementary video material.", "title": "A Multiple-View Geometric Model of Specularities on Non-Planar Shapes with Application to Dynamic Retexturing", "normalizedTitle": "A Multiple-View Geometric Model of Specularities on Non-Planar Shapes with Application to Dynamic Retexturing", "fno": "08007318", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Light Sources", "Cameras", "Three Dimensional Displays", "Surface Reconstruction", "Shape", "Geometry", "Image Reconstruction", "Specularity Prediction", "Augmented Reality", "Retexturing", "Quadric", "Multiple Light Sources" ], "authors": [ { "givenName": "Alexandre", "surname": "Morgand", "fullName": "Alexandre Morgand", "affiliation": "CEA, LIST, Gif-sur-Yvette, France", "__typename": "ArticleAuthorType" }, { "givenName": "Mohamed", "surname": "Tamaazousti", "fullName": "Mohamed Tamaazousti", "affiliation": "CEALIST", "__typename": "ArticleAuthorType" }, { "givenName": "Adrien", "surname": "Bartoli", "fullName": "Adrien Bartoli", "affiliation": "IP", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2017-11-01 00:00:00", "pubType": "trans", "pages": "2485-2493", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2012/4660/0/06402544", "title": "Real-time surface light-field capture for augmentation of planar specular surfaces", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402544/12OmNASILPn", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840c504", "title": "Multi-view Normal Field Integration for 3D Reconstruction of Mirroring Objects", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840c504/12OmNAoUTgY", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/worv/2013/5646/0/06521920", "title": "Near surface light source estimation from a single view image", "doi": null, "abstractUrl": "/proceedings-article/worv/2013/06521920/12OmNBVrjoU", "parentPublication": { "id": "proceedings/worv/2013/5646/0", "title": "2013 IEEE Workshop on Robot Vision (WORV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2016/3641/0/3641a044", "title": "An Empirical Model for Specularity Prediction with Application to Dynamic Retexturing", "doi": null, "abstractUrl": "/proceedings-article/ismar/2016/3641a044/12OmNCd2rxc", "parentPublication": { "id": "proceedings/ismar/2016/3641/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2013/2869/0/06671772", "title": "Delta Light Propagation Volumes for mixed reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2013/06671772/12OmNwkhTdN", "parentPublication": { "id": "proceedings/ismar/2013/2869/0", "title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a175", "title": "Surface Recovery: Fusion of Image and Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a175/12OmNxE2mUe", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2010/7779/0/05575931", "title": "User-Controlled Geometric Feature Preserving Simplification", "doi": null, "abstractUrl": "/proceedings-article/fcst/2010/05575931/12OmNyNQSQn", "parentPublication": { "id": "proceedings/fcst/2010/7779/0", "title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/05/07869421", "title": "A Geometric Model for Specularity Prediction on Planar Surfaces with Multiple Light Sources", "doi": null, "abstractUrl": "/journal/tg/2018/05/07869421/13rRUwdIOUT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b052", "title": "A Differential Volumetric Approach to Multi-View Photometric Stereo", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b052/1hVlAZv5zfG", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/09022090", "title": "Learning to Reconstruct Symmetric Shapes using Planar Parameterization of 3D Surface", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/09022090/1i5mERbIGQg", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08007317", "articleId": "13rRUILc8fg", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRQj", "name": "ttg201711-08007318s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201711-08007318s1.zip", "extension": "zip", "size": "58.7 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNAle6QR", "title": "July", "year": "2020", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "42", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1iZGtGUiMhO", "doi": "10.1109/TPAMI.2020.2986764", "abstract": "Recovering the shape and reflectance of non-Lambertian surfaces remains a challenging problem in computer vision since the view-dependent appearance invalidates traditional photo-consistency constraint. In this paper, we introduce a novel concentric multi-spectral light field (CMSLF) design that is able to recover the shape and reflectance of surfaces of various materials in one shot. Our CMSLF system consists of an array of cameras arranged on concentric circles where each ring captures a specific spectrum. Coupled with a multi-spectral ring light, we are able to sample viewpoint and lighting variations in a single shot via spectral multiplexing. We further show that our concentric camera and light source setting results in a unique single-peak pattern in specularity variations across viewpoints. This property enables robust depth estimation for specular points. To estimate depth and multi-spectral reflectance map, we formulate a physics-based reflectance model for the CMSLF under the surface camera (S-Cam) representation. Extensive synthetic and real experiments show that our method outperforms the state-of-the-art shape reconstruction methods, especially for non-Lambertian surfaces.", "abstracts": [ { "abstractType": "Regular", "content": "Recovering the shape and reflectance of non-Lambertian surfaces remains a challenging problem in computer vision since the view-dependent appearance invalidates traditional photo-consistency constraint. In this paper, we introduce a novel concentric multi-spectral light field (CMSLF) design that is able to recover the shape and reflectance of surfaces of various materials in one shot. Our CMSLF system consists of an array of cameras arranged on concentric circles where each ring captures a specific spectrum. Coupled with a multi-spectral ring light, we are able to sample viewpoint and lighting variations in a single shot via spectral multiplexing. We further show that our concentric camera and light source setting results in a unique single-peak pattern in specularity variations across viewpoints. This property enables robust depth estimation for specular points. To estimate depth and multi-spectral reflectance map, we formulate a physics-based reflectance model for the CMSLF under the surface camera (S-Cam) representation. Extensive synthetic and real experiments show that our method outperforms the state-of-the-art shape reconstruction methods, especially for non-Lambertian surfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recovering the shape and reflectance of non-Lambertian surfaces remains a challenging problem in computer vision since the view-dependent appearance invalidates traditional photo-consistency constraint. In this paper, we introduce a novel concentric multi-spectral light field (CMSLF) design that is able to recover the shape and reflectance of surfaces of various materials in one shot. Our CMSLF system consists of an array of cameras arranged on concentric circles where each ring captures a specific spectrum. Coupled with a multi-spectral ring light, we are able to sample viewpoint and lighting variations in a single shot via spectral multiplexing. We further show that our concentric camera and light source setting results in a unique single-peak pattern in specularity variations across viewpoints. This property enables robust depth estimation for specular points. To estimate depth and multi-spectral reflectance map, we formulate a physics-based reflectance model for the CMSLF under the surface camera (S-Cam) representation. Extensive synthetic and real experiments show that our method outperforms the state-of-the-art shape reconstruction methods, especially for non-Lambertian surfaces.", "title": "Shape and Reflectance Reconstruction Using Concentric Multi-Spectral Light Field", "normalizedTitle": "Shape and Reflectance Reconstruction Using Concentric Multi-Spectral Light Field", "fno": "09064908", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cameras", "Estimation Theory", "Image Reconstruction", "Image Representation", "Light Sources", "Multiplexing", "Light Source Setting", "Single Peak Pattern", "Multispectral Reflectance Map", "Physics Based Reflectance Model", "Surface Camera Representation", "Non Lambertian Surfaces", "Reflectance Reconstruction", "Computer Vision", "CMSLF System", "Concentric Circles", "Spectral Multiplexing", "Concentric Camera", "View Dependent Appearance", "Photoconsistency Constraint", "Multispectral Ring Lighting Variations", "Shape Reconstruction Methods", "Concentric Multispectral Light Field Design", "S Cam Representation", "Cameras", "Shape", "Surface Reconstruction", "Lighting", "Light Sources", "Image Reconstruction", "Computational Modeling", "Shape Reconstruction", "Surface Reflectance", "Multi Spectral", "Light Field" ], "authors": [ { "givenName": "Mingyuan", "surname": "Zhou", "fullName": "Mingyuan Zhou", "affiliation": "DGene Digital Technology, Baton Rouge, LA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yuqi", "surname": "Ding", "fullName": "Yuqi Ding", "affiliation": "Louisiana State University, Baton Rouge, LA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yu", "surname": "Ji", "fullName": "Yu Ji", "affiliation": "DGene Digital Technology, Baton Rouge, LA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "S. Susan", "surname": "Young", "fullName": "S. Susan Young", "affiliation": "US Army Research Laboratory, Adelphi, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jingyi", "surname": "Yu", "fullName": "Jingyi Yu", "affiliation": "Shanghai Tech University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jinwei", "surname": "Ye", "fullName": "Jinwei Ye", "affiliation": "Division of Computer Science and Engineering, Louisiana State University, Baton Rouge, LA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2020-07-01 00:00:00", "pubType": "trans", "pages": "1594-1605", "year": "2020", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733b735", "title": "Surface Normal Reconstruction from Specular Information in Light Field Data", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b735/12OmNAP1YZr", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1989/1938/0/00099963", "title": "Shape and reflectance from an image sequence generated using extended sources", "doi": null, "abstractUrl": "/proceedings-article/robot/1989/00099963/12OmNAq3hRr", "parentPublication": { "id": "proceedings/robot/1989/1938/0", "title": "1989 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06239343", "title": "Recovering spectral reflectance under commonly available lighting conditions", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06239343/12OmNBTs7yq", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1989/1952/0/00037871", "title": "Multiresolution shape from shading", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1989/00037871/12OmNCeaQ1d", "parentPublication": { "id": "proceedings/cvpr/1989/1952/0", "title": "1989 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1989/1952/0/00037826", "title": "A theory of photometric stereo for a general class of reflectance maps", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1989/00037826/12OmNqJHFLT", "parentPublication": { "id": "proceedings/cvpr/1989/1952/0", "title": "1989 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139483", "title": "Determining reflectance parameters using range and brightness images", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139483/12OmNrMZpwA", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbmcv/1995/7021/0/00514684", "title": "Reflectance analysis under solar illumination", "doi": null, "abstractUrl": "/proceedings-article/pbmcv/1995/00514684/12OmNxbW4O4", "parentPublication": { "id": "proceedings/pbmcv/1995/7021/0", "title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851f451", "title": "SVBRDF-Invariant Shape and Reflectance Estimation from Light-Field Cameras", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851f451/12OmNzw8jaI", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1993/3880/0/00341163", "title": "Diffuse reflectance from rough surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1993/00341163/12OmNzwpU3S", "parentPublication": { "id": "proceedings/cvpr/1993/3880/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/03/07875163", "title": "SVBRDF-Invariant Shape and Reflectance Estimation from a Light-Field Camera", "doi": null, "abstractUrl": "/journal/tp/2018/03/07875163/13rRUwbJD6c", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09064938", "articleId": "1iZGugECLTy", "__typename": "AdjacentArticleType" }, "next": { "fno": "09064909", "articleId": "1iZGvNAjnXi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1koY9BIx6Du", "name": "ttp202007-09064908s1-supp1-2986764.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202007-09064908s1-supp1-2986764.pdf", "extension": "pdf", "size": "289 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxb5hpF", "title": "Sept.", "year": "2014", "issueNum": "09", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgQpqK", "doi": "10.1109/TVCG.2013.264", "abstract": "In this paper, we present a high quality and interactive method for volume rendering curvilinear-grid data sets. This method is based on a two-stage parallel transformation of the sample position into intermediate computational space then into texture space through the use of multiple 1 and 2D deformation textures using hardware acceleration. In this manner, it is possible to render many curvilinear-grid volume data sets at high quality and with a low memory footprint, while taking advantage of modern graphic hardware’s tri-linear filtering for the data itself. We also extend our method to handle volume shading. Additionally, we present a comprehensive study and comparisons with previous works, we show improvements both in quality and performance using our technique on multiple curvilinear data sets.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a high quality and interactive method for volume rendering curvilinear-grid data sets. This method is based on a two-stage parallel transformation of the sample position into intermediate computational space then into texture space through the use of multiple 1 and 2D deformation textures using hardware acceleration. In this manner, it is possible to render many curvilinear-grid volume data sets at high quality and with a low memory footprint, while taking advantage of modern graphic hardware’s tri-linear filtering for the data itself. We also extend our method to handle volume shading. Additionally, we present a comprehensive study and comparisons with previous works, we show improvements both in quality and performance using our technique on multiple curvilinear data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a high quality and interactive method for volume rendering curvilinear-grid data sets. This method is based on a two-stage parallel transformation of the sample position into intermediate computational space then into texture space through the use of multiple 1 and 2D deformation textures using hardware acceleration. In this manner, it is possible to render many curvilinear-grid volume data sets at high quality and with a low memory footprint, while taking advantage of modern graphic hardware’s tri-linear filtering for the data itself. We also extend our method to handle volume shading. Additionally, we present a comprehensive study and comparisons with previous works, we show improvements both in quality and performance using our technique on multiple curvilinear data sets.", "title": "Volume Rendering of Curvilinear-Grid Data Using Low-Dimensional Deformation Textures", "normalizedTitle": "Volume Rendering of Curvilinear-Grid Data Using Low-Dimensional Deformation Textures", "fno": "06684150", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Rendering Computer Graphics", "Hardware", "Data Visualization", "Interpolation", "Ray Casting", "Deformation Texture", "Curvilinear Datasets" ], "authors": [ { "givenName": "Robert", "surname": "Hero", "fullName": "Robert Hero", "affiliation": "University of California, Davis,", "__typename": "ArticleAuthorType" }, { "givenName": "Chris", "surname": "Ho", "fullName": "Chris Ho", "affiliation": "University of California, Davis,", "__typename": "ArticleAuthorType" }, { "givenName": "Kwan-Liu", "surname": "Ma", "fullName": "Kwan-Liu Ma", "affiliation": "University of California, Davis,", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2014-09-01 00:00:00", "pubType": "trans", "pages": "1330-1343", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/shpcc/1992/2775/0/00232693", "title": "Parallel volume rendering for curvilinear volumes", "doi": null, "abstractUrl": "/proceedings-article/shpcc/1992/00232693/12OmNAtK4gA", "parentPublication": { "id": "proceedings/shpcc/1992/2775/0", "title": "1992 Proceedings Scalable High Performance Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2008/1966/0/04475452", "title": "Efficient Rendering of Extrudable Curvilinear Volumes", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2008/04475452/12OmNBKW9AV", "parentPublication": { "id": "proceedings/pacificvis/2008/1966/0", "title": "IEEE Pacific Visualization Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300038", "title": "Acceleration Techniques for GPU-based Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300038/12OmNC2xhD8", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1995/7187/0/71870061", "title": "Splatting of curvilinear volumes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870061/12OmNwCsdPK", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2008/1966/0/04475453", "title": "Second Order Pre-Integrated Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2008/04475453/12OmNwlqhPE", "parentPublication": { "id": "proceedings/pacificvis/2008/1966/0", "title": "IEEE Pacific Visualization Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1998/9176/0/91760247", "title": "Accelerated Ray-Casting for Curvilinear Volumes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760247/12OmNyoAA7g", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vv/2000/308/0/04384228", "title": "Level-of-Detail Volume Rendering via 3D Textures", "doi": null, "abstractUrl": "/proceedings-article/vv/2000/04384228/12OmNz4SOrJ", "parentPublication": { "id": "proceedings/vv/2000/308/0", "title": "2000 IEEE Symposium on Volume Visualization (VV 2000)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1995/7187/0/71870011", "title": "Interactive Maximum Projection Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870011/12OmNzZmZv2", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1993/3940/0/00398853", "title": "Rapid exploration of curvilinear grids using direct volume rendering", "doi": null, "abstractUrl": "/proceedings-article/visual/1993/00398853/12OmNzlD9sU", "parentPublication": { "id": "proceedings/visual/1993/3940/0", "title": "Proceedings Visualization '93", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1999/04/v0322", "title": "Fast Projection-Based Ray-Casting Algorithm for Rendering Curvilinear Volumes", "doi": null, "abstractUrl": "/journal/tg/1999/04/v0322/13rRUyY294r", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06803934", "articleId": "13rRUwInvyA", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DGRZtSiOdy", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1oZxEim72LK", "doi": "10.1109/TVCG.2020.3039777", "abstract": "<italic>Mesh Colors</italic> provide an effective alternative to standard texture mapping. They significantly simplify the asset production pipeline by removing the need for defining a mapping and eliminate rendering artifacts due to seams. This article addresses the problem that using Mesh Colors for real-time rendering has not been practical, due to the absence of hardware support. We show that it is possible to provide full hardware texture filtering support for Mesh Colors with minimal changes to existing GPUs by introducing a hardware-friendly representation for Mesh Colors that we call <italic>Patch Textures</italic>, which can have quadrilateral or triangular topology. We discuss the hardware modifications needed for storing and filtering Patch Textures, including anisotropic filtering. This article extends our previous work by discussing and comparing patch edge-handling approaches, including an option for sampling the textures of neighboring patches using an adjacency map. We also provide extensive discussions regarding data duplication, a partial implementation present in existing hardware, and the difficulties with providing a similar hardware support for Ptex.", "abstracts": [ { "abstractType": "Regular", "content": "<italic>Mesh Colors</italic> provide an effective alternative to standard texture mapping. They significantly simplify the asset production pipeline by removing the need for defining a mapping and eliminate rendering artifacts due to seams. This article addresses the problem that using Mesh Colors for real-time rendering has not been practical, due to the absence of hardware support. We show that it is possible to provide full hardware texture filtering support for Mesh Colors with minimal changes to existing GPUs by introducing a hardware-friendly representation for Mesh Colors that we call <italic>Patch Textures</italic>, which can have quadrilateral or triangular topology. We discuss the hardware modifications needed for storing and filtering Patch Textures, including anisotropic filtering. This article extends our previous work by discussing and comparing patch edge-handling approaches, including an option for sampling the textures of neighboring patches using an adjacency map. We also provide extensive discussions regarding data duplication, a partial implementation present in existing hardware, and the difficulties with providing a similar hardware support for Ptex.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mesh Colors provide an effective alternative to standard texture mapping. They significantly simplify the asset production pipeline by removing the need for defining a mapping and eliminate rendering artifacts due to seams. This article addresses the problem that using Mesh Colors for real-time rendering has not been practical, due to the absence of hardware support. We show that it is possible to provide full hardware texture filtering support for Mesh Colors with minimal changes to existing GPUs by introducing a hardware-friendly representation for Mesh Colors that we call Patch Textures, which can have quadrilateral or triangular topology. We discuss the hardware modifications needed for storing and filtering Patch Textures, including anisotropic filtering. This article extends our previous work by discussing and comparing patch edge-handling approaches, including an option for sampling the textures of neighboring patches using an adjacency map. We also provide extensive discussions regarding data duplication, a partial implementation present in existing hardware, and the difficulties with providing a similar hardware support for Ptex.", "title": "Patch Textures: Hardware Support for Mesh Colors", "normalizedTitle": "Patch Textures: Hardware Support for Mesh Colors", "fno": "09266764", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computational Geometry", "Computer Graphic Equipment", "Coprocessors", "Data Visualisation", "Image Colour Analysis", "Image Texture", "Rendering Computer Graphics", "Discussing Comparing Patch Edge Handling Approaches", "Similar Hardware Support", "Patch Textures", "Mesh Colors", "Standard Texture Mapping", "Hardware Texture", "Hardware Friendly Representation", "Image Color Analysis", "Hardware", "Two Dimensional Displays", "Standards", "Rendering Computer Graphics", "Graphics Processing Units", "Faces", "Textures", "Mesh Colors", "Ptex", "GPU Hardware", "Texture Filtering", "Barycentric Filtering", "Anisotropic Filtering" ], "authors": [ { "givenName": "Ian", "surname": "Mallett", "fullName": "Ian Mallett", "affiliation": "School of Computing, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Larry", "surname": "Seiler", "fullName": "Larry Seiler", "affiliation": "Facebook Reality Labs, Pittsburgh, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Cem", "surname": "Yuksel", "fullName": "Cem Yuksel", "affiliation": "School of Computing, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "2710-2721", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/nca/2009/3698/0/3698a242", "title": "Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission", "doi": null, "abstractUrl": "/proceedings-article/nca/2009/3698a242/12OmNBOllgR", "parentPublication": { "id": "proceedings/nca/2009/3698/0", "title": "2009 Eighth IEEE International Symposium on Network Computing and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2016/4400/0/4400a267", "title": "A Mesh Reconstruction Method Based on View Maps", "doi": null, "abstractUrl": "/proceedings-article/icdh/2016/4400a267/12OmNBoNrqY", "parentPublication": { "id": "proceedings/icdh/2016/4400/0", "title": "2016 6th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1993/3940/0/00398878", "title": "Geometric clipping using Boolean textures", "doi": null, "abstractUrl": "/proceedings-article/visual/1993/00398878/12OmNrIrPtG", "parentPublication": { "id": "proceedings/visual/1993/3940/0", "title": "Proceedings Visualization '93", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2007/2996/0/29960079", "title": "Geometry Textures", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2007/29960079/12OmNvrvjab", "parentPublication": { "id": "proceedings/sibgrapi/2007/2996/0", "title": "XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/09/ttg2013091488", "title": "Multiresolution Attributes for Hardware Tessellated Objects", "doi": null, "abstractUrl": "/journal/tg/2013/09/ttg2013091488/13rRUwIF69j", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/05/07903744", "title": "Packing Vertex Data into Hardware-Decompressible Textures", "doi": null, "abstractUrl": "/journal/tg/2018/05/07903744/13rRUwbJD4R", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/02/v0379", "title": "Aura 3D Textures", "doi": null, "abstractUrl": "/journal/tg/2007/02/v0379/13rRUwkfAZb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904457", "title": "Quick Clusters: A GPU-Parallel Partitioning for Efficient Path Tracing of Unstructured Volumetric Grids", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904457/1H1gpFOnUeQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/08/09286513", "title": "Accelerating Unstructured Mesh Point Location With RT Cores", "doi": null, "abstractUrl": "/journal/tg/2022/08/09286513/1porhlu0eEo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/08/09409710", "title": "Interactive Focus+Context Rendering for Hexahedral Mesh Inspection", "doi": null, "abstractUrl": "/journal/tg/2021/08/09409710/1sXjFab9xYc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09257094", "articleId": "1oFCABrJUmA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09249052", "articleId": "1ovEVPWDI4g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzVXNIj", "title": "Dec.", "year": "2017", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYSWl4", "doi": "10.1109/TVCG.2016.2636187", "abstract": "We present a new method to efficiently generate a set of morphologically diverse and inspiring virtual trees through hierarchical topology-preserving blending, aiming to facilitate designers’ creativity production. By maintaining the topological consistency of the tree branches, sequences of similar yet different trees and novel intermediate trees with encouragingly interesting structures are generated by performing inner-species and cross-species blending, respectively. Hierarchical fuzzy correspondences are automatically established between two or multiple trees based on the multi-scale topology tree representations. Fundamental blending tasks including morph,  grow and wilt are introduced and organized into a tree-structured blending scheduler, which not only introduces the randomness into the blending procedure but also wisely schedules the tasks to generate topology-aware blending sequences, contributing to a variety of resulting trees that exhibit diversities in both geometry and topology. Most significantly, multiple batches of blending can be executed in parallel, resulting in a rapid creation of a large repository of diverse trees.", "abstracts": [ { "abstractType": "Regular", "content": "We present a new method to efficiently generate a set of morphologically diverse and inspiring virtual trees through hierarchical topology-preserving blending, aiming to facilitate designers’ creativity production. By maintaining the topological consistency of the tree branches, sequences of similar yet different trees and novel intermediate trees with encouragingly interesting structures are generated by performing inner-species and cross-species blending, respectively. Hierarchical fuzzy correspondences are automatically established between two or multiple trees based on the multi-scale topology tree representations. Fundamental blending tasks including morph,  grow and wilt are introduced and organized into a tree-structured blending scheduler, which not only introduces the randomness into the blending procedure but also wisely schedules the tasks to generate topology-aware blending sequences, contributing to a variety of resulting trees that exhibit diversities in both geometry and topology. Most significantly, multiple batches of blending can be executed in parallel, resulting in a rapid creation of a large repository of diverse trees.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a new method to efficiently generate a set of morphologically diverse and inspiring virtual trees through hierarchical topology-preserving blending, aiming to facilitate designers’ creativity production. By maintaining the topological consistency of the tree branches, sequences of similar yet different trees and novel intermediate trees with encouragingly interesting structures are generated by performing inner-species and cross-species blending, respectively. Hierarchical fuzzy correspondences are automatically established between two or multiple trees based on the multi-scale topology tree representations. Fundamental blending tasks including morph,  grow and wilt are introduced and organized into a tree-structured blending scheduler, which not only introduces the randomness into the blending procedure but also wisely schedules the tasks to generate topology-aware blending sequences, contributing to a variety of resulting trees that exhibit diversities in both geometry and topology. Most significantly, multiple batches of blending can be executed in parallel, resulting in a rapid creation of a large repository of diverse trees.", "title": "Creative Virtual Tree Modeling Through Hierarchical Topology-Preserving Blending", "normalizedTitle": "Creative Virtual Tree Modeling Through Hierarchical Topology-Preserving Blending", "fno": "07775115", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Vegetation", "Shape", "Topology", "Computational Modeling", "Creativity", "Geometry", "Animation", "Creative Modeling", "Tree Modeling", "Hierarchical Topology Preservation", "And Shape Blending" ], "authors": [ { "givenName": "Yutong", "surname": "Wang", "fullName": "Yutong Wang", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaowei", "surname": "Xue", "fullName": "Xiaowei Xue", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaogang", "surname": "Jin", "fullName": "Xiaogang Jin", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhigang", "surname": "Deng", "fullName": "Zhigang Deng", "affiliation": "Department of Computer Science, University of Houston, Houston, TX", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2017-12-01 00:00:00", "pubType": "trans", "pages": "2521-2534", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2014/03/06702461", "title": "Effect of Incomplete Lineage Sorting On Tree-Reconciliation-Based Inference of Gene Duplication", "doi": null, "abstractUrl": "/journal/tb/2014/03/06702461/13rRUEgs2Ah", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/05/07289362", "title": "Asymptotic Properties of the Number of Matching Coalescent Histories for Caterpillar-Like Families of Species Trees", "doi": null, "abstractUrl": "/journal/tb/2016/05/07289362/13rRUxBJhls", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/01/07557076", "title": "Species Tree Inference from Gene Splits by Unrooted STAR Methods", "doi": null, "abstractUrl": "/journal/tb/2018/01/07557076/13rRUxBa54I", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/01/ttb2013010061", "title": "Mathematical Properties of the Deep Coalescence Cost", "doi": null, "abstractUrl": "/journal/tb/2013/01/ttb2013010061/13rRUxC0SNu", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/05/07403951", "title": "Unconstrained Diameters for Deep Coalescence", "doi": null, "abstractUrl": "/journal/tb/2017/05/07403951/13rRUyhaInd", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/07959594", "title": "Gene Tree Construction and Correction Using SuperTree and Reconciliation", "doi": null, "abstractUrl": "/journal/tb/2018/05/07959594/14dcDXLXNjM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/08002594", "title": "Bijective Diameters of Gene Tree Parsimony Costs", "doi": null, "abstractUrl": "/journal/tb/2018/05/08002594/14dcEdidYgv", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/08053780", "title": "Species Tree Estimation Using ASTRAL: How Many Genes Are Enough?", "doi": null, "abstractUrl": "/journal/tb/2018/05/08053780/14qdcSDRDIR", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/08868219", "title": "Consensus of All Solutions for Intractable Phylogenetic Tree Inference", "doi": null, "abstractUrl": "/journal/tb/2021/01/08868219/1e7BUc5cU92", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/09093990", "title": "Using Constrained-<sc>INC</sc> for Large-Scale Gene Tree and Species Tree Estimation", "doi": null, "abstractUrl": "/journal/tb/2021/01/09093990/1jP8tj9B2Uw", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07778257", "articleId": "13rRUxCitJj", "__typename": "AdjacentArticleType" }, "next": { "fno": "07726076", "articleId": "13rRUwkfAZk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesWb", "name": "ttg201712-07775115s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201712-07775115s1.zip", "extension": "zip", "size": "132 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNAZx8OB", "title": "Sept.-Oct.", "year": "2018", "issueNum": "05", "idPrefix": "tb", "pubType": "journal", "volume": "15", "label": "Sept.-Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "14dcDXLXNjM", "doi": "10.1109/TCBB.2017.2720581", "abstract": "The supertree problem asking for a tree displaying a set of consistent input trees has been largely considered for the reconstruction of species trees. Here, we rather explore this framework for the sake of reconstructing a gene tree from a set of input gene trees on partial data. In this perspective, the phylogenetic tree for the species containing the genes of interest can be used to choose among the many possible compatible “supergenetrees”, the most natural criteria being to minimize a reconciliation cost. We develop a variety of algorithmic solutions for the construction and correction of gene trees using the supertree framework. A dynamic programming supertree algorithm for constructing or correcting gene trees, exponential in the number of input trees, is first developed for the less constrained version of the problem. It is then adapted to gene trees with nodes labeled as duplication or speciation, the additional constraint being to preserve the orthology and paralogy relations between genes. Then, a quadratic time algorithm is developed for efficiently correcting an initial gene tree while preserving a set of “trusted” subtrees, as well as the relative phylogenetic distance between them, in both cases of labeled or unlabeled input trees. By applying these algorithms to the set of Ensembl gene trees, we show that this new correction framework is particularly useful to correct weakly-supported duplication nodes. The C++ source code for the algorithms and simulations described in the paper are available at https://github.com/UdeM-LBIT/SuGeT.", "abstracts": [ { "abstractType": "Regular", "content": "The supertree problem asking for a tree displaying a set of consistent input trees has been largely considered for the reconstruction of species trees. Here, we rather explore this framework for the sake of reconstructing a gene tree from a set of input gene trees on partial data. In this perspective, the phylogenetic tree for the species containing the genes of interest can be used to choose among the many possible compatible “supergenetrees”, the most natural criteria being to minimize a reconciliation cost. We develop a variety of algorithmic solutions for the construction and correction of gene trees using the supertree framework. A dynamic programming supertree algorithm for constructing or correcting gene trees, exponential in the number of input trees, is first developed for the less constrained version of the problem. It is then adapted to gene trees with nodes labeled as duplication or speciation, the additional constraint being to preserve the orthology and paralogy relations between genes. Then, a quadratic time algorithm is developed for efficiently correcting an initial gene tree while preserving a set of “trusted” subtrees, as well as the relative phylogenetic distance between them, in both cases of labeled or unlabeled input trees. By applying these algorithms to the set of Ensembl gene trees, we show that this new correction framework is particularly useful to correct weakly-supported duplication nodes. The C++ source code for the algorithms and simulations described in the paper are available at https://github.com/UdeM-LBIT/SuGeT.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The supertree problem asking for a tree displaying a set of consistent input trees has been largely considered for the reconstruction of species trees. Here, we rather explore this framework for the sake of reconstructing a gene tree from a set of input gene trees on partial data. In this perspective, the phylogenetic tree for the species containing the genes of interest can be used to choose among the many possible compatible “supergenetrees”, the most natural criteria being to minimize a reconciliation cost. We develop a variety of algorithmic solutions for the construction and correction of gene trees using the supertree framework. A dynamic programming supertree algorithm for constructing or correcting gene trees, exponential in the number of input trees, is first developed for the less constrained version of the problem. It is then adapted to gene trees with nodes labeled as duplication or speciation, the additional constraint being to preserve the orthology and paralogy relations between genes. Then, a quadratic time algorithm is developed for efficiently correcting an initial gene tree while preserving a set of “trusted” subtrees, as well as the relative phylogenetic distance between them, in both cases of labeled or unlabeled input trees. By applying these algorithms to the set of Ensembl gene trees, we show that this new correction framework is particularly useful to correct weakly-supported duplication nodes. The C++ source code for the algorithms and simulations described in the paper are available at https://github.com/UdeM-LBIT/SuGeT.", "title": "Gene Tree Construction and Correction Using SuperTree and Reconciliation", "normalizedTitle": "Gene Tree Construction and Correction Using SuperTree and Reconciliation", "fno": "07959594", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Vegetation", "Phylogeny", "Heuristic Algorithms", "Labeling", "Topology", "History", "Electronic Mail", "Algorithm Design And Analysis", "Bioinformatics", "Phylogeny", "Reconciliation", "Supertree" ], "authors": [ { "givenName": "Manuel", "surname": "Lafond", "fullName": "Manuel Lafond", "affiliation": "Département d'Informatique (DIRO), Université de Montréal, Montreal, QC, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Cedric", "surname": "Chauve", "fullName": "Cedric Chauve", "affiliation": "Department of Mathematics, Simon Fraser University, Burnaby, BC, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Nadia", "surname": "El-Mabrouk", "fullName": "Nadia El-Mabrouk", "affiliation": "Département d'Informatique (DIRO), Université de Montréal, Montreal, QC, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Aïda", "surname": "Ouangraoua", "fullName": "Aïda Ouangraoua", "affiliation": "Département d'Informatique, Université de Sherbrooke, Sherbrooke, QC, Canada", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2018-09-01 00:00:00", "pubType": "trans", "pages": "1560-1570", "year": "2018", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2018/03/07782719", "title": "Efficient Quartet Representations of Trees and Applications to Supertree and Summary Methods", "doi": null, "abstractUrl": "/journal/tb/2018/03/07782719/13rRUwIF6jx", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/01/06892945", "title": "Gene Tree Diameter for Deep Coalescence", "doi": null, "abstractUrl": "/journal/tb/2015/01/06892945/13rRUwjoNvj", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/06/06867321", "title": "On the Number of Ranked Species Trees Producing Anomalous Ranked Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2014/06/06867321/13rRUwwJWEo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/06/ttb2012061558", "title": "A Characterization of the Set of Species Trees that Produce Anomalous Ranked Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2012/06/ttb2012061558/13rRUxZzAg7", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/03/08244309", "title": "Credibility of Evolutionary Events in Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2019/03/08244309/13rRUy2YLRA", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/02/06917051", "title": "Data Requirement for Phylogenetic Inference from Multiple Loci: A New Distance Method", "doi": null, "abstractUrl": "/journal/tb/2015/02/06917051/13rRUy2YLWO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/08002594", "title": "Bijective Diameters of Gene Tree Parsimony Costs", "doi": null, "abstractUrl": "/journal/tb/2018/05/08002594/14dcEdidYgv", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08382181", "title": "An Integrated Reconciliation Framework for Domain, Gene, and Species Level Evolution", "doi": null, "abstractUrl": "/journal/tb/2019/01/08382181/17D45W9KVFu", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/06/08716584", "title": "Topological Metrizations of Trees, and New Quartet Methods of Tree Inference", "doi": null, "abstractUrl": "/journal/tb/2020/06/08716584/1a4Zq70F8t2", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/08868219", "title": "Consensus of All Solutions for Intractable Phylogenetic Tree Inference", "doi": null, "abstractUrl": "/journal/tb/2021/01/08868219/1e7BUc5cU92", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07936538", "articleId": "14dcDXDJqye", "__typename": "AdjacentArticleType" }, "next": { "fno": "07933200", "articleId": "14dcDYg3h6G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qV2sxoqL2U", "title": "Jan.-Feb.", "year": "2021", "issueNum": "01", "idPrefix": "tb", "pubType": "journal", "volume": "18", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1e7BUc5cU92", "doi": "10.1109/TCBB.2019.2947051", "abstract": "Solving median tree problems is a classic approach for inferring species trees from a collection of discordant gene trees. Median tree problems are typically NP-hard and dealt with by local search heuristics. Unfortunately, such heuristics generally lack provable correctness and precision. Algorithmic advances addressing this uncertainty have led to exact dynamic programming formulations suitable to solve a well-studied group of median tree problems for smaller phylogenetic analyses. However, these formulations allow computing only very few optimal species trees out of possibly many such trees, and phylogenetic studies often require the analysis of all optimal solutions through their consensus tree. Here, we describe a significant algorithmic modification of the dynamic programming formulations that compute the cluster counts of all optimal species trees from which various types of consensus trees can be efficiently computed. Through experimental studies, we demonstrate that our parallel implementation of the modified dynamic programming formulation is more efficient than a previous implementation of the original formulation. Finally, we show that the parallel implementation can rapidly identify novel reassorted influenza A viruses potentially facilitating pandemic preparedness efforts.", "abstracts": [ { "abstractType": "Regular", "content": "Solving median tree problems is a classic approach for inferring species trees from a collection of discordant gene trees. Median tree problems are typically NP-hard and dealt with by local search heuristics. Unfortunately, such heuristics generally lack provable correctness and precision. Algorithmic advances addressing this uncertainty have led to exact dynamic programming formulations suitable to solve a well-studied group of median tree problems for smaller phylogenetic analyses. However, these formulations allow computing only very few optimal species trees out of possibly many such trees, and phylogenetic studies often require the analysis of all optimal solutions through their consensus tree. Here, we describe a significant algorithmic modification of the dynamic programming formulations that compute the cluster counts of all optimal species trees from which various types of consensus trees can be efficiently computed. Through experimental studies, we demonstrate that our parallel implementation of the modified dynamic programming formulation is more efficient than a previous implementation of the original formulation. Finally, we show that the parallel implementation can rapidly identify novel reassorted influenza A viruses potentially facilitating pandemic preparedness efforts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Solving median tree problems is a classic approach for inferring species trees from a collection of discordant gene trees. Median tree problems are typically NP-hard and dealt with by local search heuristics. Unfortunately, such heuristics generally lack provable correctness and precision. Algorithmic advances addressing this uncertainty have led to exact dynamic programming formulations suitable to solve a well-studied group of median tree problems for smaller phylogenetic analyses. However, these formulations allow computing only very few optimal species trees out of possibly many such trees, and phylogenetic studies often require the analysis of all optimal solutions through their consensus tree. Here, we describe a significant algorithmic modification of the dynamic programming formulations that compute the cluster counts of all optimal species trees from which various types of consensus trees can be efficiently computed. Through experimental studies, we demonstrate that our parallel implementation of the modified dynamic programming formulation is more efficient than a previous implementation of the original formulation. Finally, we show that the parallel implementation can rapidly identify novel reassorted influenza A viruses potentially facilitating pandemic preparedness efforts.", "title": "Consensus of All Solutions for Intractable Phylogenetic Tree Inference", "normalizedTitle": "Consensus of All Solutions for Intractable Phylogenetic Tree Inference", "fno": "08868219", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Computational Complexity", "Diseases", "Dynamic Programming", "Epidemics", "Genetics", "Microorganisms", "Search Problems", "Trees Mathematics", "Intractable Phylogenetic Tree Inference", "Median Tree Problems", "Discordant Gene Trees", "Optimal Species Trees", "Consensus Tree", "Dynamic Programming", "NP Hard", "Local Search Heuristics", "Phylogenetic Analyses", "Algorithmic Modification", "Cluster Counts", "Influenza A Viruses", "Pandemic Preparedness Efforts", "Vegetation", "Dynamic Programming", "Phylogeny", "Heuristic Algorithms", "Clustering Algorithms", "Genomics", "Consensus Tree", "Median Tree", "Dynamic Progamming", "Species Tree", "Gene Tree", "Influenza A Virus" ], "authors": [ { "givenName": "P.", "surname": "Tabaszewski", "fullName": "P. Tabaszewski", "affiliation": "Department of Mathematics, Informatics and Mechanics, University of Warsaw, Warszawa, Poland", "__typename": "ArticleAuthorType" }, { "givenName": "P.", "surname": "Górecki", "fullName": "P. Górecki", "affiliation": "Department of Mathematics, Informatics and Mechanics, University of Warsaw, Warszawa, Poland", "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Markin", "fullName": "A. Markin", "affiliation": "Department of Computer Science, Iowa State University, Ames, IA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "T.", "surname": "Anderson", "fullName": "T. Anderson", "affiliation": "Virus and Prion Research Unit, National Animal Disease Center, USDA-ARS, Ames, IA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "O.", "surname": "Eulenstein", "fullName": "O. Eulenstein", "affiliation": "Department of Computer Science, Iowa State University, Ames, IA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2021-01-01 00:00:00", "pubType": "trans", "pages": "149-161", "year": "2021", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2017/1324/0/132401a260", "title": "Whole Genome Phylogenetic Tree Reconstruction Using Colored de Bruijn Graphs", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a260/12OmNyq0zMR", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/04/08068237", "title": "Efficient Local Search for Euclidean Path-Difference Median Trees", "doi": null, "abstractUrl": "/journal/tb/2019/04/08068237/13rRUwghd3r", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/04/07954997", "title": "Computing Manhattan Path-Difference Median Trees: A Practical Local Search Approach", "doi": null, "abstractUrl": "/journal/tb/2019/04/07954997/13rRUxE04s9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/03/08244309", "title": "Credibility of Evolutionary Events in Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2019/03/08244309/13rRUy2YLRA", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/02/06917051", "title": "Data Requirement for Phylogenetic Inference from Multiple Loci: A New Distance Method", "doi": null, "abstractUrl": "/journal/tb/2015/02/06917051/13rRUy2YLWO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/05/07403951", "title": "Unconstrained Diameters for Deep Coalescence", "doi": null, "abstractUrl": "/journal/tb/2017/05/07403951/13rRUyhaInd", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/08002594", "title": "Bijective Diameters of Gene Tree Parsimony Costs", "doi": null, "abstractUrl": "/journal/tb/2018/05/08002594/14dcEdidYgv", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08554124", "title": "imPhy: Imputing Phylogenetic Trees with Missing Information Using Mathematical Programming", "doi": null, "abstractUrl": "/journal/tb/2020/04/08554124/17D45XfSETx", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/06/08716584", "title": "Topological Metrizations of Trees, and New Quartet Methods of Tree Inference", "doi": null, "abstractUrl": "/journal/tb/2020/06/08716584/1a4Zq70F8t2", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/01/08798653", "title": "Polynomial-Time Algorithms for Phylogenetic Inference Problems Involving Duplication and Reticulation", "doi": null, "abstractUrl": "/journal/tb/2020/01/08798653/1cumNg7RHKE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08964484", "articleId": "1gLZEMlyNDa", "__typename": "AdjacentArticleType" }, "next": { "fno": "08798655", "articleId": "1cumN655Mn6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNqJHFwC", "title": "March", "year": "2019", "issueNum": "03", "idPrefix": "tm", "pubType": "journal", "volume": "18", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45Xtvpei", "doi": "10.1109/TMC.2018.2843801", "abstract": "The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently, there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique walking patterns inherent to humans and differentiate our work from other walking behavior studies by using it as first-order authentication and developing matching methods fast enough to act as an actual anti-theft system. We test our system with the aid of 45 volunteers and demonstrate detection of unauthorized movement within 10 to 20 steps with an accuracy of 96.4 to 98.4 percent, while simultaneously distinguishing owners as themselves with 97.8 percent accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently, there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique walking patterns inherent to humans and differentiate our work from other walking behavior studies by using it as first-order authentication and developing matching methods fast enough to act as an actual anti-theft system. We test our system with the aid of 45 volunteers and demonstrate detection of unauthorized movement within 10 to 20 steps with an accuracy of 96.4 to 98.4 percent, while simultaneously distinguishing owners as themselves with 97.8 percent accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently, there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique walking patterns inherent to humans and differentiate our work from other walking behavior studies by using it as first-order authentication and developing matching methods fast enough to act as an actual anti-theft system. We test our system with the aid of 45 volunteers and demonstrate detection of unauthorized movement within 10 to 20 steps with an accuracy of 96.4 to 98.4 percent, while simultaneously distinguishing owners as themselves with 97.8 percent accuracy.", "title": "Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices", "normalizedTitle": "Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices", "fno": "08371635", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Mobile Computing", "Security Of Data", "Virtual Safe", "Unauthorized Walking", "Mobile Devices", "Monetary Value", "Mobile Nature", "GPS Tracking", "Walking Behavior Studies", "First Order Authentication", "Walking Patterns", "Anti Theft Mechanisms", "Efficiency 98 4 Percent", "Efficiency 97 8 Percent", "Mobile Handsets", "Authentication", "Legged Locomotion", "Feature Extraction", "Tools", "Acceleration", "Pattern Matching", "Mobile Society", "Anti Theft", "Gait Authentication", "Quick Detection" ], "authors": [ { "givenName": "Dakun", "surname": "Shen", "fullName": "Dakun Shen", "affiliation": "University of South Florida, Tampa, FL", "__typename": "ArticleAuthorType" }, { "givenName": "Ian", "surname": "Markwood", "fullName": "Ian Markwood", "affiliation": "University of South Florida, Tampa, FL", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Shen", "fullName": "Dan Shen", "affiliation": "University of South Florida, Tampa, FL", "__typename": "ArticleAuthorType" }, { "givenName": "Yao", "surname": "Liu", "fullName": "Yao Liu", "affiliation": "University of South Florida, Tampa, FL", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2019-03-01 00:00:00", "pubType": "trans", "pages": "688-701", "year": "2019", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/smartcomp/2014/5711/0/07043832", "title": "A crowdsourcing approach to promote safe walking for visually impaired people", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2014/07043832/12OmNA0vnZC", "parentPublication": { "id": "proceedings/smartcomp/2014/5711/0", "title": "2014 International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2014/4311/0/4311a328", "title": "Smartphone-Based Walking Speed Estimation for Stroke Mitigation", "doi": null, "abstractUrl": "/proceedings-article/ism/2014/4311a328/12OmNANTAtS", "parentPublication": { "id": "proceedings/ism/2014/4311/0", "title": "2014 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550193", "title": "Tapping-In-Place: Increasing the naturalness of immersive walking-in-place locomotion through novel gestural input", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550193/12OmNAnMuyq", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223431", "title": "Walking recording and experience system by Visual Psychophysics Lab", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223431/12OmNB1NVNQ", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2016/0943/0/0943a150", "title": "Kalman-Filter-Based Walking Distance Estimation for a Smart-Watch", "doi": null, "abstractUrl": "/proceedings-article/chase/2016/0943a150/12OmNBBQZlF", "parentPublication": { "id": "proceedings/chase/2016/0943/0", "title": "2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223415", "title": "Impact of illusory resistance on finger walking behavior", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223415/12OmNvA1h4N", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881513", "title": "Estimating Distracted Pedestrian from Deviated Walking Considering Consumption of Working Memory", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881513/12OmNwGZNKW", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2019/9245/0/924500a288", "title": "A Bio-Inspired Musculoskeletal Model of the Lower Limb for Energy Economical Bipedal Walking", "doi": null, "abstractUrl": "/proceedings-article/irc/2019/924500a288/18M7ixxaQr6", "parentPublication": { "id": "proceedings/irc/2019/9245/0", "title": "2019 Third IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797751", "title": "Improving Walking in Place Methods with Individualization and Deep Networks", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797751/1cJ0WSuJ27e", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctec/2017/5784/0/578400b048", "title": "Novel Walking-Intention Recognition Method for Omnidirectional Walking Support Robot", "doi": null, "abstractUrl": "/proceedings-article/icctec/2017/578400b048/1cksaAkAfaU", "parentPublication": { "id": "proceedings/icctec/2017/5784/0", "title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08365809", "articleId": "17D45Xtvpeh", "__typename": "AdjacentArticleType" }, "next": { "fno": "08370712", "articleId": "17D45WXIkHr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1striDZtwqI", "title": "May", "year": "2021", "issueNum": "05", "idPrefix": "tm", "pubType": "journal", "volume": "20", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1hx2BubgF2M", "doi": "10.1109/TMC.2020.2974222", "abstract": "As mobile devices play increasingly important roles in our daily lives, it is of great significance to protect personal mobile devices from being lost. Noticing the trend that one person normally carries more than one mobile device, we propose an innovative scheme, called <italic>CoSafe</italic>, to detect device loss by verifying the motion consistency between a pair of devices. The rationale is that the vibrations perceived on devices carried by the same person should be tightly coupled whereas a lost device would show distinct mobility characteristics from others. Specifically, CoSafe compares the mobility consistency between a pair of devices on three levels, where coarse features (i.e., the mobility state and motion periodicity) are first compared to give fast response and more complex comparison on subtle feature (i.e., the relative phase) is conducted only when needed. In this way, CoSafe can instantly respond and introduce very low computation and communication costs. We implement CoSafe on a Commercial-Off-The-Shelf Android smartphone and a smartwatch, and conduct both trace-driven simulations and real-world experiments to evaluate the performance of CoSafe. The results show that CoSafe achieves a mean false negative ratio and false positive ratio of 1.46 and 3.12 percent, respectively, even under sophisticated stealing attacks.", "abstracts": [ { "abstractType": "Regular", "content": "As mobile devices play increasingly important roles in our daily lives, it is of great significance to protect personal mobile devices from being lost. Noticing the trend that one person normally carries more than one mobile device, we propose an innovative scheme, called <italic>CoSafe</italic>, to detect device loss by verifying the motion consistency between a pair of devices. The rationale is that the vibrations perceived on devices carried by the same person should be tightly coupled whereas a lost device would show distinct mobility characteristics from others. Specifically, CoSafe compares the mobility consistency between a pair of devices on three levels, where coarse features (i.e., the mobility state and motion periodicity) are first compared to give fast response and more complex comparison on subtle feature (i.e., the relative phase) is conducted only when needed. In this way, CoSafe can instantly respond and introduce very low computation and communication costs. We implement CoSafe on a Commercial-Off-The-Shelf Android smartphone and a smartwatch, and conduct both trace-driven simulations and real-world experiments to evaluate the performance of CoSafe. The results show that CoSafe achieves a mean false negative ratio and false positive ratio of 1.46 and 3.12 percent, respectively, even under sophisticated stealing attacks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As mobile devices play increasingly important roles in our daily lives, it is of great significance to protect personal mobile devices from being lost. Noticing the trend that one person normally carries more than one mobile device, we propose an innovative scheme, called CoSafe, to detect device loss by verifying the motion consistency between a pair of devices. The rationale is that the vibrations perceived on devices carried by the same person should be tightly coupled whereas a lost device would show distinct mobility characteristics from others. Specifically, CoSafe compares the mobility consistency between a pair of devices on three levels, where coarse features (i.e., the mobility state and motion periodicity) are first compared to give fast response and more complex comparison on subtle feature (i.e., the relative phase) is conducted only when needed. In this way, CoSafe can instantly respond and introduce very low computation and communication costs. We implement CoSafe on a Commercial-Off-The-Shelf Android smartphone and a smartwatch, and conduct both trace-driven simulations and real-world experiments to evaluate the performance of CoSafe. The results show that CoSafe achieves a mean false negative ratio and false positive ratio of 1.46 and 3.12 percent, respectively, even under sophisticated stealing attacks.", "title": "CoSafe: Securing Mobile Devices through Mutual Mobility Consistency Verification", "normalizedTitle": "CoSafe: Securing Mobile Devices through Mutual Mobility Consistency Verification", "fno": "09000578", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Mobile Handsets", "Legged Locomotion", "Wireless Communication", "Support Vector Machines", "Communication System Security", "Signal To Noise Ratio", "Acceleration", "Device Loss Detection", "Mobile Device", "Motion Consistency", "SVM", "Cross Wavelet Analysis" ], "authors": [ { "givenName": "Shan", "surname": "Chang", "fullName": "Shan Chang", "affiliation": "School of Computer Science & Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hang", "surname": "Chen", "fullName": "Hang Chen", "affiliation": "School of Computer Science & Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hongzi", "surname": "Zhu", "fullName": "Hongzi Zhu", "affiliation": "Department of Computer Science and Technology, Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinggang", "surname": "Hu", "fullName": "Xinggang Hu", "affiliation": "School of Computer Science & Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Di", "surname": "Cao", "fullName": "Di Cao", "affiliation": "School of Computer Science & Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2021-05-01 00:00:00", "pubType": "trans", "pages": "1761-1772", "year": "2021", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icnp/2014/6204/0/6204a498", "title": "A Study on a Routing-Based Mobility Management Architecture for IoT Devices", "doi": null, "abstractUrl": "/proceedings-article/icnp/2014/6204a498/12OmNApLGy4", "parentPublication": { "id": "proceedings/icnp/2014/6204/0", "title": "2014 IEEE 22nd International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2016/8779/0/07456523", "title": "Group mobility classification and structure recognition using mobile devices", "doi": null, "abstractUrl": "/proceedings-article/percom/2016/07456523/12OmNC8MsxB", "parentPublication": { "id": "proceedings/percom/2016/8779/0", "title": "2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbr-lars/2012/4906/0/4906a239", "title": "Ortholeg Project - Development of an Active Orthosis Prototype for Lower Limbs", "doi": null, "abstractUrl": "/proceedings-article/sbr-lars/2012/4906a239/12OmNCfjez6", "parentPublication": { "id": "proceedings/sbr-lars/2012/4906/0", "title": "Brazilian Robotics Symposium and Latin American Robotics Symposium (SBR-LARS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2016/8692/0/07501310", "title": "Fuzzy PID control of lower limb exoskeleton for elderly mobility", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2016/07501310/12OmNvqmUGb", "parentPublication": { "id": "proceedings/aqtr/2016/8692/0", "title": "2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2016/1941/0/07457058", "title": "Secure key generation and distribution protocol for wearable devices", "doi": null, "abstractUrl": "/proceedings-article/percomw/2016/07457058/12OmNwE9Oqt", "parentPublication": { "id": "proceedings/percomw/2016/1941/0", "title": "2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2016/4178/0/07832990", "title": "Virtualization Toolset for Emulating Mobile Devices and Networks", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2016/07832990/12OmNx5Yvg3", "parentPublication": { "id": "proceedings/mobilesoft/2016/4178/0", "title": "2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2018/04/07902188", "title": "Recognition of Group Mobility Level and Group Structure with Mobile Devices", "doi": null, "abstractUrl": "/journal/tm/2018/04/07902188/13rRUx0Pqq8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276853", "title": "Uncertainty Investigation for Personalised Lifelogging Physical Activity Intensity Pattern Assessment with Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276853/17D45WnnFVH", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0", "title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09813555", "title": "Mobility Management in 5G and Beyond: A Novel Smart Handover with Adaptive Time-to-Trigger and Hysteresis Margin", "doi": null, "abstractUrl": "/journal/tm/5555/01/09813555/1EJBhPX3xew", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccps/2020/5501/0/09096021", "title": "WiP Abstract: Mobility-based Load Balancing for IoT-enabled Devices in Smart Grids", "doi": null, "abstractUrl": "/proceedings-article/iccps/2020/09096021/1jXvua6WhPi", "parentPublication": { "id": "proceedings/iccps/2020/5501/0", "title": "2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08998403", "articleId": "1hrXb6uaH5e", "__typename": "AdjacentArticleType" }, "next": { "fno": "08981890", "articleId": "1h9emyDZEHK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBTJIJJ", "title": "September", "year": "1989", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "11", "label": "September", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyfbwrG", "doi": "10.1109/34.35501", "abstract": "Time series modeling techniques are adapted to represent or describe two-dimensional closed contours. Both linear and nonlinear models are fitted. It is found that to detect small changes in shape nonlinear modeling is necessary, even though linear models may be sufficient to differentiate between shapes which differ widely. A nonlinear model called the noncausal quadratic Volterra model is developed for the purpose. Implementation is illustrated with shapes of aircraft.", "abstracts": [ { "abstractType": "Regular", "content": "Time series modeling techniques are adapted to represent or describe two-dimensional closed contours. Both linear and nonlinear models are fitted. It is found that to detect small changes in shape nonlinear modeling is necessary, even though linear models may be sufficient to differentiate between shapes which differ widely. A nonlinear model called the noncausal quadratic Volterra model is developed for the purpose. Implementation is illustrated with shapes of aircraft.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Time series modeling techniques are adapted to represent or describe two-dimensional closed contours. Both linear and nonlinear models are fitted. It is found that to detect small changes in shape nonlinear modeling is necessary, even though linear models may be sufficient to differentiate between shapes which differ widely. A nonlinear model called the noncausal quadratic Volterra model is developed for the purpose. Implementation is illustrated with shapes of aircraft.", "title": "Shape Description by Time Series", "normalizedTitle": "Shape Description by Time Series", "fno": "i0977", "hasPdf": true, "idPrefix": "tp", "keywords": [ "2 D Closed Contours Shape Description Pattern Recognition Picture Processing Time Series Modeling Noncausal Quadratic Volterra Model Pattern Recognition Picture Processing Time Series" ], "authors": [ { "givenName": "B.", "surname": "Kartikeyan", "fullName": "B. Kartikeyan", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Sarkar", "fullName": "A. Sarkar", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "09", "pubDate": "1989-09-01 00:00:00", "pubType": "trans", "pages": "977-984", "year": "1989", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0973", "articleId": "13rRUxC0SPo", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0985", "articleId": "13rRUwwJWGv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IRhD73QTpC", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1BfU4lCwLTO", "doi": "10.1109/TPAMI.2022.3152862", "abstract": "This paper addresses the problem of multi-step time series forecasting for non-stationary signals that can present sudden changes. Current state-of-the-art deep learning forecasting methods, often trained with variants of the MSE, lack the ability to provide sharp predictions in deterministic and probabilistic contexts. To handle these challenges, we propose to incorporate shape and temporal criteria in the training objective of deep models. We define shape and temporal similarities and dissimilarities, based on a smooth relaxation of Dynamic Time Warping (DTW) and Temporal Distortion Index (TDI), that enable to build differentiable loss functions and positive semi-definite (PSD) kernels. With these tools, we introduce DILATE (DIstortion Loss including shApe and TimE), a new objective for deterministic forecasting, that explicitly incorporates two terms supporting precise shape and temporal change detection. For probabilistic forecasting, we introduce STRIPE++ (Shape and Time diverRsIty in Probabilistic for Ecasting), a framework for providing a set of sharp and diverse forecasts, where the structured shape and time diversity is enforced with a determinantal point process (DPP) diversity loss. Extensive experiments and ablations studies on synthetic and real-world datasets confirm the benefits of leveraging shape and time features in time series forecasting.", "abstracts": [ { "abstractType": "Regular", "content": "This paper addresses the problem of multi-step time series forecasting for non-stationary signals that can present sudden changes. Current state-of-the-art deep learning forecasting methods, often trained with variants of the MSE, lack the ability to provide sharp predictions in deterministic and probabilistic contexts. To handle these challenges, we propose to incorporate shape and temporal criteria in the training objective of deep models. We define shape and temporal similarities and dissimilarities, based on a smooth relaxation of Dynamic Time Warping (DTW) and Temporal Distortion Index (TDI), that enable to build differentiable loss functions and positive semi-definite (PSD) kernels. With these tools, we introduce DILATE (DIstortion Loss including shApe and TimE), a new objective for deterministic forecasting, that explicitly incorporates two terms supporting precise shape and temporal change detection. For probabilistic forecasting, we introduce STRIPE++ (Shape and Time diverRsIty in Probabilistic for Ecasting), a framework for providing a set of sharp and diverse forecasts, where the structured shape and time diversity is enforced with a determinantal point process (DPP) diversity loss. Extensive experiments and ablations studies on synthetic and real-world datasets confirm the benefits of leveraging shape and time features in time series forecasting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper addresses the problem of multi-step time series forecasting for non-stationary signals that can present sudden changes. Current state-of-the-art deep learning forecasting methods, often trained with variants of the MSE, lack the ability to provide sharp predictions in deterministic and probabilistic contexts. To handle these challenges, we propose to incorporate shape and temporal criteria in the training objective of deep models. We define shape and temporal similarities and dissimilarities, based on a smooth relaxation of Dynamic Time Warping (DTW) and Temporal Distortion Index (TDI), that enable to build differentiable loss functions and positive semi-definite (PSD) kernels. With these tools, we introduce DILATE (DIstortion Loss including shApe and TimE), a new objective for deterministic forecasting, that explicitly incorporates two terms supporting precise shape and temporal change detection. For probabilistic forecasting, we introduce STRIPE++ (Shape and Time diverRsIty in Probabilistic for Ecasting), a framework for providing a set of sharp and diverse forecasts, where the structured shape and time diversity is enforced with a determinantal point process (DPP) diversity loss. Extensive experiments and ablations studies on synthetic and real-world datasets confirm the benefits of leveraging shape and time features in time series forecasting.", "title": "Deep Time Series Forecasting With Shape and Temporal Criteria", "normalizedTitle": "Deep Time Series Forecasting With Shape and Temporal Criteria", "fno": "09721108", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Deep Learning Artificial Intelligence", "Forecasting Theory", "Probability", "Time Series", "Deep Learning Forecasting Methods", "Deep Time Series Forecasting", "Determinantal Point Process Diversity Loss", "Deterministic Forecasting", "Differentiable Loss Functions", "DILATE", "D Istortion Loss Including Sh Ape And Tim E", "DPP", "DTW", "Dynamic Time Warping", "MSE", "Multistep Time Series Forecasting", "Nonstationary Signals", "Probabilistic Forecasting", "PSD", "Semidefinite Kernels", "Shape And Time Diver Rs Ity In Probabilistic For Ecasting", "Smooth Relaxation", "STRIPE", "TDI", "Temporal Change Detection", "Temporal Distortion Index", "Temporal Similarities", "Forecasting", "Shape", "Probabilistic Logic", "Time Series Analysis", "Predictive Models", "Training", "Kernel", "Time Series Forecasting", "Deep Neural Networks", "Differentiable Programming", "Loss Functions", "Structured Prediction", "Shape And Temporal Criteria", "Dynamic Time Warping", "Time Distortion", "Structured Diversity", "Determinantal Point Processes" ], "authors": [ { "givenName": "Vincent", "surname": "Le Guen", "fullName": "Vincent Le Guen", "affiliation": "EDF Recherche et Developpement Site de Chatou, PRISME, Chatou, France", "__typename": "ArticleAuthorType" }, { "givenName": "Nicolas", "surname": "Thome", "fullName": "Nicolas Thome", "affiliation": "Conservatoire National des Arts et Metiers, CEDRIC, Paris, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "342-355", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/his/2008/3326/0/3326a602", "title": "Using Reservoir Computing for Forecasting Time Series: Brazilian Case Study", "doi": null, "abstractUrl": "/proceedings-article/his/2008/3326a602/12OmNA0vnWQ", "parentPublication": { "id": "proceedings/his/2008/3326/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a705", "title": "Spatio-Temporal Neural Networks for Space-Time Series Forecasting and Relations Discovery", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a705/12OmNC2fGx4", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2007/3124/0/3124a091", "title": "Machine Learning Tools to Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/micai/2007/3124a091/12OmNxX3uon", "parentPublication": { "id": "proceedings/micai/2007/3124/0", "title": "2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2016/2251/0/2251a166", "title": "Temporal Uncertainty of Wind Ramp Predictions Using Probabilistic Forecasting Technique", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2016/2251a166/12OmNzICESk", "parentPublication": { "id": "proceedings/bigdataservice/2016/2251/0", "title": "2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2018/9403/0/940300a171", "title": "Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework", "doi": null, "abstractUrl": "/proceedings-article/paap/2018/940300a171/19JE9MimPza", "parentPublication": { "id": "proceedings/paap/2018/9403/0", "title": "2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09806345", "title": "Learning Generative RNN-ODE for Collaborative Time-Series and Event Sequence Forecasting", "doi": null, "abstractUrl": "/journal/tk/5555/01/09806345/1Et0bxmE3tK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c900", "title": "Towards Spatio- Temporal Aware Traffic Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c900/1FwFtXKptp6", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acompa/2022/6171/0/617100a054", "title": "Multi-step-ahead time series forecasting based on CEEMDAN decomposition and temporal convolutional networks", "doi": null, "abstractUrl": "/proceedings-article/acompa/2022/617100a054/1JNqNGzGaoE", "parentPublication": { "id": "proceedings/acompa/2022/6171/0", "title": "2022 International Conference on Advanced Computing and Analytics (ACOMPA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020927", "title": "GQFormer: A Multi-Quantile Generative Transformer for Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020927/1KfQxuiG1DW", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09120214", "title": "Adaptive Temporal-Frequency Network for Time-Series Forecasting", "doi": null, "abstractUrl": "/journal/tk/2022/04/09120214/1kLe77jnEBi", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09693294", "articleId": "1As6URxY8KI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09678082", "articleId": "1A4SoLoOuqI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IRhSVq6biE", "name": "ttp202301-09721108s1-supp1-3152862.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202301-09721108s1-supp1-3152862.pdf", "extension": "pdf", "size": "4.88 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNyv7moW", "title": "Sept.", "year": "2019", "issueNum": "09", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYBlgE", "doi": "10.1109/TVCG.2018.2859997", "abstract": "A popular method of force-directed graph drawing is multidimensional scaling using graph-theoretic distances as input. We present an algorithm to minimize its energy function, known as stress, by using stochastic gradient descent (SGD) to move a single pair of vertices at a time. Our results show that SGD can reach lower stress levels faster and more consistently than majorization, without needing help from a good initialization. We then show how the unique properties of SGD make it easier to produce constrained layouts than previous approaches. We also show how SGD can be directly applied within the sparse stress approximation of Ortmann et al. [1], making the algorithm scalable up to large graphs.", "abstracts": [ { "abstractType": "Regular", "content": "A popular method of force-directed graph drawing is multidimensional scaling using graph-theoretic distances as input. We present an algorithm to minimize its energy function, known as stress, by using stochastic gradient descent (SGD) to move a single pair of vertices at a time. Our results show that SGD can reach lower stress levels faster and more consistently than majorization, without needing help from a good initialization. We then show how the unique properties of SGD make it easier to produce constrained layouts than previous approaches. We also show how SGD can be directly applied within the sparse stress approximation of Ortmann et al. [1], making the algorithm scalable up to large graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A popular method of force-directed graph drawing is multidimensional scaling using graph-theoretic distances as input. We present an algorithm to minimize its energy function, known as stress, by using stochastic gradient descent (SGD) to move a single pair of vertices at a time. Our results show that SGD can reach lower stress levels faster and more consistently than majorization, without needing help from a good initialization. We then show how the unique properties of SGD make it easier to produce constrained layouts than previous approaches. We also show how SGD can be directly applied within the sparse stress approximation of Ortmann et al. [1], making the algorithm scalable up to large graphs.", "title": "Graph Drawing by Stochastic Gradient Descent", "normalizedTitle": "Graph Drawing by Stochastic Gradient Descent", "fno": "08419285", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Directed Graphs", "Gradient Methods", "Minimisation", "Stochastic Processes", "Force Directed Graph Drawing", "Multidimensional Scaling", "Graph Theoretic Distances", "Stochastic Gradient Descent", "SGD", "Sparse Stress Approximation", "Energy Function Minimization", "Stress Levels", "Stress", "Layout", "Schedules", "Annealing", "Mathematical Model", "Standards", "Approximation Algorithms", "Graph Drawing", "Multidimensional Scaling", "Constraints", "Relaxation", "Stochastic Gradient Descent" ], "authors": [ { "givenName": "Jonathan X.", "surname": "Zheng", "fullName": "Jonathan X. Zheng", "affiliation": "Department of Electrical and Electronic Engineering, Imperial College London, London, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Samraat", "surname": "Pawar", "fullName": "Samraat Pawar", "affiliation": "Department of Life Sciences, Imperial College London, Ascot, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Dan F. M.", "surname": "Goodman", "fullName": "Dan F. M. Goodman", "affiliation": "Department of Electrical and Electronic Engineering, Imperial College London, London, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2019-09-01 00:00:00", "pubType": "trans", "pages": "2738-2748", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2016/8942/0/8942a069", "title": "Drawing Clustered Graphs Using Stress Majorization and Force-Directed Placements", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a069/12OmNrMHOnz", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2018/4368/0/436801a224", "title": "Semantics-Preserving Parallelization of Stochastic Gradient Descent", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2018/436801a224/12OmNzVoBEB", "parentPublication": { "id": "proceedings/ipdps/2018/4368/0", "title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/06/ttg2013060927", "title": "A Maxent-Stress Model for Graph Layout", "doi": null, "abstractUrl": "/journal/tg/2013/06/ttg2013060927/13rRUwj7cpa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08031987", "title": "Joint Graph Layouts for Visualizing Collections of Segmented Meshes", "doi": null, "abstractUrl": "/journal/tg/2018/09/08031987/13rRUxC0SWg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017634", "title": "Revisiting Stress Majorization as a Unified Framework for Interactive Constrained Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017634/13rRUxC0Sw3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2018/6259/0/625900a118", "title": "Parallelizing Stochastic Gradient Descent with Hardware Transactional Memory for Matrix Factorization", "doi": null, "abstractUrl": "/proceedings-article/icise/2018/625900a118/17D45WXIkEa", "parentPublication": { "id": "proceedings/icise/2018/6259/0", "title": "2018 3rd International Conference on Information Systems Engineering (ICISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09714870", "title": "Predicting Throughput of Distributed Stochastic Gradient Descent", "doi": null, "abstractUrl": "/journal/td/2022/11/09714870/1B2DimXLVYs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2020/9558/0/09172424", "title": "An Efficient Parallel Stochastic Gradient Descent for Matrix Factorization On GPUS", "doi": null, "abstractUrl": "/proceedings-article/dsc/2020/09172424/1mtwjhpRsBi", "parentPublication": { "id": "proceedings/dsc/2020/9558/0", "title": "2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a166", "title": "Sublinear-time Algorithms for Stress Minimization in Graph Drawing", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a166/1tTtqT2rN7y", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08412138", "articleId": "13rRUwInvl8", "__typename": "AdjacentArticleType" }, "next": { "fno": "08409988", "articleId": "13rRUIM2VBO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1c5CciuqhJ6", "name": "ttg201909-08419285s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201909-08419285s1.zip", "extension": "zip", "size": "1.56 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1EJBn7YxwGY", "doi": "10.1109/TVCG.2022.3187425", "abstract": "We present Target Netgrams as a visualization technique for radial layouts of graphs. Inspired by manually created target sociograms, we propose an annulus-constrained stress model that aims to position nodes onto the annuli between adjacent circles for indicating their radial hierarchy, while maintaining the network structure (clusters and neighborhoods) and improving readability as much as possible. This is achieved by having more space on the annuli than traditional layout techniques. By adapting stress majorization to this model, the layout is computed as a constrained least square optimization problem. Additional constraints (e.g., parent-child preservation, attribute-based clusters and structure-aware radii) are provided for exploring nodes, edges, and levels of interest. We demonstrate the effectiveness of our method through a comprehensive evaluation, a user study, and a case study.", "abstracts": [ { "abstractType": "Regular", "content": "We present Target Netgrams as a visualization technique for radial layouts of graphs. Inspired by manually created target sociograms, we propose an annulus-constrained stress model that aims to position nodes onto the annuli between adjacent circles for indicating their radial hierarchy, while maintaining the network structure (clusters and neighborhoods) and improving readability as much as possible. This is achieved by having more space on the annuli than traditional layout techniques. By adapting stress majorization to this model, the layout is computed as a constrained least square optimization problem. Additional constraints (e.g., parent-child preservation, attribute-based clusters and structure-aware radii) are provided for exploring nodes, edges, and levels of interest. We demonstrate the effectiveness of our method through a comprehensive evaluation, a user study, and a case study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present Target Netgrams as a visualization technique for radial layouts of graphs. Inspired by manually created target sociograms, we propose an annulus-constrained stress model that aims to position nodes onto the annuli between adjacent circles for indicating their radial hierarchy, while maintaining the network structure (clusters and neighborhoods) and improving readability as much as possible. This is achieved by having more space on the annuli than traditional layout techniques. By adapting stress majorization to this model, the layout is computed as a constrained least square optimization problem. Additional constraints (e.g., parent-child preservation, attribute-based clusters and structure-aware radii) are provided for exploring nodes, edges, and levels of interest. We demonstrate the effectiveness of our method through a comprehensive evaluation, a user study, and a case study.", "title": "Target Netgrams: An Annulus-Constrained Stress Model for Radial Graph Visualization", "normalizedTitle": "Target Netgrams: An Annulus-Constrained Stress Model for Radial Graph Visualization", "fno": "09814874", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Layout", "Stress", "Visualization", "Data Visualization", "Computational Modeling", "Adaptation Models", "Task Analysis", "Radial Visualization", "Stress Model", "Hierarchy Constraint", "Graph" ], "authors": [ { "givenName": "Mingliang", "surname": "Xue", "fullName": "Mingliang Xue", "affiliation": "Department of Computer Science, Shandong University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yunhai", "surname": "Wang", "fullName": "Yunhai Wang", "affiliation": "Department of Computer Science, Shandong University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chang", "surname": "Han", "fullName": "Chang Han", "affiliation": "Department of Computer Science, Shandong University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jian", "surname": "Zhang", "fullName": "Jian Zhang", "affiliation": "Computer Network Information Center Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zheng", "surname": "Wang", "fullName": "Zheng Wang", "affiliation": "China Information Consulting & Designing Institute Co., Ltd (CITC), Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kaiyi", "surname": "Zhang", "fullName": "Kaiyi Zhang", "affiliation": "Department of Computer Science, Shandong University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Christophe", "surname": "Hurter", "fullName": "Christophe Hurter", "affiliation": "ENAC, Ecole National de l’Aviation Civile, Toulouse, France", "__typename": "ArticleAuthorType" }, { "givenName": "Jian", "surname": "Zhao", "fullName": "Jian Zhao", "affiliation": "Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Oliver", "surname": "Deussen", "fullName": "Oliver Deussen", "affiliation": "Computer and Information Science, University of Konstanz, Konstanz, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2013/5049/0/5049a051", "title": "Radial Layered Matrix Visualization of Dynamic Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a051/12OmNxHJ9om", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfcse/2011/1562/0/06041657", "title": "Study on Lumbar Rotated and Localized Manipulation on Stress Based on Finite Element Method", "doi": null, "abstractUrl": "/proceedings-article/icfcse/2011/06041657/12OmNzwpU7O", "parentPublication": { "id": "proceedings/icfcse/2011/1562/0", "title": "2011 International Conference on Future Computer Science and Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061089", "title": "SpicyNodes: Radial Layout Authoring for the General Public", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061089/13rRUIM2VGY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061399", "title": "Stress Tensor Field Visualization for Implant Planning in Orthopedics", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061399/13rRUwI5U2B", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017634", "title": "Revisiting Stress Majorization as a Unified Framework for Interactive Constrained Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017634/13rRUxC0Sw3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2012/03/05703168", "title": "A Framework for Layout-dependent STI Stress Analysis and Stress-aware Circuit Optimization", "doi": null, "abstractUrl": "/journal/si/2012/03/05703168/13rRUxNEqNc", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/05/07889042", "title": "Drawing Large Graphs by Multilevel Maxent-Stress Optimization", "doi": null, "abstractUrl": "/journal/tg/2018/05/07889042/13rRUxYINfn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a096", "title": "Radial Calendar of Consumption", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a096/17D45XvMcd7", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807238", "title": "A Comparison of Radial and Linear Charts for Visualizing Daily Patterns", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807238/1cG66qf6MKs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a409", "title": "Optimizing a radial visualization with a genetic algorithm", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a409/1rSRd8jh960", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09806341", "articleId": "1Et0iwB480M", "__typename": "AdjacentArticleType" }, "next": { "fno": "09815871", "articleId": "1EMV6Kftb2g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1J9y2mtpt3a", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1H1gf0yG0qA", "doi": "10.1109/TVCG.2022.3209371", "abstract": "Over the past few decades, a large number of graph layout techniques have been proposed for visualizing graphs from various domains. In this paper, we present a general framework, Taurus, for unifying popular techniques such as the spring-electrical model, stress model, and maxent-stress model. It is based on a unified force representation, which formulates most existing techniques as a combination of quotient-based forces that combine power functions of graph-theoretical and Euclidean distances. This representation enables us to compare the strengths and weaknesses of existing techniques, while facilitating the development of new methods. Based on this, we propose a new balanced stress model (BSM) that is able to layout graphs in superior quality. In addition, we introduce a universal augmented stochastic gradient descent (SGD) optimizer that efficiently finds proper solutions for all layout techniques. To demonstrate the power of our framework, we conduct a comprehensive evaluation of existing techniques on a large number of synthetic and real graphs. We release an open-source package, which facilitates easy comparison of different graph layout methods for any graph input as well as effectively creating customized graph layout techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Over the past few decades, a large number of graph layout techniques have been proposed for visualizing graphs from various domains. In this paper, we present a general framework, Taurus, for unifying popular techniques such as the spring-electrical model, stress model, and maxent-stress model. It is based on a unified force representation, which formulates most existing techniques as a combination of quotient-based forces that combine power functions of graph-theoretical and Euclidean distances. This representation enables us to compare the strengths and weaknesses of existing techniques, while facilitating the development of new methods. Based on this, we propose a new balanced stress model (BSM) that is able to layout graphs in superior quality. In addition, we introduce a universal augmented stochastic gradient descent (SGD) optimizer that efficiently finds proper solutions for all layout techniques. To demonstrate the power of our framework, we conduct a comprehensive evaluation of existing techniques on a large number of synthetic and real graphs. We release an open-source package, which facilitates easy comparison of different graph layout methods for any graph input as well as effectively creating customized graph layout techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Over the past few decades, a large number of graph layout techniques have been proposed for visualizing graphs from various domains. In this paper, we present a general framework, Taurus, for unifying popular techniques such as the spring-electrical model, stress model, and maxent-stress model. It is based on a unified force representation, which formulates most existing techniques as a combination of quotient-based forces that combine power functions of graph-theoretical and Euclidean distances. This representation enables us to compare the strengths and weaknesses of existing techniques, while facilitating the development of new methods. Based on this, we propose a new balanced stress model (BSM) that is able to layout graphs in superior quality. In addition, we introduce a universal augmented stochastic gradient descent (SGD) optimizer that efficiently finds proper solutions for all layout techniques. To demonstrate the power of our framework, we conduct a comprehensive evaluation of existing techniques on a large number of synthetic and real graphs. We release an open-source package, which facilitates easy comparison of different graph layout methods for any graph input as well as effectively creating customized graph layout techniques.", "title": "Taurus: Towards a Unified Force Representation and Universal Solver for Graph Layout", "normalizedTitle": "Taurus: Towards a Unified Force Representation and Universal Solver for Graph Layout", "fno": "09904492", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Gradient Methods", "Graph Theory", "Mathematics Computing", "Optimisation", "Stochastic Processes", "Balanced Stress Model", "BSM", "Euclidean Distances", "Force Representation", "Graph Input", "Graph Layout", "Graph Visualization", "Open Source Package", "SGD Optimizer", "Stochastic Gradient Descent Optimizer", "Taurus", "Universal Solver", "Layout", "Stress", "Force", "Computational Modeling", "Springs", "Graph Drawing", "Adaptation Models", "Graph Layout", "Gradient Descent", "Framework" ], "authors": [ { "givenName": "Mingliang", "surname": "Xue", "fullName": "Mingliang Xue", "affiliation": "Department of Computer Science, Shandong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhi", "surname": "Wang", "fullName": "Zhi Wang", "affiliation": "Department of Computer Science, Shandong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Fahai", "surname": "Zhong", "fullName": "Fahai Zhong", "affiliation": "Department of Computer Science, Shandong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong", "surname": "Wang", "fullName": "Yong Wang", "affiliation": "School of Computing and Information Systems, Singapore Management University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Mingliang", "surname": "Xu", "fullName": "Mingliang Xu", "affiliation": "Zhengzhou University, Zhengzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Oliver", "surname": "Deussen", "fullName": "Oliver Deussen", "affiliation": "Computer and Information Science, University of Konstanz, Konstanz, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Yunhai", "surname": "Wang", "fullName": "Yunhai Wang", "affiliation": "Department of Computer Science, Shandong University, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "886-895", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2012/4771/0/4771a124", "title": "Force-directed Graph Visualization with Pre-positioning - Improving Convergence Time and Quality of Layout", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a124/12OmNBiygtD", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a069", "title": "Drawing Clustered Graphs Using Stress Majorization and Force-Directed Placements", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a069/12OmNrMHOnz", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2012/2599/0/06341510", "title": "Scalable Force Directed Graph Layout Algorithms Using Fast Multipole Methods", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2012/06341510/12OmNx3HI8B", "parentPublication": { "id": "proceedings/ispdc/2012/2599/0", "title": "2012 11th International Symposium on Parallel and Distributed Computing (ISPDC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0821", "title": "IPSep-CoLa: An Incremental Procedure for Separation Constraint Layout of Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0821/13rRUNvyat8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/06/ttg2013060927", "title": "A Maxent-Stress Model for Graph Layout", "doi": null, "abstractUrl": "/journal/tg/2013/06/ttg2013060927/13rRUwj7cpa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/06/ttg2013060953", "title": "CiSE: A Circular Spring Embedder Layout Algorithm", "doi": null, "abstractUrl": "/journal/tg/2013/06/ttg2013060953/13rRUxASuhz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017634", "title": "Revisiting Stress Majorization as a Unified Framework for Interactive Constrained Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017634/13rRUxC0Sw3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061293", "title": "Exploration of Networks using overview+detail with Constraint-based cooperative layout", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061293/13rRUyp7tWQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10024360", "title": "Force-Directed Graph Layouts Revisited: A New Force Based on the T-Distribution", "doi": null, "abstractUrl": "/journal/tg/5555/01/10024360/1KaBabqZxSg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944364", "title": "Force-Directed Graph Layouts by Edge Sampling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944364/1grOFicLl9S", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09904435", "articleId": "1H1ghDpBufu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09908291", "articleId": "1HbasfaWNX2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1J9yw0HZpZe", "name": "ttg202301-09904492s1-supp1-3209371.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202301-09904492s1-supp1-3209371.pdf", "extension": "pdf", "size": "67.8 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nJsFpDFsu4", "doi": "10.1109/TVCG.2020.3028947", "abstract": "In recent years, deep learning has opened countless research opportunities across many different disciplines. At present, visualization is mainly applied to explore and explain neural networks. Its counterpart-the application of deep learning to visualization problems-requires us to share data more openly in order to enable more scientists to engage in data-driven research. In this paper, we construct a large fluid flow data set and apply it to a deep learning problem in scientific visualization. Parameterized by the Reynolds number, the data set contains a wide spectrum of laminar and turbulent fluid flow regimes. The full data set was simulated on a high-performance compute cluster and contains 8000 time-dependent 2D vector fields, accumulating to more than 16 TB in size. Using our public fluid data set, we trained deep convolutional neural networks in order to set a benchmark for an improved post-hoc Lagrangian fluid flow analysis. In in-situ settings, flow maps are exported and interpolated in order to assess the transport characteristics of time-dependent fluids. Using deep learning, we improve the accuracy of flow map interpolations, allowing a more precise flow analysis at a reduced memory IO footprint.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, deep learning has opened countless research opportunities across many different disciplines. At present, visualization is mainly applied to explore and explain neural networks. Its counterpart-the application of deep learning to visualization problems-requires us to share data more openly in order to enable more scientists to engage in data-driven research. In this paper, we construct a large fluid flow data set and apply it to a deep learning problem in scientific visualization. Parameterized by the Reynolds number, the data set contains a wide spectrum of laminar and turbulent fluid flow regimes. The full data set was simulated on a high-performance compute cluster and contains 8000 time-dependent 2D vector fields, accumulating to more than 16 TB in size. Using our public fluid data set, we trained deep convolutional neural networks in order to set a benchmark for an improved post-hoc Lagrangian fluid flow analysis. In in-situ settings, flow maps are exported and interpolated in order to assess the transport characteristics of time-dependent fluids. Using deep learning, we improve the accuracy of flow map interpolations, allowing a more precise flow analysis at a reduced memory IO footprint.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, deep learning has opened countless research opportunities across many different disciplines. At present, visualization is mainly applied to explore and explain neural networks. Its counterpart-the application of deep learning to visualization problems-requires us to share data more openly in order to enable more scientists to engage in data-driven research. In this paper, we construct a large fluid flow data set and apply it to a deep learning problem in scientific visualization. Parameterized by the Reynolds number, the data set contains a wide spectrum of laminar and turbulent fluid flow regimes. The full data set was simulated on a high-performance compute cluster and contains 8000 time-dependent 2D vector fields, accumulating to more than 16 TB in size. Using our public fluid data set, we trained deep convolutional neural networks in order to set a benchmark for an improved post-hoc Lagrangian fluid flow analysis. In in-situ settings, flow maps are exported and interpolated in order to assess the transport characteristics of time-dependent fluids. Using deep learning, we improve the accuracy of flow map interpolations, allowing a more precise flow analysis at a reduced memory IO footprint.", "title": "A Fluid Flow Data Set for Machine Learning and its Application to Neural Flow Map Interpolation", "normalizedTitle": "A Fluid Flow Data Set for Machine Learning and its Application to Neural Flow Map Interpolation", "fno": "09216518", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computational Fluid Dynamics", "Convolutional Neural Nets", "Data Visualisation", "Deep Learning Artificial Intelligence", "Flow Simulation", "Interpolation", "Turbulence", "Fluid Flow Data Set", "Deep Learning", "Laminar Fluid Flow", "Turbulent Fluid Flow", "Deep Convolutional Neural Networks", "Time Dependent Fluids", "Flow Map Interpolations", "Machine Learning", "Neural Flow Map Interpolation", "Reynolds Number", "Lagrangian Fluid Flow Analysis", "Scientific Visualization", "Machine Learning", "Interpolation", "Image Resolution", "Data Visualization", "Convolutional Neural Networks", "Feature Extraction", "Scientific Visualization", "Deep Learning", "Flow Maps" ], "authors": [ { "givenName": "Jakob", "surname": "Jakob", "fullName": "Jakob Jakob", "affiliation": "ETH Zurich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Markus", "surname": "Gross", "fullName": "Markus Gross", "affiliation": "ETH Zurich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Günther", "fullName": "Tobias Günther", "affiliation": "ETH Zurich, Switzerland", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1279-1289", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2005/2766/0/27660079", "title": "Visual Analysis and Exploration of Fluid Flow in a Cooling Jacket", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660079/12OmNBDQbfz", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1996/3673/0/36730249", "title": "UFLOW: Visualizing Uncertainty in Fluid Flow", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1996/36730249/12OmNs59JIG", "parentPublication": { "id": "proceedings/ieee-vis/1996/3673/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2012/4733/0/06378979", "title": "Virtual rheoscopic fluids for dense, large-scale fluid flow visualizations", "doi": null, "abstractUrl": "/proceedings-article/ldav/2012/06378979/12OmNvAS4pN", "parentPublication": { "id": "proceedings/ldav/2012/4733/0", "title": "2012 IEEE Symposium on Large Data Analysis and Visualization (LDAV 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1994/6627/0/00346309", "title": "An annotation system for 3D fluid flow visualization", "doi": null, "abstractUrl": "/proceedings-article/visual/1994/00346309/12OmNweBUQu", "parentPublication": { "id": "proceedings/visual/1994/6627/0", "title": "Proceedings Visualization '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1994/6605/0/00344260", "title": "A scalable high-performance environment for fluid flow analysis on unstructured grids", "doi": null, "abstractUrl": "/proceedings-article/sc/1994/00344260/12OmNxvO0ar", "parentPublication": { "id": "proceedings/sc/1994/6605/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532850", "title": "Visual analysis and exploration of fluid flow in a cooling jacket", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532850/12OmNz6iOKT", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323845", "title": "Salient structure analysis of fluid flow", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323845/12OmNzzP5Jg", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1993/10/rx013", "title": "Interactive Scientific Visualization of Fluid Flow", "doi": null, "abstractUrl": "/magazine/co/1993/10/rx013/13rRUEgs2Gc", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1994/05/mcg1994050033", "title": "Three Ways to Show 3D Fluid Flow", "doi": null, "abstractUrl": "/magazine/cg/1994/05/mcg1994050033/13rRUxBJhxC", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1993/06/r6098", "title": "Visualizing Fluid Flow", "doi": null, "abstractUrl": "/magazine/co/1993/06/r6098/13rRUy0HYMS", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09222376", "articleId": "1nTqtgLjBMQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "09230431", "articleId": "1o3nDz76NBC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qL86wCgOsg", "name": "ttg202102-09216518s1-supp2-3028947.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216518s1-supp2-3028947.mp4", "extension": "mp4", "size": "47.7 MB", "__typename": "WebExtraType" }, { "id": "1qL8i178TaE", "name": "ttg202102-09216518s1-supp1-3028947.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216518s1-supp1-3028947.pdf", "extension": "pdf", "size": "11.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwoxSj4", "title": "March", "year": "2017", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "39", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUIJcWmw", "doi": "10.1109/TPAMI.2016.2557779", "abstract": "Marker-less motion capture has seen great progress, but most state-of-the-art approaches fail to reliably track articulated human body motion with a very low number of cameras, let alone when applied in outdoor scenes with general background. In this paper, we propose a method for accurate marker-less capture of articulated skeleton motion of several subjects in general scenes, indoors and outdoors, even from input filmed with as few as two cameras. The new algorithm combines the strengths of a discriminative image-based joint detection method with a model-based generative motion tracking algorithm through an unified pose optimization energy. The discriminative part-based pose detection method is implemented using Convolutional Networks (ConvNet) and estimates unary potentials for each joint of a kinematic skeleton model. These unary potentials serve as the basis of a probabilistic extraction of pose constraints for tracking by using weighted sampling from a pose posterior that is guided by the model. In the final energy, we combine these constraints with an appearance-based model-to-image similarity term. Poses can be computed very efficiently using iterative local optimization, since joint detection with a trained ConvNet is fast, and since our formulation yields a combined pose estimation energy with analytic derivatives. In combination, this enables to track full articulated joint angles at state-of-the-art accuracy and temporal stability with a very low number of cameras. Our method is efficient and lends itself to implementation on parallel computing hardware, such as GPUs. We test our method extensively and show its advantages over related work on many indoor and outdoor data sets captured by ourselves, as well as data sets made available to the community by other research labs. The availability of good evaluation data sets is paramount for scientific progress, and many existing test data sets focus on controlled indoor settings, do not feature much variety in the scenes, and often lack a large corpus of data with ground truth annotation. We therefore further contribute with a new extensive test data set called MPI-MARCOnI for indoor and outdoor marker-less motion capture that features Z_$12$_Z scenes of varying complexity and varying camera count, and that features ground truth reference data from different modalities, ranging from manual joint annotations to marker-based motion capture results. Our new method is tested on these data, and the data set will be made available to the community.", "abstracts": [ { "abstractType": "Regular", "content": "Marker-less motion capture has seen great progress, but most state-of-the-art approaches fail to reliably track articulated human body motion with a very low number of cameras, let alone when applied in outdoor scenes with general background. In this paper, we propose a method for accurate marker-less capture of articulated skeleton motion of several subjects in general scenes, indoors and outdoors, even from input filmed with as few as two cameras. The new algorithm combines the strengths of a discriminative image-based joint detection method with a model-based generative motion tracking algorithm through an unified pose optimization energy. The discriminative part-based pose detection method is implemented using Convolutional Networks (ConvNet) and estimates unary potentials for each joint of a kinematic skeleton model. These unary potentials serve as the basis of a probabilistic extraction of pose constraints for tracking by using weighted sampling from a pose posterior that is guided by the model. In the final energy, we combine these constraints with an appearance-based model-to-image similarity term. Poses can be computed very efficiently using iterative local optimization, since joint detection with a trained ConvNet is fast, and since our formulation yields a combined pose estimation energy with analytic derivatives. In combination, this enables to track full articulated joint angles at state-of-the-art accuracy and temporal stability with a very low number of cameras. Our method is efficient and lends itself to implementation on parallel computing hardware, such as GPUs. We test our method extensively and show its advantages over related work on many indoor and outdoor data sets captured by ourselves, as well as data sets made available to the community by other research labs. The availability of good evaluation data sets is paramount for scientific progress, and many existing test data sets focus on controlled indoor settings, do not feature much variety in the scenes, and often lack a large corpus of data with ground truth annotation. We therefore further contribute with a new extensive test data set called MPI-MARCOnI for indoor and outdoor marker-less motion capture that features $12$ scenes of varying complexity and varying camera count, and that features ground truth reference data from different modalities, ranging from manual joint annotations to marker-based motion capture results. Our new method is tested on these data, and the data set will be made available to the community.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Marker-less motion capture has seen great progress, but most state-of-the-art approaches fail to reliably track articulated human body motion with a very low number of cameras, let alone when applied in outdoor scenes with general background. In this paper, we propose a method for accurate marker-less capture of articulated skeleton motion of several subjects in general scenes, indoors and outdoors, even from input filmed with as few as two cameras. The new algorithm combines the strengths of a discriminative image-based joint detection method with a model-based generative motion tracking algorithm through an unified pose optimization energy. The discriminative part-based pose detection method is implemented using Convolutional Networks (ConvNet) and estimates unary potentials for each joint of a kinematic skeleton model. These unary potentials serve as the basis of a probabilistic extraction of pose constraints for tracking by using weighted sampling from a pose posterior that is guided by the model. In the final energy, we combine these constraints with an appearance-based model-to-image similarity term. Poses can be computed very efficiently using iterative local optimization, since joint detection with a trained ConvNet is fast, and since our formulation yields a combined pose estimation energy with analytic derivatives. In combination, this enables to track full articulated joint angles at state-of-the-art accuracy and temporal stability with a very low number of cameras. Our method is efficient and lends itself to implementation on parallel computing hardware, such as GPUs. We test our method extensively and show its advantages over related work on many indoor and outdoor data sets captured by ourselves, as well as data sets made available to the community by other research labs. The availability of good evaluation data sets is paramount for scientific progress, and many existing test data sets focus on controlled indoor settings, do not feature much variety in the scenes, and often lack a large corpus of data with ground truth annotation. We therefore further contribute with a new extensive test data set called MPI-MARCOnI for indoor and outdoor marker-less motion capture that features - scenes of varying complexity and varying camera count, and that features ground truth reference data from different modalities, ranging from manual joint annotations to marker-based motion capture results. Our new method is tested on these data, and the data set will be made available to the community.", "title": "MARCOnI—ConvNet-Based MARker-Less Motion Capture in Outdoor and Indoor Scenes", "normalizedTitle": "MARCOnI—ConvNet-Based MARker-Less Motion Capture in Outdoor and Indoor Scenes", "fno": "07457717", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cameras", "Tracking", "Computational Modeling", "Optimization", "Three Dimensional Displays", "Skeleton", "Convolutional Neural Networks", "Motion Capture", "Marker Less Motion Capture", "Multi Model Dataset" ], "authors": [ { "givenName": "A.", "surname": "Elhayek", "fullName": "A. Elhayek", "affiliation": "MPI for Informatics, Saarland, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "E.", "surname": "de Aguiar", "fullName": "E. de Aguiar", "affiliation": "MPI for Informatics, Saarland, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "A.", "surname": "Jain", "fullName": "A. Jain", "affiliation": "New York University, New York, NY", "__typename": "ArticleAuthorType" }, { "givenName": "J.", "surname": "Thompson", "fullName": "J. Thompson", "affiliation": "Google, Mountain View, CA", "__typename": "ArticleAuthorType" }, { "givenName": "L.", "surname": "Pishchulin", "fullName": "L. Pishchulin", "affiliation": "MPI for Informatics, Saarland, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Andriluka", "fullName": "M. Andriluka", "affiliation": "Stanford University, Stanford, CA", "__typename": "ArticleAuthorType" }, { "givenName": "C.", "surname": "Bregler", "fullName": "C. Bregler", "affiliation": "Google, Mountain View, CA", "__typename": "ArticleAuthorType" }, { "givenName": "B.", "surname": "Schiele", "fullName": "B. Schiele", "affiliation": "MPI for Informatics, Saarland, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "C.", "surname": "Theobalt", "fullName": "C. Theobalt", "affiliation": "MPI for Informatics, Saarland, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2017-03-01 00:00:00", "pubType": "trans", "pages": "501-514", "year": "2017", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209c507", "title": "Automatic Gait Motion Capture with Missing-Marker Fillings", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c507/12OmNB7LvGk", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a166", "title": "Model-Based Outdoor Performance Capture", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a166/12OmNwDSdg1", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2013/0703/0/06636645", "title": "Gait recognition based on marker-less 3D motion capture", "doi": null, "abstractUrl": "/proceedings-article/avss/2013/06636645/12OmNwwd2Os", "parentPublication": { "id": "proceedings/avss/2013/0703/0", "title": "2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/1/4356a281", "title": "Marker-Less Human Body Tracking Using Locally Affine Invariant Contour Matching", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356a281/12OmNx7XGZy", "parentPublication": { "id": "proceedings/cmsp/2011/4356/1", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07299005", "title": "Efficient ConvNet-based marker-less motion capture in general scenes with a low number of cameras", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07299005/12OmNy5zsoy", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2005/2488/0/24880621", "title": "Using Interval Particle Filtering for Marker Less 3D Human Motion Capture", "doi": null, "abstractUrl": "/proceedings-article/ictai/2005/24880621/12OmNykCcbv", "parentPublication": { "id": "proceedings/ictai/2005/2488/0", "title": "17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/05/07896626", "title": "Outdoor Markerless Motion Capture with Sparse Handheld Video Cameras", "doi": null, "abstractUrl": "/journal/tg/2018/05/07896626/13rRUB7a1g0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/05/09714116", "title": "Prepare for Ludicrous Speed: Marker-based Instantaneous Binocular Rolling Shutter Localization", "doi": null, "abstractUrl": "/journal/tg/2022/05/09714116/1B0XY0RxxvO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a823", "title": "Markerless Outdoor Human Motion Capture Using Multiple Autonomous Micro Aerial Vehicles", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a823/1hQqk33280w", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306581", "title": "Performance Evaluation of Markerless 3D Skeleton Pose Estimates with Pop Dance Motion Sequence", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306581/1qcicQKjJ6g", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07450177", "articleId": "13rRUB7a1h7", "__typename": "AdjacentArticleType" }, "next": { "fno": "07497466", "articleId": "13rRUwd9CHg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRPY", "name": "ttp201703-07457717s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttp201703-07457717s1.zip", "extension": "zip", "size": "87.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvAiSp1", "title": "Nov.", "year": "2018", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "24", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "14M3E0YMV5C", "doi": "10.1109/TVCG.2018.2868527", "abstract": "We propose a new approach for 3D reconstruction of dynamic indoor and outdoor scenes in everyday environments, leveraging only cameras worn by a user. This approach allows 3D reconstruction of experiences at any location and virtual tours from anywhere. The key innovation of the proposed ego-centric reconstruction system is to capture the wearer's body pose and facial expression from near-body views, e.g. cameras on the user's glasses, and to capture the surrounding environment using outward-facing views. The main challenge of the ego-centric reconstruction, however, is the poor coverage of the near-body views - that is, the user's body and face are observed from vantage points that are convenient for wear but inconvenient for capture. To overcome these challenges, we propose a parametric-model-based approach to user motion estimation. This approach utilizes convolutional neural networks (CNNs) for near-view body pose estimation, and we introduce a CNN-based approach for facial expression estimation that combines audio and video. For each time-point during capture, the intermediate model-based reconstructions from these systems are used to re-target a high-fidelity pre-scanned model of the user. We demonstrate that the proposed self-sufficient, head-worn capture system is capable of reconstructing the wearer's movements and their surrounding environment in both indoor and outdoor situations without any additional views. As a proof of concept, we show how the resulting 3D-plus-time reconstruction can be immersively experienced within a virtual reality system (e.g., the HTC Vive). We expect that the size of the proposed egocentric capture-and-reconstruction system will eventually be reduced to fit within future AR glasses, and will be widely useful for immersive 3D telepresence, virtual tours, and general use-anywhere 3D content creation.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a new approach for 3D reconstruction of dynamic indoor and outdoor scenes in everyday environments, leveraging only cameras worn by a user. This approach allows 3D reconstruction of experiences at any location and virtual tours from anywhere. The key innovation of the proposed ego-centric reconstruction system is to capture the wearer's body pose and facial expression from near-body views, e.g. cameras on the user's glasses, and to capture the surrounding environment using outward-facing views. The main challenge of the ego-centric reconstruction, however, is the poor coverage of the near-body views - that is, the user's body and face are observed from vantage points that are convenient for wear but inconvenient for capture. To overcome these challenges, we propose a parametric-model-based approach to user motion estimation. This approach utilizes convolutional neural networks (CNNs) for near-view body pose estimation, and we introduce a CNN-based approach for facial expression estimation that combines audio and video. For each time-point during capture, the intermediate model-based reconstructions from these systems are used to re-target a high-fidelity pre-scanned model of the user. We demonstrate that the proposed self-sufficient, head-worn capture system is capable of reconstructing the wearer's movements and their surrounding environment in both indoor and outdoor situations without any additional views. As a proof of concept, we show how the resulting 3D-plus-time reconstruction can be immersively experienced within a virtual reality system (e.g., the HTC Vive). We expect that the size of the proposed egocentric capture-and-reconstruction system will eventually be reduced to fit within future AR glasses, and will be widely useful for immersive 3D telepresence, virtual tours, and general use-anywhere 3D content creation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a new approach for 3D reconstruction of dynamic indoor and outdoor scenes in everyday environments, leveraging only cameras worn by a user. This approach allows 3D reconstruction of experiences at any location and virtual tours from anywhere. The key innovation of the proposed ego-centric reconstruction system is to capture the wearer's body pose and facial expression from near-body views, e.g. cameras on the user's glasses, and to capture the surrounding environment using outward-facing views. The main challenge of the ego-centric reconstruction, however, is the poor coverage of the near-body views - that is, the user's body and face are observed from vantage points that are convenient for wear but inconvenient for capture. To overcome these challenges, we propose a parametric-model-based approach to user motion estimation. This approach utilizes convolutional neural networks (CNNs) for near-view body pose estimation, and we introduce a CNN-based approach for facial expression estimation that combines audio and video. For each time-point during capture, the intermediate model-based reconstructions from these systems are used to re-target a high-fidelity pre-scanned model of the user. We demonstrate that the proposed self-sufficient, head-worn capture system is capable of reconstructing the wearer's movements and their surrounding environment in both indoor and outdoor situations without any additional views. As a proof of concept, we show how the resulting 3D-plus-time reconstruction can be immersively experienced within a virtual reality system (e.g., the HTC Vive). We expect that the size of the proposed egocentric capture-and-reconstruction system will eventually be reduced to fit within future AR glasses, and will be widely useful for immersive 3D telepresence, virtual tours, and general use-anywhere 3D content creation.", "title": "Towards Fully Mobile 3D Face, Body, and Environment Capture Using Only Head-worn Cameras", "normalizedTitle": "Towards Fully Mobile 3D Face, Body, and Environment Capture Using Only Head-worn Cameras", "fno": "08458443", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Cameras", "Computer Vision", "Convolution", "Face Recognition", "Feedforward Neural Nets", "Image Reconstruction", "Mobile Computing", "Motion Estimation", "Pose Estimation", "Solid Modelling", "Virtual Reality", "Environment Capture", "Head Worn Cameras", "Dynamic Indoor Scenes", "Virtual Tours", "Ego Centric Reconstruction System", "Near Body Views", "Parametric Model Based Approach", "User Motion Estimation", "Convolutional Neural Networks", "CNN Based Approach", "Facial Expression Estimation", "Intermediate Model Based Reconstructions", "High Fidelity Pre Scanned Model", "Head Worn Capture System", "3 D Plus Time Reconstruction", "Virtual Reality System", "Immersive 3 D Telepresence", "Use Anywhere 3 D Content Creation", "Capture And Reconstruction System", "Fully Mobile 3 D Face Capture", "AR Glasses", "HTC Vive", "Near View Body Pose Estimation", "Cameras", "Three Dimensional Displays", "Image Reconstruction", "Face", "Solid Modeling", "Pose Estimation", "Deformable Models", "Telepresence", "Ego Centric Vision", "Motion Capture", "Convolutional Neural Networks" ], "authors": [ { "givenName": "Young-Woon", "surname": "Cha", "fullName": "Young-Woon Cha", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "True", "surname": "Price", "fullName": "True Price", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Zhen", "surname": "Wei", "fullName": "Zhen Wei", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Xinran", "surname": "Lu", "fullName": "Xinran Lu", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Nicholas", "surname": "Rewkowski", "fullName": "Nicholas Rewkowski", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Rohan", "surname": "Chabra", "fullName": "Rohan Chabra", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Zihe", "surname": "Qin", "fullName": "Zihe Qin", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Hyounghun", "surname": "Kim", "fullName": "Hyounghun Kim", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Zhaoqi", "surname": "Su", "fullName": "Zhaoqi Su", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Yebin", "surname": "Liu", "fullName": "Yebin Liu", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Adrian", "surname": "Ilie", "fullName": "Adrian Ilie", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Andrei", "surname": "State", "fullName": "Andrei State", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Zhenlin", "surname": "Xu", "fullName": "Zhenlin Xu", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Jan-Michael", "surname": "Frahm", "fullName": "Jan-Michael Frahm", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Henry", "surname": "Fuchs", "fullName": "Henry Fuchs", "affiliation": "UNC Chapel Hill", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2018-11-01 00:00:00", "pubType": "trans", "pages": "2993-3004", "year": "2018", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icme/2007/1016/0/04284846", "title": "Model-Based Markerless Human Body Motion Capture using Multiple Cameras", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284846/12OmNvmXJ37", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2016/2491/0/2491a024", "title": "Real-Time Human Motion Capture with Multiple Depth Cameras", "doi": null, "abstractUrl": "/proceedings-article/crv/2016/2491a024/12OmNwBT1rW", "parentPublication": { "id": "proceedings/crv/2016/2491/0", "title": "2016 13th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2015/6593/0/6593a352", "title": "Quick Capture and Reconstruction for 3D Head", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2015/6593a352/12OmNyUnEKB", "parentPublication": { "id": "proceedings/dcabes/2015/6593/0", "title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892243", "title": "Optimizing placement of commodity depth cameras for known 3D dynamic scene capture", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892243/12OmNyYDDME", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/04/08316924", "title": "MonoCap: Monocular Human Motion Capture using a CNN Coupled with a Geometric Prior", "doi": null, "abstractUrl": "/journal/tp/2019/04/08316924/13rRUEgarkK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g219", "title": "DeepMultiCap: Performance Capture of Multiple Characters Using Sparse Multiview Cameras", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g219/1BmEybxUSnC", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09748011", "title": "Beyond 3DMM: Learning to Capture High-Fidelity 3D Face Shape", "doi": null, "abstractUrl": "/journal/tp/2023/02/09748011/1CdB5uPaTlK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2022/5670/0/567000a001", "title": "MoCapDeform: Monocular 3D Human Motion Capture in Deformable Scenes", "doi": null, "abstractUrl": "/proceedings-article/3dv/2022/567000a001/1KYso7Sd0Zy", "parentPublication": { "id": "proceedings/3dv/2022/5670/0", "title": "2022 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a308", "title": "Motion Capture from Pan-Tilt Cameras with Unknown Orientation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a308/1ezRBTghOZq", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a616", "title": "Mobile. Egocentric Human Body Motion Reconstruction Using Only Eyeglasses-mounted Cameras and a Few Body-worn Inertial Sensors", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a616/1tuAWRhj1Uk", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08456525", "articleId": "14M3DYGRu3n", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KsSqOPRvjy", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tm", "pubType": "journal", "volume": "22", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1wuoWrOGGPe", "doi": "10.1109/TMC.2021.3108750", "abstract": "Numerical simulations on mobile devices are an important tool for engineers and decision makers in the field. However, providing simulation results on mobile devices is challenging due to the complexity of the simulation, requiring remote server resources and distributed mobile computation. The additional large size of multi-dimensional simulation results leads to the insufficient performance of existing approaches, especially when the bandwidth of wireless communication is scarce. In this article, we present an optimized novel approach utilizing surrogate models and data assimilation techniques to reduce the communication overhead. Evaluations show that our approach is up to 6.5 times faster than streaming results from the server while still meeting required quality constraints.", "abstracts": [ { "abstractType": "Regular", "content": "Numerical simulations on mobile devices are an important tool for engineers and decision makers in the field. However, providing simulation results on mobile devices is challenging due to the complexity of the simulation, requiring remote server resources and distributed mobile computation. The additional large size of multi-dimensional simulation results leads to the insufficient performance of existing approaches, especially when the bandwidth of wireless communication is scarce. In this article, we present an optimized novel approach utilizing surrogate models and data assimilation techniques to reduce the communication overhead. Evaluations show that our approach is up to 6.5 times faster than streaming results from the server while still meeting required quality constraints.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Numerical simulations on mobile devices are an important tool for engineers and decision makers in the field. However, providing simulation results on mobile devices is challenging due to the complexity of the simulation, requiring remote server resources and distributed mobile computation. The additional large size of multi-dimensional simulation results leads to the insufficient performance of existing approaches, especially when the bandwidth of wireless communication is scarce. In this article, we present an optimized novel approach utilizing surrogate models and data assimilation techniques to reduce the communication overhead. Evaluations show that our approach is up to 6.5 times faster than streaming results from the server while still meeting required quality constraints.", "title": "Using Surrogate Models and Data Assimilation for Efficient Mobile Simulations", "normalizedTitle": "Using Surrogate Models and Data Assimilation for Efficient Mobile Simulations", "fno": "09525231", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Data Assimilation", "Mobile Computing", "Optimisation", "Data Assimilation", "Decision Makers", "Efficient Mobile Simulations", "Mobile Computation", "Mobile Devices", "Multidimensional Simulation Results", "Numerical Simulations", "Optimized Novel Approach", "Remote Server Resources", "Surrogate Models", "Wireless Communication", "Computational Modeling", "Numerical Models", "Mobile Handsets", "Servers", "Data Models", "Numerical Simulation", "Mobile Computing", "Middleware", "Mobile Computing", "Numerical Simulation", "Pervasive Computing", "Ubiquitous Computing" ], "authors": [ { "givenName": "Christoph", "surname": "Dibak", "fullName": "Christoph Dibak", "affiliation": "Institute of Parallel and Distributed Systems (IPVS), University of Stuttgart, Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Wolfgang", "surname": "Nowak", "fullName": "Wolfgang Nowak", "affiliation": "Institute of Modelling Hydraulic and Environmental Systems (IWS), University of Stuttgart, Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Frank", "surname": "Dürr", "fullName": "Frank Dürr", "affiliation": "Institute of Parallel and Distributed Systems (IPVS), University of Stuttgart, Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Kurt", "surname": "Rothermel", "fullName": "Kurt Rothermel", "affiliation": "Institute of Parallel and Distributed Systems (IPVS), University of Stuttgart, Stuttgart, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1856-1866", "year": "2023", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/mdm/2012/4713/0/4713a380", "title": "Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects", "doi": null, "abstractUrl": "/proceedings-article/mdm/2012/4713a380/12OmNy5zss3", "parentPublication": { "id": "proceedings/mdm/2012/4713/0", "title": "2012 IEEE 13th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2017/4338/0/07917525", "title": "Demo: Server-assisted interactive mobile simulations for pervasive applications", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2017/07917525/19wAHGn5iNi", "parentPublication": { "id": "proceedings/percom-workshops/2017/4338/0", "title": "2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipc/2021/1016/0/101600a131", "title": "Towards Zero-Waste Recovery and Zero-Overhead Checkpointing in Ensemble Data Assimilation", "doi": null, "abstractUrl": "/proceedings-article/hipc/2021/101600a131/1Aqy7ba3GXC", "parentPublication": { "id": "proceedings/hipc/2021/1016/0", "title": "2021 IEEE 28th International Conference on High Performance Computing, Data, and Analytics (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annsim/2022/5288/0/09859329", "title": "Data Assimilation For Simulation-Based Real-Time Prediction/Analysis", "doi": null, "abstractUrl": "/proceedings-article/annsim/2022/09859329/1G4ERHxNYM8", "parentPublication": { "id": "proceedings/annsim/2022/5288/0", "title": "2022 Annual Modeling and Simulation Conference (ANNSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2022/0971/0/097100a294", "title": "Request-Aware Task Offloading in Mobile Edge Computing via Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/cbd/2022/097100a294/1KdZcI2QUzC", "parentPublication": { "id": "proceedings/cbd/2022/0971/0", "title": "2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/springsim/2019/8388/0/08732916", "title": "Data Assimilation Using Spatial Partition-Based Particle Filtering For Freeway Traffic Simulation", "doi": null, "abstractUrl": "/proceedings-article/springsim/2019/08732916/1aIRRolnAFG", "parentPublication": { "id": "proceedings/springsim/2019/8388/0", "title": "2019 Spring Simulation Conference (SpringSim)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a633", "title": "Hybrid Data Assimilation: An Ensemble-Variational Approach", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a633/1j9xC44RWNy", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ds-rt/2020/7343/0/09213694", "title": "MEDART-MAS: MEta-model of Data Assimilation on Real-Time Multi-Agent Simulation", "doi": null, "abstractUrl": "/proceedings-article/ds-rt/2020/09213694/1nHROL6gjE4", "parentPublication": { "id": "proceedings/ds-rt/2020/7343/0", "title": "2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eecs/2019/6109/0/610900a090", "title": "Comparison of generalized data assimilation method with an Ensemble Optimal Interpolation scheme", "doi": null, "abstractUrl": "/proceedings-article/eecs/2019/610900a090/1oUCPFWD0go", "parentPublication": { "id": "proceedings/eecs/2019/6109/0", "title": "2019 3rd European Conference on Electrical Engineering and Computer Science (EECS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2020/9998/0/999800a001", "title": "A 1024-Member Ensemble Data Assimilation with 3.5-Km Mesh Global Weather Simulations", "doi": null, "abstractUrl": "/proceedings-article/sc/2020/999800a001/1oeORswZpYY", "parentPublication": { "id": "proceedings/sc/2020/9998/0/", "title": "2020 SC20: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09537655", "articleId": "1wTin86WohO", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DFd8NuTZXW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "td", "pubType": "journal", "volume": "33", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1zumrWeoLUk", "doi": "10.1109/TPDS.2021.3136672", "abstract": "Recently, intelligent scheduling approaches using surrogate models have been proposed to efficiently allocate volatile tasks in heterogeneous fog environments. Advances like deterministic surrogate models, deep neural networks (DNN) and gradient-based optimization allow low energy consumption and response times to be reached. However, deterministic surrogate models, which estimate objective values for optimization, do not consider the uncertainties in the distribution of the Quality of Service (QoS) objective function that can lead to high Service Level Agreement (SLA) violation rates. Moreover, the brittle nature of DNN training and the limited exploration with low agility in gradient-based optimization prevent such models from reaching minimal energy or response times. To overcome these difficulties, we present a novel scheduler that we call GOSH for Gradient Based Optimization using Second Order derivatives and Heteroscedastic Deep Surrogate Models. GOSH uses a second-order gradient based optimization approach to obtain better QoS and reduce the number of iterations to converge to a scheduling decision, subsequently lowering the scheduling time. Instead of a vanilla DNN, GOSH uses a Natural Parameter Network (NPN) to approximate objective scores. Further, a Lower Confidence Bound (LCB) optimization approach allows GOSH to find an optimal trade-off between greedy minimization of the mean latency and uncertainty reduction by employing error-based exploration. Thus, GOSH and its co-simulation based extension GOSH*, can adapt quickly and reach better objective scores than baseline methods. We show that GOSH* reaches better objective scores than GOSH, but it is suitable only for high resource availability settings, whereas GOSH is apt for limited resource settings. Real system experiments for both GOSH and GOSH* show significant improvements against the state-of-the-art in terms of energy consumption, response time and SLA violations by up to 18, 27 and 82 percent, respectively.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, intelligent scheduling approaches using surrogate models have been proposed to efficiently allocate volatile tasks in heterogeneous fog environments. Advances like deterministic surrogate models, deep neural networks (DNN) and gradient-based optimization allow low energy consumption and response times to be reached. However, deterministic surrogate models, which estimate objective values for optimization, do not consider the uncertainties in the distribution of the Quality of Service (QoS) objective function that can lead to high Service Level Agreement (SLA) violation rates. Moreover, the brittle nature of DNN training and the limited exploration with low agility in gradient-based optimization prevent such models from reaching minimal energy or response times. To overcome these difficulties, we present a novel scheduler that we call GOSH for Gradient Based Optimization using Second Order derivatives and Heteroscedastic Deep Surrogate Models. GOSH uses a second-order gradient based optimization approach to obtain better QoS and reduce the number of iterations to converge to a scheduling decision, subsequently lowering the scheduling time. Instead of a vanilla DNN, GOSH uses a Natural Parameter Network (NPN) to approximate objective scores. Further, a Lower Confidence Bound (LCB) optimization approach allows GOSH to find an optimal trade-off between greedy minimization of the mean latency and uncertainty reduction by employing error-based exploration. Thus, GOSH and its co-simulation based extension GOSH*, can adapt quickly and reach better objective scores than baseline methods. We show that GOSH* reaches better objective scores than GOSH, but it is suitable only for high resource availability settings, whereas GOSH is apt for limited resource settings. Real system experiments for both GOSH and GOSH* show significant improvements against the state-of-the-art in terms of energy consumption, response time and SLA violations by up to 18, 27 and 82 percent, respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, intelligent scheduling approaches using surrogate models have been proposed to efficiently allocate volatile tasks in heterogeneous fog environments. Advances like deterministic surrogate models, deep neural networks (DNN) and gradient-based optimization allow low energy consumption and response times to be reached. However, deterministic surrogate models, which estimate objective values for optimization, do not consider the uncertainties in the distribution of the Quality of Service (QoS) objective function that can lead to high Service Level Agreement (SLA) violation rates. Moreover, the brittle nature of DNN training and the limited exploration with low agility in gradient-based optimization prevent such models from reaching minimal energy or response times. To overcome these difficulties, we present a novel scheduler that we call GOSH for Gradient Based Optimization using Second Order derivatives and Heteroscedastic Deep Surrogate Models. GOSH uses a second-order gradient based optimization approach to obtain better QoS and reduce the number of iterations to converge to a scheduling decision, subsequently lowering the scheduling time. Instead of a vanilla DNN, GOSH uses a Natural Parameter Network (NPN) to approximate objective scores. Further, a Lower Confidence Bound (LCB) optimization approach allows GOSH to find an optimal trade-off between greedy minimization of the mean latency and uncertainty reduction by employing error-based exploration. Thus, GOSH and its co-simulation based extension GOSH*, can adapt quickly and reach better objective scores than baseline methods. We show that GOSH* reaches better objective scores than GOSH, but it is suitable only for high resource availability settings, whereas GOSH is apt for limited resource settings. Real system experiments for both GOSH and GOSH* show significant improvements against the state-of-the-art in terms of energy consumption, response time and SLA violations by up to 18, 27 and 82 percent, respectively.", "title": "GOSH: Task Scheduling Using Deep Surrogate Models in Fog Computing Environments", "normalizedTitle": "GOSH: Task Scheduling Using Deep Surrogate Models in Fog Computing Environments", "fno": "09656655", "hasPdf": true, "idPrefix": "td", "keywords": [ "Contracts", "Deep Learning Artificial Intelligence", "Distributed Processing", "Gradient Methods", "Optimisation", "Quality Of Service", "Resource Allocation", "Scheduling", "Energy Consumption", "Second Order Gradient Based Optimization Approach", "Greedy Minimization", "Co Simulation Based Extension GOSH", "Objective Scores", "Response Time", "Task Scheduling", "Fog Computing Environments", "Intelligent Scheduling Approaches", "Deterministic Surrogate Models", "Deep Neural Networks", "DNN", "Service Level Agreement Violation Rates", "Service Objective Function", "SLA", "Quality Of Service", "Qo S", "Heteroscedastic Deep Surrogate Models", "Natural Parameter Network", "NPN", "Lower Confidence Bound Optimization Approach", "LCB", "Quality Of Service", "Adaptation Models", "Optimization", "Task Analysis", "Uncertainty", "Computational Modeling", "Time Factors", "DL For PDC", "Fog Computing", "Scheduling", "Heteroscedastic Models", "Lower Confidence Bound", "Qo S Optimization", "Second Order Optimization" ], "authors": [ { "givenName": "Shreshth", "surname": "Tuli", "fullName": "Shreshth Tuli", "affiliation": "Department of Computing, Imperial College London, London, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Giuliano", "surname": "Casale", "fullName": "Giuliano Casale", "affiliation": "Department of Computing, Imperial College London, London, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Nicholas R.", "surname": "Jennings", "fullName": "Nicholas R. Jennings", "affiliation": "Department of Computing, Imperial College London, London, U.K.", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "2821-2833", "year": "2022", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/snpd/2017/5504/0/08022789", "title": "A fundamental study on adaptive surrogate-assisted evolutionary computation using rank correlation", "doi": null, "abstractUrl": "/proceedings-article/snpd/2017/08022789/12OmNAIdBT8", "parentPublication": { "id": "proceedings/snpd/2017/5504/0", "title": "2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2009/3562/0/3562a003", "title": "Surrogate Models for Shape Optimization of Underwater Glider", "doi": null, "abstractUrl": "/proceedings-article/iccms/2009/3562a003/12OmNwErpV0", "parentPublication": { "id": "proceedings/iccms/2009/3562/0", "title": "2009 International Conference on Computer Modeling and Simulation. ICCMS 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsbse/2013/6284/0/06604429", "title": "Testing elastic systems with surrogate models", "doi": null, "abstractUrl": "/proceedings-article/cmsbse/2013/06604429/12OmNzwpU7Y", "parentPublication": { "id": "proceedings/cmsbse/2013/6284/0", "title": "2013 1st International Workshop on Combining Modelling and Search-Based Software Engineering (CMSBSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2022/1316/0/131600a052", "title": "SoK: How Robust is Image Classification Deep Neural Network Watermarking?", "doi": null, "abstractUrl": "/proceedings-article/sp/2022/131600a052/1FlQuMr0vq8", "parentPublication": { "id": "proceedings/sp/2022/1316/0/", "title": "2022 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a331", "title": "MetaNet: Automated Dynamic Selection of Scheduling Policies in Cloud Environments", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a331/1G6lc1hbAuk", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsm/2022/5486/0/548600a036", "title": "Deep Learning based FEA Surrogate for Sub-Sea Pressure Vessel", "doi": null, "abstractUrl": "/proceedings-article/iccsm/2022/548600a036/1JeF4HIjRVm", "parentPublication": { "id": "proceedings/iccsm/2022/5486/0", "title": "2022 6th International Conference on Computer, Software and Modeling (ICCSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2021/04/08863918", "title": "Surrogate-Assisted Evolutionary Framework with Adaptive Knowledge Transfer for Multi-Task Optimization", "doi": null, "abstractUrl": "/journal/ec/2021/04/08863918/1e0YpGSKYO4", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/01/09448450", "title": "COSCO: Container Orchestration Using Co-Simulation and Gradient Based Optimization for Fog Computing Environments", "doi": null, "abstractUrl": "/journal/td/2022/01/09448450/1ugE95BK3qE", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icict/2021/1399/0/139900a052", "title": "A dynamic selection strategy for classification based surrogate-assisted multi-objective evolutionary algorithms", "doi": null, "abstractUrl": "/proceedings-article/icict/2021/139900a052/1vg8w0jqtOg", "parentPublication": { "id": "proceedings/icict/2021/1399/0", "title": "2021 4th International Conference on Information and Computer Technologies (ICICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlhpc/2021/1124/0/112400a081", "title": "HYPPO: A Surrogate-Based Multi-Level Parallelism Tool for Hyperparameter Optimization", "doi": null, "abstractUrl": "/proceedings-article/mlhpc/2021/112400a081/1zG33CeDYNa", "parentPublication": { "id": "proceedings/mlhpc/2021/1124/0", "title": "2021 IEEE/ACM Workshop on Machine Learning in High Performance Computing Environments (MLHPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09664375", "articleId": "1zHDKGtYkgw", "__typename": "AdjacentArticleType" }, "next": { "fno": "09645224", "articleId": "1zc6JTLADC0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBpEeNs", "title": "September/October", "year": "2003", "issueNum": "05", "idPrefix": "tk", "pubType": "journal", "volume": "15", "label": "September/October", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwcS1Dh", "doi": "10.1109/TKDE.2003.1232264", "abstract": "Abstract—A number of different approaches have been recently presented for image retrieval using color features. Most of these methods use the color histogram or some variation of it. If the extracted information is to be stored for each image, such methods may require a significant amount of space for storing the histogram, depending on a given image's size and content. In the method proposed in this paper, only a small number of features, called chromaticity moments, are required to capture the spectral content (chrominance) of an image. The proposed method is based on the concept of the chromaticity diagram and extracts a set of two-dimensional moments from it to characterize the shape and distribution of chromaticities of the given image. This representation is compact (only a few chromaticity moments per image are required) and constant (independent of image size and content), while its retrieval effectiveness is comparable to using the full chromaticity histogram.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—A number of different approaches have been recently presented for image retrieval using color features. Most of these methods use the color histogram or some variation of it. If the extracted information is to be stored for each image, such methods may require a significant amount of space for storing the histogram, depending on a given image's size and content. In the method proposed in this paper, only a small number of features, called chromaticity moments, are required to capture the spectral content (chrominance) of an image. The proposed method is based on the concept of the chromaticity diagram and extracts a set of two-dimensional moments from it to characterize the shape and distribution of chromaticities of the given image. This representation is compact (only a few chromaticity moments per image are required) and constant (independent of image size and content), while its retrieval effectiveness is comparable to using the full chromaticity histogram.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—A number of different approaches have been recently presented for image retrieval using color features. Most of these methods use the color histogram or some variation of it. If the extracted information is to be stored for each image, such methods may require a significant amount of space for storing the histogram, depending on a given image's size and content. In the method proposed in this paper, only a small number of features, called chromaticity moments, are required to capture the spectral content (chrominance) of an image. The proposed method is based on the concept of the chromaticity diagram and extracts a set of two-dimensional moments from it to characterize the shape and distribution of chromaticities of the given image. This representation is compact (only a few chromaticity moments per image are required) and constant (independent of image size and content), while its retrieval effectiveness is comparable to using the full chromaticity histogram.", "title": "Image Content-Based Retrieval Using Chromaticity Moments", "normalizedTitle": "Image Content-Based Retrieval Using Chromaticity Moments", "fno": "k1069", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Image Retrieval", "Color Processing", "Histogram", "Chromaticity", "Color Spaces" ], "authors": [ { "givenName": "George", "surname": "Paschos", "fullName": "George Paschos", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Ivan", "surname": "Radev", "fullName": "Ivan Radev", "affiliation": "IEEE", "__typename": "ArticleAuthorType" }, { "givenName": "Nagarajan", "surname": "Prabakar", "fullName": "Nagarajan Prabakar", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "05", "pubDate": "2003-09-01 00:00:00", "pubType": "trans", "pages": "1069-1072", "year": "2003", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "k1059", "articleId": "13rRUEgs2Mh", "__typename": "AdjacentArticleType" }, "next": { "fno": "k1073", "articleId": "13rRUxZzAhR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNx8fieR", "title": "March", "year": "2012", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "18", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPi6", "doi": "10.1109/TVCG.2011.54", "abstract": "In many scientific simulations, the temporal variation and analysis of features are important. Visualization and visual analysis of time series data is still a significant challenge because of the large volume of data. Irregular and scattered time series data sets are even more problematic to visualize interactively. Previous work proposed functional representation using basis functions as one solution for interactively visualizing scattered data by harnessing the power of modern PC graphics boards. In this paper, we use the functional representation approach for time-varying data sets and develop an efficient encoding technique utilizing temporal similarity between time steps. Our system utilizes a graduated approach of three methods with increasing time complexity based on the lack of similarity of the evolving data sets. Using this system, we are able to enhance the encoding performance for the time-varying data sets, reduce the data storage by saving only changed or additional basis functions over time, and interactively visualize the time-varying encoding results. Moreover, we present efficient rendering of the functional representations using binary space partitioning tree textures to increase the rendering performance.", "abstracts": [ { "abstractType": "Regular", "content": "In many scientific simulations, the temporal variation and analysis of features are important. Visualization and visual analysis of time series data is still a significant challenge because of the large volume of data. Irregular and scattered time series data sets are even more problematic to visualize interactively. Previous work proposed functional representation using basis functions as one solution for interactively visualizing scattered data by harnessing the power of modern PC graphics boards. In this paper, we use the functional representation approach for time-varying data sets and develop an efficient encoding technique utilizing temporal similarity between time steps. Our system utilizes a graduated approach of three methods with increasing time complexity based on the lack of similarity of the evolving data sets. Using this system, we are able to enhance the encoding performance for the time-varying data sets, reduce the data storage by saving only changed or additional basis functions over time, and interactively visualize the time-varying encoding results. Moreover, we present efficient rendering of the functional representations using binary space partitioning tree textures to increase the rendering performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In many scientific simulations, the temporal variation and analysis of features are important. Visualization and visual analysis of time series data is still a significant challenge because of the large volume of data. Irregular and scattered time series data sets are even more problematic to visualize interactively. Previous work proposed functional representation using basis functions as one solution for interactively visualizing scattered data by harnessing the power of modern PC graphics boards. In this paper, we use the functional representation approach for time-varying data sets and develop an efficient encoding technique utilizing temporal similarity between time steps. Our system utilizes a graduated approach of three methods with increasing time complexity based on the lack of similarity of the evolving data sets. Using this system, we are able to enhance the encoding performance for the time-varying data sets, reduce the data storage by saving only changed or additional basis functions over time, and interactively visualize the time-varying encoding results. Moreover, we present efficient rendering of the functional representations using binary space partitioning tree textures to increase the rendering performance.", "title": "Time-Varying Data Visualization Using Functional Representations", "normalizedTitle": "Time-Varying Data Visualization Using Functional Representations", "fno": "ttg2012030421", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Basis Functions", "Functional Representation", "Time Varying Data", "Volume Rendering" ], "authors": [ { "givenName": "Yun", "surname": "Jang", "fullName": "Yun Jang", "affiliation": "ETH Zurich, Zurich and Sejong University, Seoul", "__typename": "ArticleAuthorType" }, { "givenName": "David S.", "surname": "Ebert", "fullName": "David S. Ebert", "affiliation": "Purdue University, West Lafayette", "__typename": "ArticleAuthorType" }, { "givenName": "Kelly", "surname": "Gaither", "fullName": "Kelly Gaither", "affiliation": "The University of Texas at Austin, Austin", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2012-03-01 00:00:00", "pubType": "trans", "pages": "421-433", "year": "2012", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2004/8788/0/87880147", "title": "Visibility Culling for Time-Varying Volume Rendering Using Temporal Occlusion Coherence", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880147/12OmNAY79mS", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2011/4602/0/4602a205", "title": "A Smart Compression Scheme for GPU-Accelerated Volume Rendering of Time-Varying Data", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2011/4602a205/12OmNrnJ6SL", "parentPublication": { "id": "proceedings/icvrv/2011/4602/0", "title": "2011 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1999/5897/0/58970062", "title": "A Fast Volume Rendering Algorithm for Time-Varying Fields Using a Time-Space Partitioning (TSP) Tree", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1999/58970062/12OmNxA3YU5", "parentPublication": { "id": "proceedings/ieee-vis/1999/5897/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a411", "title": "An Optimal Color Mapping Strategy Based on Energy Minimization for Time-Varying Data", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a411/12OmNyuy9JR", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2000/9802/0/98020029", "title": "High Performance Visualization of Time-Varying Volume Data over a Wide-Area Network", "doi": null, "abstractUrl": "/proceedings-article/sc/2000/98020029/12OmNzC5Tra", "parentPublication": { "id": "proceedings/sc/2000/9802/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2005/05/mcg2005050072", "title": "Hardware-Assisted Feature Analysis and Visualization of Procedurally Encoded Multifield Volumetric Data", "doi": null, "abstractUrl": "/magazine/cg/2005/05/mcg2005050072/13rRUB6Sq2N", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/05/ttg2009050734", "title": "Distribution-Driven Visualization of Volume Data", "doi": null, "abstractUrl": "/journal/tg/2009/05/ttg2009050734/13rRUNvgyWi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061579", "title": "Interactive Volume Rendering of Functional Representations in Quantum Chemistry", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061579/13rRUwgQpDq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2003/02/c2034", "title": "Visualizing Time-Varying Volume Data", "doi": null, "abstractUrl": "/magazine/cs/2003/02/c2034/13rRUxNmPJy", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/04/v0570", "title": "An Architecture for Java-Based Real-Time Distributed Visualization", "doi": null, "abstractUrl": "/journal/tg/2003/04/v0570/13rRUxlgy3r", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2012030407", "articleId": "13rRUwInvsM", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2012030434", "articleId": "13rRUwI5TQV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzDvSjl", "title": "July", "year": "1988", "issueNum": "04", "idPrefix": "tp", "pubType": "journal", "volume": "10", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxly8Ym", "doi": "10.1109/34.3913", "abstract": "Various types of moments have been used to recognize image patterns in a number of applications. A number of moments are evaluated and some fundamental questions are addressed, such as image-representation ability, noise sensitivity, and information redundancy. Moments considered include regular moments, Legendre moments, Zernike moments, pseudo-Zernike moments, rotational moments, and complex moments. Properties of these moments are examined in detail and the interrelationships among them are discussed. Both theoretical and experimental results are presented.", "abstracts": [ { "abstractType": "Regular", "content": "Various types of moments have been used to recognize image patterns in a number of applications. A number of moments are evaluated and some fundamental questions are addressed, such as image-representation ability, noise sensitivity, and information redundancy. Moments considered include regular moments, Legendre moments, Zernike moments, pseudo-Zernike moments, rotational moments, and complex moments. Properties of these moments are examined in detail and the interrelationships among them are discussed. Both theoretical and experimental results are presented.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Various types of moments have been used to recognize image patterns in a number of applications. A number of moments are evaluated and some fundamental questions are addressed, such as image-representation ability, noise sensitivity, and information redundancy. Moments considered include regular moments, Legendre moments, Zernike moments, pseudo-Zernike moments, rotational moments, and complex moments. Properties of these moments are examined in detail and the interrelationships among them are discussed. Both theoretical and experimental results are presented.", "title": "On Image Analysis by the Methods of Moments", "normalizedTitle": "On Image Analysis by the Methods of Moments", "fno": "i0496", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Picture Processing Pattern Recognition Image Analysis Image Representation Noise Sensitivity Information Redundancy Regular Moments Legendre Moments Zernike Moments Rotational Moments Complex Moments Pattern Recognition Picture Processing" ], "authors": [ { "givenName": "C.H.", "surname": "Teh", "fullName": "C.H. Teh", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "R.T.", "surname": "Chin", "fullName": "R.T. Chin", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "04", "pubDate": "1988-07-01 00:00:00", "pubType": "trans", "pages": "496-513", "year": "1988", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0482", "articleId": "13rRUxEhFtC", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0514", "articleId": "13rRUxBJhwm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04Q", "title": "Jan.", "year": "2017", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygT7sJ", "doi": "10.1109/TVCG.2016.2598831", "abstract": "Deep convolutional neural networks (CNNs) have achieved breakthrough performance in many pattern recognition tasks such as image classification. However, the development of high-quality deep models typically relies on a substantial amount of trial-and-error, as there is still no clear understanding of when and why a deep model works. In this paper, we present a visual analytics approach for better understanding, diagnosing, and refining deep CNNs. We formulate a deep CNN as a directed acyclic graph. Based on this formulation, a hybrid visualization is developed to disclose the multiple facets of each neuron and the interactions between them. In particular, we introduce a hierarchical rectangle packing algorithm and a matrix reordering algorithm to show the derived features of a neuron cluster. We also propose a biclustering-based edge bundling method to reduce visual clutter caused by a large number of connections between neurons. We evaluated our method on a set of CNNs and the results are generally favorable.", "abstracts": [ { "abstractType": "Regular", "content": "Deep convolutional neural networks (CNNs) have achieved breakthrough performance in many pattern recognition tasks such as image classification. However, the development of high-quality deep models typically relies on a substantial amount of trial-and-error, as there is still no clear understanding of when and why a deep model works. In this paper, we present a visual analytics approach for better understanding, diagnosing, and refining deep CNNs. We formulate a deep CNN as a directed acyclic graph. Based on this formulation, a hybrid visualization is developed to disclose the multiple facets of each neuron and the interactions between them. In particular, we introduce a hierarchical rectangle packing algorithm and a matrix reordering algorithm to show the derived features of a neuron cluster. We also propose a biclustering-based edge bundling method to reduce visual clutter caused by a large number of connections between neurons. We evaluated our method on a set of CNNs and the results are generally favorable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep convolutional neural networks (CNNs) have achieved breakthrough performance in many pattern recognition tasks such as image classification. However, the development of high-quality deep models typically relies on a substantial amount of trial-and-error, as there is still no clear understanding of when and why a deep model works. In this paper, we present a visual analytics approach for better understanding, diagnosing, and refining deep CNNs. We formulate a deep CNN as a directed acyclic graph. Based on this formulation, a hybrid visualization is developed to disclose the multiple facets of each neuron and the interactions between them. In particular, we introduce a hierarchical rectangle packing algorithm and a matrix reordering algorithm to show the derived features of a neuron cluster. We also propose a biclustering-based edge bundling method to reduce visual clutter caused by a large number of connections between neurons. We evaluated our method on a set of CNNs and the results are generally favorable.", "title": "Towards Better Analysis of Deep Convolutional Neural Networks", "normalizedTitle": "Towards Better Analysis of Deep Convolutional Neural Networks", "fno": "07536654", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Neurons", "Neural Networks", "Training", "Visual Analytics", "Clustering Algorithms", "Image Edge Detection", "Biclustering", "Deep Convolutional Neural Networks", "Rectangle Packing", "Matrix Reordering", "Edge Bundling" ], "authors": [ { "givenName": "Mengchen", "surname": "Liu", "fullName": "Mengchen Liu", "affiliation": "School of Software and TNListTsinghua University", "__typename": "ArticleAuthorType" }, { "givenName": "Jiaxin", "surname": "Shi", "fullName": "Jiaxin Shi", "affiliation": "Dept. of Comp. Sci. & Tech., State Key Lab of Intell. Tech. & Sys.TNList LabCBICR Center", "__typename": "ArticleAuthorType" }, { "givenName": "Zhen", "surname": "Li", "fullName": "Zhen Li", "affiliation": "School of Software and TNListTsinghua University", "__typename": "ArticleAuthorType" }, { "givenName": "Chongxuan", "surname": "Li", "fullName": "Chongxuan Li", "affiliation": "Dept. of Comp. Sci. & Tech., State Key Lab of Intell. Tech. & Sys.TNList LabCBICR Center", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Zhu", "fullName": "Jun Zhu", "affiliation": "School of Software and TNListTsinghua University", "__typename": "ArticleAuthorType" }, { "givenName": "Shixia", "surname": "Liu", "fullName": "Shixia Liu", "affiliation": "School of Software and TNListTsinghua University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "trans", "pages": "91-100", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2019/07/08370896", "title": "Feedback Convolutional Neural Network for Visual Localization and Segmentation", "doi": null, "abstractUrl": "/journal/tp/2019/07/08370896/13rRUwdIOTs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019879", "title": "Analyzing the Training Processes of Deep Generative Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019879/13rRUxAATgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2017/2594/0/08114310", "title": "Survey on deep convolutional neural networks in mammography", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2017/08114310/1DICe5bFQJ2", "parentPublication": { "id": "proceedings/iccabs/2017/2594/0", "title": "2017 IEEE 7th International Conference on Computational Advances in Bio- and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a481", "title": "Morphological Classification of Neurons Based Deep Residual Multiscale Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a481/1MrFOSRyDVm", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802509", "title": "Analyzing the Noise Robustness of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802509/1cJ6WWAb0wo", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006069", "title": "Activation Ensembles for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006069/1hJsqC2OO7S", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a629", "title": "Deep Anchored Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a629/1iTvksNhxF6", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222510", "title": "<italic>CNN</italic>Pruner: Pruning Convolutional Neural Networks with Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222510/1nTrIuXAPRe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222325", "title": "CNN Explainer: Learning Convolutional Neural Networks with Interactive Visualization", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222325/1nTrMkbZAQg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2020/7383/0/738300a229", "title": "Fast-BCNN: Massive Neuron Skipping in Bayesian Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/micro/2020/738300a229/1oFGE53o78A", "parentPublication": { "id": "proceedings/micro/2020/7383/0", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07539323", "articleId": "13rRUxNEqPZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07539329", "articleId": "13rRUyYjKal", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1MQvcIkoAko", "title": "June", "year": "2023", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1AIIbJW1goU", "doi": "10.1109/TVCG.2022.3148107", "abstract": "Graph Neural Networks (GNNs) aim to extend deep learning techniques to graph data and have achieved significant progress in graph analysis tasks (e.g., node classification) in recent years. However, similar to other deep neural networks like Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), GNNs behave like a black box with their details hidden from model developers and users. It is therefore difficult to diagnose possible errors of GNNs. Despite many visual analytics studies being done on CNNs and RNNs, little research has addressed the challenges for GNNs. This paper fills the research gap with an interactive visual analysis tool, <italic>GNNLens</italic>, to assist model developers and users in understanding and analyzing GNNs. Specifically, Parallel Sets View and Projection View enable users to quickly identify and validate error patterns in the set of wrong predictions; Graph View and Feature Matrix View offer a detailed analysis of individual nodes to assist users in forming hypotheses about the error patterns. Since GNNs jointly model the graph structure and the node features, we reveal the relative influences of the two types of information by comparing the predictions of three models: GNN, Multi-Layer Perceptron (MLP), and GNN Without Using Features (GNNWUF). Two case studies and interviews with domain experts demonstrate the effectiveness of <italic>GNNLens</italic> in facilitating the understanding of GNN models and their errors.", "abstracts": [ { "abstractType": "Regular", "content": "Graph Neural Networks (GNNs) aim to extend deep learning techniques to graph data and have achieved significant progress in graph analysis tasks (e.g., node classification) in recent years. However, similar to other deep neural networks like Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), GNNs behave like a black box with their details hidden from model developers and users. It is therefore difficult to diagnose possible errors of GNNs. Despite many visual analytics studies being done on CNNs and RNNs, little research has addressed the challenges for GNNs. This paper fills the research gap with an interactive visual analysis tool, <italic>GNNLens</italic>, to assist model developers and users in understanding and analyzing GNNs. Specifically, Parallel Sets View and Projection View enable users to quickly identify and validate error patterns in the set of wrong predictions; Graph View and Feature Matrix View offer a detailed analysis of individual nodes to assist users in forming hypotheses about the error patterns. Since GNNs jointly model the graph structure and the node features, we reveal the relative influences of the two types of information by comparing the predictions of three models: GNN, Multi-Layer Perceptron (MLP), and GNN Without Using Features (GNNWUF). Two case studies and interviews with domain experts demonstrate the effectiveness of <italic>GNNLens</italic> in facilitating the understanding of GNN models and their errors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph Neural Networks (GNNs) aim to extend deep learning techniques to graph data and have achieved significant progress in graph analysis tasks (e.g., node classification) in recent years. However, similar to other deep neural networks like Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), GNNs behave like a black box with their details hidden from model developers and users. It is therefore difficult to diagnose possible errors of GNNs. Despite many visual analytics studies being done on CNNs and RNNs, little research has addressed the challenges for GNNs. This paper fills the research gap with an interactive visual analysis tool, GNNLens, to assist model developers and users in understanding and analyzing GNNs. Specifically, Parallel Sets View and Projection View enable users to quickly identify and validate error patterns in the set of wrong predictions; Graph View and Feature Matrix View offer a detailed analysis of individual nodes to assist users in forming hypotheses about the error patterns. Since GNNs jointly model the graph structure and the node features, we reveal the relative influences of the two types of information by comparing the predictions of three models: GNN, Multi-Layer Perceptron (MLP), and GNN Without Using Features (GNNWUF). Two case studies and interviews with domain experts demonstrate the effectiveness of GNNLens in facilitating the understanding of GNN models and their errors.", "title": "<italic>GNNLens</italic>: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks", "normalizedTitle": "GNNLens: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks", "fno": "09705076", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Analytical Models", "Deep Learning", "Predictive Models", "Visual Analytics", "Data Models", "Convolutional Neural Networks", "Task Analysis", "Graph Neural Networks", "Error Diagnosis", "Visualization" ], "authors": [ { "givenName": "Zhihua", "surname": "Jin", "fullName": "Zhihua Jin", "affiliation": "Hong Kong University of Science and Technology, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong", "surname": "Wang", "fullName": "Yong Wang", "affiliation": "Singapore Management University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Qianwen", "surname": "Wang", "fullName": "Qianwen Wang", "affiliation": "Harvard University, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yao", "surname": "Ming", "fullName": "Yao Ming", "affiliation": "Bloomberg LP, New York, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Tengfei", "surname": "Ma", "fullName": "Tengfei Ma", "affiliation": "IBM T. J. Watson Research Center, Yorktown Heights, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Huamin", "surname": "Qu", "fullName": "Huamin Qu", "affiliation": "Hong Kong University of Science and Technology, Hong Kong, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2023-06-01 00:00:00", "pubType": "trans", "pages": "3024-3038", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ism/2021/3734/0/373400a249", "title": "Edge-Level Explanations for Graph Neural Networks by Extending Explainability Methods for Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/ism/2021/373400a249/1A3j8OOLHa0", "parentPublication": { "id": "proceedings/ism/2021/3734/0", "title": "2021 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/06/09861728", "title": "&#x3C;italic&#x3E;SUBPLEX&#x3C;/italic&#x3E;: A Visual Analytics Approach to Understand Local Model Explanations at the Subpopulation Level", "doi": null, "abstractUrl": "/magazine/cg/2022/06/09861728/1FWhZ4WX0Ji", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2022/02/09837798", "title": "PreGNN: Hardware Acceleration to Take Preprocessing Off the Critical Path in Graph Neural Networks", "doi": null, "abstractUrl": "/journal/ca/2022/02/09837798/1FdIDQMyl20", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/06/10081322", "title": "How Does Attention Work in Vision Transformers? A Visual Analytics Attempt", "doi": null, "abstractUrl": "/journal/tg/2023/06/10081322/1LRbRtJhrG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222510", "title": "<italic>CNN</italic>Pruner: Pruning Convolutional Neural Networks with Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222510/1nTrIuXAPRe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09540311", "title": "Eigen-GNN: A Graph Structure Preserving Plug-in for GNNs", "doi": null, "abstractUrl": "/journal/tk/2023/03/09540311/1wWCbkQuLrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09547794", "title": "Higher-Order Explanations of Graph Neural Networks via Relevant Walks", "doi": null, "abstractUrl": "/journal/tp/2022/11/09547794/1x9Tw52fo0o", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552909", "title": "<italic>Where Can We Help</italic>? A Visual Analytics Approach to Diagnosing and Improving Semantic Segmentation of Movable Objects", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552909/1xibW2zLd9C", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09606581", "title": "Adaptive Graph Auto-Encoder for General Data Clustering", "doi": null, "abstractUrl": "/journal/tp/2022/12/09606581/1ymELIevIpq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/04/09638331", "title": "MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph", "doi": null, "abstractUrl": "/journal/bd/2022/04/09638331/1z77HnrOpl6", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09695348", "articleId": "1AvqJHyHeO4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09705143", "articleId": "1AIIcwNiqxq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1MQvgAImXVS", "name": "ttg202306-09705076s1-supp2-3148107.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202306-09705076s1-supp2-3148107.pdf", "extension": "pdf", "size": "4.29 MB", "__typename": "WebExtraType" }, { "id": "1MQvgEKJaEM", "name": "ttg202306-09705076s1-supp1-3148107.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202306-09705076s1-supp1-3148107.mp4", "extension": "mp4", "size": "36.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nJsFIg64us", "doi": "10.1109/TVCG.2020.3028956", "abstract": "An important approach for scientific inquiry across many disciplines involves using observational time series data to understand the relationships between key variables to gain mechanistic insights into the underlying rules that govern the given system. In real systems, such as those found in ecology, the relationships between time series variables are generally not static; instead, these relationships are dynamical and change in a nonlinear or state-dependent manner. To further understand such systems, we investigate integrating methods that appropriately characterize these dynamics (i.e., methods that measure interactions as they change with time-varying system states) with visualization techniques that can help analyze the behavior of the system. Here, we focus on empirical dynamic modeling (EDM) as a state-of-the-art method that specifically identifies causal variables and measures changing state-dependent relationships between time series variables. Instead of using approaches centered on parametric equations, EDM is an equation-free approach that studies systems based on their dynamic attractors. We propose a visual analytics system to support the identification and mechanistic interpretation of system states using an EDM-constructed dynamic graph. This work, as detailed in four analysis tasks and demonstrated with a GUI, provides a novel synthesis of EDM and visualization techniques such as brush-link visualization and visual summarization to interpret dynamic graphs representing ecosystem dynamics. We applied our proposed system to ecological simulation data and real data from a marine mesocosm study as two key use cases. Our case studies show that our visual analytics tools support the identification and interpretation of the system state by the user, and enable us to discover both confirmatory and new findings in ecosystem dynamics. Overall, we demonstrated that our system can facilitate an understanding of how systems function beyond the intuitive analysis of high-dimensional information based on specific domain knowledge.", "abstracts": [ { "abstractType": "Regular", "content": "An important approach for scientific inquiry across many disciplines involves using observational time series data to understand the relationships between key variables to gain mechanistic insights into the underlying rules that govern the given system. In real systems, such as those found in ecology, the relationships between time series variables are generally not static; instead, these relationships are dynamical and change in a nonlinear or state-dependent manner. To further understand such systems, we investigate integrating methods that appropriately characterize these dynamics (i.e., methods that measure interactions as they change with time-varying system states) with visualization techniques that can help analyze the behavior of the system. Here, we focus on empirical dynamic modeling (EDM) as a state-of-the-art method that specifically identifies causal variables and measures changing state-dependent relationships between time series variables. Instead of using approaches centered on parametric equations, EDM is an equation-free approach that studies systems based on their dynamic attractors. We propose a visual analytics system to support the identification and mechanistic interpretation of system states using an EDM-constructed dynamic graph. This work, as detailed in four analysis tasks and demonstrated with a GUI, provides a novel synthesis of EDM and visualization techniques such as brush-link visualization and visual summarization to interpret dynamic graphs representing ecosystem dynamics. We applied our proposed system to ecological simulation data and real data from a marine mesocosm study as two key use cases. Our case studies show that our visual analytics tools support the identification and interpretation of the system state by the user, and enable us to discover both confirmatory and new findings in ecosystem dynamics. Overall, we demonstrated that our system can facilitate an understanding of how systems function beyond the intuitive analysis of high-dimensional information based on specific domain knowledge.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An important approach for scientific inquiry across many disciplines involves using observational time series data to understand the relationships between key variables to gain mechanistic insights into the underlying rules that govern the given system. In real systems, such as those found in ecology, the relationships between time series variables are generally not static; instead, these relationships are dynamical and change in a nonlinear or state-dependent manner. To further understand such systems, we investigate integrating methods that appropriately characterize these dynamics (i.e., methods that measure interactions as they change with time-varying system states) with visualization techniques that can help analyze the behavior of the system. Here, we focus on empirical dynamic modeling (EDM) as a state-of-the-art method that specifically identifies causal variables and measures changing state-dependent relationships between time series variables. Instead of using approaches centered on parametric equations, EDM is an equation-free approach that studies systems based on their dynamic attractors. We propose a visual analytics system to support the identification and mechanistic interpretation of system states using an EDM-constructed dynamic graph. This work, as detailed in four analysis tasks and demonstrated with a GUI, provides a novel synthesis of EDM and visualization techniques such as brush-link visualization and visual summarization to interpret dynamic graphs representing ecosystem dynamics. We applied our proposed system to ecological simulation data and real data from a marine mesocosm study as two key use cases. Our case studies show that our visual analytics tools support the identification and interpretation of the system state by the user, and enable us to discover both confirmatory and new findings in ecosystem dynamics. Overall, we demonstrated that our system can facilitate an understanding of how systems function beyond the intuitive analysis of high-dimensional information based on specific domain knowledge.", "title": "A Visual Analytics Approach for Ecosystem Dynamics based on Empirical Dynamic Modeling", "normalizedTitle": "A Visual Analytics Approach for Ecosystem Dynamics based on Empirical Dynamic Modeling", "fno": "09216532", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Biology Computing", "Data Analysis", "Data Visualisation", "Ecology", "Graph Theory", "Graphical User Interfaces", "GUI", "Time Varying System States", "State Dependent Manner", "Time Series Variables", "Mechanistic Insights", "Observational Time Series Data", "Empirical Dynamic Modeling", "Visual Analytics Approach", "Visual Analytics Tools", "Ecological Simulation Data", "Ecosystem Dynamics", "Dynamic Graphs", "Visual Summarization", "Brush Link Visualization", "Visualization Techniques", "EDM Constructed Dynamic Graph", "Visual Analytics System", "Equation Free Approach", "Visual Analytics", "Time Series Analysis", "Data Visualization", "Ecosystems", "Task Analysis", "Time Measurement", "Ecology", "Visual Analytics", "Empirical Dynamic Modeling", "Dynamic Network", "Exploratory Data Analysis" ], "authors": [ { "givenName": "Hiroaki", "surname": "Natsukawa", "fullName": "Hiroaki Natsukawa", "affiliation": "Kyoto University", "__typename": "ArticleAuthorType" }, { "givenName": "Ethan R.", "surname": "Deyle", "fullName": "Ethan R. Deyle", "affiliation": "Boston University", "__typename": "ArticleAuthorType" }, { "givenName": "Gerald M.", "surname": "Pao", "fullName": "Gerald M. Pao", "affiliation": "Salk Institution for Biological Sciences", "__typename": "ArticleAuthorType" }, { "givenName": "Koji", "surname": "Koyamada", "fullName": "Koji Koyamada", "affiliation": "Kyoto University", "__typename": "ArticleAuthorType" }, { "givenName": "George", "surname": "Sugihara", "fullName": "George Sugihara", "affiliation": "Scripps Institution of Oceanography, University of California, San Diego", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "506-516", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718613", "title": "Describing Temporal Correlation Spatially in a Visual Analytics Environment", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718613/12OmNvpNIoc", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pma/2006/2851/0/2851a209", "title": "Biometrical Models as Tools for Forest Ecosystem Management", "doi": null, "abstractUrl": "/proceedings-article/pma/2006/2851a209/12OmNyqRn3k", "parentPublication": { "id": "proceedings/pma/2006/2851/0", "title": "2006 Second International Symposium on Plant Growth Modeling, Simulation, Visualization and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08037991", "title": "A Visual Analytics Framework for Identifying Topic Drivers in Media Events", "doi": null, "abstractUrl": "/journal/tg/2018/09/08037991/13rRUxASuhI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122899", "title": "A Visual Analytics Approach to Multiscale Exploration of Environmental Time Series", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122899/13rRUxDqS8g", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876015", "title": "VAET: A Visual Analytics Approach for E-Transactions Time-Series", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876015/13rRUyYSWl1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903340", "title": "RISeer: Inspecting the Status and Dynamics of Regional Industrial Structure via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903340/1GZomXUgXNm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006235", "title": "Hybrid 2D and 3D Visual Analytics of Network Simulation Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006235/1hJspq9r0KA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2020/9074/0/907400a196", "title": "Massively Parallel Causal Inference of Whole Brain Dynamics at Single Neuron Resolution", "doi": null, "abstractUrl": "/proceedings-article/icpads/2020/907400a196/1rvCw0LZ33O", "parentPublication": { "id": "proceedings/icpads/2020/9074/0", "title": "2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a051", "title": "NetScatter: Visual analytics of multivariate time series with a hybrid of dynamic and static variable relationships", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a051/1tTtrcoidWg", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09511808", "title": "VisInReport: Complementing Visual Discourse Analytics Through Personalized Insight Reports", "doi": null, "abstractUrl": "/journal/tg/2022/12/09511808/1vYRHccYKDS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09222280", "articleId": "1nTqVJBaroA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09222072", "articleId": "1nTqwNTE1AQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLddqZjeBq", "name": "ttg202102-09216532s1-supp1-3028956.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216532s1-supp1-3028956.pdf", "extension": "pdf", "size": "464 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwFid7w", "title": "Jan.", "year": "2019", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45Vw15wK", "doi": "10.1109/TVCG.2018.2864853", "abstract": "There currently exist two dominant strategies to reduce data sizes in analysis and visualization: reducing the precision of the data, e.g., through quantization, or reducing its resolution, e.g., by subsampling. Both have advantages and disadvantages and both face fundamental limits at which the reduced information ceases to be useful. The paper explores the additional gains that could be achieved by combining both strategies. In particular, we present a common framework that allows us to study the trade-off in reducing precision and/or resolution in a principled manner. We represent data reduction schemes as progressive streams of bits and study how various bit orderings such as by resolution, by precision, etc., impact the resulting approximation error across a variety of data sets as well as analysis tasks. Furthermore, we compute streams that are optimized for different tasks to serve as lower bounds on the achievable error. Scientific data management systems can use the results presented in this paper as guidance on how to store and stream data to make efficient use of the limited storage and bandwidth in practice.", "abstracts": [ { "abstractType": "Regular", "content": "There currently exist two dominant strategies to reduce data sizes in analysis and visualization: reducing the precision of the data, e.g., through quantization, or reducing its resolution, e.g., by subsampling. Both have advantages and disadvantages and both face fundamental limits at which the reduced information ceases to be useful. The paper explores the additional gains that could be achieved by combining both strategies. In particular, we present a common framework that allows us to study the trade-off in reducing precision and/or resolution in a principled manner. We represent data reduction schemes as progressive streams of bits and study how various bit orderings such as by resolution, by precision, etc., impact the resulting approximation error across a variety of data sets as well as analysis tasks. Furthermore, we compute streams that are optimized for different tasks to serve as lower bounds on the achievable error. Scientific data management systems can use the results presented in this paper as guidance on how to store and stream data to make efficient use of the limited storage and bandwidth in practice.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There currently exist two dominant strategies to reduce data sizes in analysis and visualization: reducing the precision of the data, e.g., through quantization, or reducing its resolution, e.g., by subsampling. Both have advantages and disadvantages and both face fundamental limits at which the reduced information ceases to be useful. The paper explores the additional gains that could be achieved by combining both strategies. In particular, we present a common framework that allows us to study the trade-off in reducing precision and/or resolution in a principled manner. We represent data reduction schemes as progressive streams of bits and study how various bit orderings such as by resolution, by precision, etc., impact the resulting approximation error across a variety of data sets as well as analysis tasks. Furthermore, we compute streams that are optimized for different tasks to serve as lower bounds on the achievable error. Scientific data management systems can use the results presented in this paper as guidance on how to store and stream data to make efficient use of the limited storage and bandwidth in practice.", "title": "A Study of the Trade-off Between Reducing Precision and Reducing Resolution for Data Analysis and Visualization", "normalizedTitle": "A Study of the Trade-off Between Reducing Precision and Reducing Resolution for Data Analysis and Visualization", "fno": "08440822", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Compression", "Data Reduction", "Data Visualisation", "Optimisation", "Reducing Precision", "Reducing Resolution", "Data Analysis", "Data Reduction Schemes", "Bit Orderings", "Scientific Data Management Systems", "Approximation Error", "Data Visualization", "Data Precision", "Task Analysis", "Spatial Resolution", "Transforms", "Data Visualization", "Data Analysis", "Rendering Computer Graphics", "Data Compression", "Bit Ordering", "Multi Resolution", "Data Analysis" ], "authors": [ { "givenName": "Duong", "surname": "Hoang", "fullName": "Duong Hoang", "affiliation": "SCI Institute, University of Utah, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Pavol", "surname": "Klacansky", "fullName": "Pavol Klacansky", "affiliation": "SCI Institute, University of Utah, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Harsh", "surname": "Bhatia", "fullName": "Harsh Bhatia", "affiliation": "Lawrence Livemore National Laboratory, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Peer-Timo", "surname": "Bremer", "fullName": "Peer-Timo Bremer", "affiliation": "Lawrence Livemore National Laboratory, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Lindstrom", "fullName": "Peter Lindstrom", "affiliation": "Lawrence Livemore National Laboratory, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Valerio", "surname": "Pascucci", "fullName": "Valerio Pascucci", "affiliation": "SCI Institute, University of Utah, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "trans", "pages": "1193-1203", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vrais/1995/7084/0/70840067", "title": "Visual resolution and spatial performance: the trade-off between resolution and interactivity", "doi": null, "abstractUrl": "/proceedings-article/vrais/1995/70840067/12OmNrAMEXL", "parentPublication": { "id": "proceedings/vrais/1995/7084/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209e435", "title": "An Evaluation of the Faster STORM Method for Super-resolution Microscopy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209e435/12OmNx3q73A", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candar/2014/4152/0/4152a185", "title": "Auto-Parallelization for a Video Processing Library with Content-Aware Resolution Management", "doi": null, "abstractUrl": "/proceedings-article/candar/2014/4152a185/12OmNym2bZD", "parentPublication": { "id": "proceedings/candar/2014/4152/0", "title": "2014 Second International Symposium on Computing and Networking (CANDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2007/02/mcg2007020043", "title": "Exploring Defocus Matting: Nonparametric Acceleration, Super-Resolution, and Off-Center Matting", "doi": null, "abstractUrl": "/magazine/cg/2007/02/mcg2007020043/13rRUwvT9jv", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2019/03/08600372", "title": "Integration of Wireless Sensor Networks and Smart UAVs for Precision Viticulture", "doi": null, "abstractUrl": "/magazine/ic/2019/03/08600372/17D45X0yjTY", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e862", "title": "EvIntSR-Net: Event Guided Multiple Latent Frames Reconstruction and Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e862/1BmG5NkgY0M", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09751449", "title": "AMM: Adaptive Multilinear Meshes", "doi": null, "abstractUrl": "/journal/tg/2022/06/09751449/1CpcEXDpWIE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09920542", "title": "Deep Hierarchical Super Resolution for Scientific Data", "doi": null, "abstractUrl": "/journal/tg/5555/01/09920542/1HxSntuIBnW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/08918030", "title": "Volumetric Isosurface Rendering with Deep Learning-Based Super-Resolution", "doi": null, "abstractUrl": "/journal/tg/2021/06/08918030/1fm1QUuzRAI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222049", "title": "Efficient and Flexible Hierarchical Data Layouts for a Unified Encoding of Scalar Field Precision and Resolution", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222049/1nTrPy5zy5a", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08440824", "articleId": "17D45Xh13tG", "__typename": "AdjacentArticleType" }, "next": { "fno": "08440109", "articleId": "17D45WaTkhY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1JIoNANhmqk", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "ts", "pubType": "journal", "volume": "49", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ADJi2dqnwA", "doi": "10.1109/TSE.2022.3147975", "abstract": "Event-driven programming is widely practiced in the JavaScript community, both on the client side to handle UI events and AJAX requests, and on the server side to accommodate long-running operations such as file or network I/O. Many popular event-based APIs allow event names to be specified as free-form strings without any validation, potentially leading to <italic>lost events</italic> for which no listener has been registered and <italic>dead listeners</italic> for events that are never emitted. In previous work, Madsen <italic>et al.</italic> presented a precise static analysis for detecting such problems, but their analysis does not scale because it may require a number of contexts that is exponential in the size of the program. Concentrating on the problem of detecting dead listeners, we present an approach to <italic>learn</italic> how to use event-based APIs by first mining a large corpus of JavaScript code using a simple static analysis to identify code snippets that register an event listener, and then applying statistical modeling to identify anomalous patterns, which often indicate incorrect API usage. In a large-scale evaluation on 127,531 open-source JavaScript code bases, our technique was able to detect 75 anomalous listener-registration patterns, while maintaining a precision of 90.9&#x0025; and recall of 7.5&#x0025; over a validation set, demonstrating that a learning-based approach to detecting event-handling bug patterns is feasible. In an additional experiment, we investigated instances of these patterns in 25 open-source projects, and reported 30 issues to the project maintainers, of which 7 have been confirmed as bugs.", "abstracts": [ { "abstractType": "Regular", "content": "Event-driven programming is widely practiced in the JavaScript community, both on the client side to handle UI events and AJAX requests, and on the server side to accommodate long-running operations such as file or network I/O. Many popular event-based APIs allow event names to be specified as free-form strings without any validation, potentially leading to <italic>lost events</italic> for which no listener has been registered and <italic>dead listeners</italic> for events that are never emitted. In previous work, Madsen <italic>et al.</italic> presented a precise static analysis for detecting such problems, but their analysis does not scale because it may require a number of contexts that is exponential in the size of the program. Concentrating on the problem of detecting dead listeners, we present an approach to <italic>learn</italic> how to use event-based APIs by first mining a large corpus of JavaScript code using a simple static analysis to identify code snippets that register an event listener, and then applying statistical modeling to identify anomalous patterns, which often indicate incorrect API usage. In a large-scale evaluation on 127,531 open-source JavaScript code bases, our technique was able to detect 75 anomalous listener-registration patterns, while maintaining a precision of 90.9&#x0025; and recall of 7.5&#x0025; over a validation set, demonstrating that a learning-based approach to detecting event-handling bug patterns is feasible. In an additional experiment, we investigated instances of these patterns in 25 open-source projects, and reported 30 issues to the project maintainers, of which 7 have been confirmed as bugs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Event-driven programming is widely practiced in the JavaScript community, both on the client side to handle UI events and AJAX requests, and on the server side to accommodate long-running operations such as file or network I/O. Many popular event-based APIs allow event names to be specified as free-form strings without any validation, potentially leading to lost events for which no listener has been registered and dead listeners for events that are never emitted. In previous work, Madsen et al. presented a precise static analysis for detecting such problems, but their analysis does not scale because it may require a number of contexts that is exponential in the size of the program. Concentrating on the problem of detecting dead listeners, we present an approach to learn how to use event-based APIs by first mining a large corpus of JavaScript code using a simple static analysis to identify code snippets that register an event listener, and then applying statistical modeling to identify anomalous patterns, which often indicate incorrect API usage. In a large-scale evaluation on 127,531 open-source JavaScript code bases, our technique was able to detect 75 anomalous listener-registration patterns, while maintaining a precision of 90.9% and recall of 7.5% over a validation set, demonstrating that a learning-based approach to detecting event-handling bug patterns is feasible. In an additional experiment, we investigated instances of these patterns in 25 open-source projects, and reported 30 issues to the project maintainers, of which 7 have been confirmed as bugs.", "title": "Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs", "normalizedTitle": "Learning How to Listen: Automatically Finding Bug Patterns in Event-Driven JavaScript APIs", "fno": "09699408", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Application Program Interfaces", "Internet", "Java", "Learning Artificial Intelligence", "Program Debugging", "Program Diagnostics", "Programming", "127 Source Java Script Code Bases", "531 Open Source Java Script Code Bases", "Anomalous Listener Registration Patterns", "Anomalous Patterns", "Automatically Finding Bug Patterns", "Dead Listeners", "Detecting Event Handling Bug Patterns", "Event Listener", "Event Names", "Event Based AP Is", "Event Driven Java Script AP Is", "Event Driven Programming", "Free Form Strings", "Incorrect API Usage", "Java Script Community", "Learning Based Approach", "Precise Static Analysis", "Simple Static Analysis", "UI Events", "Computer Bugs", "Codes", "Registers", "Open Source Software", "Programming", "Static Analysis", "Libraries", "Static Analysis", "Java Script", "Event Driven Programming", "Bug Finding", "API Modeling" ], "authors": [ { "givenName": "Ellen", "surname": "Arteca", "fullName": "Ellen Arteca", "affiliation": "Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Max", "surname": "Schäfer", "fullName": "Max Schäfer", "affiliation": "GitHub, Oxford, U.K", "__typename": "ArticleAuthorType" }, { "givenName": "Frank", "surname": "Tip", "fullName": "Frank Tip", "affiliation": "Khoury College of Computer Sciences, Northeastern University, Boston, MA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "166-184", "year": "2023", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sp/2017/5533/0/07958598", "title": "Finding and Preventing Bugs in JavaScript Bindings", "doi": null, "abstractUrl": "/proceedings-article/sp/2017/07958598/12OmNqG0T5G", "parentPublication": { "id": "proceedings/sp/2017/5533/0", "title": "2017 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115720", "title": "Characterizing and taming non-deterministic bugs in Javascript applications", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115720/12OmNviHKaP", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/formalise/2017/0422/0/07967996", "title": "Partition-Based Coverage Metrics and Type-Guided Search in Concolic Testing for JavaScript Applications", "doi": null, "abstractUrl": "/proceedings-article/formalise/2017/07967996/12OmNwekjxn", "parentPublication": { "id": "proceedings/formalise/2017/0422/0", "title": "2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100b494", "title": "Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100b494/1EmrWl7hvtS", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a094", "title": "An Exploratory Study of Analyzing JavaScript Online Code Clones", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a094/1EpKI5vJzY4", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/5555/01/10108937", "title": "JavaScript Dead Code Identification, Elimination, and Empirical Assessment", "doi": null, "abstractUrl": "/journal/ts/5555/01/10108937/1MDGlfpbCo0", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2020/9248/0/924800a215", "title": "Optimizing Away JavaScript Obfuscation", "doi": null, "abstractUrl": "/proceedings-article/scam/2020/924800a215/1oFGYX6Wwuc", "parentPublication": { "id": "proceedings/scam/2020/9248/0", "title": "2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2020/6768/0/676800a385", "title": "Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports", "doi": null, "abstractUrl": "/proceedings-article/ase/2020/676800a385/1pP3M0V3hQI", "parentPublication": { "id": "proceedings/ase/2020/6768/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600a970", "title": "Automatically Matching Bug Reports With Related App Reviews", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600a970/1sEXoPjOFzy", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/10/09519532", "title": "Dependency Smells in JavaScript Projects", "doi": null, "abstractUrl": "/journal/ts/2022/10/09519532/1wc8U3FaaNq", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09699412", "articleId": "1ADJiatMlj2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09705152", "articleId": "1AIIp0fFuaQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1JIoPsJ0080", "name": "tts202301-09699408s1-supp1-3147975.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tts202301-09699408s1-supp1-3147975.pdf", "extension": "pdf", "size": "288 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1KL777Fok6c", "title": "Feb.", "year": "2023", "issueNum": "02", "idPrefix": "ts", "pubType": "journal", "volume": "49", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1C0jiAoispi", "doi": "10.1109/TSE.2022.3162236", "abstract": "Object-sensitive pointer analysis (denoted <italic>k</italic><sc>obj</sc> under <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-limiting) for an object-oriented program can be accelerated if context-sensitivity can be selectively applied to only some precision-critical variables/objects in a program. Existing pre-analyses for making such selections, which are performed as whole-program analyses to a program, are developed based on two broad approaches. One approach preserves the precision of object-sensitive pointer analysis but achieves limited speedups by reasoning about all the possible value flows in the program conservatively, while the other approach achieves greater speedups but sacrifices precision (often unduly) by examining only some but not all the value flows in the program heuristically. In this paper, we introduce a new pre-analysis approach, <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">Z_$^{\\mathcal{m}}$_Z</tex-math></inline-formula> (where <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {m}$_Z</tex-math></inline-formula> stands for modularity), that represents a sweet spot between these two existing ones, as it is designed to enable <italic>k</italic><sc>obj</sc> to run significantly faster than the former approach and achieve significantly better precision than the latter approach. <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">Z_$^{\\mathcal{m}}$_Z</tex-math></inline-formula> is simple, lightweight yet effective due to two novel aspects in its design. First, we exploit a key observation that some precision-uncritical objects in the program can be approximated based on the object-containment relationship pre-established (from Andersen&#x0027;s analysis). In practice, this approximation introduces only a small degree of imprecision into <italic>k</italic><sc>obj</sc>. Second, leveraging this initial approximation, we apply a novel object reachability analysis to the program by pre-analyzing its methods according to a reverse topological order of its call graph. When pre-analyzing each method, we make use of a simple DFA (Deterministic Finite Automaton) to reason about object reachability intra-procedurally from its entry to its exit along all the possible value flows established by its statements to identify its precision-critical variables/objects. In practice, this new modular object reachability analysis, which runs linearly in terms of the number of statements in the program, introduces again only a small loss of precision into <italic>k</italic><sc>obj</sc>. We have validated <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">Z_$^{\\mathcal{m}}$_Z</tex-math></inline-formula> with an open-source implementation in <sc>Soot</sc> (already publicly available) against the state of the art by using a set of 12 widely used Java benchmarks and applications.", "abstracts": [ { "abstractType": "Regular", "content": "Object-sensitive pointer analysis (denoted <italic>k</italic><sc>obj</sc> under <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"he-ieq1-3162236.gif\"/></alternatives></inline-formula>-limiting) for an object-oriented program can be accelerated if context-sensitivity can be selectively applied to only some precision-critical variables/objects in a program. Existing pre-analyses for making such selections, which are performed as whole-program analyses to a program, are developed based on two broad approaches. One approach preserves the precision of object-sensitive pointer analysis but achieves limited speedups by reasoning about all the possible value flows in the program conservatively, while the other approach achieves greater speedups but sacrifices precision (often unduly) by examining only some but not all the value flows in the program heuristically. In this paper, we introduce a new pre-analysis approach, <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">$^{\\mathcal{m}}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mi mathvariant=\"script\">m</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"he-ieq2-3162236.gif\"/></alternatives></inline-formula> (where <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {m}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"script\">m</mml:mi></mml:math><inline-graphic xlink:href=\"he-ieq3-3162236.gif\"/></alternatives></inline-formula> stands for modularity), that represents a sweet spot between these two existing ones, as it is designed to enable <italic>k</italic><sc>obj</sc> to run significantly faster than the former approach and achieve significantly better precision than the latter approach. <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">$^{\\mathcal{m}}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mi mathvariant=\"script\">m</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"he-ieq4-3162236.gif\"/></alternatives></inline-formula> is simple, lightweight yet effective due to two novel aspects in its design. First, we exploit a key observation that some precision-uncritical objects in the program can be approximated based on the object-containment relationship pre-established (from Andersen&#x0027;s analysis). In practice, this approximation introduces only a small degree of imprecision into <italic>k</italic><sc>obj</sc>. Second, leveraging this initial approximation, we apply a novel object reachability analysis to the program by pre-analyzing its methods according to a reverse topological order of its call graph. When pre-analyzing each method, we make use of a simple DFA (Deterministic Finite Automaton) to reason about object reachability intra-procedurally from its entry to its exit along all the possible value flows established by its statements to identify its precision-critical variables/objects. In practice, this new modular object reachability analysis, which runs linearly in terms of the number of statements in the program, introduces again only a small loss of precision into <italic>k</italic><sc>obj</sc>. We have validated <sc>Turner</sc><inline-formula><tex-math notation=\"LaTeX\">$^{\\mathcal{m}}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mi mathvariant=\"script\">m</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"he-ieq5-3162236.gif\"/></alternatives></inline-formula> with an open-source implementation in <sc>Soot</sc> (already publicly available) against the state of the art by using a set of 12 widely used Java benchmarks and applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Object-sensitive pointer analysis (denoted kobj under --limiting) for an object-oriented program can be accelerated if context-sensitivity can be selectively applied to only some precision-critical variables/objects in a program. Existing pre-analyses for making such selections, which are performed as whole-program analyses to a program, are developed based on two broad approaches. One approach preserves the precision of object-sensitive pointer analysis but achieves limited speedups by reasoning about all the possible value flows in the program conservatively, while the other approach achieves greater speedups but sacrifices precision (often unduly) by examining only some but not all the value flows in the program heuristically. In this paper, we introduce a new pre-analysis approach, Turner- (where - stands for modularity), that represents a sweet spot between these two existing ones, as it is designed to enable kobj to run significantly faster than the former approach and achieve significantly better precision than the latter approach. Turner- is simple, lightweight yet effective due to two novel aspects in its design. First, we exploit a key observation that some precision-uncritical objects in the program can be approximated based on the object-containment relationship pre-established (from Andersen's analysis). In practice, this approximation introduces only a small degree of imprecision into kobj. Second, leveraging this initial approximation, we apply a novel object reachability analysis to the program by pre-analyzing its methods according to a reverse topological order of its call graph. When pre-analyzing each method, we make use of a simple DFA (Deterministic Finite Automaton) to reason about object reachability intra-procedurally from its entry to its exit along all the possible value flows established by its statements to identify its precision-critical variables/objects. In practice, this new modular object reachability analysis, which runs linearly in terms of the number of statements in the program, introduces again only a small loss of precision into kobj. We have validated Turner- with an open-source implementation in Soot (already publicly available) against the state of the art by using a set of 12 widely used Java benchmarks and applications.", "title": "Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis", "normalizedTitle": "Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis", "fno": "09741339", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Finite Automata", "Java", "Object Oriented Programming", "Program Diagnostics", "Reachability Analysis", "Context Sensitivity Modularly", "Deterministic Finite Automaton", "DFA", "Java Benchmarks", "Modular Object Reachability Analysis", "Object Reachability Intra Procedurally", "Object Containment Relationship", "Object Oriented Program", "Object Sensitive Pointer Analysis", "Pre Analysis Approach", "Precision Uncritical Objects", "Turner Sup M Sup", "Java", "Reachability Analysis", "Receivers", "Open Source Software", "Object Recognition", "Benchmark Testing", "Resource Management", "Object Sensitive Pointer Analysis", "CFL Reachability", "Object Containment", "Modular Static Analysis" ], "authors": [ { "givenName": "Dongjie", "surname": "He", "fullName": "Dongjie He", "affiliation": "University of New South Wales Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Jingbo", "surname": "Lu", "fullName": "Jingbo Lu", "affiliation": "University of New South Wales Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Yaoqing", "surname": "Gao", "fullName": "Yaoqing Gao", "affiliation": "Huawei, Markham, ON, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Jingling", "surname": "Xue", "fullName": "Jingling Xue", "affiliation": "University of New South Wales Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "719-742", "year": "2023", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/12/09007415", "title": "Flexible Aggregate Nearest Neighbor Queries and its Keyword-Aware Variant on Road Networks", "doi": null, "abstractUrl": "/journal/tk/2021/12/09007415/1hJKhc0u1So", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09110776", "title": "Accelerated Variance Reduction Stochastic ADMM for Large-Scale Machine Learning", "doi": null, "abstractUrl": "/journal/tp/2021/12/09110776/1kuDlRSAfuw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09262018", "title": "Few-Shot Named Entity Recognition via Meta-Learning", "doi": null, "abstractUrl": "/journal/tk/2022/09/09262018/1oPzNXzelHy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/07/09350237", "title": "Will Dependency Conflicts Affect My Program&#x0027;s Semantics?", "doi": null, "abstractUrl": "/journal/ts/2022/07/09350237/1r3lex52PFC", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09448388", "title": "A Hybrid Stochastic-Deterministic Minibatch Proximal Gradient Method for Efficient Optimization and Generalization", "doi": null, "abstractUrl": "/journal/tp/2022/10/09448388/1ugE3BTixLq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/04/09459541", "title": "<sc>gSoFa</sc>: Scalable Sparse Symbolic LU Factorization on GPUs", "doi": null, "abstractUrl": "/journal/td/2022/04/09459541/1uvA0zwhJKg", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09531369", "title": "Deletion Propagation Revisited for Multiple Key Preserving Views", "doi": null, "abstractUrl": "/journal/tk/2023/03/09531369/1wJkZcWVIE8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09540319", "title": "Extraction of Long <italic>k</italic>-mers Using Spaced Seeds", "doi": null, "abstractUrl": "/journal/tb/2022/06/09540319/1wWC92V3JbG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09739868", "articleId": "1BWZjO9PXWg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09744446", "articleId": "1C8BLxccf5e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KmyiLazy5q", "doi": "10.1109/TPAMI.2023.3240397", "abstract": "<italic>S</italic>uper-<italic>R</italic>esolution from a single motion <italic>B</italic>lurred image (SRB) is a severely ill-posed problem due to the joint degradation of motion blurs and low spatial resolution. In this paper, we employ events to alleviate the burden of SRB and propose an <italic>E</italic>vent-enhanced SRB (E-SRB) algorithm, which can generate a sequence of sharp and clear images with <italic>H</italic>igh <italic>R</italic>esolution (HR) from a single blurry image with <italic>L</italic>ow <italic>R</italic>esolution (LR). To achieve this end, we formulate an event-enhanced degeneration model to consider the low spatial resolution, motion blurs, and event noises simultaneously. We then build an <italic>e</italic>vent-enhanced <italic>S</italic>parse <italic>L</italic>earning <italic>Net</italic>work (<bold>eSL-Net++</bold>) upon a dual sparse learning scheme where both events and intensity frames are modeled with sparse representations. Furthermore, we propose an event shuffle-and-merge scheme to extend the single-frame SRB to the sequence-frame SRB without any additional training process. Experimental results on synthetic and real-world datasets show that the proposed eSL-Net++ outperforms state-of-the-art methods by a large margin. Datasets, codes, and more results are available at https://github.com/ShinyWang33/eSL-Net-Plusplus.", "abstracts": [ { "abstractType": "Regular", "content": "<italic>S</italic>uper-<italic>R</italic>esolution from a single motion <italic>B</italic>lurred image (SRB) is a severely ill-posed problem due to the joint degradation of motion blurs and low spatial resolution. In this paper, we employ events to alleviate the burden of SRB and propose an <italic>E</italic>vent-enhanced SRB (E-SRB) algorithm, which can generate a sequence of sharp and clear images with <italic>H</italic>igh <italic>R</italic>esolution (HR) from a single blurry image with <italic>L</italic>ow <italic>R</italic>esolution (LR). To achieve this end, we formulate an event-enhanced degeneration model to consider the low spatial resolution, motion blurs, and event noises simultaneously. We then build an <italic>e</italic>vent-enhanced <italic>S</italic>parse <italic>L</italic>earning <italic>Net</italic>work (<bold>eSL-Net++</bold>) upon a dual sparse learning scheme where both events and intensity frames are modeled with sparse representations. Furthermore, we propose an event shuffle-and-merge scheme to extend the single-frame SRB to the sequence-frame SRB without any additional training process. Experimental results on synthetic and real-world datasets show that the proposed eSL-Net++ outperforms state-of-the-art methods by a large margin. Datasets, codes, and more results are available at https://github.com/ShinyWang33/eSL-Net-Plusplus.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Super-Resolution from a single motion Blurred image (SRB) is a severely ill-posed problem due to the joint degradation of motion blurs and low spatial resolution. In this paper, we employ events to alleviate the burden of SRB and propose an Event-enhanced SRB (E-SRB) algorithm, which can generate a sequence of sharp and clear images with High Resolution (HR) from a single blurry image with Low Resolution (LR). To achieve this end, we formulate an event-enhanced degeneration model to consider the low spatial resolution, motion blurs, and event noises simultaneously. We then build an event-enhanced Sparse Learning Network (eSL-Net++) upon a dual sparse learning scheme where both events and intensity frames are modeled with sparse representations. Furthermore, we propose an event shuffle-and-merge scheme to extend the single-frame SRB to the sequence-frame SRB without any additional training process. Experimental results on synthetic and real-world datasets show that the proposed eSL-Net++ outperforms state-of-the-art methods by a large margin. Datasets, codes, and more results are available at https://github.com/ShinyWang33/eSL-Net-Plusplus.", "title": "Learning to Super-Resolve Blurry Images With Events", "normalizedTitle": "Learning to Super-Resolve Blurry Images With Events", "fno": "10029887", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Spatial Resolution", "Cameras", "Kernel", "Task Analysis", "Noise Reduction", "Image Reconstruction", "Degradation", "Deblurring", "Denoising", "Event Camera", "Intensity Reconstruction", "Sparse Learning", "Super Resolution" ], "authors": [ { "givenName": "Lei", "surname": "Yu", "fullName": "Lei Yu", "affiliation": "School of Electronic Information, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bishan", "surname": "Wang", "fullName": "Bishan Wang", "affiliation": "School of Electronic Information, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiang", "surname": "Zhang", "fullName": "Xiang Zhang", "affiliation": "School of Electronic Information, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Haijian", "surname": "Zhang", "fullName": "Haijian Zhang", "affiliation": "School of Electronic Information, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wen", "surname": "Yang", "fullName": "Wen Yang", "affiliation": "School of Electronic Information, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianzhuang", "surname": "Liu", "fullName": "Jianzhuang Liu", "affiliation": "Huawei Noah's Ark Lab, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Gui-Song", "surname": "Xia", "fullName": "Gui-Song Xia", "affiliation": "School of Computer Science, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851b646", "title": "Accurate Image Super-Resolution Using Very Deep Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851b646/12OmNApu5eJ", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c846", "title": "Super-resolving Noisy Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c846/12OmNB7Lvzf", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032a251", "title": "Learning to Super-Resolve Blurry Face and Text Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032a251/12OmNzYNNmq", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456025", "title": "Super-resolution and De-noising for Portrait Images Using Compressive Sensing", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456025/12OmNzzP5Ll", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itc/2010/3975/0/05460604", "title": "Super Resolution Blind Reconstruction of Low Resolution Images Using Framelets Based Fusion", "doi": null, "abstractUrl": "/proceedings-article/itc/2010/05460604/13bd1eSlysl", "parentPublication": { "id": "proceedings/itc/2010/3975/0", "title": "2010 International Conference on Recent Trends in Information, Telecommunication and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859632", "title": "A Noise-Aware Framework for Blind Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859632/1G9Eys1sYog", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800c765", "title": "Learning to Super Resolve Intensity Images From Events", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800c765/1m3nCpxERDa", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09485034", "title": "E2SRI: Learning to Super-Resolve Intensity Images From Events", "doi": null, "abstractUrl": "/journal/tp/2022/10/09485034/1veokqDc14Q", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541012", "title": "Joint Framework for Single Image Reconstruction and Super-Resolution With an Event Camera", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541012/1x3fNobsyZy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2819", "title": "EventZoom: Learning to Denoise and Super Resolve Neuromorphic Events", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2819/1yeKqmZkueQ", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10027464", "articleId": "1Kl026YJkn6", "__typename": "AdjacentArticleType" }, "next": { "fno": "10032235", "articleId": "1KmyjHlM13i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1AH3nE0O7Oo", "title": "March", "year": "2022", "issueNum": "03", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1jmV7H3Ew2Q", "doi": "10.1109/TKDE.2020.2990491", "abstract": "Besides the traditional cartographic data sources, spatial information can also be derived from location-based sources. However, even though different location-based sources refer to the same physical world, each one has only partial coverage of the spatial entities, describe them with different attributes, and sometimes provide contradicting information. Hence, we introduce the spatial entity linkage problem, which finds which pairs of spatial entities belong to the same physical spatial entity. Our proposed solution (<italic>QuadSky</italic>) starts with a time-efficient spatial blocking technique (<italic>QuadFlex</italic>), compares pairwise the spatial entities in the same block, ranks the pairs using Pareto optimality with the <italic>SkyRank</italic> algorithm, and finally, classifies the pairs with our novel <italic>SkyEx-*</italic> family of algorithms that yield 0.85 <italic>precision</italic> and 0.85 <italic>recall</italic> for a manually labeled dataset of 1,500 pairs and 0.87 <italic>precision</italic> and 0.6 <italic>recall</italic> for a semi-manually labeled dataset of 777,452 pairs. Moreover, we provide a theoretical guarantee and formalize the <italic>SkyEx-FES</italic> algorithm that explores only 27 percent of the skylines without any loss in <italic>F-measure</italic>. Furthermore, our fully unsupervised algorithm <italic>SkyEx-D</italic> approximates the optimal result with an <italic>F-measure</italic> loss of just 0.01. Finally, <italic>QuadSky</italic> provides the best trade-off between <italic>precision</italic> and <italic>recall</italic>, and the best <italic>F-measure</italic> compared to the existing baselines and clustering techniques, and approximates the results of supervised learning solutions.", "abstracts": [ { "abstractType": "Regular", "content": "Besides the traditional cartographic data sources, spatial information can also be derived from location-based sources. However, even though different location-based sources refer to the same physical world, each one has only partial coverage of the spatial entities, describe them with different attributes, and sometimes provide contradicting information. Hence, we introduce the spatial entity linkage problem, which finds which pairs of spatial entities belong to the same physical spatial entity. Our proposed solution (<italic>QuadSky</italic>) starts with a time-efficient spatial blocking technique (<italic>QuadFlex</italic>), compares pairwise the spatial entities in the same block, ranks the pairs using Pareto optimality with the <italic>SkyRank</italic> algorithm, and finally, classifies the pairs with our novel <italic>SkyEx-*</italic> family of algorithms that yield 0.85 <italic>precision</italic> and 0.85 <italic>recall</italic> for a manually labeled dataset of 1,500 pairs and 0.87 <italic>precision</italic> and 0.6 <italic>recall</italic> for a semi-manually labeled dataset of 777,452 pairs. Moreover, we provide a theoretical guarantee and formalize the <italic>SkyEx-FES</italic> algorithm that explores only 27 percent of the skylines without any loss in <italic>F-measure</italic>. Furthermore, our fully unsupervised algorithm <italic>SkyEx-D</italic> approximates the optimal result with an <italic>F-measure</italic> loss of just 0.01. Finally, <italic>QuadSky</italic> provides the best trade-off between <italic>precision</italic> and <italic>recall</italic>, and the best <italic>F-measure</italic> compared to the existing baselines and clustering techniques, and approximates the results of supervised learning solutions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Besides the traditional cartographic data sources, spatial information can also be derived from location-based sources. However, even though different location-based sources refer to the same physical world, each one has only partial coverage of the spatial entities, describe them with different attributes, and sometimes provide contradicting information. Hence, we introduce the spatial entity linkage problem, which finds which pairs of spatial entities belong to the same physical spatial entity. Our proposed solution (QuadSky) starts with a time-efficient spatial blocking technique (QuadFlex), compares pairwise the spatial entities in the same block, ranks the pairs using Pareto optimality with the SkyRank algorithm, and finally, classifies the pairs with our novel SkyEx-* family of algorithms that yield 0.85 precision and 0.85 recall for a manually labeled dataset of 1,500 pairs and 0.87 precision and 0.6 recall for a semi-manually labeled dataset of 777,452 pairs. Moreover, we provide a theoretical guarantee and formalize the SkyEx-FES algorithm that explores only 27 percent of the skylines without any loss in F-measure. Furthermore, our fully unsupervised algorithm SkyEx-D approximates the optimal result with an F-measure loss of just 0.01. Finally, QuadSky provides the best trade-off between precision and recall, and the best F-measure compared to the existing baselines and clustering techniques, and approximates the results of supervised learning solutions.", "title": "Multi-Source Spatial Entity Linkage", "normalizedTitle": "Multi-Source Spatial Entity Linkage", "fno": "09079585", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Location Based Services", "Pareto Optimisation", "Pattern Classification", "Supervised Learning", "Unsupervised Learning", "Multisource Spatial Entity Linkage", "Spatial Information", "Location Based Sources", "Physical Spatial Entity", "Cartographic Data Sources", "Quad Sky", "Time Efficient Spatial Blocking", "Quad Flex", "Pareto Optimality", "Sky Rank Algorithm", "Sky Ex Family", "Classification", "Sky Ex FES Algorithm", "Skylines", "Fully Unsupervised Algorithm", "Sky Ex D", "F Measure", "Supervised Learning", "Couplings", "Spatial Resolution", "Spatial Databases", "Approximation Algorithms", "Clustering Algorithms", "Tools", "Data Integration", "Spatial Data", "Entity Resolution", "Spatial Blocking", "Skyline Based" ], "authors": [ { "givenName": "Suela", "surname": "Isaj", "fullName": "Suela Isaj", "affiliation": "Department of Computer Science, Aalborg University, Aalborg, Denmark", "__typename": "ArticleAuthorType" }, { "givenName": "Torben Bach", "surname": "Pedersen", "fullName": "Torben Bach Pedersen", "affiliation": "Department of Computer Science, Aalborg University, Aalborg, Denmark", "__typename": "ArticleAuthorType" }, { "givenName": "Esteban", "surname": "Zimányi", "fullName": "Esteban Zimányi", "affiliation": "Department of Computer and Decision Engineering, Université libre de Bruxelles, Bruxelles, Belgium", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "03", "pubDate": "2022-03-01 00:00:00", "pubType": "trans", "pages": "1344-1358", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/isai/2016/1585/0/1585a241", "title": "Key Technology Research of Massive Multi-source Heterogeneous Spatial Data Visualization and Management System Based on 3D Digital Earth", "doi": null, "abstractUrl": "/proceedings-article/isai/2016/1585a241/12OmNs5rkMO", "parentPublication": { "id": "proceedings/isai/2016/1585/0", "title": "2016 International Conference on Information System and Artificial Intelligence (ISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2008/3326/0/3326a899", "title": "Learning Spatial Grammars for Drawn Documents Using Genetic Algorithms", "doi": null, "abstractUrl": "/proceedings-article/his/2008/3326a899/12OmNxwncvx", "parentPublication": { "id": "proceedings/his/2008/3326/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2013/5058/0/06623868", "title": "Efficient Multi-dimensional Spatial RkNN Query Processing with MapReduce", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2013/06623868/12OmNzBOhOB", "parentPublication": { "id": "proceedings/chinagrid/2013/5058/0", "title": "2013 8th ChinaGrid Annual Conference (ChinaGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2010/4212/1/4212a976", "title": "Multi-source Spatial Data Code on the Global Partition Method", "doi": null, "abstractUrl": "/proceedings-article/isdea/2010/4212a976/12OmNzdoMWa", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2022/1332/0/09687191", "title": "A Spatial Common Datasets for Linkage between Dataset Values", "doi": null, "abstractUrl": "/proceedings-article/icoin/2022/09687191/1AtQf91oAXS", "parentPublication": { "id": "proceedings/icoin/2022/1332/0", "title": "2022 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10029887", "title": "Learning to Super-Resolve Blurry Images With Events", "doi": null, "abstractUrl": "/journal/tp/5555/01/10029887/1KmyiLazy5q", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10036144", "title": "Spatial Index Structures for Modern Storage Devices: A Survey", "doi": null, "abstractUrl": "/journal/tk/5555/01/10036144/1KsRzjDLuMg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/11/08799015", "title": "Conveying spatial awareness cues in xR collaborations", "doi": null, "abstractUrl": "/journal/tg/2019/11/08799015/1cumXlkNGuY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/02/09064883", "title": "Linear Approximation of F-Measure for the Performance Evaluation of Classification Algorithms on Imbalanced Data Sets", "doi": null, "abstractUrl": "/journal/tk/2022/02/09064883/1iZGrC6o6OI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09099994", "title": "Progressive Cross-Stream Cooperation in Spatial and Temporal Domain for Action Localization", "doi": null, "abstractUrl": "/journal/tp/2021/12/09099994/1k93jaR4Xg4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09084265", "articleId": "1jtyFTMMisg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093985", "articleId": "1jP8u9eqduo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1AH3tO4TcEo", "name": "ttk202203-09079585s1-supp1-2990491.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk202203-09079585s1-supp1-2990491.pdf", "extension": "pdf", "size": "757 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1F1RjfRE5Lq", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "ts", "pubType": "journal", "volume": "48", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1r3lex52PFC", "doi": "10.1109/TSE.2021.3057767", "abstract": "Java projects are often built on top of various third-party libraries. If multiple versions of a library exist on the classpath, JVM will only load one version and shadow the others, which we refer to as <italic>dependency conflicts</italic>. This would give rise to <italic>semantic conflict</italic> (SC) issues, if the library APIs referenced by a project have identical method signatures but inconsistent semantics across the loaded and shadowed versions of libraries. SC issues are difficult for developers to diagnose in practice, since understanding them typically requires domain knowledge. Although adapting the existing test generation technique for dependency conflict issues, <sc>Riddle</sc>, to detect SC issues is feasible, its effectiveness is greatly compromised. This is mainly because <sc>Riddle</sc> randomly generates test inputs, while the SC issues typically require specific arguments in the tests to be exposed. To address that, we conducted an empirical study of 316 real SC issues to understand the characteristics of such specific arguments in the test cases that can capture the SC issues. Inspired by our empirical findings, we propose an automated testing technique <sc>Sensor</sc>, which synthesizes test cases using ingredients from the project under test to trigger inconsistent behaviors of the APIs with the same signatures in conflicting library versions. Our evaluation results show that <sc>Sensor</sc> is effective and useful: it achieved a <inline-formula><tex-math notation=\"LaTeX\">Z_$Precision$_Z</tex-math></inline-formula> of 0.898 and a <inline-formula><tex-math notation=\"LaTeX\">Z_$Recall$_Z</tex-math></inline-formula> of 0.725 on open-source projects and a <inline-formula><tex-math notation=\"LaTeX\">Z_$Precision$_Z</tex-math></inline-formula> of 0.821 on industrial projects; it detected 306 semantic conflict issues in 50 projects, 70.4 percent of which had been confirmed as real bugs, and 84.2 percent of the confirmed issues have been fixed quickly.", "abstracts": [ { "abstractType": "Regular", "content": "Java projects are often built on top of various third-party libraries. If multiple versions of a library exist on the classpath, JVM will only load one version and shadow the others, which we refer to as <italic>dependency conflicts</italic>. This would give rise to <italic>semantic conflict</italic> (SC) issues, if the library APIs referenced by a project have identical method signatures but inconsistent semantics across the loaded and shadowed versions of libraries. SC issues are difficult for developers to diagnose in practice, since understanding them typically requires domain knowledge. Although adapting the existing test generation technique for dependency conflict issues, <sc>Riddle</sc>, to detect SC issues is feasible, its effectiveness is greatly compromised. This is mainly because <sc>Riddle</sc> randomly generates test inputs, while the SC issues typically require specific arguments in the tests to be exposed. To address that, we conducted an empirical study of 316 real SC issues to understand the characteristics of such specific arguments in the test cases that can capture the SC issues. Inspired by our empirical findings, we propose an automated testing technique <sc>Sensor</sc>, which synthesizes test cases using ingredients from the project under test to trigger inconsistent behaviors of the APIs with the same signatures in conflicting library versions. Our evaluation results show that <sc>Sensor</sc> is effective and useful: it achieved a <inline-formula><tex-math notation=\"LaTeX\">$Precision$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"yu-ieq1-3057767.gif\"/></alternatives></inline-formula> of 0.898 and a <inline-formula><tex-math notation=\"LaTeX\">$Recall$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"yu-ieq2-3057767.gif\"/></alternatives></inline-formula> of 0.725 on open-source projects and a <inline-formula><tex-math notation=\"LaTeX\">$Precision$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"yu-ieq3-3057767.gif\"/></alternatives></inline-formula> of 0.821 on industrial projects; it detected 306 semantic conflict issues in 50 projects, 70.4 percent of which had been confirmed as real bugs, and 84.2 percent of the confirmed issues have been fixed quickly.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Java projects are often built on top of various third-party libraries. If multiple versions of a library exist on the classpath, JVM will only load one version and shadow the others, which we refer to as dependency conflicts. This would give rise to semantic conflict (SC) issues, if the library APIs referenced by a project have identical method signatures but inconsistent semantics across the loaded and shadowed versions of libraries. SC issues are difficult for developers to diagnose in practice, since understanding them typically requires domain knowledge. Although adapting the existing test generation technique for dependency conflict issues, Riddle, to detect SC issues is feasible, its effectiveness is greatly compromised. This is mainly because Riddle randomly generates test inputs, while the SC issues typically require specific arguments in the tests to be exposed. To address that, we conducted an empirical study of 316 real SC issues to understand the characteristics of such specific arguments in the test cases that can capture the SC issues. Inspired by our empirical findings, we propose an automated testing technique Sensor, which synthesizes test cases using ingredients from the project under test to trigger inconsistent behaviors of the APIs with the same signatures in conflicting library versions. Our evaluation results show that Sensor is effective and useful: it achieved a - of 0.898 and a - of 0.725 on open-source projects and a - of 0.821 on industrial projects; it detected 306 semantic conflict issues in 50 projects, 70.4 percent of which had been confirmed as real bugs, and 84.2 percent of the confirmed issues have been fixed quickly.", "title": "Will Dependency Conflicts Affect My Program&#x0027;s Semantics?", "normalizedTitle": "Will Dependency Conflicts Affect My Program's Semantics?", "fno": "09350237", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Application Program Interfaces", "Java", "Program Debugging", "Program Testing", "Software Libraries", "Java Projects", "Third Party Libraries", "Library AP Is", "SC Issues", "Test Generation Technique", "Dependency Conflict Issues", "Riddle", "Library Versions", "Open Source Projects", "Industrial Projects", "Semantic Conflict Issues", "Automated Testing Technique Sensor", "Application Program Interfaces", "Libraries", "Semantics", "Testing", "Open Source Software", "Runtime", "Java", "Computer Science", "Third Party Libraries", "Test Generation", "Empirical Study" ], "authors": [ { "givenName": "Ying", "surname": "Wang", "fullName": "Ying Wang", "affiliation": "Software College, Northeasthern University, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Rongxin", "surname": "Wu", "fullName": "Rongxin Wu", "affiliation": "Department of Cyber Space Security, Xiamen University, Xiamen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chao", "surname": "Wang", "fullName": "Chao Wang", "affiliation": "Software College, Northeasthern University, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ming", "surname": "Wen", "fullName": "Ming Wen", "affiliation": "School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yepang", "surname": "Liu", "fullName": "Yepang Liu", "affiliation": "Department of Computer Science and Engineering, and Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation, Southern University of Science and Technology, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shing-Chi", "surname": "Cheung", "fullName": "Shing-Chi Cheung", "affiliation": "Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hai", "surname": "Yu", "fullName": "Hai Yu", "affiliation": "Software College, Northeasthern University, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chang", "surname": "Xu", "fullName": "Chang Xu", "affiliation": "State Key Lab for Novel Software Technology, and Department of Computer Science and Technology, Nanjing University, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiliang", "surname": "Zhu", "fullName": "Zhiliang Zhu", "affiliation": "Software College, Northeasthern University, Shenyang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "2295-2316", "year": "2022", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2020/02/08465974", "title": "Gene Expressions, Hippocampal Volume Loss, and MMSE Scores in Computation of Progression and Pharmacologic Therapy Effects for Alzheimer&#x0027;s Disease", "doi": null, "abstractUrl": "/journal/tb/2020/02/08465974/13zn9cZGHLO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2021/06/08705372", "title": "Scheduling Real-Time Security Aware Tasks in Fog Networks", "doi": null, "abstractUrl": "/journal/sc/2021/06/08705372/19JpNnOBEY0", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/02/09741339", "title": "Selecting Context-Sensitivity Modularly for Accelerating Object-Sensitive Pointer Analysis", "doi": null, "abstractUrl": "/journal/ts/2023/02/09741339/1C0jiAoispi", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/03/09827923", "title": "PMNS for Efficient Arithmetic and Small Memory Cost", "doi": null, "abstractUrl": "/journal/ec/2022/03/09827923/1EWSBFUfd6M", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/03/08846007", "title": "Online Scheduling of Task Graphs on Heterogeneous Platforms", "doi": null, "abstractUrl": "/journal/td/2020/03/08846007/1gAnzzTm4GA", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/12/09007415", "title": "Flexible Aggregate Nearest Neighbor Queries and its Keyword-Aware Variant on Road Networks", "doi": null, "abstractUrl": "/journal/tk/2021/12/09007415/1hJKhc0u1So", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09110776", "title": "Accelerated Variance Reduction Stochastic ADMM for Large-Scale Machine Learning", "doi": null, "abstractUrl": "/journal/tp/2021/12/09110776/1kuDlRSAfuw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09448388", "title": "A Hybrid Stochastic-Deterministic Minibatch Proximal Gradient Method for Efficient Optimization and Generalization", "doi": null, "abstractUrl": "/journal/tp/2022/10/09448388/1ugE3BTixLq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09531369", "title": "Deletion Propagation Revisited for Multiple Key Preserving Views", "doi": null, "abstractUrl": "/journal/tk/2023/03/09531369/1wJkZcWVIE8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09350178", "articleId": "1r3lcBduLew", "__typename": "AdjacentArticleType" }, "next": { "fno": "09350184", "articleId": "1r3lcokakWQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DU9C1cnFPq", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1r9YBlQm7YI", "doi": "10.1109/TPAMI.2021.3058945", "abstract": "We present an efficient foveal framework to perform object detection. A scale normalized image pyramid (SNIP) is generated that, like human vision, only attends to objects within a fixed size range at different scales. Such a restriction of objects&#x2019; size during training affords better learning of object-sensitive filters, and therefore, results in better accuracy. However, the use of an image pyramid increases the computational cost. Hence, we propose an efficient <italic>spatial sub-sampling</italic> scheme which only operates on fixed-size sub-regions likely to contain objects (as object locations are known during training). The resulting approach, referred to as <italic>Scale Normalized Image Pyramid with Efficient Resampling</italic> or SNIPER, yields up to 3&#x00D7; speed-up during training. Unfortunately, as object locations are unknown during inference, the entire image pyramid still needs processing. To this end, we adopt a coarse-to-fine approach, and predict the locations and extent of object-like regions which will be processed in successive scales of the image pyramid. Intuitively, it&#x0027;s akin to our active human-vision that first <italic>skims over</italic> the field-of-view to spot interesting regions for further processing and only recognizes objects at the right resolution. The resulting algorithm is referred to as <italic>AutoFocus</italic> and results in a 2.5-5&#x00D7; speed-up during inference when used with SNIP. Code: <uri>https://github.com/mahyarnajibi/SNIPER</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "We present an efficient foveal framework to perform object detection. A scale normalized image pyramid (SNIP) is generated that, like human vision, only attends to objects within a fixed size range at different scales. Such a restriction of objects&#x2019; size during training affords better learning of object-sensitive filters, and therefore, results in better accuracy. However, the use of an image pyramid increases the computational cost. Hence, we propose an efficient <italic>spatial sub-sampling</italic> scheme which only operates on fixed-size sub-regions likely to contain objects (as object locations are known during training). The resulting approach, referred to as <italic>Scale Normalized Image Pyramid with Efficient Resampling</italic> or SNIPER, yields up to 3&#x00D7; speed-up during training. Unfortunately, as object locations are unknown during inference, the entire image pyramid still needs processing. To this end, we adopt a coarse-to-fine approach, and predict the locations and extent of object-like regions which will be processed in successive scales of the image pyramid. Intuitively, it&#x0027;s akin to our active human-vision that first <italic>skims over</italic> the field-of-view to spot interesting regions for further processing and only recognizes objects at the right resolution. The resulting algorithm is referred to as <italic>AutoFocus</italic> and results in a 2.5-5&#x00D7; speed-up during inference when used with SNIP. Code: <uri>https://github.com/mahyarnajibi/SNIPER</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an efficient foveal framework to perform object detection. A scale normalized image pyramid (SNIP) is generated that, like human vision, only attends to objects within a fixed size range at different scales. Such a restriction of objects’ size during training affords better learning of object-sensitive filters, and therefore, results in better accuracy. However, the use of an image pyramid increases the computational cost. Hence, we propose an efficient spatial sub-sampling scheme which only operates on fixed-size sub-regions likely to contain objects (as object locations are known during training). The resulting approach, referred to as Scale Normalized Image Pyramid with Efficient Resampling or SNIPER, yields up to 3× speed-up during training. Unfortunately, as object locations are unknown during inference, the entire image pyramid still needs processing. To this end, we adopt a coarse-to-fine approach, and predict the locations and extent of object-like regions which will be processed in successive scales of the image pyramid. Intuitively, it's akin to our active human-vision that first skims over the field-of-view to spot interesting regions for further processing and only recognizes objects at the right resolution. The resulting algorithm is referred to as AutoFocus and results in a 2.5-5× speed-up during inference when used with SNIP. Code: https://github.com/mahyarnajibi/SNIPER.", "title": "Scale Normalized Image Pyramids With AutoFocus for Object Detection", "normalizedTitle": "Scale Normalized Image Pyramids With AutoFocus for Object Detection", "fno": "09354054", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computer Vision", "Feature Extraction", "Image Resolution", "Image Sampling", "Learning Artificial Intelligence", "Object Detection", "Fixed Size Range", "Object Sensitive Filters", "Fixed Size Sub Regions", "Object Locations", "Scale Normalized Image Pyramid", "Object Like Regions", "Object Detection", "Subsampling Scheme", "Efficient Resampling", "SNIPER", "Active Human Vision", "Auto Focus", "Feature Extraction", "Training", "Object Detection", "Computational Efficiency", "Spatial Resolution", "Semantics", "Detectors", "Object Detection", "Image Pyramids", "Foveal Vision", "Scale Space Theory", "Deep Learning" ], "authors": [ { "givenName": "Bharat", "surname": "Singh", "fullName": "Bharat Singh", "affiliation": "Computer Science Department, University of Maryland, College Park, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Mahyar", "surname": "Najibi", "fullName": "Mahyar Najibi", "affiliation": "Computer Science Department, University of Maryland, College Park, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Abhishek", "surname": "Sharma", "fullName": "Abhishek Sharma", "affiliation": "Computer Science Department, University of Maryland, College Park, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Larry S.", "surname": "Davis", "fullName": "Larry S. Davis", "affiliation": "Computer Science Department, University of Maryland, College Park, MD, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "3749-3766", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/437P3C09", "title": "SURFing the point clouds: Selective 3D spatial pyramids for category-level object recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/437P3C09/12OmNwE9Otm", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/08/06714453", "title": "Fast Feature Pyramids for Object Detection", "doi": null, "abstractUrl": "/journal/tp/2014/08/06714453/13rRUwghdap", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000h814", "title": "Optimizing Video Object Detection via a Scale-Time Lattice", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000h814/17D45WK5AlZ", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a528", "title": "Scale-Transferrable Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a528/17D45XDIXUC", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d578", "title": "An Analysis of Scale Invariance in Object Detection - SNIP", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d578/17D45XH89pn", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2019/5050/0/505000a428", "title": "A New Feature Pyramid Network for Object Detection", "doi": null, "abstractUrl": "/proceedings-article/icvris/2019/505000a428/1fHk833tB6g", "parentPublication": { "id": "proceedings/icvris/2019/5050/0", "title": "2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j744", "title": "AutoFocus: Efficient Multi-Scale Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j744/1hVlzTrkJAA", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150671", "title": "Recursive Hybrid Fusion Pyramid Network for Real-Time Small Object Detection on Embedded Devices", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150671/1lPHbyc0icg", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800n3356", "title": "Scale-Equalizing Pyramid Convolution for Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800n3356/1m3ndnXX5WE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isceic/2021/4160/0/416000a311", "title": "MM-FPN: Multi-path and Multi-scale Feature Pyramid Network for Object Detection", "doi": null, "abstractUrl": "/proceedings-article/isceic/2021/416000a311/1yzP4Fhivrq", "parentPublication": { "id": "proceedings/isceic/2021/4160/0", "title": "2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09332260", "articleId": "1qzsMjbt8XK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09355012", "articleId": "1rgCaS7KCnm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1tWIYFFvfOM", "title": "April-June", "year": "2021", "issueNum": "02", "idPrefix": "pc", "pubType": "magazine", "volume": "20", "label": "April-June", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1r9YpKrIyf6", "doi": "10.1109/MPRV.2021.3052528", "abstract": "The real world presents interpretable visual detail at different scales in different situations. While empowering face recognition, augmented reality, and other computer vision tasks, mobile systems should be able to dynamically adapt the spatiotemporal resolution of the visual sensing pipeline to capture image frames at high resolutions for task precision and low resolutions for energy savings. Facilitating real-time decisions to reconfigure resolutions will let systems dynamically adapt to the needs of the vision algorithms, as well as the environmental situation of the visual scene. This article will review system challenges and opportunities of image-resolution-based tradeoffs toward energy-efficient visual computing through device driver and media framework optimization.", "abstracts": [ { "abstractType": "Regular", "content": "The real world presents interpretable visual detail at different scales in different situations. While empowering face recognition, augmented reality, and other computer vision tasks, mobile systems should be able to dynamically adapt the spatiotemporal resolution of the visual sensing pipeline to capture image frames at high resolutions for task precision and low resolutions for energy savings. Facilitating real-time decisions to reconfigure resolutions will let systems dynamically adapt to the needs of the vision algorithms, as well as the environmental situation of the visual scene. This article will review system challenges and opportunities of image-resolution-based tradeoffs toward energy-efficient visual computing through device driver and media framework optimization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The real world presents interpretable visual detail at different scales in different situations. While empowering face recognition, augmented reality, and other computer vision tasks, mobile systems should be able to dynamically adapt the spatiotemporal resolution of the visual sensing pipeline to capture image frames at high resolutions for task precision and low resolutions for energy savings. Facilitating real-time decisions to reconfigure resolutions will let systems dynamically adapt to the needs of the vision algorithms, as well as the environmental situation of the visual scene. This article will review system challenges and opportunities of image-resolution-based tradeoffs toward energy-efficient visual computing through device driver and media framework optimization.", "title": "Adaptive Resolution-Based Tradeoffs for Energy-Efficient Visual Computing Systems", "normalizedTitle": "Adaptive Resolution-Based Tradeoffs for Energy-Efficient Visual Computing Systems", "fno": "09354109", "hasPdf": true, "idPrefix": "pc", "keywords": [ "Augmented Reality", "Computer Vision", "Data Visualisation", "Energy Conservation", "Face Recognition", "Image Resolution", "Image Sampling", "Image Sensors", "Real Time Systems", "Robot Vision", "World Presents Interpretable Visual Detail", "Face Recognition", "Augmented Reality", "Computer Vision Tasks", "Mobile Systems", "Spatiotemporal Resolution", "Visual Sensing Pipeline", "Image Frames", "Task Precision", "Low Resolutions", "Energy Savings", "Environmental Situation", "Visual Scene", "System Challenges", "Image Resolution Based Tradeoffs", "Adaptive Resolution Based Tradeoffs", "Energy Efficient Visual Computing Systems", "Energy Resolution", "Image Sensors", "Visual Analytics", "Power Demand", "Visualization", "Spatial Resolution", "Signal Resolution", "Energy Resolution" ], "authors": [ { "givenName": "Robert", "surname": "Likamwa", "fullName": "Robert Likamwa", "affiliation": "School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jinhan", "surname": "Hu", "fullName": "Jinhan Hu", "affiliation": "School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Venkatesh", "surname": "Kodukula", "fullName": "Venkatesh Kodukula", "affiliation": "School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yifei", "surname": "Liu", "fullName": "Yifei Liu", "affiliation": "School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, AZ, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "02", "pubDate": "2021-04-01 00:00:00", "pubType": "mags", "pages": "18-26", "year": "2021", "issn": "1536-1268", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457b032", "title": "Unsupervised Visual-Linguistic Reference Resolution in Instructional Videos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457b032/12OmNCm7BNq", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1994/5637/0/00305945", "title": "Visibility of DCT basis functions: effects of display resolution", "doi": null, "abstractUrl": "/proceedings-article/dcc/1994/00305945/12OmNqFJhzU", "parentPublication": { "id": "proceedings/dcc/1994/5637/0", "title": "Proceedings of IEEE Data Compression Conference (DCC'94)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccbd/2016/3555/0/3555a197", "title": "Distinguish True or False 4K Resolution Using Frequency Domain Analysis and Free-Energy Modelling", "doi": null, "abstractUrl": "/proceedings-article/ccbd/2016/3555a197/12OmNqHqSwH", "parentPublication": { "id": "proceedings/ccbd/2016/3555/0", "title": "2016 7th International Conference on Cloud Computing and Big Data (CCBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1995/7084/0/70840067", "title": "Visual resolution and spatial performance: the trade-off between resolution and interactivity", "doi": null, "abstractUrl": "/proceedings-article/vrais/1995/70840067/12OmNrAMEXL", "parentPublication": { "id": "proceedings/vrais/1995/7084/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2008/3504/0/3504a402", "title": "Polygon Mesh Simplification Based on Visual Resolution Principle", "doi": null, "abstractUrl": "/proceedings-article/iccee/2008/3504a402/12OmNwogh8A", "parentPublication": { "id": "proceedings/iccee/2008/3504/0", "title": "2008 International Conference on Computer and Electrical Engineering (ICCEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2015/8146/0/07340509", "title": "The effect of dictionary learning algorithms on super-resolution hyperspectral reconstruction", "doi": null, "abstractUrl": "/proceedings-article/icat/2015/07340509/12OmNwvDQvU", "parentPublication": { "id": "proceedings/icat/2015/8146/0", "title": "2015 XXV International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/08/mco2013080090", "title": "Bixplorer: Visual Analytics with Biclusters", "doi": null, "abstractUrl": "/magazine/co/2013/08/mco2013080090/13rRUwcAqvs", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539323", "title": "Multi-Resolution Climate Ensemble Parameter Analysis with Nested Parallel Coordinates Plots", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539323/13rRUxNEqPZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09052469", "title": "Deep High-Resolution Representation Learning for Visual Recognition", "doi": null, "abstractUrl": "/journal/tp/2021/10/09052469/1iFLFnPx47S", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b432", "title": "The Effects of Super-Resolution on Object Detection Performance in Satellite Imagery", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b432/1iTvixTUqNG", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09360864", "articleId": "1rsek1nhrby", "__typename": "AdjacentArticleType" }, "next": { "fno": "09345461", "articleId": "1qTYD4zb3oc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1CvQiJgja2k", "doi": "10.1109/TVCG.2022.3166666", "abstract": "Parametric face models, like morphable and blendshape models, have shown great potential in face representation, reconstruction, and animation. However, all these models focus on large-scale facial geometry. Facial details like wrinkles are not parameterized in these models, impeding their accuracy and realism. In this paper, we propose a method to learn a Semantically Disentangled Variational Autoencoder (SDVAE) to parameterize facial details and support independent detail manipulation as an extension of an off-the-shelf large-scale face model. Our method utilizes the non-linear capability of Deep Neural Networks for detail modeling, achieving better accuracy and greater representation power compared with linear models. In order to disentangle the semantic factors of identity, expression and age, we propose to eliminate the correlation between different factors in an adversarial manner. Therefore, wrinkle-level details of various identities, expressions, and ages can be generated and independently controlled by changing latent vectors of our SDVAE. We further leverage our model to reconstruct 3D faces via fitting to facial scans and images. Benefiting from our parametric model, we achieve accurate and robust reconstruction, and the reconstructed details can be easily animated and manipulated. We evaluate our method on practical applications, including scan fitting, image fitting, video tracking, model manipulation, and expression and age animation. Extensive experiments demonstrate that the proposed method can robustly model facial details and achieve better results than alternative methods.", "abstracts": [ { "abstractType": "Regular", "content": "Parametric face models, like morphable and blendshape models, have shown great potential in face representation, reconstruction, and animation. However, all these models focus on large-scale facial geometry. Facial details like wrinkles are not parameterized in these models, impeding their accuracy and realism. In this paper, we propose a method to learn a Semantically Disentangled Variational Autoencoder (SDVAE) to parameterize facial details and support independent detail manipulation as an extension of an off-the-shelf large-scale face model. Our method utilizes the non-linear capability of Deep Neural Networks for detail modeling, achieving better accuracy and greater representation power compared with linear models. In order to disentangle the semantic factors of identity, expression and age, we propose to eliminate the correlation between different factors in an adversarial manner. Therefore, wrinkle-level details of various identities, expressions, and ages can be generated and independently controlled by changing latent vectors of our SDVAE. We further leverage our model to reconstruct 3D faces via fitting to facial scans and images. Benefiting from our parametric model, we achieve accurate and robust reconstruction, and the reconstructed details can be easily animated and manipulated. We evaluate our method on practical applications, including scan fitting, image fitting, video tracking, model manipulation, and expression and age animation. Extensive experiments demonstrate that the proposed method can robustly model facial details and achieve better results than alternative methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Parametric face models, like morphable and blendshape models, have shown great potential in face representation, reconstruction, and animation. However, all these models focus on large-scale facial geometry. Facial details like wrinkles are not parameterized in these models, impeding their accuracy and realism. In this paper, we propose a method to learn a Semantically Disentangled Variational Autoencoder (SDVAE) to parameterize facial details and support independent detail manipulation as an extension of an off-the-shelf large-scale face model. Our method utilizes the non-linear capability of Deep Neural Networks for detail modeling, achieving better accuracy and greater representation power compared with linear models. In order to disentangle the semantic factors of identity, expression and age, we propose to eliminate the correlation between different factors in an adversarial manner. Therefore, wrinkle-level details of various identities, expressions, and ages can be generated and independently controlled by changing latent vectors of our SDVAE. We further leverage our model to reconstruct 3D faces via fitting to facial scans and images. Benefiting from our parametric model, we achieve accurate and robust reconstruction, and the reconstructed details can be easily animated and manipulated. We evaluate our method on practical applications, including scan fitting, image fitting, video tracking, model manipulation, and expression and age animation. Extensive experiments demonstrate that the proposed method can robustly model facial details and achieve better results than alternative methods.", "title": "Semantically Disentangled Variational Autoencoder for Modeling 3D Facial Details", "normalizedTitle": "Semantically Disentangled Variational Autoencoder for Modeling 3D Facial Details", "fno": "09756299", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Solid Modeling", "Three Dimensional Displays", "Faces", "Image Reconstruction", "Geometry", "Principal Component Analysis", "Shape", "Detail Reconstruction", "Facial Animation", "Semantic Disentanglement" ], "authors": [ { "givenName": "Jingwang", "surname": "Ling", "fullName": "Jingwang Ling", "affiliation": "School of Software, Tsinghua University, 12442 Beijing, Beijing, China, 100084", "__typename": "ArticleAuthorType" }, { "givenName": "Zhibo", "surname": "Wang", "fullName": "Zhibo Wang", "affiliation": "The Institute of CG&CAD, Tsinghua University, 12442 Beijing, Beijing, China, 100084", "__typename": "ArticleAuthorType" }, { "givenName": "Ming", "surname": "Lu", "fullName": "Ming Lu", "affiliation": "VAIL, Intel Labs China, Beijing, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Quan", "surname": "Wang", "fullName": "Quan Wang", "affiliation": "SenseTime Research, SenseTime Group, 602673 Hong Kong, Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Chen", "surname": "Qian", "fullName": "Chen Qian", "affiliation": "Research Deparment, SenseTime Group Limited, Hong Kong, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Feng", "surname": "Xu", "fullName": "Feng Xu", "affiliation": "School of Software, CG&CAD, Beijing, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-04-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2017/4822/0/07926714", "title": "Deep Feature Consistent Variational Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/wacv/2017/07926714/12OmNAmVH7L", "parentPublication": { "id": "proceedings/wacv/2017/4822/0", "title": "2017 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b031", "title": "Large Pose 3D Face Reconstruction from a Single Image via Direct Volumetric CNN Regression", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b031/12OmNCd2rI2", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2014/4308/0/4308a009", "title": "Improving 3D Face Details Based on Normal Map of Hetero-source Images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2014/4308a009/12OmNCmpcLR", "parentPublication": { "id": "proceedings/cvprw/2014/4308/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3870", "title": "VariTex: Variational Neural Face Textures", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3870/1BmGhEwLQL6", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042668", "title": "DisVAE: Disentangled Variational Autoencoder for High-Quality Facial Expression Features", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042668/1KOv1LhvlYI", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10061279", "title": "ReenactArtFace: Artistic Face Image Reenactment", "doi": null, "abstractUrl": "/journal/tg/5555/01/10061279/1LiKMy3pdDO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j428", "title": "Photo-Realistic Facial Details Synthesis From Single Image", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j428/1hVlh0SqiPe", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h917", "title": "Guided Variational Autoencoder for Disentanglement Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h917/1m3oiUnuaIM", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378242", "title": "FSRGAN-DB: Super-resolution Reconstruction Based on Facial Prior Knowledge", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378242/1s64JgJ8t32", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09606538", "title": "AvatarMe<sup>++</sup>: Facial Shape and BRDF Inference With Photorealistic Rendering-Aware GANs", "doi": null, "abstractUrl": "/journal/tp/2022/12/09606538/1ymEN8wBXRC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09754991", "articleId": "1CubHSuE8bm", "__typename": "AdjacentArticleType" }, "next": { "fno": "09756929", "articleId": "1Cxva6pb2iA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1CAPfQoWmxW", "name": "ttg555501-09756299s1-supp1-3166666.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-09756299s1-supp1-3166666.mp4", "extension": "mp4", "size": "19.5 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNrMZprf", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "mu", "pubType": "magazine", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Fp5SzELLaM", "doi": "10.1109/MMUL.2022.3195091", "abstract": "Monocular face reconstruction is a significant task in many multimedia applications. However, learning-based methods unequivocally suffer from the lack of large datasets annotated with 3D ground-truth. To tackle this problem, we proposed a novel end-to-end 3D face reconstruction network consisting of a domain-transfer conditional GAN (cGAN) and a face reconstruction network. Our method first uses cGAN to translate the realistic face images to the specific rendered style, with a novel 2D facial edge consistency loss function to exploit in-the-wild images. The domain-transferred images are then fed into 3D face reconstruction network. We further propose a novel reprojection consistency loss to restrict 3D face reconstruction network in a self-supervised way. Our approach can be trained with annotated dataset, synthetic dataset and in-the-wild images to learn a unified face model. Extensive experiments have demonstrated the effectiveness of our method.", "abstracts": [ { "abstractType": "Regular", "content": "Monocular face reconstruction is a significant task in many multimedia applications. However, learning-based methods unequivocally suffer from the lack of large datasets annotated with 3D ground-truth. To tackle this problem, we proposed a novel end-to-end 3D face reconstruction network consisting of a domain-transfer conditional GAN (cGAN) and a face reconstruction network. Our method first uses cGAN to translate the realistic face images to the specific rendered style, with a novel 2D facial edge consistency loss function to exploit in-the-wild images. The domain-transferred images are then fed into 3D face reconstruction network. We further propose a novel reprojection consistency loss to restrict 3D face reconstruction network in a self-supervised way. Our approach can be trained with annotated dataset, synthetic dataset and in-the-wild images to learn a unified face model. Extensive experiments have demonstrated the effectiveness of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Monocular face reconstruction is a significant task in many multimedia applications. However, learning-based methods unequivocally suffer from the lack of large datasets annotated with 3D ground-truth. To tackle this problem, we proposed a novel end-to-end 3D face reconstruction network consisting of a domain-transfer conditional GAN (cGAN) and a face reconstruction network. Our method first uses cGAN to translate the realistic face images to the specific rendered style, with a novel 2D facial edge consistency loss function to exploit in-the-wild images. The domain-transferred images are then fed into 3D face reconstruction network. We further propose a novel reprojection consistency loss to restrict 3D face reconstruction network in a self-supervised way. Our approach can be trained with annotated dataset, synthetic dataset and in-the-wild images to learn a unified face model. Extensive experiments have demonstrated the effectiveness of our method.", "title": "Learning 3D Face Shape From Diverse Sources With Cross-Domain Face Synthesis", "normalizedTitle": "Learning 3D Face Shape From Diverse Sources With Cross-Domain Face Synthesis", "fno": "09844786", "hasPdf": true, "idPrefix": "mu", "keywords": [ "Faces", "Three Dimensional Displays", "Image Reconstruction", "Shape", "Training", "Solid Modeling", "Image Edge Detection" ], "authors": [ { "givenName": "Zhuo", "surname": "Chen", "fullName": "Zhuo Chen", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuesong", "surname": "Wang", "fullName": "Yuesong Wang", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tao", "surname": "Guan", "fullName": "Tao Guan", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yawei", "surname": "Luo", "fullName": "Yawei Luo", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Luoyuan", "surname": "Xu", "fullName": "Luoyuan Xu", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenkai", "surname": "Liu", "fullName": "Wenkai Liu", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-07-01 00:00:00", "pubType": "mags", "pages": "1-10", "year": "5555", "issn": "1070-986X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2009/3736/6/3736f040", "title": "Pose-Robust Face Recognition Based on 3D Shape Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f040/12OmNC4wttN", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/11/07776921", "title": "Adaptive 3D Face Reconstruction from Unconstrained Photo Collections", "doi": null, "abstractUrl": "/journal/tp/2017/11/07776921/13rRUxAAT8W", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/03/08571265", "title": "Joint Face Alignment and 3D Face Reconstruction with Application to Face Recognition", "doi": null, "abstractUrl": "/journal/tp/2020/03/08571265/17D45WnnFYh", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09748011", "title": "Beyond 3DMM: Learning to Capture High-Fidelity 3D Face Shape", "doi": null, "abstractUrl": "/journal/tp/2023/02/09748011/1CdB5uPaTlK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10061279", "title": "ReenactArtFace: Artistic Face Image Reenactment", "doi": null, "abstractUrl": "/journal/tg/5555/01/10061279/1LiKMy3pdDO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j397", "title": "Semi-Supervised Monocular 3D Face Reconstruction With End-to-End Shape-Preserved Domain Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j397/1hVlewcspjy", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a285", "title": "Accurate 3D Face Reconstruction With Weakly-Supervised Learning: From Single Image to Image Set", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a285/1iTvd6D2IAU", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a032", "title": "Face Denoising and 3D Reconstruction from A Single Depth Image", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a032/1kecHQ8tg3K", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a848", "title": "Learning Distribution Independent Latent Representation for 3D Face Disentanglement", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a848/1qyxlNs5m1O", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412668", "title": "Multi-Attribute Regression Network for Face Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412668/1tmiWOgAeI0", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09832493", "articleId": "1F6Q7uHssEg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09863651", "articleId": "1FXWUazOUfu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GlbpNMaT7y", "title": "July-Sept.", "year": "2022", "issueNum": "03", "idPrefix": "ta", "pubType": "journal", "volume": "13", "label": "July-Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1mQGyzlbleM", "doi": "10.1109/TAFFC.2020.3022017", "abstract": "Speech conveys not only the verbal communication, but also emotions, manifested as facial expressions of the speaker. In this article, we present deep learning frameworks that directly infer facial expressions from just speech signals. Specifically, the time-varying contextual non-linear mapping between audio stream and micro facial movements is realized by our proposed recurrent neural networks to drive a 3D blendshape face model in real-time. Our models not only activate appropriate facial action units (AUs), defined as 3D expression blendshapes in the FaceWarehouse database, to depict different utterance generating actions in the form of lip movements, but also, without any assumption, automatically estimate emotional intensity of the speaker and reproduces her ever-changing affective states by adjusting strength of related facial unit activations. In the baseline models, conventional handcrafted acoustic features are utilized to predict facial actions. Furthermore, we show that it is more advantageous to learn meaningful acoustic feature representation from speech spectrograms with convolutional nets, which subsequently improves the accuracy of facial action synthesis. Experiments on diverse audiovisual corpora of different actors across a wide range of facial actions and emotional states show promising results of our approaches. Being speaker-independent, our generalized models are readily applicable to various tasks in human-machine interaction and animation.", "abstracts": [ { "abstractType": "Regular", "content": "Speech conveys not only the verbal communication, but also emotions, manifested as facial expressions of the speaker. In this article, we present deep learning frameworks that directly infer facial expressions from just speech signals. Specifically, the time-varying contextual non-linear mapping between audio stream and micro facial movements is realized by our proposed recurrent neural networks to drive a 3D blendshape face model in real-time. Our models not only activate appropriate facial action units (AUs), defined as 3D expression blendshapes in the FaceWarehouse database, to depict different utterance generating actions in the form of lip movements, but also, without any assumption, automatically estimate emotional intensity of the speaker and reproduces her ever-changing affective states by adjusting strength of related facial unit activations. In the baseline models, conventional handcrafted acoustic features are utilized to predict facial actions. Furthermore, we show that it is more advantageous to learn meaningful acoustic feature representation from speech spectrograms with convolutional nets, which subsequently improves the accuracy of facial action synthesis. Experiments on diverse audiovisual corpora of different actors across a wide range of facial actions and emotional states show promising results of our approaches. Being speaker-independent, our generalized models are readily applicable to various tasks in human-machine interaction and animation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Speech conveys not only the verbal communication, but also emotions, manifested as facial expressions of the speaker. In this article, we present deep learning frameworks that directly infer facial expressions from just speech signals. Specifically, the time-varying contextual non-linear mapping between audio stream and micro facial movements is realized by our proposed recurrent neural networks to drive a 3D blendshape face model in real-time. Our models not only activate appropriate facial action units (AUs), defined as 3D expression blendshapes in the FaceWarehouse database, to depict different utterance generating actions in the form of lip movements, but also, without any assumption, automatically estimate emotional intensity of the speaker and reproduces her ever-changing affective states by adjusting strength of related facial unit activations. In the baseline models, conventional handcrafted acoustic features are utilized to predict facial actions. Furthermore, we show that it is more advantageous to learn meaningful acoustic feature representation from speech spectrograms with convolutional nets, which subsequently improves the accuracy of facial action synthesis. Experiments on diverse audiovisual corpora of different actors across a wide range of facial actions and emotional states show promising results of our approaches. Being speaker-independent, our generalized models are readily applicable to various tasks in human-machine interaction and animation.", "title": "Learning Continuous Facial Actions From Speech for Real-Time Animation", "normalizedTitle": "Learning Continuous Facial Actions From Speech for Real-Time Animation", "fno": "09186776", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Three Dimensional Displays", "Acoustics", "Faces", "Hidden Markov Models", "Face Recognition", "Animation", "Solid Modeling", "Deep Learning", "Speech", "Emotion", "Facial Action Unit", "Animation" ], "authors": [ { "givenName": "Hai X.", "surname": "Pham", "fullName": "Hai X. Pham", "affiliation": "Samsung AI Center, Cambridge, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Yuting", "surname": "Wang", "fullName": "Yuting Wang", "affiliation": "Department of Computer Science, Rutgers University, Piscataway, NJ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Vladimir", "surname": "Pavlovic", "fullName": "Vladimir Pavlovic", "affiliation": "Department of Computer Science, Rutgers University, Piscataway, NJ, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1567-1580", "year": "2022", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/pg/2002/1784/0/17840077", "title": "\"May I talk to you? :-)\" — Facial Animation from Text", "doi": null, "abstractUrl": "/proceedings-article/pg/2002/17840077/12OmNAkWveH", "parentPublication": { "id": "proceedings/pg/2002/1784/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a132", "title": "Towards 3D Communications: Real Time Emotion Driven 3D Virtual Facial Animation", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a132/12OmNrHjqI9", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a072", "title": "Speech-Based Emotion Characterization Using Postures and Gestures in CVEs", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a072/12OmNvSKNN3", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733c328", "title": "Speech-Driven 3D Facial Animation with Implicit Emotional Awareness: A Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733c328/12OmNxE2mG1", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344664", "title": "3D emotional facial animation synthesis with factored conditional Restricted Boltzmann Machines", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344664/12OmNxdVh2J", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1523", "title": "Expressive Facial Animation Synthesis by Learning Speech Coarticulation and Expression Spaces", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1523/13rRUxASubv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/03/v0341", "title": "Creating Speech-Synchronized Animation", "doi": null, "abstractUrl": "/journal/tg/2005/03/v0341/13rRUxE04tq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545744", "title": "Dense Convolutional Recurrent Neural Network for Generalized Speech Animation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545744/17D45Wuc33F", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a627", "title": "Synthesising 3D Facial Motion from &#x201C;In-the-Wild&#x201D; Speech", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a627/1kecIN6MkwM", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/03/09140332", "title": "Emotion Dependent Domain Adaptation for Speech Driven Affective Facial Feature Synthesis", "doi": null, "abstractUrl": "/journal/ta/2022/03/09140332/1lsnzQkrydG", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09165162", "articleId": "1mcQTrYsXbG", "__typename": "AdjacentArticleType" }, "next": { "fno": "09186792", "articleId": "1mQGzgMF2uY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1GlbBJ8H96w", "name": "tta202203-09186776s1-supp2-3022017.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/tta202203-09186776s1-supp2-3022017.mp4", "extension": "mp4", "size": "17.6 MB", "__typename": "WebExtraType" }, { "id": "1GlbBTsdp9S", "name": "tta202203-09186776s1-supp1-3022017.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tta202203-09186776s1-supp1-3022017.pdf", "extension": "pdf", "size": "3.39 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNznkK6H", "title": "January-February", "year": "2004", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "10", "label": "January-February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwI5TXq", "doi": "10.1109/TVCG.2004.1260761", "abstract": "Abstract- Cartograms are a well-known technique for showing geography-related statistical information, such as population demographics and epidemiological data. The basic idea is to distort a map by resizing its regions according to a statistical parameter, but in a way that keeps the map recognizable. In this study, we formally define a family of cartogram drawing problems. We show that even simple variants are unsolvable in the general case. Because the feasible variants are NP-complete, heuristics are needed to solve the problem. Previously proposed solutions suffer from problems with the quality of the generated drawings. For a cartogram to be recognizable, it is important to preserve the global shape or outline of the input map, a requirement that has been overlooked in the past. To address this, our objective function for cartogram drawing includes both global and local shape preservation. To measure the degree of shape preservation, we propose a shape similarity function, which is based on a Fourier transformation of the polygons' curvatures. Also, our application is visualization of dynamic data, for which we need an algorithm that recalculates a cartogram in a few seconds. None of the previous algorithms provides adequate performance with an acceptable level of quality for this application. In this paper, we therefore propose an efficient iterative scanline algorithm to reposition edges while preserving local and global shapes. Scanlines may be generated automatically or entered interactively to guide the optimization process more closely. We apply our algorithm to several example data sets and provide a detailed comparison of the two variants of our algorithm and previous approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract- Cartograms are a well-known technique for showing geography-related statistical information, such as population demographics and epidemiological data. The basic idea is to distort a map by resizing its regions according to a statistical parameter, but in a way that keeps the map recognizable. In this study, we formally define a family of cartogram drawing problems. We show that even simple variants are unsolvable in the general case. Because the feasible variants are NP-complete, heuristics are needed to solve the problem. Previously proposed solutions suffer from problems with the quality of the generated drawings. For a cartogram to be recognizable, it is important to preserve the global shape or outline of the input map, a requirement that has been overlooked in the past. To address this, our objective function for cartogram drawing includes both global and local shape preservation. To measure the degree of shape preservation, we propose a shape similarity function, which is based on a Fourier transformation of the polygons' curvatures. Also, our application is visualization of dynamic data, for which we need an algorithm that recalculates a cartogram in a few seconds. None of the previous algorithms provides adequate performance with an acceptable level of quality for this application. In this paper, we therefore propose an efficient iterative scanline algorithm to reposition edges while preserving local and global shapes. Scanlines may be generated automatically or entered interactively to guide the optimization process more closely. We apply our algorithm to several example data sets and provide a detailed comparison of the two variants of our algorithm and previous approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract- Cartograms are a well-known technique for showing geography-related statistical information, such as population demographics and epidemiological data. The basic idea is to distort a map by resizing its regions according to a statistical parameter, but in a way that keeps the map recognizable. In this study, we formally define a family of cartogram drawing problems. We show that even simple variants are unsolvable in the general case. Because the feasible variants are NP-complete, heuristics are needed to solve the problem. Previously proposed solutions suffer from problems with the quality of the generated drawings. For a cartogram to be recognizable, it is important to preserve the global shape or outline of the input map, a requirement that has been overlooked in the past. To address this, our objective function for cartogram drawing includes both global and local shape preservation. To measure the degree of shape preservation, we propose a shape similarity function, which is based on a Fourier transformation of the polygons' curvatures. Also, our application is visualization of dynamic data, for which we need an algorithm that recalculates a cartogram in a few seconds. None of the previous algorithms provides adequate performance with an acceptable level of quality for this application. In this paper, we therefore propose an efficient iterative scanline algorithm to reposition edges while preserving local and global shapes. Scanlines may be generated automatically or entered interactively to guide the optimization process more closely. We apply our algorithm to several example data sets and provide a detailed comparison of the two variants of our algorithm and previous approaches.", "title": "CartoDraw: A Fast Algorithm for Generating Contiguous Cartograms", "normalizedTitle": "CartoDraw: A Fast Algorithm for Generating Contiguous Cartograms", "fno": "v0095", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Information Visualization", "Visualization Of Geo Related Information", "Continuous Cartograms", "Value By Area Cartograms", "Visualization And Cartography" ], "authors": [ { "givenName": "Daniel A.", "surname": "Keim", "fullName": "Daniel A. Keim", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Stephen C.", "surname": "North", "fullName": "Stephen C. North", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Christian", "surname": "Panse", "fullName": "Christian Panse", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "01", "pubDate": "2004-01-01 00:00:00", "pubType": "trans", "pages": "95-110", "year": "2004", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "v0085", "articleId": "13rRUxDIth5", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0111", "articleId": "13rRUygT7mJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1FUYos4XN9C", "title": "Aug.", "year": "2022", "issueNum": "04", "idPrefix": "nt", "pubType": "journal", "volume": "30", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1BQi8YoxvLG", "doi": "10.1109/TNET.2022.3154367", "abstract": "We consider the stability region of a mmWave integrated access and backhaul (IAB) network with stochastic arrivals and time-varying link rates. In the scheduling of links, we consider a limit on the number of RF chains, and the half-duplex constraint which occurs due to the wireless backhaul links. We characterize the stability region, and propose a back-pressure policy for the IAB network under the RF chains and half-duplex constraints. To implement the back-pressure policy, it is required to compute the maximum weighted schedule, which is a complex problem in general. For the IAB network, we present a distributed message passing scheme to compute the maximum weighted schedule, with almost linear complexity. We also investigate a class of local scheduling policies for the IAB network, which have a smaller stability region in general, but require no message passing. We characterize the stability region for the local class, and show that it is same as the global stability region, if the link rates are un-varying. We provide a bound on the gap between local and global regions when the links are time varying. We propose a local max-weight algorithm which achieves the stability region for the local class, and we present numerical results.", "abstracts": [ { "abstractType": "Regular", "content": "We consider the stability region of a mmWave integrated access and backhaul (IAB) network with stochastic arrivals and time-varying link rates. In the scheduling of links, we consider a limit on the number of RF chains, and the half-duplex constraint which occurs due to the wireless backhaul links. We characterize the stability region, and propose a back-pressure policy for the IAB network under the RF chains and half-duplex constraints. To implement the back-pressure policy, it is required to compute the maximum weighted schedule, which is a complex problem in general. For the IAB network, we present a distributed message passing scheme to compute the maximum weighted schedule, with almost linear complexity. We also investigate a class of local scheduling policies for the IAB network, which have a smaller stability region in general, but require no message passing. We characterize the stability region for the local class, and show that it is same as the global stability region, if the link rates are un-varying. We provide a bound on the gap between local and global regions when the links are time varying. We propose a local max-weight algorithm which achieves the stability region for the local class, and we present numerical results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider the stability region of a mmWave integrated access and backhaul (IAB) network with stochastic arrivals and time-varying link rates. In the scheduling of links, we consider a limit on the number of RF chains, and the half-duplex constraint which occurs due to the wireless backhaul links. We characterize the stability region, and propose a back-pressure policy for the IAB network under the RF chains and half-duplex constraints. To implement the back-pressure policy, it is required to compute the maximum weighted schedule, which is a complex problem in general. For the IAB network, we present a distributed message passing scheme to compute the maximum weighted schedule, with almost linear complexity. We also investigate a class of local scheduling policies for the IAB network, which have a smaller stability region in general, but require no message passing. We characterize the stability region for the local class, and show that it is same as the global stability region, if the link rates are un-varying. We provide a bound on the gap between local and global regions when the links are time varying. We propose a local max-weight algorithm which achieves the stability region for the local class, and we present numerical results.", "title": "Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul", "normalizedTitle": "Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul", "fno": "09737293", "hasPdf": true, "idPrefix": "nt", "keywords": [ "Millimetre Wave Communication", "Radio Links", "Stochastic Processes", "Telecommunication Scheduling", "Mm Wave Integrated Access", "Stochastic Arrivals", "Time Varying Link Rates", "RF Chains", "Half Duplex Constraint", "Wireless Backhaul Links", "Back Pressure Policy", "IAB Network", "Maximum Weighted Schedule", "Distributed Message", "Local Scheduling Policies", "Global Stability Region", "Local Max Weight Algorithm", "Mm Wave Integrated Access And Backhaul Network", "Numerical Stability", "Radio Frequency", "Wireless Communication", "Scheduling Algorithms", "Topology", "Schedules", "Stability Criteria", "Millimeter Wave Cellular IAB Network", "RF Chains Constraint", "Local Max Weight Scheduling Algorithm", "Distributed Back Pressure Scheduling Algorithm" ], "authors": [ { "givenName": "Swaroop", "surname": "Gopalam", "fullName": "Swaroop Gopalam", "affiliation": "School of Engineering, Macquarie University, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Stephen V.", "surname": "Hanly", "fullName": "Stephen V. Hanly", "affiliation": "School of Engineering, Macquarie University, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Philip", "surname": "Whiting", "fullName": "Philip Whiting", "affiliation": "School of Engineering, Macquarie University, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "1749-1764", "year": "2022", "issn": "1063-6692", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wowmom/2016/2185/0/07523543", "title": "Resilient SDN based small cell backhaul networks using mmWave bands", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2016/07523543/12OmNxvwoW7", "parentPublication": { "id": "proceedings/wowmom/2016/2185/0", "title": "2016 IEEE 17th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019841", "title": "Stable Treemaps via Local Moves", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019841/13rRUIJcWlt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2017/05/07513390", "title": "Stability Analysis of Frame Slotted Aloha Protocol", "doi": null, "abstractUrl": "/journal/tm/2017/05/07513390/13rRUIJuxqk", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2015/01/06689353", "title": "Scheduling in Networks With Time-Varying Channels and Reconfiguration Delay", "doi": null, "abstractUrl": "/journal/nt/2015/01/06689353/13rRUwgyOds", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2014/07/06579614", "title": "Distributed Throughput Maximization in Wireless Networks Using the Stability Region", "doi": null, "abstractUrl": "/journal/td/2014/07/06579614/13rRUwkxc5b", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2023/01/09827974", "title": "On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers", "doi": null, "abstractUrl": "/journal/nt/2023/01/09827974/1EWSpNQ68Mg", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2019/1246/0/124600a708", "title": "mmWave Wireless Backhaul Scheduling of Stochastic Packet Arrivals", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2019/124600a708/1cYhOXgbgTC", "parentPublication": { "id": "proceedings/ipdps/2019/1246/0", "title": "2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2020/8448/0/844800a348", "title": "Evaluation of TDM-based Integrated Access and Backhaul Schemes for 5G and Beyond at mmWave Band", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2020/844800a348/1qJugJIdmNi", "parentPublication": { "id": "proceedings/cyberc/2020/8448/0", "title": "2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/5gwf/2021/4308/0/430800a281", "title": "Investigating Integrated Access and Backhaul on the Aether 5G Testbed", "doi": null, "abstractUrl": "/proceedings-article/5gwf/2021/430800a281/1yEYKPrilH2", "parentPublication": { "id": "proceedings/5gwf/2021/4308/0", "title": "2021 IEEE 4th 5G World Forum (5GWF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/02/09626134", "title": "Stability and Optimization of Speculative Queueing Networks", "doi": null, "abstractUrl": "/journal/nt/2022/02/09626134/1yNcTTEc3ZK", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09707597", "articleId": "1APlvctqfRK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09709533", "articleId": "1ASFiwLoQco", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KMLK3AfWb6", "title": "Feb.", "year": "2023", "issueNum": "01", "idPrefix": "nt", "pubType": "journal", "volume": "31", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1EWSpNQ68Mg", "doi": "10.1109/TNET.2022.3188757", "abstract": "Motivated by the need to provide differentiated quality-of-service (QoS) in grant-free uplink transmissions in 5G networks and beyond, we extend the probabilistic analysis of coded Poisson receivers (CPR) to the setting with multiple classes of users and receivers. For such a CPR system, we prove (under certain technical conditions) that there is a region, called the stability region in this paper. Each transmitted packet can be successfully received with probability 1 when the offered load to the system is within the stability region. On the other hand, if the offered load is outside the stability region, there is a nonzero probability that a packet will fail to be received. We then extend the stability region to the <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\epsilon $_Z</tex-math></inline-formula>-stability region for CPR systems with decoding errors. We also demonstrate the capability of providing differentiated QoS in such CPR systems by comparing the stability regions under various parameter settings.", "abstracts": [ { "abstractType": "Regular", "content": "Motivated by the need to provide differentiated quality-of-service (QoS) in grant-free uplink transmissions in 5G networks and beyond, we extend the probabilistic analysis of coded Poisson receivers (CPR) to the setting with multiple classes of users and receivers. For such a CPR system, we prove (under certain technical conditions) that there is a region, called the stability region in this paper. Each transmitted packet can be successfully received with probability 1 when the offered load to the system is within the stability region. On the other hand, if the offered load is outside the stability region, there is a nonzero probability that a packet will fail to be received. We then extend the stability region to the <inline-formula> <tex-math notation=\"LaTeX\">$\\epsilon $ </tex-math></inline-formula>-stability region for CPR systems with decoding errors. We also demonstrate the capability of providing differentiated QoS in such CPR systems by comparing the stability regions under various parameter settings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Motivated by the need to provide differentiated quality-of-service (QoS) in grant-free uplink transmissions in 5G networks and beyond, we extend the probabilistic analysis of coded Poisson receivers (CPR) to the setting with multiple classes of users and receivers. For such a CPR system, we prove (under certain technical conditions) that there is a region, called the stability region in this paper. Each transmitted packet can be successfully received with probability 1 when the offered load to the system is within the stability region. On the other hand, if the offered load is outside the stability region, there is a nonzero probability that a packet will fail to be received. We then extend the stability region to the --stability region for CPR systems with decoding errors. We also demonstrate the capability of providing differentiated QoS in such CPR systems by comparing the stability regions under various parameter settings.", "title": "On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers", "normalizedTitle": "On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers", "fno": "09827974", "hasPdf": true, "idPrefix": "nt", "keywords": [ "5 G Mobile Communication", "Probability", "Quality Of Service", "Coded Poisson Receivers", "CPR System", "X 03 B 5 Stability Region", "Receivers", "Numerical Stability", "Quality Of Service", "Ultra Reliable Low Latency Communication", "Fading Channels", "Stability Criteria", "Uplink", "Multiple Access", "Differentiated Quality Of Service", "Stability", "Ultra Reliable Low Latency Communications" ], "authors": [ { "givenName": "Chia-Ming", "surname": "Chang", "fullName": "Chia-Ming Chang", "affiliation": "Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Yi-Jheng", "surname": "Lin", "fullName": "Yi-Jheng Lin", "affiliation": "Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Cheng-Shang", "surname": "Chang", "fullName": "Cheng-Shang Chang", "affiliation": "Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Duan-Shin", "surname": "Lee", "fullName": "Duan-Shin Lee", "affiliation": "Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "234-247", "year": "2023", "issn": "1063-6692", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/1/3586b283", "title": "Color Stability and Homogeneity Regions to Detect Text in Real Scene Images: CSHR", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586b283/12OmNA0vnSZ", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2017/4822/0/482201a363", "title": "A Widely Linear Affine LMS Adaptive Algorithm with Momentum Acceleration for DS-CDMA MAI Suppression", "doi": null, "abstractUrl": "/proceedings-article/cis/2017/482201a363/12OmNAle709", "parentPublication": { "id": "proceedings/cis/2017/4822/0", "title": "2017 13th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prdc/2004/2076/0/20760015", "title": "Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers", "doi": null, "abstractUrl": "/proceedings-article/prdc/2004/20760015/12OmNxI0KwH", "parentPublication": { "id": "proceedings/prdc/2004/2076/0", "title": "Pacific Rim International Symposium on Dependable Computing, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nss/2009/3838/0/3838a415", "title": "Framework for Identification of Power System Operating Security Regions", "doi": null, "abstractUrl": "/proceedings-article/nss/2009/3838a415/12OmNyGtjkb", "parentPublication": { "id": "proceedings/nss/2009/3838/0", "title": "Network and System Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmc/2009/5302/0/05295864", "title": "A new rapid synchronization method with anti-timing jitter for UWB systems in dense multipath environment", "doi": null, "abstractUrl": "/proceedings-article/gmc/2009/05295864/12OmNz6iOPc", "parentPublication": { "id": "proceedings/gmc/2009/5302/0", "title": "2009 Global Mobile Congress", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2015/05/06804015", "title": "Algorithms and Stability Analysis for Content Distribution over Multiple Multicast Trees", "doi": null, "abstractUrl": "/journal/td/2015/05/06804015/13rRUxOdD2i", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/05/09765641", "title": "A Theoretical Framework for Random Access: Stability Regions and Transmission Control", "doi": null, "abstractUrl": "/journal/nt/2022/05/09765641/1CY3BaAPmDe", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0/541700a625", "title": "Resource Allocation and Computation Offloading in Ultra-reliable Low-latency Communication Systems via Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2022/541700a625/1Hcn2m1Nv32", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0", "title": "2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2021/02/09334421", "title": "Poisson Receivers: A Probabilistic Framework for Analyzing Coded Random Access", "doi": null, "abstractUrl": "/journal/nt/2021/02/09334421/1qB7o9Oy8ms", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/02/09604910", "title": "ALOHA Receivers: A Network Calculus Approach for Analyzing Coded Multiple Access With SIC", "doi": null, "abstractUrl": "/journal/nt/2022/02/09604910/1yhBkMC9mJG", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09849482", "articleId": "1FxoicYvmN2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09843937", "articleId": "1FlLY5FLG5G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KMLOnQTrVu", "name": "tnt202301-09827974s1-supp1-3188757.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tnt202301-09827974s1-supp1-3188757.pdf", "extension": "pdf", "size": "141 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1M2Ido7rZde", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1AvqHcyRqbS", "doi": "10.1109/TKDE.2022.3146403", "abstract": "Since obtaining data labels is a time-consuming and laborious task, unsupervised feature selection has become a popular feature selection technique. However, the current unsupervised feature selection methods are facing three challenges: (1) they rely on a fixed similarity matrix derived from the original data, which will affect their performance; (2) due to the limitation of sparsity, they can only obtain sub-optimal solutions; (3) they have high computational complexity and cannot handle large-scale data. To solve this dilemma, we propose a fast unsupervised feature selection algorithm with bipartite graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint (BGCFS). We use the original data and the selected anchors to construct an adaptive bipartite graph in the subspace, and apply the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint to the projection matrix for feature selection. In this way, we can update the adaptive bipartite graph and the projection matrix simultaneously, and we can get the feature subset directly, without sorting the features. In addition, we propose an iterative algorithm that can solve the proposed problem globally to obtain a closed-form solution, and we provide a strict proof of convergence for it. Experiments on eight real data sets with different scales show that our method can select more valuable feature subsets more quickly.", "abstracts": [ { "abstractType": "Regular", "content": "Since obtaining data labels is a time-consuming and laborious task, unsupervised feature selection has become a popular feature selection technique. However, the current unsupervised feature selection methods are facing three challenges: (1) they rely on a fixed similarity matrix derived from the original data, which will affect their performance; (2) due to the limitation of sparsity, they can only obtain sub-optimal solutions; (3) they have high computational complexity and cannot handle large-scale data. To solve this dilemma, we propose a fast unsupervised feature selection algorithm with bipartite graph and <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"chen-ieq2-3146403.gif\"/></alternatives></inline-formula>-norm constraint (BGCFS). We use the original data and the selected anchors to construct an adaptive bipartite graph in the subspace, and apply the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"chen-ieq3-3146403.gif\"/></alternatives></inline-formula>-norm constraint to the projection matrix for feature selection. In this way, we can update the adaptive bipartite graph and the projection matrix simultaneously, and we can get the feature subset directly, without sorting the features. In addition, we propose an iterative algorithm that can solve the proposed problem globally to obtain a closed-form solution, and we provide a strict proof of convergence for it. Experiments on eight real data sets with different scales show that our method can select more valuable feature subsets more quickly.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since obtaining data labels is a time-consuming and laborious task, unsupervised feature selection has become a popular feature selection technique. However, the current unsupervised feature selection methods are facing three challenges: (1) they rely on a fixed similarity matrix derived from the original data, which will affect their performance; (2) due to the limitation of sparsity, they can only obtain sub-optimal solutions; (3) they have high computational complexity and cannot handle large-scale data. To solve this dilemma, we propose a fast unsupervised feature selection algorithm with bipartite graph and --norm constraint (BGCFS). We use the original data and the selected anchors to construct an adaptive bipartite graph in the subspace, and apply the --norm constraint to the projection matrix for feature selection. In this way, we can update the adaptive bipartite graph and the projection matrix simultaneously, and we can get the feature subset directly, without sorting the features. In addition, we propose an iterative algorithm that can solve the proposed problem globally to obtain a closed-form solution, and we provide a strict proof of convergence for it. Experiments on eight real data sets with different scales show that our method can select more valuable feature subsets more quickly.", "title": "Fast Unsupervised Feature Selection With Bipartite Graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm Constraint", "normalizedTitle": "Fast Unsupervised Feature Selection With Bipartite Graph and --Norm Constraint", "fno": "09695194", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Computational Complexity", "Feature Extraction", "Feature Selection", "Graph Theory", "Iterative Methods", "Matrix Algebra", "Unsupervised Learning", "Adaptive Bipartite Graph", "BGCFS", "Bipartite Graph", "Data Labels", "Data Sets", "Fast Unsupervised Feature Selection Algorithm", "Feature Subset", "Fixed Similarity Matrix", "Large Scale Data", "Selected Anchors", "Unsupervised Feature Selection Methods", "X 2113 Sub 2 0 Sub Norm Constraint", "Feature Extraction", "Bipartite Graph", "Computational Complexity", "Manifolds", "Convergence", "Task Analysis", "Optics", "Unsupervised Feature Selection", "Large Scale Data", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <named-content content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math> </inline-formula> </named-content> </named-content>-norm constraint", "Bipartite Graph" ], "authors": [ { "givenName": "Hong", "surname": "Chen", "fullName": "Hong Chen", "affiliation": "School of Computer Science and School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi’an, Shaanxi, China", "__typename": "ArticleAuthorType" }, { "givenName": "Feiping", "surname": "Nie", "fullName": "Feiping Nie", "affiliation": "Key Laboratory of Intelligent Interaction and Applications (Ministry of Industry and Information Technology), School of Computer Science, School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi’an, Shaanxi, China", "__typename": "ArticleAuthorType" }, { "givenName": "Rong", "surname": "Wang", "fullName": "Rong Wang", "affiliation": "Key Laboratory of Intelligent Interaction and Applications (Ministry of Industry and Information Technology), School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi’an, Shaanxi, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xuelong", "surname": "Li", "fullName": "Xuelong Li", "affiliation": "Key Laboratory of Intelligent Interaction and Applications (Ministry of Industry and Information Technology), School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Xi’an, Shaanxi, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "4781-4793", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09759987", "title": "Sparse and Flexible Projections for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tk/2023/06/09759987/1CHsvtlNSSI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09925098", "title": "The Proxy Step-Size Technique for Regularized Optimization on the Sphere Manifold", "doi": null, "abstractUrl": "/journal/tp/2023/05/09925098/1HBHVijhpLi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/05/09423579", "title": "Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks", "doi": null, "abstractUrl": "/journal/tc/2022/05/09423579/1tkyeT8TOwg", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09580680", "title": "Sparse PCA via <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,p}$_Z</tex-math></inline-formula>-Norm Regularization for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tp/2023/04/09580680/1xPnZXaZEhG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09645237", "title": "Laplacian Regularized Sparse Representation Based Classifier for Identifying DNA N4-Methylcytosine Sites via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{2,1/2}$_Z</tex-math></inline-formula>-Matrix Norm", "doi": null, "abstractUrl": "/journal/tb/2023/01/09645237/1zc6nhrcvaE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09712197", "articleId": "1AUkecqbRok", "__typename": "AdjacentArticleType" }, "next": { "fno": "09706297", "articleId": "1AO28w9Us7e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1M2IpVB2R3i", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1HojygQOnNm", "doi": "10.1109/TPAMI.2022.3213716", "abstract": "In this article, we present a general optimization framework that leverages structured sparsity to achieve superior recovery results. The traditional method for solving the structured sparse objectives based on <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm is to use the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,1}$_Z</tex-math></inline-formula>-norm as a convex surrogate. However, such an approximation often yields a large performance gap. To tackle this issue, we first provide a framework that allows for a wide range of surrogate functions (including non-convex surrogates), which exhibits better performance in harnessing structured sparsity. Moreover, we develop a fixed point algorithm that solves a key underlying non-convex structured sparse recovery optimization problem to global optimality with a guaranteed super-linear convergence rate. Building on this, we consider three specific applications, i.e., outlier pursuit, supervised feature selection, and structured dictionary learning, which can benefit from the proposed structured sparsity optimization framework. In each application, how the optimization problem can be formulated and thus be relaxed under a generic surrogate function is explained in detail. We conduct extensive experiments on both synthetic and real-world data and demonstrate the effectiveness and efficiency of the proposed framework.", "abstracts": [ { "abstractType": "Regular", "content": "In this article, we present a general optimization framework that leverages structured sparsity to achieve superior recovery results. The traditional method for solving the structured sparse objectives based on <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"zhang-ieq2-3213716.gif\"/></alternatives></inline-formula>-norm is to use the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"zhang-ieq3-3213716.gif\"/></alternatives></inline-formula>-norm as a convex surrogate. However, such an approximation often yields a large performance gap. To tackle this issue, we first provide a framework that allows for a wide range of surrogate functions (including non-convex surrogates), which exhibits better performance in harnessing structured sparsity. Moreover, we develop a fixed point algorithm that solves a key underlying non-convex structured sparse recovery optimization problem to global optimality with a guaranteed super-linear convergence rate. Building on this, we consider three specific applications, i.e., outlier pursuit, supervised feature selection, and structured dictionary learning, which can benefit from the proposed structured sparsity optimization framework. In each application, how the optimization problem can be formulated and thus be relaxed under a generic surrogate function is explained in detail. We conduct extensive experiments on both synthetic and real-world data and demonstrate the effectiveness and efficiency of the proposed framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this article, we present a general optimization framework that leverages structured sparsity to achieve superior recovery results. The traditional method for solving the structured sparse objectives based on --norm is to use the --norm as a convex surrogate. However, such an approximation often yields a large performance gap. To tackle this issue, we first provide a framework that allows for a wide range of surrogate functions (including non-convex surrogates), which exhibits better performance in harnessing structured sparsity. Moreover, we develop a fixed point algorithm that solves a key underlying non-convex structured sparse recovery optimization problem to global optimality with a guaranteed super-linear convergence rate. Building on this, we consider three specific applications, i.e., outlier pursuit, supervised feature selection, and structured dictionary learning, which can benefit from the proposed structured sparsity optimization framework. In each application, how the optimization problem can be formulated and thus be relaxed under a generic surrogate function is explained in detail. We conduct extensive experiments on both synthetic and real-world data and demonstrate the effectiveness and efficiency of the proposed framework.", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "normalizedTitle": "Structured Sparsity Optimization With Non-Convex Surrogates of --Norm: A Unified Algorithmic Framework", "fno": "09916142", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Concave Programming", "Convex Programming", "Feature Selection", "Signal Processing", "Convex Surrogate", "Fixed Point Algorithm", "General Optimization Framework", "Nonconvex Structured Sparse Recovery Optimization Problem", "Nonconvex Surrogates", "Outlier Pursuit", "Structured Dictionary Learning", "Structured Sparse Objectives", "Structured Sparsity Optimization Framework", "Super Linear Convergence Rate", "Supervised Feature Selection", "Surrogate Functions", "Unified Algorithmic Framework", "Optimization", "Convergence", "Sparse Matrices", "Machine Learning", "Minimization", "Mathematical Models", "Iterative Algorithms", "Structured Sparsity", "Non Convex Surrogate", "Fixed Point Algorithm" ], "authors": [ { "givenName": "Xiaoqin", "surname": "Zhang", "fullName": "Xiaoqin Zhang", "affiliation": "College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jingjing", "surname": "Zheng", "fullName": "Jingjing Zheng", "affiliation": "College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Di", "surname": "Wang", "fullName": "Di Wang", "affiliation": "Center for Intelligent Decision-Making and Machine Learning, School of Management, Xi’an Jiaotong University, Xi’an, Shaanxi, China", "__typename": "ArticleAuthorType" }, { "givenName": "Guiying", "surname": "Tang", "fullName": "Guiying Tang", "affiliation": "College of Computer Science and Artificial Intelligence, Wenzhou University, Wenzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhengyuan", "surname": "Zhou", "fullName": "Zhengyuan Zhou", "affiliation": "Department of Electrical Engineering, Stanford University, Stanford, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zhouchen", "surname": "Lin", "fullName": "Zhouchen Lin", "affiliation": "Key Laboratory of Machine Perception (MOE), School of Intelligence Science and Technology, Peking University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "6386-6402", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2019/04/08494787", "title": "Better Circuits for Binary Polynomial Multiplication", "doi": null, "abstractUrl": "/journal/tc/2019/04/08494787/14s8M4Sn2IE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09695194", "title": "Fast Unsupervised Feature Selection With Bipartite Graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm Constraint", "doi": null, "abstractUrl": "/journal/tk/2023/05/09695194/1AvqHcyRqbS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09925098", "title": "The Proxy Step-Size Technique for Regularized Optimization on the Sphere Manifold", "doi": null, "abstractUrl": "/journal/tp/2023/05/09925098/1HBHVijhpLi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09580680", "title": "Sparse PCA via <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,p}$_Z</tex-math></inline-formula>-Norm Regularization for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tp/2023/04/09580680/1xPnZXaZEhG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09645237", "title": "Laplacian Regularized Sparse Representation Based Classifier for Identifying DNA N4-Methylcytosine Sites via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{2,1/2}$_Z</tex-math></inline-formula>-Matrix Norm", "doi": null, "abstractUrl": "/journal/tb/2023/01/09645237/1zc6nhrcvaE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09894086", "articleId": "1GIqmLcwiuk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09895320", "articleId": "1GNpcsNqHW8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1M2IwTS8LoQ", "name": "ttp202305-09916142s1-supp1-3213716.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202305-09916142s1-supp1-3213716.pdf", "extension": "pdf", "size": "380 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1EECwg7RIqY", "title": "Aug.", "year": "2022", "issueNum": "08", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1rPt9ICFlCw", "doi": "10.1109/TPAMI.2021.3065021", "abstract": "Point cloud registration (PCR) is an important and fundamental problem in 3D computer vision, whose goal is to seek an optimal rigid model to register a point cloud pair. Correspondence-based PCR techniques do not require initial guesses and gain more attentions. However, 3D keypoint techniques are much more difficult than their 2D counterparts, which results in extremely high outlier rates. Current robust techniques suffer from very high computational cost. In this paper, we propose a polynomial time (<inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> is the number of correspondences.) outlier removal method. Its basic idea is to reduce the input set into a smaller one with a lower outlier rate based on bound principle. To seek tight lower and upper bounds, we originally define two concepts, i.e., correspondence matrix (CM) and augmented correspondence matrix (ACM). We propose a cost function to minimize the determinant of CM or ACM, where the cost of CM rises to a tight lower bound and the cost of ACM leads to a tight upper bound. Then, we propose a scale-adaptive Cauchy estimator (SA-Cauchy) for further optimization. Extensive experiments on simulated and real PCR datasets demonstrate that the proposed method is robust at outlier rates above 99 percent and 1<inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim$_Z</tex-math></inline-formula>2 orders faster than its competitors. The source code will be made publicly available in <uri>https://ljy-rs.github.io/web/</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Point cloud registration (PCR) is an important and fundamental problem in 3D computer vision, whose goal is to seek an optimal rigid model to register a point cloud pair. Correspondence-based PCR techniques do not require initial guesses and gain more attentions. However, 3D keypoint techniques are much more difficult than their 2D counterparts, which results in extremely high outlier rates. Current robust techniques suffer from very high computational cost. In this paper, we propose a polynomial time (<inline-formula><tex-math notation=\"LaTeX\">$O(N^2)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>N</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"li-ieq2-3065021.gif\"/></alternatives></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math><alternatives><mml:math><mml:mi>N</mml:mi></mml:math><inline-graphic xlink:href=\"li-ieq3-3065021.gif\"/></alternatives></inline-formula> is the number of correspondences.) outlier removal method. Its basic idea is to reduce the input set into a smaller one with a lower outlier rate based on bound principle. To seek tight lower and upper bounds, we originally define two concepts, i.e., correspondence matrix (CM) and augmented correspondence matrix (ACM). We propose a cost function to minimize the determinant of CM or ACM, where the cost of CM rises to a tight lower bound and the cost of ACM leads to a tight upper bound. Then, we propose a scale-adaptive Cauchy estimator (SA-Cauchy) for further optimization. Extensive experiments on simulated and real PCR datasets demonstrate that the proposed method is robust at outlier rates above 99 percent and 1<inline-formula><tex-math notation=\"LaTeX\">$\\sim$</tex-math><alternatives><mml:math><mml:mo>&#x223C;</mml:mo></mml:math><inline-graphic xlink:href=\"li-ieq4-3065021.gif\"/></alternatives></inline-formula>2 orders faster than its competitors. The source code will be made publicly available in <uri>https://ljy-rs.github.io/web/</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point cloud registration (PCR) is an important and fundamental problem in 3D computer vision, whose goal is to seek an optimal rigid model to register a point cloud pair. Correspondence-based PCR techniques do not require initial guesses and gain more attentions. However, 3D keypoint techniques are much more difficult than their 2D counterparts, which results in extremely high outlier rates. Current robust techniques suffer from very high computational cost. In this paper, we propose a polynomial time (-, where - is the number of correspondences.) outlier removal method. Its basic idea is to reduce the input set into a smaller one with a lower outlier rate based on bound principle. To seek tight lower and upper bounds, we originally define two concepts, i.e., correspondence matrix (CM) and augmented correspondence matrix (ACM). We propose a cost function to minimize the determinant of CM or ACM, where the cost of CM rises to a tight lower bound and the cost of ACM leads to a tight upper bound. Then, we propose a scale-adaptive Cauchy estimator (SA-Cauchy) for further optimization. Extensive experiments on simulated and real PCR datasets demonstrate that the proposed method is robust at outlier rates above 99 percent and 1-2 orders faster than its competitors. The source code will be made publicly available in https://ljy-rs.github.io/web/.", "title": "A Practical <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula> Outlier Removal Method for Correspondence-Based Point Cloud Registration", "normalizedTitle": "A Practical - Outlier Removal Method for Correspondence-Based Point Cloud Registration", "fno": "09373914", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computational Complexity", "Computational Geometry", "Computer Vision", "Image Registration", "Optimisation", "Statistical Analysis", "Stereo Image Processing", "ACM", "Correspondence Based Point Cloud Registration", "3 D Computer Vision", "3 D Keypoint Techniques", "Bound Principle", "Augmented Correspondence Matrix", "Cost Function", "O N Sup 2 Sup Outlier Removal", "Correspondence Based PCR", "Polynomial Time Outlier Removal", "Scale Adaptive Cauchy Estimator", "SA Cauchy", "Optimization", "Three Dimensional Displays", "Upper Bound", "Feature Extraction", "Estimation", "Two Dimensional Displays", "Time Complexity", "Detectors", "Point Cloud Registration", "Outlier Removal", "Correspondence Matrix", "Robust Estimation", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math> </inline-formula> </named-content> running time" ], "authors": [ { "givenName": "Jiayuan", "surname": "Li", "fullName": "Jiayuan Li", "affiliation": "School of Remote Sensing and Information Engineering, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "3926-3939", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09463675", "title": "Efficient Hardware Implementation of Finite Field Arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> for Binary Ring-LWE Based Post-Quantum Cryptography", "doi": null, "abstractUrl": "/journal/ec/2022/02/09463675/1uFxptYevFC", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09616383", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$xAFCL$_Z</tex-math></inline-formula>: Run Scalable Function Choreographies Across Multiple FaaS Systems", "doi": null, "abstractUrl": "/journal/sc/2023/01/09616383/1yA74qnPV4c", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09812934", "articleId": "1EECDmJ0nfO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09372870", "articleId": "1rNOzajdn5C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1EECE455H2M", "name": "ttp202208-09373914s1-supp1-3065021.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202208-09373914s1-supp1-3065021.pdf", "extension": "pdf", "size": "199 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1DU9C1cnFPq", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1reXhVJz6eI", "doi": "10.1109/TPAMI.2021.3059301", "abstract": "Proximal operators are of particular interest in optimization problems dealing with non-smooth objectives because in many practical cases they lead to optimization algorithms whose updates can be computed in closed form or very efficiently. A well-known example is the proximal operator of the vector <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _1$_Z</tex-math></inline-formula> norm, which is given by the soft-thresholding operator. In this paper we study the proximal operator of the mixed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> matrix norm and show that it can be computed in closed form by applying the well-known soft-thresholding operator to each column of the matrix. However, unlike the vector <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _1$_Z</tex-math></inline-formula> norm case where the threshold is constant, in the mixed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> norm case each column of the matrix might require a different threshold and all thresholds depend on the given matrix. We propose a general iterative algorithm for computing these thresholds, as well as two efficient implementations that further exploit easy to compute lower bounds for the mixed norm of the optimal solution. Experiments on large-scale synthetic and real data indicate that the proposed methods can be orders of magnitude faster than state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Proximal operators are of particular interest in optimization problems dealing with non-smooth objectives because in many practical cases they lead to optimization algorithms whose updates can be computed in closed form or very efficiently. A well-known example is the proximal operator of the vector <inline-formula><tex-math notation=\"LaTeX\">$\\ell _1$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math><inline-graphic xlink:href=\"bejar-ieq2-3059301.gif\"/></alternatives></inline-formula> norm, which is given by the soft-thresholding operator. In this paper we study the proximal operator of the mixed <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{1,\\infty }$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>&#x221E;</mml:mi></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"bejar-ieq3-3059301.gif\"/></alternatives></inline-formula> matrix norm and show that it can be computed in closed form by applying the well-known soft-thresholding operator to each column of the matrix. However, unlike the vector <inline-formula><tex-math notation=\"LaTeX\">$\\ell _1$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math><inline-graphic xlink:href=\"bejar-ieq4-3059301.gif\"/></alternatives></inline-formula> norm case where the threshold is constant, in the mixed <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{1,\\infty }$</tex-math><alternatives><mml:math><mml:msub><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>&#x221E;</mml:mi></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"bejar-ieq5-3059301.gif\"/></alternatives></inline-formula> norm case each column of the matrix might require a different threshold and all thresholds depend on the given matrix. We propose a general iterative algorithm for computing these thresholds, as well as two efficient implementations that further exploit easy to compute lower bounds for the mixed norm of the optimal solution. Experiments on large-scale synthetic and real data indicate that the proposed methods can be orders of magnitude faster than state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Proximal operators are of particular interest in optimization problems dealing with non-smooth objectives because in many practical cases they lead to optimization algorithms whose updates can be computed in closed form or very efficiently. A well-known example is the proximal operator of the vector - norm, which is given by the soft-thresholding operator. In this paper we study the proximal operator of the mixed - matrix norm and show that it can be computed in closed form by applying the well-known soft-thresholding operator to each column of the matrix. However, unlike the vector - norm case where the threshold is constant, in the mixed - norm case each column of the matrix might require a different threshold and all thresholds depend on the given matrix. We propose a general iterative algorithm for computing these thresholds, as well as two efficient implementations that further exploit easy to compute lower bounds for the mixed norm of the optimal solution. Experiments on large-scale synthetic and real data indicate that the proposed methods can be orders of magnitude faster than state-of-the-art methods.", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "normalizedTitle": "The Fastest - Prox in the West", "fno": "09354530", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Iterative Methods", "Matrix Algebra", "Optimisation", "Vectors", "Proximal Operator", "Optimization Problems", "Nonsmooth Objectives", "Soft Thresholding Operator", "Optimal Solution", "X 2113 1 Sub X 221 E Sub Matrix Norm", "Iterative Algorithm", "X 2113 1 Sub X 221 E Sub Prox", "Convex Functions", "Sorting", "Signal Processing Algorithms", "Linear Programming", "Iterative Methods", "Complexity Theory", "Acceleration", "Proximal Operator", "Mixed Norm", "Block Sparsity" ], "authors": [ { "givenName": "Benjamín", "surname": "Béjar", "fullName": "Benjamín Béjar", "affiliation": "Department of Biomedical Engineering, Mathematical Institute for Data Science, Johns Hopkins University, Baltimore, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ivan", "surname": "Dokmanić", "fullName": "Ivan Dokmanić", "affiliation": "Department of Electrical and Computer Engineering, University of Illinois at Urbana Champaign, Champaign, IL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "René", "surname": "Vidal", "fullName": "René Vidal", "affiliation": "Department of Biomedical Engineering, Mathematical Institute for Data Science, Johns Hopkins University, Baltimore, MD, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "3858-3869", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09695194", "title": "Fast Unsupervised Feature Selection With Bipartite Graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm Constraint", "doi": null, "abstractUrl": "/journal/tk/2023/05/09695194/1AvqHcyRqbS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09448409", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1}$_Z</tex-math></inline-formula>-Norm Quantile Regression Screening Rule via the Dual Circumscribed Sphere", "doi": null, "abstractUrl": "/journal/tp/2022/10/09448409/1ugE4OYu2Xu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09580680", "title": "Sparse PCA via <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,p}$_Z</tex-math></inline-formula>-Norm Regularization for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tp/2023/04/09580680/1xPnZXaZEhG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09645237", "title": "Laplacian Regularized Sparse Representation Based Classifier for Identifying DNA N4-Methylcytosine Sites via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{2,1/2}$_Z</tex-math></inline-formula>-Matrix Norm", "doi": null, "abstractUrl": "/journal/tb/2023/01/09645237/1zc6nhrcvaE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09354025", "articleId": "1r9YImS2Xv2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09335510", "articleId": "1qG6p9bvm3m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GF6jMpqNjy", "title": "Oct.", "year": "2022", "issueNum": "10", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1uHcfwcwOju", "doi": "10.1109/TPAMI.2021.3092177", "abstract": "Support vector machines (SVM) have drawn wide attention for the last two decades due to its extensive applications, so a vast body of work has developed optimization algorithms to solve SVM with various soft-margin losses. To distinguish all, in this paper, we aim at solving an ideal soft-margin loss SVM: <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> soft-margin loss SVM (dubbed as <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula>-SVM). Many of the existing (non)convex soft-margin losses can be viewed as one of the surrogates of the <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> soft-margin loss. Despite its discrete nature, we manage to establish the optimality theory for the <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula>-SVM including the existence of the optimal solutions, the relationship between them and P-stationary points. These not only enable us to deliver a rigorous definition of <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> support vectors but also allow us to define a working set. Integrating such a working set, a fast alternating direction method of multipliers is then proposed with its limit point being a locally optimal solution to the <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula>-SVM. Finally, numerical experiments demonstrate that our proposed method outperforms some leading classification solvers from SVM communities, in terms of faster computational speed and a fewer number of support vectors. The bigger the data size is, the more evident its advantage appears.", "abstracts": [ { "abstractType": "Regular", "content": "Support vector machines (SVM) have drawn wide attention for the last two decades due to its extensive applications, so a vast body of work has developed optimization algorithms to solve SVM with various soft-margin losses. To distinguish all, in this paper, we aim at solving an ideal soft-margin loss SVM: <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq2-3092177.gif\"/></alternatives></inline-formula> soft-margin loss SVM (dubbed as <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq3-3092177.gif\"/></alternatives></inline-formula>-SVM). Many of the existing (non)convex soft-margin losses can be viewed as one of the surrogates of the <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq4-3092177.gif\"/></alternatives></inline-formula> soft-margin loss. Despite its discrete nature, we manage to establish the optimality theory for the <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq5-3092177.gif\"/></alternatives></inline-formula>-SVM including the existence of the optimal solutions, the relationship between them and P-stationary points. These not only enable us to deliver a rigorous definition of <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq6-3092177.gif\"/></alternatives></inline-formula> support vectors but also allow us to define a working set. Integrating such a working set, a fast alternating direction method of multipliers is then proposed with its limit point being a locally optimal solution to the <inline-formula><tex-math notation=\"LaTeX\">$L_{0/1}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mn>0</mml:mn><mml:mo>/</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"wang-ieq7-3092177.gif\"/></alternatives></inline-formula>-SVM. Finally, numerical experiments demonstrate that our proposed method outperforms some leading classification solvers from SVM communities, in terms of faster computational speed and a fewer number of support vectors. The bigger the data size is, the more evident its advantage appears.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Support vector machines (SVM) have drawn wide attention for the last two decades due to its extensive applications, so a vast body of work has developed optimization algorithms to solve SVM with various soft-margin losses. To distinguish all, in this paper, we aim at solving an ideal soft-margin loss SVM: - soft-margin loss SVM (dubbed as --SVM). Many of the existing (non)convex soft-margin losses can be viewed as one of the surrogates of the - soft-margin loss. Despite its discrete nature, we manage to establish the optimality theory for the --SVM including the existence of the optimal solutions, the relationship between them and P-stationary points. These not only enable us to deliver a rigorous definition of - support vectors but also allow us to define a working set. Integrating such a working set, a fast alternating direction method of multipliers is then proposed with its limit point being a locally optimal solution to the --SVM. Finally, numerical experiments demonstrate that our proposed method outperforms some leading classification solvers from SVM communities, in terms of faster computational speed and a fewer number of support vectors. The bigger the data size is, the more evident its advantage appears.", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "normalizedTitle": "Support Vector Machine Classifier via - Soft-Margin Loss", "fno": "09464733", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Convex Programming", "Optimisation", "Pattern Classification", "Support Vector Machines", "Ideal Soft Margin Loss SVM", "Existingconvex Soft Margin Losses", "Support Vector Machines", "Training", "Optimization", "Fasteners", "Training Data", "Standards", "Robustness", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math> </inline-formula> </named-content> soft-margin loss", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math> </inline-formula> </named-content>-SVM", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math> </inline-formula> </named-content> proximal operator", "Minimizer And P Stationary Point", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math> </inline-formula> </named-content> support vectors", "<monospace xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\">L<named-content content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$_{0/1}$_Z</tex-math> </inline-formula> </named-content>ADMM</monospace>" ], "authors": [ { "givenName": "Huajun", "surname": "Wang", "fullName": "Huajun Wang", "affiliation": "Department of Applied Mathematics, Beijing Jiaotong University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuanhai", "surname": "Shao", "fullName": "Yuanhai Shao", "affiliation": "School of Management, Hainan University, Haikou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shenglong", "surname": "Zhou", "fullName": "Shenglong Zhou", "affiliation": "Department of Electrical and Electronic Engineering, Imperial College London, London, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Ce", "surname": "Zhang", "fullName": "Ce Zhang", "affiliation": "Department of Applied Mathematics, Beijing Jiaotong University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Naihua", "surname": "Xiu", "fullName": "Naihua Xiu", "affiliation": "Department of Applied Mathematics, Beijing Jiaotong University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "7253-7265", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09690063", "title": "Algebraic Attacks on Block Ciphers Using Quantum Annealing", "doi": null, "abstractUrl": "/journal/ec/2022/02/09690063/1AlCiyYAakw", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09695194", "title": "Fast Unsupervised Feature Selection With Bipartite Graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm Constraint", "doi": null, "abstractUrl": "/journal/tk/2023/05/09695194/1AvqHcyRqbS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09580680", "title": "Sparse PCA via <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,p}$_Z</tex-math></inline-formula>-Norm Regularization for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tp/2023/04/09580680/1xPnZXaZEhG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09645237", "title": "Laplacian Regularized Sparse Representation Based Classifier for Identifying DNA N4-Methylcytosine Sites via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{2,1/2}$_Z</tex-math></inline-formula>-Matrix Norm", "doi": null, "abstractUrl": "/journal/tb/2023/01/09645237/1zc6nhrcvaE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09454290", "articleId": "1uqBdfvmYc8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09462521", "articleId": "1uDSvbmzJQc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1GF6ryHCnHW", "name": "ttp202210-09464733s1-supp1-3092177.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202210-09464733s1-supp1-3092177.pdf", "extension": "pdf", "size": "548 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1DeF3m08bU4", "title": "June", "year": "2022", "issueNum": "06", "idPrefix": "tc", "pubType": "journal", "volume": "71", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1uaauvs6N0c", "doi": "10.1109/TC.2021.3086071", "abstract": "Hardware realization of public-key cryptosystems often entails Montgomery modular multiplication (MMM), which is more efficient in residue number systems (RNS). A large pool of co-prime moduli allows for higher number of dynamically changeable moduli-set pairs for the required base extension, leading to ultra-wide key-lengths to accommodate the indispensable resistance to differential power-analysis (DPA) attacks. The moduli are often of the form <inline-formula><tex-math notation=\"LaTeX\">Z_${2^r} - {{\\delta }}$_Z</tex-math></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">Z_$r$_Z</tex-math></inline-formula> denotes the width of residue channels. In a previous relevant RNS MMM design, with <inline-formula><tex-math notation=\"LaTeX\">Z_$r\\ = \\ 64$_Z</tex-math></inline-formula>, probability of a successful DPA attack is less than <inline-formula><tex-math notation=\"LaTeX\">Z_${2^{ - 66}}$_Z</tex-math></inline-formula>, where efficient arithmetic is obtained only for a limited set of moduli that are insufficient for key-lengths over 1024 bits. Here we propose a free-<inline-formula><tex-math notation=\"LaTeX\">Z_${{\\delta }}$_Z</tex-math></inline-formula> RNS MMM scheme, for up-to 8192-bit key-lengths and fast 16-bit residue channels, based on the proposed <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\delta }}$_Z</tex-math></inline-formula>-independent modulo-(<inline-formula><tex-math notation=\"LaTeX\">Z_${2^r} - {{\\delta }}$_Z</tex-math></inline-formula>) adders and multipliers. Moreover, we propose an especial method for moduli selection that is required for base extension, leading to the same aforementioned DPA-resistance measure and much lower measures for key-lengths over 1024. The implementation results show <inline-formula><tex-math notation=\"LaTeX\">Z_$82,69,44\\ percent$_Z</tex-math></inline-formula> less RSA delay, for key-lengths <inline-formula><tex-math notation=\"LaTeX\">Z_$512,1024,2048$_Z</tex-math></inline-formula>, respectively of the home designs versus the 512-bit main reference design, and more than <inline-formula><tex-math notation=\"LaTeX\">Z_$5,100\\ percent$_Z</tex-math></inline-formula> for <inline-formula><tex-math notation=\"LaTeX\">Z_$4096,8192$_Z</tex-math></inline-formula> key-lengths, respectively, all per 512-bit encrypted messages.", "abstracts": [ { "abstractType": "Regular", "content": "Hardware realization of public-key cryptosystems often entails Montgomery modular multiplication (MMM), which is more efficient in residue number systems (RNS). A large pool of co-prime moduli allows for higher number of dynamically changeable moduli-set pairs for the required base extension, leading to ultra-wide key-lengths to accommodate the indispensable resistance to differential power-analysis (DPA) attacks. The moduli are often of the form <inline-formula><tex-math notation=\"LaTeX\">${2^r} - {{\\delta }}$</tex-math><alternatives><mml:math><mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mi>r</mml:mi></mml:msup><mml:mo>-</mml:mo><mml:mi>&#x03B4;</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq2-3086071.gif\"/></alternatives></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">$r$</tex-math><alternatives><mml:math><mml:mi>r</mml:mi></mml:math><inline-graphic xlink:href=\"jaberipur-ieq3-3086071.gif\"/></alternatives></inline-formula> denotes the width of residue channels. In a previous relevant RNS MMM design, with <inline-formula><tex-math notation=\"LaTeX\">$r\\ = \\ 64$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>r</mml:mi><mml:mspace width=\"4pt\"/><mml:mo>=</mml:mo><mml:mspace width=\"4pt\"/><mml:mn>64</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq4-3086071.gif\"/></alternatives></inline-formula>, probability of a successful DPA attack is less than <inline-formula><tex-math notation=\"LaTeX\">${2^{ - 66}}$</tex-math><alternatives><mml:math><mml:msup><mml:mn>2</mml:mn><mml:mrow><mml:mo>-</mml:mo><mml:mn>66</mml:mn></mml:mrow></mml:msup></mml:math><inline-graphic xlink:href=\"jaberipur-ieq5-3086071.gif\"/></alternatives></inline-formula>, where efficient arithmetic is obtained only for a limited set of moduli that are insufficient for key-lengths over 1024 bits. Here we propose a free-<inline-formula><tex-math notation=\"LaTeX\">${{\\delta }}$</tex-math><alternatives><mml:math><mml:mi>&#x03B4;</mml:mi></mml:math><inline-graphic xlink:href=\"jaberipur-ieq6-3086071.gif\"/></alternatives></inline-formula> RNS MMM scheme, for up-to 8192-bit key-lengths and fast 16-bit residue channels, based on the proposed <inline-formula><tex-math notation=\"LaTeX\">${{\\delta }}$</tex-math><alternatives><mml:math><mml:mi>&#x03B4;</mml:mi></mml:math><inline-graphic xlink:href=\"jaberipur-ieq7-3086071.gif\"/></alternatives></inline-formula>-independent modulo-(<inline-formula><tex-math notation=\"LaTeX\">${2^r} - {{\\delta }}$</tex-math><alternatives><mml:math><mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mi>r</mml:mi></mml:msup><mml:mo>-</mml:mo><mml:mi>&#x03B4;</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq8-3086071.gif\"/></alternatives></inline-formula>) adders and multipliers. Moreover, we propose an especial method for moduli selection that is required for base extension, leading to the same aforementioned DPA-resistance measure and much lower measures for key-lengths over 1024. The implementation results show <inline-formula><tex-math notation=\"LaTeX\">$82,69,44\\ percent$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>82</mml:mn><mml:mo>,</mml:mo><mml:mn>69</mml:mn><mml:mo>,</mml:mo><mml:mn>44</mml:mn><mml:mspace width=\"4pt\"/><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>c</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq9-3086071.gif\"/></alternatives></inline-formula> less RSA delay, for key-lengths <inline-formula><tex-math notation=\"LaTeX\">$512,1024,2048$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>512</mml:mn><mml:mo>,</mml:mo><mml:mn>1024</mml:mn><mml:mo>,</mml:mo><mml:mn>2048</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq10-3086071.gif\"/></alternatives></inline-formula>, respectively of the home designs versus the 512-bit main reference design, and more than <inline-formula><tex-math notation=\"LaTeX\">$5,100\\ percent$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>100</mml:mn><mml:mspace width=\"4pt\"/><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>c</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq11-3086071.gif\"/></alternatives></inline-formula> for <inline-formula><tex-math notation=\"LaTeX\">$4096,8192$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>4096</mml:mn><mml:mo>,</mml:mo><mml:mn>8192</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"jaberipur-ieq12-3086071.gif\"/></alternatives></inline-formula> key-lengths, respectively, all per 512-bit encrypted messages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Hardware realization of public-key cryptosystems often entails Montgomery modular multiplication (MMM), which is more efficient in residue number systems (RNS). A large pool of co-prime moduli allows for higher number of dynamically changeable moduli-set pairs for the required base extension, leading to ultra-wide key-lengths to accommodate the indispensable resistance to differential power-analysis (DPA) attacks. The moduli are often of the form -, where - denotes the width of residue channels. In a previous relevant RNS MMM design, with -, probability of a successful DPA attack is less than -, where efficient arithmetic is obtained only for a limited set of moduli that are insufficient for key-lengths over 1024 bits. Here we propose a free-- RNS MMM scheme, for up-to 8192-bit key-lengths and fast 16-bit residue channels, based on the proposed --independent modulo-(-) adders and multipliers. Moreover, we propose an especial method for moduli selection that is required for base extension, leading to the same aforementioned DPA-resistance measure and much lower measures for key-lengths over 1024. The implementation results show - less RSA delay, for key-lengths -, respectively of the home designs versus the 512-bit main reference design, and more than - for - key-lengths, respectively, all per 512-bit encrypted messages.", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "normalizedTitle": "Up to --bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "fno": "09445629", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Adders", "Digital Arithmetic", "Multiplying Circuits", "Public Key Cryptography", "Residue Number Systems", "Encrypted Messages", "Bit Modular Montgomery Multiplication", "Residue Number Systems", "16 Bit Residue Channels", "Public Key Cryptosystems", "Montgomery Modular Multiplication", "Co Prime Moduli", "Dynamically Changeable Moduli Set Pairs", "Required Base Extension", "Ultra Wide Key Lengths", "Differential Power Analysis Attacks", "Previous Relevant RNS MMM Design", "Successful DPA Attack", "Moduli Selection", "Main Reference Design", "DPA Resistance Measure", "Free X 03 B 4 RNS MMM Scheme", "Key Lengths", "Word Length 1024 0 Bit", "Word Length 512 Bit", "Cryptography", "Elliptic Curve Cryptography", "Delays", "Length Measurement", "Hardware", "Computer Science", "Transforms", "Cryptosystem", "Hardware Realization", "Modular Addition", "Montgomery Multiplication", "Residue Number System" ], "authors": [ { "givenName": "Zabihollah", "surname": "Ahmadpour", "fullName": "Zabihollah Ahmadpour", "affiliation": "Department of Computer Science and Engineering, Shahid Beheshti University, Tehran, Iran", "__typename": "ArticleAuthorType" }, { "givenName": "Ghassem", "surname": "Jaberipur", "fullName": "Ghassem Jaberipur", "affiliation": "Department of Computer Science and Engineering, Shahid Beheshti University, Tehran, Iran", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1399-1410", "year": "2022", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09695194", "title": "Fast Unsupervised Feature Selection With Bipartite Graph and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm Constraint", "doi": null, "abstractUrl": "/journal/tk/2023/05/09695194/1AvqHcyRqbS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09463675", "title": "Efficient Hardware Implementation of Finite Field Arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> for Binary Ring-LWE Based Post-Quantum Cryptography", "doi": null, "abstractUrl": "/journal/ec/2022/02/09463675/1uFxptYevFC", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09616383", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$xAFCL$_Z</tex-math></inline-formula>: Run Scalable Function Choreographies Across Multiple FaaS Systems", "doi": null, "abstractUrl": "/journal/sc/2023/01/09616383/1yA74qnPV4c", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09445600", "articleId": "1uaaumNlk2c", "__typename": "AdjacentArticleType" }, "next": { "fno": "09445590", "articleId": "1uaav1j9K36", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Hcio5iMQBW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1wpq5To7ikU", "doi": "10.1109/TPAMI.2021.3107796", "abstract": "As deep learning models are usually massive and complex, distributed learning is essential for increasing training efficiency. Moreover, in many real-world application scenarios like healthcare, distributed learning can also keep the data local and protect privacy. Recently, the asynchronous decentralized parallel stochastic gradient descent (ADPSGD) algorithm has been proposed and demonstrated to be an efficient and practical strategy where there is no central server, so that each computing node only communicates with its neighbors. Although no raw data will be transmitted across different local nodes, there is still a risk of information leak during the communication process for malicious participants to make attacks. In this paper, we present a differentially private version of asynchronous decentralized parallel SGD framework, or A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD for short, which maintains communication efficiency of ADPSGD and prevents the inference from malicious participants. Specifically, R&#x00E9;nyi differential privacy is used to provide tighter privacy analysis for our composite Gaussian mechanisms while the convergence rate is consistent with the non-private version. Theoretical analysis shows A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD also converges at the optimal <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {O}(1/\\sqrt{T})$_Z</tex-math></inline-formula> rate as SGD. Empirically, A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD achieves comparable model accuracy as the differentially private version of Synchronous SGD (SSGD) but runs much faster than SSGD in heterogeneous computing environments.", "abstracts": [ { "abstractType": "Regular", "content": "As deep learning models are usually massive and complex, distributed learning is essential for increasing training efficiency. Moreover, in many real-world application scenarios like healthcare, distributed learning can also keep the data local and protect privacy. Recently, the asynchronous decentralized parallel stochastic gradient descent (ADPSGD) algorithm has been proposed and demonstrated to be an efficient and practical strategy where there is no central server, so that each computing node only communicates with its neighbors. Although no raw data will be transmitted across different local nodes, there is still a risk of information leak during the communication process for malicious participants to make attacks. In this paper, we present a differentially private version of asynchronous decentralized parallel SGD framework, or A(DP)<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xu-ieq2-3107796.gif\"/></alternatives></inline-formula>SGD for short, which maintains communication efficiency of ADPSGD and prevents the inference from malicious participants. Specifically, R&#x00E9;nyi differential privacy is used to provide tighter privacy analysis for our composite Gaussian mechanisms while the convergence rate is consistent with the non-private version. Theoretical analysis shows A(DP)<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xu-ieq3-3107796.gif\"/></alternatives></inline-formula>SGD also converges at the optimal <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {O}(1/\\sqrt{T})$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"script\">O</mml:mi><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>/</mml:mo><mml:msqrt><mml:mi>T</mml:mi></mml:msqrt><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"xu-ieq4-3107796.gif\"/></alternatives></inline-formula> rate as SGD. Empirically, A(DP)<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xu-ieq5-3107796.gif\"/></alternatives></inline-formula>SGD achieves comparable model accuracy as the differentially private version of Synchronous SGD (SSGD) but runs much faster than SSGD in heterogeneous computing environments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As deep learning models are usually massive and complex, distributed learning is essential for increasing training efficiency. Moreover, in many real-world application scenarios like healthcare, distributed learning can also keep the data local and protect privacy. Recently, the asynchronous decentralized parallel stochastic gradient descent (ADPSGD) algorithm has been proposed and demonstrated to be an efficient and practical strategy where there is no central server, so that each computing node only communicates with its neighbors. Although no raw data will be transmitted across different local nodes, there is still a risk of information leak during the communication process for malicious participants to make attacks. In this paper, we present a differentially private version of asynchronous decentralized parallel SGD framework, or A(DP)-SGD for short, which maintains communication efficiency of ADPSGD and prevents the inference from malicious participants. Specifically, Rényi differential privacy is used to provide tighter privacy analysis for our composite Gaussian mechanisms while the convergence rate is consistent with the non-private version. Theoretical analysis shows A(DP)-SGD also converges at the optimal - rate as SGD. Empirically, A(DP)-SGD achieves comparable model accuracy as the differentially private version of Synchronous SGD (SSGD) but runs much faster than SSGD in heterogeneous computing environments.", "title": "A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent With Differential Privacy", "normalizedTitle": "A(DP)-SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent With Differential Privacy", "fno": "09524471", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Data Privacy", "Deep Learning Artificial Intelligence", "Gradient Methods", "Stochastic Processes", "Raw Data", "Communication Process", "Malicious Participants", "Asynchronous Decentralized Parallel SGD Framework", "Re X 0301 Nyi Differential Privacy", "Synchronous SGD", "Deep Learning Models", "Distributed Learning", "Asynchronous Decentralized Parallel Stochastic Gradient Descent Algorithm", "A DP Sup 2 Sup SGD", "Composite Gaussian Mechanism", "Differential Privacy", "Computational Modeling", "Servers", "Training", "Privacy", "Stochastic Processes", "Data Models", "Distributed Learning", "Asynchronous", "Decentralized", "Differential Privacy" ], "authors": [ { "givenName": "Jie", "surname": "Xu", "fullName": "Jie Xu", "affiliation": "Department of Population Health Sciences, Weill Cornell Medicine, New York, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Zhang", "fullName": "Wei Zhang", "affiliation": "IBM Research, Armonk, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Fei", "surname": "Wang", "fullName": "Fei Wang", "affiliation": "Department of Population Health Sciences, Weill Cornell Medicine, New York, NY, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "8036-8047", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09816125", "title": "<italic>E<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula>Outlier:</italic> a Self-Supervised Framework for Unsupervised Deep Outlier Detection", "doi": null, "abstractUrl": "/journal/tp/2023/03/09816125/1EMV4w3EOUU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/01/08789541", "title": "Regression Guided by Relative Ranking Using Convolutional Neural Network (R<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula>CNN) for Facial Beauty Prediction", "doi": null, "abstractUrl": "/journal/ta/2022/01/08789541/1ch5uXuM97G", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/06/08954811", "title": "Lucene-P<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>: A Distributed Platform for Privacy-Preserving Text-Based Search", "doi": null, "abstractUrl": "/journal/tq/2021/06/08954811/1gs4XOshKHC", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09497715", "title": "Spherical DNNs and Their Applications in 360<inline-formula><tex-math notation=\"LaTeX\">Z_$^\\circ$_Z</tex-math></inline-formula> Images and Videos", "doi": null, "abstractUrl": "/journal/tp/2022/10/09497715/1vzY9kuYnwA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09525250", "title": "Fast Reachability Queries Answering Based on <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> Reduction", "doi": null, "abstractUrl": "/journal/tk/2023/03/09525250/1wuoOp439OU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09647957", "title": "WAMP<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>S: Workload-Aware GPU Performance Model Based Pseudo-Preemptive Real-Time Scheduling for the Airborne Embedded System", "doi": null, "abstractUrl": "/journal/td/2022/11/09647957/1ziKjgqTuRa", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09555209", "articleId": "1xjQQnXqTO8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09573322", "articleId": "1xH5CvNpKN2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KsRzJZl0ly", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1wuoOp439OU", "doi": "10.1109/TKDE.2021.3108433", "abstract": "Answering reachability queries is one of the fundamental graph operations. One way to make acceleration is directly building index on the input graph. Considering that the size of the input graph has a great impact on the query performance, the other way is reducing the size of the input graph, such that the given queries can be answered over a smaller graph. Although the input graph can be reduced significantly in some cases by existing approaches, a smaller reduced graph does not always mean a positive effect on the query performance. In this paper, we study graph reduction to accelerate reachability queries answering. We propose a novel graph reduction approach, namely <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> reduction, to reduce the input graph <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">Z_$|V|$_Z</tex-math></inline-formula> nodes into a smaller one <inline-formula><tex-math notation=\"LaTeX\">Z_$G^{r}$_Z</tex-math></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">Z_$|V^r|$_Z</tex-math></inline-formula> nodes. Assume that the probability of a node of <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula> to be a query node is <inline-formula><tex-math notation=\"LaTeX\">Z_$1/|V|$_Z</tex-math></inline-formula>, we show that based on our approach, the lower bound probability that a query <inline-formula><tex-math notation=\"LaTeX\">Z_$q$_Z</tex-math></inline-formula> can be answered in constant time is <inline-formula><tex-math notation=\"LaTeX\">Z_$1-(\\frac{|V^r|}{|V|})^2$_Z</tex-math></inline-formula>, denoting that the probability that <inline-formula><tex-math notation=\"LaTeX\">Z_$q$_Z</tex-math></inline-formula> needs to be answered over the reduced graph is <inline-formula><tex-math notation=\"LaTeX\">Z_$(\\frac{|V^r|}{|V|})^2$_Z</tex-math></inline-formula>, which means the smaller the reduced graph, the larger the probability that <inline-formula><tex-math notation=\"LaTeX\">Z_$q$_Z</tex-math></inline-formula> can be answered in constant time. We show the difficulties of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> reduction and propose efficient algorithms to improve the reduction ratio. Based on the result of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> reduction, we further propose a novel labeling scheme to accelerate queries answering. We confirm the efficiency of our approach by extensive experimental results for graph reduction and reachability queries processing using 20 real datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Answering reachability queries is one of the fundamental graph operations. One way to make acceleration is directly building index on the input graph. Considering that the size of the input graph has a great impact on the query performance, the other way is reducing the size of the input graph, such that the given queries can be answered over a smaller graph. Although the input graph can be reduced significantly in some cases by existing approaches, a smaller reduced graph does not always mean a positive effect on the query performance. In this paper, we study graph reduction to accelerate reachability queries answering. We propose a novel graph reduction approach, namely <inline-formula><tex-math notation=\"LaTeX\">$\\mathsf{RCN}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">RCN</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq2-3108433.gif\"/></alternatives></inline-formula> reduction, to reduce the input graph <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq3-3108433.gif\"/></alternatives></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">$|V|$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>|</mml:mo><mml:mi>V</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"zhou-ieq4-3108433.gif\"/></alternatives></inline-formula> nodes into a smaller one <inline-formula><tex-math notation=\"LaTeX\">$G^{r}$</tex-math><alternatives><mml:math><mml:msup><mml:mi>G</mml:mi><mml:mi>r</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"zhou-ieq5-3108433.gif\"/></alternatives></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">$|V^r|$</tex-math><alternatives><mml:math><mml:mrow><mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:msup><mml:mi>V</mml:mi><mml:mi>r</mml:mi></mml:msup><mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mrow></mml:math><inline-graphic xlink:href=\"zhou-ieq6-3108433.gif\"/></alternatives></inline-formula> nodes. Assume that the probability of a node of <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq7-3108433.gif\"/></alternatives></inline-formula> to be a query node is <inline-formula><tex-math notation=\"LaTeX\">$1/|V|$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>1</mml:mn><mml:mo>/</mml:mo><mml:mo>|</mml:mo><mml:mi>V</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"zhou-ieq8-3108433.gif\"/></alternatives></inline-formula>, we show that based on our approach, the lower bound probability that a query <inline-formula><tex-math notation=\"LaTeX\">$q$</tex-math><alternatives><mml:math><mml:mi>q</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq9-3108433.gif\"/></alternatives></inline-formula> can be answered in constant time is <inline-formula><tex-math notation=\"LaTeX\">$1-(\\frac{|V^r|}{|V|})^2$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:msup><mml:mi>V</mml:mi><mml:mi>r</mml:mi></mml:msup><mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>V</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:math><inline-graphic xlink:href=\"zhou-ieq10-3108433.gif\"/></alternatives></inline-formula>, denoting that the probability that <inline-formula><tex-math notation=\"LaTeX\">$q$</tex-math><alternatives><mml:math><mml:mi>q</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq11-3108433.gif\"/></alternatives></inline-formula> needs to be answered over the reduced graph is <inline-formula><tex-math notation=\"LaTeX\">$(\\frac{|V^r|}{|V|})^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:msup><mml:mi>V</mml:mi><mml:mi>r</mml:mi></mml:msup><mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>V</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"zhou-ieq12-3108433.gif\"/></alternatives></inline-formula>, which means the smaller the reduced graph, the larger the probability that <inline-formula><tex-math notation=\"LaTeX\">$q$</tex-math><alternatives><mml:math><mml:mi>q</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq13-3108433.gif\"/></alternatives></inline-formula> can be answered in constant time. We show the difficulties of <inline-formula><tex-math notation=\"LaTeX\">$\\mathsf{RCN}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">RCN</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq14-3108433.gif\"/></alternatives></inline-formula> reduction and propose efficient algorithms to improve the reduction ratio. Based on the result of <inline-formula><tex-math notation=\"LaTeX\">$\\mathsf{RCN}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">RCN</mml:mi></mml:math><inline-graphic xlink:href=\"zhou-ieq15-3108433.gif\"/></alternatives></inline-formula> reduction, we further propose a novel labeling scheme to accelerate queries answering. We confirm the efficiency of our approach by extensive experimental results for graph reduction and reachability queries processing using 20 real datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Answering reachability queries is one of the fundamental graph operations. One way to make acceleration is directly building index on the input graph. Considering that the size of the input graph has a great impact on the query performance, the other way is reducing the size of the input graph, such that the given queries can be answered over a smaller graph. Although the input graph can be reduced significantly in some cases by existing approaches, a smaller reduced graph does not always mean a positive effect on the query performance. In this paper, we study graph reduction to accelerate reachability queries answering. We propose a novel graph reduction approach, namely - reduction, to reduce the input graph - with - nodes into a smaller one - with - nodes. Assume that the probability of a node of - to be a query node is -, we show that based on our approach, the lower bound probability that a query - can be answered in constant time is -, denoting that the probability that - needs to be answered over the reduced graph is -, which means the smaller the reduced graph, the larger the probability that - can be answered in constant time. We show the difficulties of - reduction and propose efficient algorithms to improve the reduction ratio. Based on the result of - reduction, we further propose a novel labeling scheme to accelerate queries answering. We confirm the efficiency of our approach by extensive experimental results for graph reduction and reachability queries processing using 20 real datasets.", "title": "Fast Reachability Queries Answering Based on <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> Reduction", "normalizedTitle": "Fast Reachability Queries Answering Based on - Reduction", "fno": "09525250", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Graph Theory", "Probability", "Reachability Analysis", "Fast Reachability Query Answering", "Fundamental Graph Operations", "Graph Reduction Approach", "Input Graph", "Lower Bound Probability", "Query Node", "RCN Reduction", "Reduced Graph", "Indexes", "Erbium", "Testing", "Time Complexity", "Query Processing", "Optimization", "Buildings", "Graph Data Management", "Reachability Queries Processing", "Graph Reduction" ], "authors": [ { "givenName": "Junfeng", "surname": "Zhou", "fullName": "Junfeng Zhou", "affiliation": "School of Computer Science and Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jeffrey Xu", "surname": "Yu", "fullName": "Jeffrey Xu Yu", "affiliation": "Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Yaxian", "surname": "Qiu", "fullName": "Yaxian Qiu", "affiliation": "School of Computer Science and Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xian", "surname": "Tang", "fullName": "Xian Tang", "affiliation": "Shanghai University of Engineering Science, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ziyang", "surname": "Chen", "fullName": "Ziyang Chen", "affiliation": "Shanghai Lixin University of Accounting and Finance, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ming", "surname": "Du", "fullName": "Ming Du", "affiliation": "School of Computer Science and Technology, Donghua University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2590-2609", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09189818", "title": "Fully Dynamic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Center Clustering With Improved Memory Efficiency", "doi": null, "abstractUrl": "/journal/tk/2022/07/09189818/1mYZ9fnEFq0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/06/09351686", "title": "Mining Diversified Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$r$_Z</tex-math></inline-formula> Lasting Cohesive Subgraphs on Temporal Networks", "doi": null, "abstractUrl": "/journal/bd/2022/06/09351686/1r4ZEAVxQQg", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09463675", "title": "Efficient Hardware Implementation of Finite Field Arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> for Binary Ring-LWE Based Post-Quantum Cryptography", "doi": null, "abstractUrl": "/journal/ec/2022/02/09463675/1uFxptYevFC", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09616383", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$xAFCL$_Z</tex-math></inline-formula>: Run Scalable Function Choreographies Across Multiple FaaS Systems", "doi": null, "abstractUrl": "/journal/sc/2023/01/09616383/1yA74qnPV4c", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09552571", "articleId": "1xibUMopgTS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09573429", "articleId": "1xH5AT83KKs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Hcio5iMQBW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1x3fMiX57S8", "doi": "10.1109/TPAMI.2021.3113612", "abstract": "While <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> cameras offer tremendous new possibilities in vision, graphics, and augmented reality, the spherical images they produce make visual recognition non-trivial. Ideally, <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> imagery could inherit the deep convolutional neural networks (CNNs) already trained with great success on perspective projection images. However, spherical images cannot be projected to a single plane without significant distortion, and existing methods to transfer CNNs from perspective to spherical images introduce significant computational costs and/or degradations in accuracy. We propose to <italic>learn</italic> a Spherical Convolution Network (SphConv) that translates a planar CNN to the equirectangular projection of <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> images. Given a source CNN for perspective images as input, SphConv learns to reproduce the flat filter outputs on <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> data, sensitive to the varying distortion effects across the viewing sphere. The key benefits are 1) efficient and accurate recognition for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> images, and 2) the ability to leverage powerful pre-trained networks for perspective images. We further proposes two instantiation of SphConv&#x2014;Spherical Kernel learns location dependent kernels on the sphere for SphConv, and Kernel Transformer Network learns a functional transformation that generates SphConv kernels from the source CNN. Among the two variants, Kernel Transformer Network has a much lower memory footprint at the cost of higher computational overhead. Validating our approach with multiple source CNNs and datasets, we show that SphConv using KTN successfully preserves the source CNN&#x2019;s accuracy, while offering efficiency, transferability, and scalability to typical image resolutions. We further introduce a spherical Faster R-CNN model based on SphConv and show that we can learn a spherical object detector without any object annotation in <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> images.", "abstracts": [ { "abstractType": "Regular", "content": "While <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq2-3113612.gif\"/></alternatives></inline-formula> cameras offer tremendous new possibilities in vision, graphics, and augmented reality, the spherical images they produce make visual recognition non-trivial. Ideally, <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq3-3113612.gif\"/></alternatives></inline-formula> imagery could inherit the deep convolutional neural networks (CNNs) already trained with great success on perspective projection images. However, spherical images cannot be projected to a single plane without significant distortion, and existing methods to transfer CNNs from perspective to spherical images introduce significant computational costs and/or degradations in accuracy. We propose to <italic>learn</italic> a Spherical Convolution Network (SphConv) that translates a planar CNN to the equirectangular projection of <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq4-3113612.gif\"/></alternatives></inline-formula> images. Given a source CNN for perspective images as input, SphConv learns to reproduce the flat filter outputs on <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq5-3113612.gif\"/></alternatives></inline-formula> data, sensitive to the varying distortion effects across the viewing sphere. The key benefits are 1) efficient and accurate recognition for <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq6-3113612.gif\"/></alternatives></inline-formula> images, and 2) the ability to leverage powerful pre-trained networks for perspective images. We further proposes two instantiation of SphConv&#x2014;Spherical Kernel learns location dependent kernels on the sphere for SphConv, and Kernel Transformer Network learns a functional transformation that generates SphConv kernels from the source CNN. Among the two variants, Kernel Transformer Network has a much lower memory footprint at the cost of higher computational overhead. Validating our approach with multiple source CNNs and datasets, we show that SphConv using KTN successfully preserves the source CNN&#x2019;s accuracy, while offering efficiency, transferability, and scalability to typical image resolutions. We further introduce a spherical Faster R-CNN model based on SphConv and show that we can learn a spherical object detector without any object annotation in <inline-formula><tex-math notation=\"LaTeX\">$360^{\\circ }$</tex-math><alternatives><mml:math><mml:msup><mml:mn>360</mml:mn><mml:mo>&#x2218;</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"su-ieq7-3113612.gif\"/></alternatives></inline-formula> images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While - cameras offer tremendous new possibilities in vision, graphics, and augmented reality, the spherical images they produce make visual recognition non-trivial. Ideally, - imagery could inherit the deep convolutional neural networks (CNNs) already trained with great success on perspective projection images. However, spherical images cannot be projected to a single plane without significant distortion, and existing methods to transfer CNNs from perspective to spherical images introduce significant computational costs and/or degradations in accuracy. We propose to learn a Spherical Convolution Network (SphConv) that translates a planar CNN to the equirectangular projection of - images. Given a source CNN for perspective images as input, SphConv learns to reproduce the flat filter outputs on - data, sensitive to the varying distortion effects across the viewing sphere. The key benefits are 1) efficient and accurate recognition for - images, and 2) the ability to leverage powerful pre-trained networks for perspective images. We further proposes two instantiation of SphConv—Spherical Kernel learns location dependent kernels on the sphere for SphConv, and Kernel Transformer Network learns a functional transformation that generates SphConv kernels from the source CNN. Among the two variants, Kernel Transformer Network has a much lower memory footprint at the cost of higher computational overhead. Validating our approach with multiple source CNNs and datasets, we show that SphConv using KTN successfully preserves the source CNN’s accuracy, while offering efficiency, transferability, and scalability to typical image resolutions. We further introduce a spherical Faster R-CNN model based on SphConv and show that we can learn a spherical object detector without any object annotation in - images.", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "normalizedTitle": "Learning Spherical Convolution for - Recognition", "fno": "09541093", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Augmented Reality", "Cameras", "Computer Vision", "Convolution", "Image Resolution", "Learning Artificial Intelligence", "Neural Nets", "Object Detection", "Significant Computational Costs", "Spherical Convolution Network", "Perspective Images", "Leverage Powerful Pre Trained Networks", "Sph Conv Spherical Kernel", "Kernel Transformer Network", "Sph Conv Kernels", "Multiple Source CN Ns", "Source CN Ns Accuracy", "Typical Image Resolutions", "Spherical Faster R CNN Model", "Spherical Object Detector", "360 X 00 B 0 Recognition", "Spherical Images", "Visual Recognition Nontrivial", "Deep Convolutional Neural Networks", "Perspective Projection Images", "Kernel", "Convolution", "Data Models", "Transformers", "Task Analysis", "Training", "Interpolation", "<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"math\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math> </inline-formula> </named-content> video analysis", "Omnidirectional Video", "Object Detection" ], "authors": [ { "givenName": "Yu-Chuan", "surname": "Su", "fullName": "Yu-Chuan Su", "affiliation": "Department of Computer Science, University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kristen", "surname": "Grauman", "fullName": "Kristen Grauman", "affiliation": "Department of Computer Science, University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "8371-8386", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09816125", "title": "<italic>E<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula>Outlier:</italic> a Self-Supervised Framework for Unsupervised Deep Outlier Detection", "doi": null, "abstractUrl": "/journal/tp/2023/03/09816125/1EMV4w3EOUU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09373914", "title": "A Practical <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula> Outlier Removal Method for Correspondence-Based Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2022/08/09373914/1rPt9ICFlCw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09497715", "title": "Spherical DNNs and Their Applications in 360<inline-formula><tex-math notation=\"LaTeX\">Z_$^\\circ$_Z</tex-math></inline-formula> Images and Videos", "doi": null, "abstractUrl": "/journal/tp/2022/10/09497715/1vzY9kuYnwA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09524471", "title": "A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent With Differential Privacy", "doi": null, "abstractUrl": "/journal/tp/2022/11/09524471/1wpq5To7ikU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09645237", "title": "Laplacian Regularized Sparse Representation Based Classifier for Identifying DNA N4-Methylcytosine Sites via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{2,1/2}$_Z</tex-math></inline-formula>-Matrix Norm", "doi": null, "abstractUrl": "/journal/tb/2023/01/09645237/1zc6nhrcvaE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09551747", "articleId": "1xgx1kQT1Kg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09547736", "articleId": "1x9TykOyyg8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1yfWD9Y4aLS", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "td", "pubType": "journal", "volume": "33", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1y11LlQdiGk", "doi": "10.1109/TPDS.2021.3122440", "abstract": "Cyberspace is not a &#x201C;vacuum space&#x201D;, and it is normal that there are inevitable viruses and worms in cyberspace. Cyberspace security threats stem from the problem of endogenous security, which is caused by the incompleteness of theoretical system and technology of the information field itself. Thus it is impossible and unnecessary for us to build an &#x201C;aseptic&#x201D; cyberspace. On the contrast, we must focus on improving the &#x201C;self-immunity&#x201D; of network. Literally, endogenous security is an endogenous effect from its own structural factors rather than external ones. The <inline-formula><tex-math notation=\"LaTeX\">Z_$t/k$_Z</tex-math></inline-formula>-diagnosis strategy plays a very important role in measuring endogenous network security without prior knowledge, which can significantly enhance the self-diagnosing capability of network. As far as we know, few research involves <inline-formula><tex-math notation=\"LaTeX\">Z_$t/k$_Z</tex-math></inline-formula>-diagnosis algorithm and <inline-formula><tex-math notation=\"LaTeX\">Z_$t/k$_Z</tex-math></inline-formula>-diagnosability of interconnection networks under MM* model. In this article, we propose a fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-diagnosis algorithm of complexity <inline-formula><tex-math notation=\"LaTeX\">Z_$O(Nr^2)$_Z</tex-math></inline-formula>, say <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula>MIS<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>DIAGMM*, for a general <inline-formula><tex-math notation=\"LaTeX\">Z_$r$_Z</tex-math></inline-formula>-regular network <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula> under MM* model by designing a 0-comparison subgraph <inline-formula><tex-math notation=\"LaTeX\">Z_$M_0(G)$_Z</tex-math></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> is the size of <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula>. We determine that the <inline-formula><tex-math notation=\"LaTeX\">Z_$t/k$_Z</tex-math></inline-formula>-diagnosability <inline-formula><tex-math notation=\"LaTeX\">Z_$(t(G)/k)^M$_Z</tex-math></inline-formula> of <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula> under MM* model is <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)$_Z</tex-math></inline-formula> by <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula>MIS<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>DIAGMM* algorithm. Moreover, we establish the <inline-formula><tex-math notation=\"LaTeX\">Z_$(t(G)/k)^M$_Z</tex-math></inline-formula> of some interconnection networks under MM* model, including BC networks, <inline-formula><tex-math notation=\"LaTeX\">Z_$(n,l)$_Z</tex-math></inline-formula>-star graph networks, and data center network DCells. Finally, we compare <inline-formula><tex-math notation=\"LaTeX\">Z_$(t(G)/k)^M$_Z</tex-math></inline-formula> with diagnosability, conditional diagnosability, pessimistic diagnosability, extra diagnosability, and good-neighbor diagnosability under MM* model. It can be seen that <inline-formula><tex-math notation=\"LaTeX\">Z_$(t(G)/k)^M$_Z</tex-math></inline-formula> is greater than other fault diagnosabilities in most cases.", "abstracts": [ { "abstractType": "Regular", "content": "Cyberspace is not a &#x201C;vacuum space&#x201D;, and it is normal that there are inevitable viruses and worms in cyberspace. Cyberspace security threats stem from the problem of endogenous security, which is caused by the incompleteness of theoretical system and technology of the information field itself. Thus it is impossible and unnecessary for us to build an &#x201C;aseptic&#x201D; cyberspace. On the contrast, we must focus on improving the &#x201C;self-immunity&#x201D; of network. Literally, endogenous security is an endogenous effect from its own structural factors rather than external ones. The <inline-formula><tex-math notation=\"LaTeX\">$t/k$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>t</mml:mi><mml:mo>/</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq2-3122440.gif\"/></alternatives></inline-formula>-diagnosis strategy plays a very important role in measuring endogenous network security without prior knowledge, which can significantly enhance the self-diagnosing capability of network. As far as we know, few research involves <inline-formula><tex-math notation=\"LaTeX\">$t/k$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>t</mml:mi><mml:mo>/</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq3-3122440.gif\"/></alternatives></inline-formula>-diagnosis algorithm and <inline-formula><tex-math notation=\"LaTeX\">$t/k$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>t</mml:mi><mml:mo>/</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq4-3122440.gif\"/></alternatives></inline-formula>-diagnosability of interconnection networks under MM* model. In this article, we propose a fast <inline-formula><tex-math notation=\"LaTeX\">$f(r,k+1)/k$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>f</mml:mi><mml:mo>(</mml:mo><mml:mi>r</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo><mml:mo>/</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq5-3122440.gif\"/></alternatives></inline-formula>-diagnosis algorithm of complexity <inline-formula><tex-math notation=\"LaTeX\">$O(Nr^2)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>N</mml:mi><mml:msup><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq6-3122440.gif\"/></alternatives></inline-formula>, say <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq7-3122440.gif\"/></alternatives></inline-formula>MIS<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq8-3122440.gif\"/></alternatives></inline-formula>DIAGMM*, for a general <inline-formula><tex-math notation=\"LaTeX\">$r$</tex-math><alternatives><mml:math><mml:mi>r</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq9-3122440.gif\"/></alternatives></inline-formula>-regular network <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq10-3122440.gif\"/></alternatives></inline-formula> under MM* model by designing a 0-comparison subgraph <inline-formula><tex-math notation=\"LaTeX\">$M_0(G)$</tex-math><alternatives><mml:math><mml:mrow><mml:msub><mml:mi>M</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq11-3122440.gif\"/></alternatives></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math><alternatives><mml:math><mml:mi>N</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq12-3122440.gif\"/></alternatives></inline-formula> is the size of <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq13-3122440.gif\"/></alternatives></inline-formula>. We determine that the <inline-formula><tex-math notation=\"LaTeX\">$t/k$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>t</mml:mi><mml:mo>/</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq14-3122440.gif\"/></alternatives></inline-formula>-diagnosability <inline-formula><tex-math notation=\"LaTeX\">$(t(G)/k)^M$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>/</mml:mo><mml:mi>k</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"lin-ieq15-3122440.gif\"/></alternatives></inline-formula> of <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq16-3122440.gif\"/></alternatives></inline-formula> under MM* model is <inline-formula><tex-math notation=\"LaTeX\">$f(r,k+1)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>f</mml:mi><mml:mo>(</mml:mo><mml:mi>r</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq17-3122440.gif\"/></alternatives></inline-formula> by <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq18-3122440.gif\"/></alternatives></inline-formula>MIS<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"lin-ieq19-3122440.gif\"/></alternatives></inline-formula>DIAGMM* algorithm. Moreover, we establish the <inline-formula><tex-math notation=\"LaTeX\">$(t(G)/k)^M$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>/</mml:mo><mml:mi>k</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"lin-ieq20-3122440.gif\"/></alternatives></inline-formula> of some interconnection networks under MM* model, including BC networks, <inline-formula><tex-math notation=\"LaTeX\">$(n,l)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mo>,</mml:mo><mml:mi>l</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"lin-ieq21-3122440.gif\"/></alternatives></inline-formula>-star graph networks, and data center network DCells. Finally, we compare <inline-formula><tex-math notation=\"LaTeX\">$(t(G)/k)^M$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>/</mml:mo><mml:mi>k</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"lin-ieq22-3122440.gif\"/></alternatives></inline-formula> with diagnosability, conditional diagnosability, pessimistic diagnosability, extra diagnosability, and good-neighbor diagnosability under MM* model. It can be seen that <inline-formula><tex-math notation=\"LaTeX\">$(t(G)/k)^M$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>/</mml:mo><mml:mi>k</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href=\"lin-ieq23-3122440.gif\"/></alternatives></inline-formula> is greater than other fault diagnosabilities in most cases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cyberspace is not a “vacuum space”, and it is normal that there are inevitable viruses and worms in cyberspace. Cyberspace security threats stem from the problem of endogenous security, which is caused by the incompleteness of theoretical system and technology of the information field itself. Thus it is impossible and unnecessary for us to build an “aseptic” cyberspace. On the contrast, we must focus on improving the “self-immunity” of network. Literally, endogenous security is an endogenous effect from its own structural factors rather than external ones. The --diagnosis strategy plays a very important role in measuring endogenous network security without prior knowledge, which can significantly enhance the self-diagnosing capability of network. As far as we know, few research involves --diagnosis algorithm and --diagnosability of interconnection networks under MM* model. In this article, we propose a fast --diagnosis algorithm of complexity -, say -MIS-DIAGMM*, for a general --regular network - under MM* model by designing a 0-comparison subgraph -, where - is the size of -. We determine that the --diagnosability - of - under MM* model is - by -MIS-DIAGMM* algorithm. Moreover, we establish the - of some interconnection networks under MM* model, including BC networks, --star graph networks, and data center network DCells. Finally, we compare - with diagnosability, conditional diagnosability, pessimistic diagnosability, extra diagnosability, and good-neighbor diagnosability under MM* model. It can be seen that - is greater than other fault diagnosabilities in most cases.", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "normalizedTitle": "A Fast --Diagnosis for Interconnection Networks Under MM* Model", "fno": "09585362", "hasPdf": true, "idPrefix": "td", "keywords": [ "Computational Complexity", "Computer Centres", "Fault Diagnosis", "Graph Theory", "Multiprocessor Interconnection Networks", "Security Of Data", "Fast F R K 1 Kf R K 1 K Diagnosis", "Interconnection Networks", "MM Model", "Cyberspace Security Threats", "Information Field", "Self Immunity", "Endogenous Network Security", "Self Diagnosing Capability", "T Kt K Diagnosis Algorithm", "T Kt K Diagnosability", "Complexity", "GGMI Skk DIAGMM", "X 03 A 5 Regular Network", "0 Comparison Subgraph", "Star Graph Networks", "Data Center Network", "D Cells", "Conditional Diagnosability", "Pessimistic Diagnosability", "Extra Diagnosability", "Good Neighbor Diagnosability", "Fault Diagnosabilities", "Security", "Program Processors", "Cyberspace", "Hypercubes", "Data Centers", "Multiprocessing Systems", "Computational Modeling", "Endogenous Security", "Fault Diagnosis", "Reliability", "<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$t/k$_Z</tex-math> </inline-formula>-diagnosability", "Interconnection Networks", "MM Model" ], "authors": [ { "givenName": "Yanze", "surname": "Huang", "fullName": "Yanze Huang", "affiliation": "College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, China", "__typename": "ArticleAuthorType" }, { "givenName": "Limei", "surname": "Lin", "fullName": "Limei Lin", "affiliation": "College of Computer and Cyber Security, Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China", "__typename": "ArticleAuthorType" }, { "givenName": "Sun-Yuan", "surname": "Hsieh", "fullName": "Sun-Yuan Hsieh", "affiliation": "Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1593-1604", "year": "2022", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09373914", "title": "A Practical <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula> Outlier Removal Method for Correspondence-Based Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2022/08/09373914/1rPt9ICFlCw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09463675", "title": "Efficient Hardware Implementation of Finite Field Arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> for Binary Ring-LWE Based Post-Quantum Cryptography", "doi": null, "abstractUrl": "/journal/ec/2022/02/09463675/1uFxptYevFC", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09573423", "articleId": "1xH5MouipUY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09585555", "articleId": "1y11LwuaG6k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAolH1h", "title": "July", "year": "2020", "issueNum": "07", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45XfSEU4", "doi": "10.1109/TVCG.2018.2886007", "abstract": "In this paper, we propose the first sketching system for interactively personalized and photorealistic face caricaturing. Input an image of a human face, the users can create caricature photos by manipulating its facial feature curves. Our system first performs exaggeration on the recovered 3D face model, which is conducted by assigning the laplacian of each vertex a scaling factor according to the edited sketches. The mapping between 2D sketches and the vertex-wise scaling field is constructed by a novel deep learning architecture. Our approach allows outputting different exaggerations when applying the same sketching on different input figures in term of their different geometric characteristics, which makes the generated results &#x201C;personalized&#x201D;. With the obtained 3D caricature model, two images are generated, one obtained by applying 2D warping guided by the underlying 3D mesh deformation and the other obtained by re-rendering the deformed 3D textured model. These two images are then seamlessly integrated to produce our final output. Due to the severe stretching of meshes, the rendered texture is of blurry appearances. A deep learning approach is exploited to infer the missing details for enhancing these blurry regions. Moreover, a relighting operation is invented to further improve the photorealism of the result. These further make our results &#x201C;photorealistic&#x201D;. The qualitative experiment results validated the efficiency of our sketching system.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose the first sketching system for interactively personalized and photorealistic face caricaturing. Input an image of a human face, the users can create caricature photos by manipulating its facial feature curves. Our system first performs exaggeration on the recovered 3D face model, which is conducted by assigning the laplacian of each vertex a scaling factor according to the edited sketches. The mapping between 2D sketches and the vertex-wise scaling field is constructed by a novel deep learning architecture. Our approach allows outputting different exaggerations when applying the same sketching on different input figures in term of their different geometric characteristics, which makes the generated results &#x201C;personalized&#x201D;. With the obtained 3D caricature model, two images are generated, one obtained by applying 2D warping guided by the underlying 3D mesh deformation and the other obtained by re-rendering the deformed 3D textured model. These two images are then seamlessly integrated to produce our final output. Due to the severe stretching of meshes, the rendered texture is of blurry appearances. A deep learning approach is exploited to infer the missing details for enhancing these blurry regions. Moreover, a relighting operation is invented to further improve the photorealism of the result. These further make our results &#x201C;photorealistic&#x201D;. The qualitative experiment results validated the efficiency of our sketching system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose the first sketching system for interactively personalized and photorealistic face caricaturing. Input an image of a human face, the users can create caricature photos by manipulating its facial feature curves. Our system first performs exaggeration on the recovered 3D face model, which is conducted by assigning the laplacian of each vertex a scaling factor according to the edited sketches. The mapping between 2D sketches and the vertex-wise scaling field is constructed by a novel deep learning architecture. Our approach allows outputting different exaggerations when applying the same sketching on different input figures in term of their different geometric characteristics, which makes the generated results “personalized”. With the obtained 3D caricature model, two images are generated, one obtained by applying 2D warping guided by the underlying 3D mesh deformation and the other obtained by re-rendering the deformed 3D textured model. These two images are then seamlessly integrated to produce our final output. Due to the severe stretching of meshes, the rendered texture is of blurry appearances. A deep learning approach is exploited to infer the missing details for enhancing these blurry regions. Moreover, a relighting operation is invented to further improve the photorealism of the result. These further make our results “photorealistic”. The qualitative experiment results validated the efficiency of our sketching system.", "title": "CaricatureShop: Personalized and Photorealistic Caricature Sketching", "normalizedTitle": "CaricatureShop: Personalized and Photorealistic Caricature Sketching", "fno": "08580421", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computer Graphics", "Face Recognition", "Image Enhancement", "Image Reconstruction", "Image Texture", "Learning Artificial Intelligence", "Rendering Computer Graphics", "Underlying 3 D Mesh Deformation", "Deformed 3 D Textured Model", "Rendered Texture", "Deep Learning Approach", "Sketching System", "Interactively Personalized Face Caricaturing", "Photorealistic Face Caricaturing", "Human Face", "Caricature Photos", "Facial Feature Curves", "Exaggeration", "Recovered 3 D Face Model", "Scaling Factor", "Edited Sketches", "Vertex Wise Scaling Field", "Novel Deep Learning Architecture", "Input Figures", "Different Geometric Characteristics", "Generated Results", "3 D Caricature Model", "Face", "Three Dimensional Displays", "Solid Modeling", "Two Dimensional Displays", "Strain", "Deformable Models", "Photorealistic Caricature", "Sketch Based Face Exaggeration", "Facial Details Enhancing" ], "authors": [ { "givenName": "Xiaoguang", "surname": "Han", "fullName": "Xiaoguang Han", "affiliation": "Shenzhen Research Institue of Big Data and The, Chinese University of Hong Kong (Shenzhen), Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kangcheng", "surname": "Hou", "fullName": "Kangcheng Hou", "affiliation": "Zhejiang University, Hangzhou, P.R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Dong", "surname": "Du", "fullName": "Dong Du", "affiliation": "Shenzhen Research Institue of Big Data, University of Science and Technology of China, Hefei Shi, Anhui Sheng, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuda", "surname": "Qiu", "fullName": "Yuda Qiu", "affiliation": "Shenzhen Research Institue of Big Data and The, Chinese University of Hong Kong (Shenzhen), Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuguang", "surname": "Cui", "fullName": "Shuguang Cui", "affiliation": "Shenzhen Research Institue of Big Data and The, Chinese University of Hong Kong (Shenzhen), Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kun", "surname": "Zhou", "fullName": "Kun Zhou", "affiliation": "Zhejiang University, Hangzhou, P.R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Yizhou", "surname": "Yu", "fullName": "Yizhou Yu", "affiliation": "University of Hong Kong, Pokfulam, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2020-07-01 00:00:00", "pubType": "trans", "pages": "2349-2361", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2013/6097/0/06550222", "title": "Poster: 3D sketching and flexible input for surface design: A case study", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550222/12OmNBBzoe4", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607591", "title": "3D caricature generation by manifold learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607591/12OmNzQR1nw", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08421591", "title": "Model-Guided 3D Sketching", "doi": null, "abstractUrl": "/journal/tg/2019/10/08421591/13rRUEgs2Mb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000h336", "title": "Alive Caricature from 2D to 3D", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000h336/17D45W2Wyzi", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a066", "title": "Enhancing Sketching and Sculpting for Shape Modeling", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a066/17D45WWzW7i", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/03/09392265", "title": "Caricature Expression Extrapolation Based on Kendall Shape Space Theory", "doi": null, "abstractUrl": "/magazine/cg/2021/03/09392265/1sq7GVOZ8nS", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412569", "title": "Unsupervised Contrastive Photo-to-Caricature Translation based on Auto-distortion", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412569/1tmjiXD2jba", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900k0231", "title": "3DCaricShop: A Dataset and A Baseline Method for Single-view 3D Caricature Face Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900k0231/1yeIGVDwIak", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/04/09609545", "title": "3D-CariGAN: An End-to-End Solution to 3D Caricature Generation From Normal Face Photos", "doi": null, "abstractUrl": "/journal/tg/2023/04/09609545/1yoxJacbZ4I", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b003", "title": "Fine-Grained VR Sketching: Dataset and Insights", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b003/1zWE3NZ5Apq", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08600335", "articleId": "17D45Vw15wR", "__typename": "AdjacentArticleType" }, "next": { "fno": "08587199", "articleId": "17D45W9KVGn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1kcw52EnvrO", "name": "ttg202007-08580421s1-tvcg-han-2886007-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202007-08580421s1-tvcg-han-2886007-mm.zip", "extension": "zip", "size": "4.21 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBKEyoy", "title": "March", "year": "2016", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUB7a1fU", "doi": "10.1109/TVCG.2015.2448080", "abstract": "The medial axis transform has long been known as an intrinsic shape representation supporting a variety of shape analysis and synthesis tasks. However, for a given shape, it is hard to obtain its faithful, concise and stable medial axis, which hinders the application of the medial axis. In this paper, we introduce the medial mesh, a new discrete representation of the medial axis. A medial mesh is a 2D simplicial complex coupled with a radius function that provides a piecewise linear approximation to the medial axis. We further present an effective algorithm for computing a concise and stable medial mesh for a given shape. Our algorithm is quantitatively driven by a shape approximation error metric, and progressively simplifies an initial medial mesh by iteratively contracting edges until the approximation error reaches a predefined threshold. We further demonstrate the superior efficiency and accuracy of our method over existing methods for medial axis simplification.", "abstracts": [ { "abstractType": "Regular", "content": "The medial axis transform has long been known as an intrinsic shape representation supporting a variety of shape analysis and synthesis tasks. However, for a given shape, it is hard to obtain its faithful, concise and stable medial axis, which hinders the application of the medial axis. In this paper, we introduce the medial mesh, a new discrete representation of the medial axis. A medial mesh is a 2D simplicial complex coupled with a radius function that provides a piecewise linear approximation to the medial axis. We further present an effective algorithm for computing a concise and stable medial mesh for a given shape. Our algorithm is quantitatively driven by a shape approximation error metric, and progressively simplifies an initial medial mesh by iteratively contracting edges until the approximation error reaches a predefined threshold. We further demonstrate the superior efficiency and accuracy of our method over existing methods for medial axis simplification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The medial axis transform has long been known as an intrinsic shape representation supporting a variety of shape analysis and synthesis tasks. However, for a given shape, it is hard to obtain its faithful, concise and stable medial axis, which hinders the application of the medial axis. In this paper, we introduce the medial mesh, a new discrete representation of the medial axis. A medial mesh is a 2D simplicial complex coupled with a radius function that provides a piecewise linear approximation to the medial axis. We further present an effective algorithm for computing a concise and stable medial mesh for a given shape. Our algorithm is quantitatively driven by a shape approximation error metric, and progressively simplifies an initial medial mesh by iteratively contracting edges until the approximation error reaches a predefined threshold. We further demonstrate the superior efficiency and accuracy of our method over existing methods for medial axis simplification.", "title": "Medial Meshes – A Compact and Accurate Representation of Medial Axis Transform", "normalizedTitle": "Medial Meshes – A Compact and Accurate Representation of Medial Axis Transform", "fno": "07138635", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Shape", "Approximation Error", "Piecewise Linear Approximation", "Three Dimensional Displays", "Approximation Algorithms", "Skeleton", "Enveloping Primitives", "Medial Representation", "Medial Axis Simplification", "Enveloping Primitives", "Medial Representation", "Medial Axis Simplification" ], "authors": [ { "givenName": "Feng", "surname": "Sun", "fullName": "Feng Sun", "affiliation": "Department of Computer Science, The University of Hong Kong, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yi-King", "surname": "Choi", "fullName": "Yi-King Choi", "affiliation": "Department of Computer Science, The University of Hong Kong, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yizhou", "surname": "Yu", "fullName": "Yizhou Yu", "affiliation": "Department of Computer Science, The University of Hong Kong, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenping", "surname": "Wang", "fullName": "Wenping Wang", "affiliation": "Department of Computer Science, The University of Hong Kong, Hong Kong, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2016-03-01 00:00:00", "pubType": "trans", "pages": "1278-1290", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628836", "title": "Scene Character Reconstruction through Medial Axis", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628836/12OmNAYGlty", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2008/3358/0/3358a212", "title": "New Higher-Resolution Discrete Euclidean Medial Axis in nD with Linear Time Parallel Algorithm", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2008/3358a212/12OmNApu5fr", "parentPublication": { "id": "proceedings/sibgrapi/2008/3358/0", "title": "2008 XXI Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032c727", "title": "AMAT: Medial Axis Transform for Natural Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032c727/12OmNBE7MmQ", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2011/4541/0/4541a182", "title": "A Medial Axis Extraction Algorithm for the Processing of Combustion Flame Images", "doi": null, "abstractUrl": "/proceedings-article/icig/2011/4541a182/12OmNrYlmTY", "parentPublication": { "id": "proceedings/icig/2011/4541/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/1/07501712", "title": "Object Representation and Comparison Inferred from Its Medial Axis", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07501712/12OmNvDI45q", "parentPublication": { "id": "proceedings/icpr/2000/0750/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/1/00905486", "title": "Object representation and comparison inferred from its medial axis", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/00905486/12OmNvkpljB", "parentPublication": { "id": "proceedings/icpr/2000/0750/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2009/3781/0/3781a171", "title": "Medial Axis Approximation with Bounded Error", "doi": null, "abstractUrl": "/proceedings-article/isvd/2009/3781a171/12OmNyUWR1g", "parentPublication": { "id": "proceedings/isvd/2009/3781/0", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2009/05/ttp2009050900", "title": "Transitions of the 3D Medial Axis under a One-Parameter Family of Deformations", "doi": null, "abstractUrl": "/journal/tp/2009/05/ttp2009050900/13rRUwghda9", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1986/04/04767815", "title": "Shape Smoothing Using Medial Axis Properties", "doi": null, "abstractUrl": "/journal/tp/1986/04/04767815/13rRUwj7cpY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/02/i0238", "title": "A Formal Classification of 3D Medial Axis Points and Their Local Geometry", "doi": null, "abstractUrl": "/journal/tp/2004/02/i0238/13rRUxAAT28", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07346513", "articleId": "13rRUIM2VH3", "__typename": "AdjacentArticleType" }, "next": { "fno": "07138633", "articleId": "13rRUxly8XI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNs0kyqf", "title": "December", "year": "1992", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "14", "label": "December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbs21S", "doi": "10.1109/34.177389", "abstract": "An O(n/sup 2/) time serial algorithm is developed for obtaining the medial axis transform (MAT) of an n*n image. An O(log n) time CREW PRAM algorithm and an O(log/sup 2/ n) time SIMD hypercube parallel algorithm for the MAT are also developed. Both of these use O(n/sup 2/) processors. Two problems associated with the MAT, the area and perimeter reporting problem, are studied. An O(log n) time hypercube algorithm is developed for both of them, where n is the number of squares in the MAT, and the algorithms use O(n/sup 2/) processors.", "abstracts": [ { "abstractType": "Regular", "content": "An O(n/sup 2/) time serial algorithm is developed for obtaining the medial axis transform (MAT) of an n*n image. An O(log n) time CREW PRAM algorithm and an O(log/sup 2/ n) time SIMD hypercube parallel algorithm for the MAT are also developed. Both of these use O(n/sup 2/) processors. Two problems associated with the MAT, the area and perimeter reporting problem, are studied. An O(log n) time hypercube algorithm is developed for both of them, where n is the number of squares in the MAT, and the algorithms use O(n/sup 2/) processors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An O(n/sup 2/) time serial algorithm is developed for obtaining the medial axis transform (MAT) of an n*n image. An O(log n) time CREW PRAM algorithm and an O(log/sup 2/ n) time SIMD hypercube parallel algorithm for the MAT are also developed. Both of these use O(n/sup 2/) processors. Two problems associated with the MAT, the area and perimeter reporting problem, are studied. An O(log n) time hypercube algorithm is developed for both of them, where n is the number of squares in the MAT, and the algorithms use O(n/sup 2/) processors.", "title": "Serial and Parallel Algorithms for the Medial Axis Transform", "normalizedTitle": "Serial and Parallel Algorithms for the Medial Axis Transform", "fno": "i1218", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Area Reporting Problem Parallel Algorithms Medial Axis Transform Serial Algorithm CREW PRAM Algorithm SIMD Hypercube Parallel Algorithm Perimeter Reporting Problem Hypercube Algorithm Computational Complexity Hypercube Networks Image Processing Parallel Algorithms Transforms" ], "authors": [ { "givenName": "J.F.", "surname": "Jenq", "fullName": "J.F. Jenq", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "S.", "surname": "Sahni", "fullName": "S. Sahni", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "12", "pubDate": "1992-12-01 00:00:00", "pubType": "trans", "pages": "1218-1224", "year": "1992", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i1214", "articleId": "13rRUB7a11U", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwfb6Tt", "title": "March", "year": "1996", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "2", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBJhFi", "doi": "10.1109/2945.489386", "abstract": "Abstract—The medial axis transform (MAT) is a representation of an object which has been shown to be useful in design, interrogation, animation, finite element mesh generation, performance analysis, manufacturing simulation, path planning, and tolerance specification. In this paper, an algorithm for determining the MAT is developed for general 3D polyhedral solids of arbitrary genus without cavities, with nonconvex vertices and edges. The algorithm is based on a classification scheme which relates different pieces of the medial axis (MA) to one another even in the presence of degenerate MA points. Vertices of the MA are connected to one another by tracing along adjacent edges, and finally the faces of the axis are found by traversing closed loops of vertices and edges. Representation of the MA and associated radius function is addressed, and pseudocode for the algorithm is given along with recommended optimizations. A connectivity theorem is proven to show the completeness of the algorithm. Complexity estimates and stability analysis for the algorithms are presented. Finally, examples illustrate the computational properties of the algorithm for convex and nonconvex 3D polyhedral solids with polyhedral holes.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—The medial axis transform (MAT) is a representation of an object which has been shown to be useful in design, interrogation, animation, finite element mesh generation, performance analysis, manufacturing simulation, path planning, and tolerance specification. In this paper, an algorithm for determining the MAT is developed for general 3D polyhedral solids of arbitrary genus without cavities, with nonconvex vertices and edges. The algorithm is based on a classification scheme which relates different pieces of the medial axis (MA) to one another even in the presence of degenerate MA points. Vertices of the MA are connected to one another by tracing along adjacent edges, and finally the faces of the axis are found by traversing closed loops of vertices and edges. Representation of the MA and associated radius function is addressed, and pseudocode for the algorithm is given along with recommended optimizations. A connectivity theorem is proven to show the completeness of the algorithm. Complexity estimates and stability analysis for the algorithms are presented. Finally, examples illustrate the computational properties of the algorithm for convex and nonconvex 3D polyhedral solids with polyhedral holes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—The medial axis transform (MAT) is a representation of an object which has been shown to be useful in design, interrogation, animation, finite element mesh generation, performance analysis, manufacturing simulation, path planning, and tolerance specification. In this paper, an algorithm for determining the MAT is developed for general 3D polyhedral solids of arbitrary genus without cavities, with nonconvex vertices and edges. The algorithm is based on a classification scheme which relates different pieces of the medial axis (MA) to one another even in the presence of degenerate MA points. Vertices of the MA are connected to one another by tracing along adjacent edges, and finally the faces of the axis are found by traversing closed loops of vertices and edges. Representation of the MA and associated radius function is addressed, and pseudocode for the algorithm is given along with recommended optimizations. A connectivity theorem is proven to show the completeness of the algorithm. Complexity estimates and stability analysis for the algorithms are presented. Finally, examples illustrate the computational properties of the algorithm for convex and nonconvex 3D polyhedral solids with polyhedral holes.", "title": "An Algorithm for the Medial Axis Transform of 3D Polyhedral Solids", "normalizedTitle": "An Algorithm for the Medial Axis Transform of 3D Polyhedral Solids", "fno": "v0044", "hasPdf": true, "idPrefix": "tg", "keywords": [ "CAD", "CAGD", "CAM", "Geometric Modeling", "Solid Modeling", "Skeleton", "Symmetry", "Voronoi Diagram", "Polyhedra" ], "authors": [ { "givenName": "Evan C.", "surname": "Sherbrooke", "fullName": "Evan C. Sherbrooke", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Nicholas M.", "surname": "Patrikalakis", "fullName": "Nicholas M. Patrikalakis", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Erik", "surname": "Brisson", "fullName": "Erik Brisson", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "01", "pubDate": "1996-01-01 00:00:00", "pubType": "trans", "pages": "44-61", "year": "1996", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "v0035", "articleId": "13rRUyYBlgo", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0062", "articleId": "13rRUx0gepQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzA6GUh", "title": "June", "year": "2010", "issueNum": "06", "idPrefix": "tp", "pubType": "journal", "volume": "32", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxlgxUv", "doi": "10.1109/TPAMI.2009.81", "abstract": "Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending, and elongation. However, it is well known that an object's medial axis transform (MAT) is unstable with respect to small perturbations of its boundary. This instability results in additional, unwanted branches in the skeletons, which must be pruned in order to recover the portions of the skeletons arising purely from the uncorrupted shape information. Almost all approaches to skeleton pruning compute a significance measure for each branch according to some heuristic criteria, and then prune the least significant branches first. Current approaches to branch significance computation can be classified as either local, solely using information from a neighborhood surrounding each branch, or global, using information about the shape as a whole. In this paper, we propose a third, groupwise approach to branch significance computation. We develop a groupwise skeletonization framework that yields a fuzzy significance measure for each branch, derived from information provided by the group of shapes. We call this framework the Groupwise Medial Axis Transform (G-MAT). We propose and evaluate four groupwise methods for computing branch significance and report superior performance compared to a recent, leading method. We measure the performance of each pruning algorithm using denoising, classification, and within-class skeleton similarity measures. This research has several applications, including object retrieval and shape analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending, and elongation. However, it is well known that an object's medial axis transform (MAT) is unstable with respect to small perturbations of its boundary. This instability results in additional, unwanted branches in the skeletons, which must be pruned in order to recover the portions of the skeletons arising purely from the uncorrupted shape information. Almost all approaches to skeleton pruning compute a significance measure for each branch according to some heuristic criteria, and then prune the least significant branches first. Current approaches to branch significance computation can be classified as either local, solely using information from a neighborhood surrounding each branch, or global, using information about the shape as a whole. In this paper, we propose a third, groupwise approach to branch significance computation. We develop a groupwise skeletonization framework that yields a fuzzy significance measure for each branch, derived from information provided by the group of shapes. We call this framework the Groupwise Medial Axis Transform (G-MAT). We propose and evaluate four groupwise methods for computing branch significance and report superior performance compared to a recent, leading method. We measure the performance of each pruning algorithm using denoising, classification, and within-class skeleton similarity measures. This research has several applications, including object retrieval and shape analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending, and elongation. However, it is well known that an object's medial axis transform (MAT) is unstable with respect to small perturbations of its boundary. This instability results in additional, unwanted branches in the skeletons, which must be pruned in order to recover the portions of the skeletons arising purely from the uncorrupted shape information. Almost all approaches to skeleton pruning compute a significance measure for each branch according to some heuristic criteria, and then prune the least significant branches first. Current approaches to branch significance computation can be classified as either local, solely using information from a neighborhood surrounding each branch, or global, using information about the shape as a whole. In this paper, we propose a third, groupwise approach to branch significance computation. We develop a groupwise skeletonization framework that yields a fuzzy significance measure for each branch, derived from information provided by the group of shapes. We call this framework the Groupwise Medial Axis Transform (G-MAT). We propose and evaluate four groupwise methods for computing branch significance and report superior performance compared to a recent, leading method. We measure the performance of each pruning algorithm using denoising, classification, and within-class skeleton similarity measures. This research has several applications, including object retrieval and shape analysis.", "title": "The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning", "normalizedTitle": "The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning", "fno": "ttp2010061084", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Skeletonization", "Pruning", "Medial Axis Transform", "Object Retrieval", "Shape Analysis", "Medical Image Analysis", "Graph Matching", "Groupwise Information" ], "authors": [ { "givenName": "Aaron D.", "surname": "Ward", "fullName": "Aaron D. Ward", "affiliation": "Simon Fraser University, Burnaby", "__typename": "ArticleAuthorType" }, { "givenName": "Ghassan", "surname": "Hamarneh", "fullName": "Ghassan Hamarneh", "affiliation": "Simon Fraser University, Burnaby", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2010-06-01 00:00:00", "pubType": "trans", "pages": "1084-1096", "year": "2010", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sibgrapi/2008/3358/0/3358a212", "title": "New Higher-Resolution Discrete Euclidean Medial Axis in nD with Linear Time Parallel Algorithm", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2008/3358a212/12OmNApu5fr", "parentPublication": { "id": "proceedings/sibgrapi/2008/3358/0", "title": "2008 XXI Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2011/4541/0/4541a182", "title": "A Medial Axis Extraction Algorithm for the Processing of Combustion Flame Images", "doi": null, "abstractUrl": "/proceedings-article/icig/2011/4541a182/12OmNrYlmTY", "parentPublication": { "id": "proceedings/icig/2011/4541/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/1/07501712", "title": "Object Representation and Comparison Inferred from Its Medial Axis", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07501712/12OmNvDI45q", "parentPublication": { "id": "proceedings/icpr/2000/0750/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300063", "title": "Shape Simplification Based on the Medial Axis Transform", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300063/12OmNvRU0rS", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/2/3816b544", "title": "Medial Axis Extraction Using Growing Neural Gas", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816b544/12OmNyS6REf", "parentPublication": { "id": "proceedings/aici/2009/3816/2", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2009/3781/0/3781a171", "title": "Medial Axis Approximation with Bounded Error", "doi": null, "abstractUrl": "/proceedings-article/isvd/2009/3781a171/12OmNyUWR1g", "parentPublication": { "id": "proceedings/isvd/2009/3781/0", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1999/03/i0277", "title": "Computing the Medial Axis Transform in Parallel With Eight Scan Operations", "doi": null, "abstractUrl": "/journal/tp/1999/03/i0277/13rRUEgarCc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2009/05/ttp2009050900", "title": "Transitions of the 3D Medial Axis under a One-Parameter Family of Deformations", "doi": null, "abstractUrl": "/journal/tp/2009/05/ttp2009050900/13rRUwghda9", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2000/11/i1241", "title": "Skeletonization of Three-Dimensional Object Using Generalized Potential Field", "doi": null, "abstractUrl": "/journal/tp/2000/11/i1241/13rRUwwsltG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/02/i0238", "title": "A Formal Classification of 3D Medial Axis Points and Their Local Geometry", "doi": null, "abstractUrl": "/journal/tp/2004/02/i0238/13rRUxAAT28", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttp2010061072", "articleId": "13rRUyYjK67", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttp2010061097", "articleId": "13rRUxjQyir", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ds7kEn7Eru", "doi": "10.1109/TVCG.2019.2934255", "abstract": "We present TSR-TVD, a novel deep learning framework that generates temporal super-resolution (TSR) of time-varying data (TVD) using adversarial learning. TSR-TVD is the first work that applies the recurrent generative network (RGN), a combination of the recurrent neural network (RNN) and generative adversarial network (GAN), to generate temporal high-resolution volume sequences from low-resolution ones. The design of TSR-TVD includes a generator and a discriminator. The generator takes a pair of volumes as input and outputs the synthesized intermediate volume sequence through forward and backward predictions. The discriminator takes the synthesized intermediate volumes as input and produces a score indicating the realness of the volumes. Our method handles multivariate data as well where the trained network from one variable is applied to generate TSR for another variable. To demonstrate the effectiveness of TSR-TVD, we show quantitative and qualitative results with several time-varying multivariate data sets and compare our method against standard linear interpolation and solutions solely based on RNN or CNN.", "abstracts": [ { "abstractType": "Regular", "content": "We present TSR-TVD, a novel deep learning framework that generates temporal super-resolution (TSR) of time-varying data (TVD) using adversarial learning. TSR-TVD is the first work that applies the recurrent generative network (RGN), a combination of the recurrent neural network (RNN) and generative adversarial network (GAN), to generate temporal high-resolution volume sequences from low-resolution ones. The design of TSR-TVD includes a generator and a discriminator. The generator takes a pair of volumes as input and outputs the synthesized intermediate volume sequence through forward and backward predictions. The discriminator takes the synthesized intermediate volumes as input and produces a score indicating the realness of the volumes. Our method handles multivariate data as well where the trained network from one variable is applied to generate TSR for another variable. To demonstrate the effectiveness of TSR-TVD, we show quantitative and qualitative results with several time-varying multivariate data sets and compare our method against standard linear interpolation and solutions solely based on RNN or CNN.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present TSR-TVD, a novel deep learning framework that generates temporal super-resolution (TSR) of time-varying data (TVD) using adversarial learning. TSR-TVD is the first work that applies the recurrent generative network (RGN), a combination of the recurrent neural network (RNN) and generative adversarial network (GAN), to generate temporal high-resolution volume sequences from low-resolution ones. The design of TSR-TVD includes a generator and a discriminator. The generator takes a pair of volumes as input and outputs the synthesized intermediate volume sequence through forward and backward predictions. The discriminator takes the synthesized intermediate volumes as input and produces a score indicating the realness of the volumes. Our method handles multivariate data as well where the trained network from one variable is applied to generate TSR for another variable. To demonstrate the effectiveness of TSR-TVD, we show quantitative and qualitative results with several time-varying multivariate data sets and compare our method against standard linear interpolation and solutions solely based on RNN or CNN.", "title": "TSR-TVD: Temporal Super-Resolution for Time-Varying Data Analysis and Visualization", "normalizedTitle": "TSR-TVD: Temporal Super-Resolution for Time-Varying Data Analysis and Visualization", "fno": "08802285", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Learning Artificial Intelligence", "Recurrent Neural Nets", "TSR TVD", "Temporal Super Resolution", "Time Varying Data Analysis", "Recurrent Generative Network", "Generative Adversarial Network", "Time Varying Multivariate Data Sets", "Time Varying Data Visualization", "Recurrent Neural Network", "RGN", "RNN", "GAN", "Deep Learning", "Gallium Nitride", "Data Visualization", "Deep Learning", "Spatial Resolution", "Training", "Generators", "Generative Adversarial Networks", "Time Varying Data Visualization", "Super Resolution", "Deep Learning", "Recurrent Generative Network" ], "authors": [ { "givenName": "Jun", "surname": "Han", "fullName": "Jun Han", "affiliation": "Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN", "__typename": "ArticleAuthorType" }, { "givenName": "Chaoli", "surname": "Wang", "fullName": "Chaoli Wang", "affiliation": "Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "205-215", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000d994", "title": "Feature Super-Resolution: Make Machine See More Clearly", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d994/17D45VsBTYU", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a021", "title": "Finding Tiny Faces in the Wild with Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a021/17D45WwsQ4S", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546039", "title": "3D Convolutional Generative Adversarial Networks for Detecting Temporal Irregularities in Videos", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546039/17D45X7VTeW", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594958", "title": "TreeGAN: Syntax-Aware Sequence Generation with Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594958/17D45Xtvp9B", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c433", "title": "Kernel Modeling Super-Resolution on Real Low-Resolution Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c433/1hQqxkiAwjC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d599", "title": "Frequency Separation for Real-World Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d599/1i5mH5rN1UA", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093603", "title": "Enhanced generative adversarial network for 3D brain MRI super-resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093603/1jPbsdiSQRa", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102917", "title": "Matchinggan: Matching-Based Few-Shot Image Generation", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102917/1kwr3cBl864", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150661", "title": "Real-World Super-Resolution using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150661/1lPH66Ff2HS", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09229162", "title": "SSR-TVD: Spatial Super-Resolution for Time-Varying Data Analysis and Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/06/09229162/1o3nNOnFv7G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08805456", "articleId": "1cG4x9FpdAI", "__typename": "AdjacentArticleType" }, "next": { "fno": "08807296", "articleId": "1cG6usdi8aQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1i4p5cLeQuI", "name": "ttg202001-08802285s2.wmv", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202001-08802285s2.wmv", "extension": "wmv", "size": "58.1 MB", "__typename": "WebExtraType" }, { "id": "1i4pbcoZi9O", "name": "ttg202001-08802285s1.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202001-08802285s1.pdf", "extension": "pdf", "size": "4.42 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1JC5tBrv3BC", "doi": "10.1109/TKDE.2022.3233481", "abstract": "Heterogeneous social networks, which are characterized by diverse interaction types, have resulted in new challenges for missing link prediction. Most deep learning models tend to capture type-specific features to maximize the prediction performances on specific link types. However, the types of missing links are uncertain in heterogeneous social networks; this restricts the prediction performances of existing deep learning models. To address this issue, we propose a multi-type transferable method (<italic>MTTM</italic>) for missing link prediction in heterogeneous social networks, which exploits adversarial neural networks to remain robust against type differences. It comprises a generative predictor and a discriminative classifier. The generative predictor can extract link representations and predict whether the unobserved link is a missing link. To generalize well for different link types to improve the prediction performance, it attempts to deceive the discriminative classifier by learning transferable feature representations among link types. In order not to be deceived, the discriminative classifier attempts to accurately distinguish link types, which indirectly helps the generative predictor judge whether the learned feature representations are transferable among link types. Finally, the integrated <italic>MTTM</italic> is constructed on this minimax two-player game between the generative predictor and discriminative classifier to predict missing links based on transferable feature representations among link types. Extensive experiments show that the proposed <italic>MTTM</italic> can outperform state-of-the-art baselines for missing link prediction in heterogeneous social networks.", "abstracts": [ { "abstractType": "Regular", "content": "Heterogeneous social networks, which are characterized by diverse interaction types, have resulted in new challenges for missing link prediction. Most deep learning models tend to capture type-specific features to maximize the prediction performances on specific link types. However, the types of missing links are uncertain in heterogeneous social networks; this restricts the prediction performances of existing deep learning models. To address this issue, we propose a multi-type transferable method (<italic>MTTM</italic>) for missing link prediction in heterogeneous social networks, which exploits adversarial neural networks to remain robust against type differences. It comprises a generative predictor and a discriminative classifier. The generative predictor can extract link representations and predict whether the unobserved link is a missing link. To generalize well for different link types to improve the prediction performance, it attempts to deceive the discriminative classifier by learning transferable feature representations among link types. In order not to be deceived, the discriminative classifier attempts to accurately distinguish link types, which indirectly helps the generative predictor judge whether the learned feature representations are transferable among link types. Finally, the integrated <italic>MTTM</italic> is constructed on this minimax two-player game between the generative predictor and discriminative classifier to predict missing links based on transferable feature representations among link types. Extensive experiments show that the proposed <italic>MTTM</italic> can outperform state-of-the-art baselines for missing link prediction in heterogeneous social networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heterogeneous social networks, which are characterized by diverse interaction types, have resulted in new challenges for missing link prediction. Most deep learning models tend to capture type-specific features to maximize the prediction performances on specific link types. However, the types of missing links are uncertain in heterogeneous social networks; this restricts the prediction performances of existing deep learning models. To address this issue, we propose a multi-type transferable method (MTTM) for missing link prediction in heterogeneous social networks, which exploits adversarial neural networks to remain robust against type differences. It comprises a generative predictor and a discriminative classifier. The generative predictor can extract link representations and predict whether the unobserved link is a missing link. To generalize well for different link types to improve the prediction performance, it attempts to deceive the discriminative classifier by learning transferable feature representations among link types. In order not to be deceived, the discriminative classifier attempts to accurately distinguish link types, which indirectly helps the generative predictor judge whether the learned feature representations are transferable among link types. Finally, the integrated MTTM is constructed on this minimax two-player game between the generative predictor and discriminative classifier to predict missing links based on transferable feature representations among link types. Extensive experiments show that the proposed MTTM can outperform state-of-the-art baselines for missing link prediction in heterogeneous social networks.", "title": "A Multi-type Transferable Method for Missing Link Prediction in Heterogeneous Social Networks", "normalizedTitle": "A Multi-type Transferable Method for Missing Link Prediction in Heterogeneous Social Networks", "fno": "10004751", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Social Networking Online", "Feature Extraction", "Predictive Models", "Deep Learning", "Task Analysis", "Heterogeneous Networks", "Measurement", "Missing Link Prediction", "Heterogeneous Social Network", "Transferable Feature Representation" ], "authors": [ { "givenName": "Huan", "surname": "Wang", "fullName": "Huan Wang", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ziwen", "surname": "Cui", "fullName": "Ziwen Cui", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ruigang", "surname": "Liu", "fullName": "Ruigang Liu", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lei", "surname": "Fang", "fullName": "Lei Fang", "affiliation": "School of Computer Science, University of St Andrews, Scotland, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Ying", "surname": "Sha", "fullName": "Ying Sha", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671645", "title": "Embedding propagation over heterogeneous event networks for link prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671645/1A8hgIberXa", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068642", "title": "DMNP: A Deep Learning Approach for Missing Node Prediction in Partially Observed Graphs", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068642/1LKx3FCrKvu", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2022/9402/0/940200a572", "title": "A Comparative Experimental Study of Link Prediction Methods with Structural Information", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2022/940200a572/1MBEClSkXLi", "parentPublication": { "id": "proceedings/wi-iat/2022/9402/0", "title": "2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/02/08792200", "title": "Target Defense Against Link-Prediction-Based Attacks via Evolutionary Perturbations", "doi": null, "abstractUrl": "/journal/tk/2021/02/08792200/1ckplUqQbS0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09229522", "title": "Learning on Attribute-Missing Graphs", "doi": null, "abstractUrl": "/journal/tp/2022/02/09229522/1o3nin1pJ3G", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/04/09229516", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf DeepNC}$_Z</tex-math></inline-formula>: Deep Generative Network Completion", "doi": null, "abstractUrl": "/journal/tp/2022/04/09229516/1o3nizfiIlW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09261972", "title": "Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation", "doi": null, "abstractUrl": "/journal/tk/2022/09/09261972/1oPzMUH2kzm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09272360", "title": "An Attribute-Aware Attentive GCN Model for Attribute Missing in Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/09/09272360/1p4vZduZBm0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a505", "title": "Effectively Explaining Missing Nodes on Structural Graph Clustering", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a505/1ua4trgtIhW", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09665299", "title": "Interpretable Signed Link Prediction With Signed Infomax Hyperbolic Graph", "doi": null, "abstractUrl": "/journal/tk/2023/04/09665299/1zJitUwv26Y", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10004013", "articleId": "1JwLnqJAyZ2", "__typename": "AdjacentArticleType" }, "next": { "fno": "10004974", "articleId": "1JC5tVrEwTu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvGPE8n", "title": "Jan.", "year": "2016", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwhHcJm", "doi": "10.1109/TVCG.2015.2466971", "abstract": "The energy performance of large building portfolios is challenging to analyze and monitor, as current analysis tools are not scalable or they present derived and aggregated data at too coarse of a level. We conducted a visualization design study, beginning with a thorough work domain analysis and a characterization of data and task abstractions. We describe generalizable visual encoding design choices for time-oriented data framed in terms of matches and mismatches, as well as considerations for workflow design. Our designs address several research questions pertaining to scalability, view coordination, and the inappropriateness of line charts for derived and aggregated data due to a combination of data semantics and domain convention. We also present guidelines relating to familiarity and trust, as well as methodological considerations for visualization design studies. Our designs were adopted by our collaborators and incorporated into the design of an energy analysis software application that will be deployed to tens of thousands of energy workers in their client base.", "abstracts": [ { "abstractType": "Regular", "content": "The energy performance of large building portfolios is challenging to analyze and monitor, as current analysis tools are not scalable or they present derived and aggregated data at too coarse of a level. We conducted a visualization design study, beginning with a thorough work domain analysis and a characterization of data and task abstractions. We describe generalizable visual encoding design choices for time-oriented data framed in terms of matches and mismatches, as well as considerations for workflow design. Our designs address several research questions pertaining to scalability, view coordination, and the inappropriateness of line charts for derived and aggregated data due to a combination of data semantics and domain convention. We also present guidelines relating to familiarity and trust, as well as methodological considerations for visualization design studies. Our designs were adopted by our collaborators and incorporated into the design of an energy analysis software application that will be deployed to tens of thousands of energy workers in their client base.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The energy performance of large building portfolios is challenging to analyze and monitor, as current analysis tools are not scalable or they present derived and aggregated data at too coarse of a level. We conducted a visualization design study, beginning with a thorough work domain analysis and a characterization of data and task abstractions. We describe generalizable visual encoding design choices for time-oriented data framed in terms of matches and mismatches, as well as considerations for workflow design. Our designs address several research questions pertaining to scalability, view coordination, and the inappropriateness of line charts for derived and aggregated data due to a combination of data semantics and domain convention. We also present guidelines relating to familiarity and trust, as well as methodological considerations for visualization design studies. Our designs were adopted by our collaborators and incorporated into the design of an energy analysis software application that will be deployed to tens of thousands of energy workers in their client base.", "title": "Matches, Mismatches, and Methods: Multiple-View Workflows for Energy Portfolio Analysis", "normalizedTitle": "Matches, Mismatches, and Methods: Multiple-View Workflows for Energy Portfolio Analysis", "fno": "07225156", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Buildings", "Data Visualization", "Visualization", "Portfolios", "Encoding", "Time Series Analysis", "Aggregates", "Coordinated And Multiple Views", "Design Study", "Design Methodologies", "Time Series Data", "Task And Requirements Analysis", "Coordinated And Multiple Views", "Design Study", "Design Methodologies", "Time Series Data", "Task And Requirements Analysis" ], "authors": [ { "givenName": "Matthew", "surname": "Brehmer", "fullName": "Matthew Brehmer", "affiliation": ", University of British Columbia", "__typename": "ArticleAuthorType" }, { "givenName": "Jocelyn", "surname": "Ng", "fullName": "Jocelyn Ng", "affiliation": ", EnerNOC, Inc.", "__typename": "ArticleAuthorType" }, { "givenName": "Kevin", "surname": "Tate", "fullName": "Kevin Tate", "affiliation": ", EnerNOC, Inc.", "__typename": "ArticleAuthorType" }, { "givenName": "Tamara", "surname": "Munzner", "fullName": "Tamara Munzner", "affiliation": ", University of British Columbia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2016-01-01 00:00:00", "pubType": "trans", "pages": "449-458", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/passat-socialcom/2011/1931/0/06113204", "title": "pieTime: Visualizing Communication Patterns", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113204/12OmNAle6kc", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2015/9666/0/9666a303", "title": "Finding the Different Patterns in Buildings Data Using Bag of Words Representation with Clustering", "doi": null, "abstractUrl": "/proceedings-article/fit/2015/9666a303/12OmNAoUTqD", "parentPublication": { "id": "proceedings/fit/2015/9666/0", "title": "2015 13th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2015/9942/0/9942a280", "title": "SAX-based Group Stock Portfolio Mining Approach", "doi": null, "abstractUrl": "/proceedings-article/nbis/2015/9942a280/12OmNBO3Kfw", "parentPublication": { "id": "proceedings/nbis/2015/9942/0", "title": "2015 18th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2003/8131/1/01261437", "title": "OptFolio - a simulation optimization system for project portfolio planning", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261437/12OmNrJiCKC", "parentPublication": { "id": "proceedings/wsc/2003/8131/1", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004025", "title": "Design Considerations for Drill-down Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004025/12OmNzSQdqN", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04438757", "title": "Preparing a Negotiated R&#x00026;D Portfolio with a Prediction Market", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04438757/12OmNzZWbza", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e892", "title": "Collaborative Unsupervised Visual Representation Learning from Decentralized Data", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e892/1BmEqgC6dxu", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005653", "title": "RAMP: Real-Time Anomaly Detection in Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005653/1hJs4F2LGQU", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101368", "title": "Picube for Fast Exploration of Large Datasets", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101368/1kaMP5idNGU", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0/764700a392", "title": "occupI: A novel Non-Intrusive Occupancy Inference Tool", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2020/764700a392/1pVHgEkrZpm", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07192712", "articleId": "13rRUwjGoLI", "__typename": "AdjacentArticleType" }, "next": { "fno": "07217849", "articleId": "13rRUy3gn7B", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXnFrN", "name": "ttg201601-07225156s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201601-07225156s1.zip", "extension": "zip", "size": "12.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qV2KUyowDK", "title": "Jan.-Feb.", "year": "2021", "issueNum": "01", "idPrefix": "sc", "pubType": "journal", "volume": "14", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwhHcO0", "doi": "10.1109/TSC.2018.2789454", "abstract": "The design principle of composability among Web services is one of the most crucial reasons for the success and popularity of Web services. However, achieving error-free automatic Web service composition is still a challenge. In this paper, we propose a recursive composition based modeling and verification technique for Web service interaction. The application of recursive composition over a Web service with respect to a given set of Web services yields a recursive composition interaction graph (RCIG). In order to capture the requirement specifications of a Web service interaction scenario, we propose recursive composition specification language (RCSL) as a requirement specification language. Further, we employ the proposed RCIG as an interpretation model to interpret the semantics of a RCSL formula. Our verification technique is based on the generation and analysis of all possible interaction patterns. Performance evaluation results, provided in this paper, show that our proposition is implementable for the real world applications. The key advantages of the proposed approach are: (i) it does not require explicit system modeling as in model checking based approaches, (ii) it captures primitive characteristics of Web service interaction patterns, such as recursive composition, sequential and parallel flow, etc, and (iii) it supports automatic composition of services.", "abstracts": [ { "abstractType": "Regular", "content": "The design principle of composability among Web services is one of the most crucial reasons for the success and popularity of Web services. However, achieving error-free automatic Web service composition is still a challenge. In this paper, we propose a recursive composition based modeling and verification technique for Web service interaction. The application of recursive composition over a Web service with respect to a given set of Web services yields a recursive composition interaction graph (RCIG). In order to capture the requirement specifications of a Web service interaction scenario, we propose recursive composition specification language (RCSL) as a requirement specification language. Further, we employ the proposed RCIG as an interpretation model to interpret the semantics of a RCSL formula. Our verification technique is based on the generation and analysis of all possible interaction patterns. Performance evaluation results, provided in this paper, show that our proposition is implementable for the real world applications. The key advantages of the proposed approach are: (i) it does not require explicit system modeling as in model checking based approaches, (ii) it captures primitive characteristics of Web service interaction patterns, such as recursive composition, sequential and parallel flow, etc, and (iii) it supports automatic composition of services.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The design principle of composability among Web services is one of the most crucial reasons for the success and popularity of Web services. However, achieving error-free automatic Web service composition is still a challenge. In this paper, we propose a recursive composition based modeling and verification technique for Web service interaction. The application of recursive composition over a Web service with respect to a given set of Web services yields a recursive composition interaction graph (RCIG). In order to capture the requirement specifications of a Web service interaction scenario, we propose recursive composition specification language (RCSL) as a requirement specification language. Further, we employ the proposed RCIG as an interpretation model to interpret the semantics of a RCSL formula. Our verification technique is based on the generation and analysis of all possible interaction patterns. Performance evaluation results, provided in this paper, show that our proposition is implementable for the real world applications. The key advantages of the proposed approach are: (i) it does not require explicit system modeling as in model checking based approaches, (ii) it captures primitive characteristics of Web service interaction patterns, such as recursive composition, sequential and parallel flow, etc, and (iii) it supports automatic composition of services.", "title": "Web Service Interaction Modeling and Verification Using Recursive Composition Algebra", "normalizedTitle": "Web Service Interaction Modeling and Verification Using Recursive Composition Algebra", "fno": "08246527", "hasPdf": true, "idPrefix": "sc", "keywords": [ "Formal Specification", "Formal Verification", "Graph Theory", "Specification Languages", "Web Services", "Recursive Composition Algebra", "Error Free Automatic Web Service Composition", "Recursive Composition Interaction Graph", "Recursive Composition Specification Language", "Web Service Interaction Patterns", "Recursive Composition Based Modeling And Verification Technique", "Interpretation Model", "Model Checking Based Approaches", "Web Services", "Model Checking", "Computational Modeling", "Algebra", "Petri Nets", "Knowledge Engineering", "Visualization", "Web Service Composition", "Web Service Interaction", "Recursive Composition", "Interaction Modeling", "Interaction Verification" ], "authors": [ { "givenName": "Gopal N.", "surname": "Rai", "fullName": "Gopal N. Rai", "affiliation": "Madanapalle Institute of Technology and Science, Madanapalle, Andhra Pradesh, India", "__typename": "ArticleAuthorType" }, { "givenName": "G. R.", "surname": "Gangadharan", "fullName": "G. R. Gangadharan", "affiliation": "IDRBT, Hyderabad, Telangana, India", "__typename": "ArticleAuthorType" }, { "givenName": "Vineet", "surname": "Padmanabhan", "fullName": "Vineet Padmanabhan", "affiliation": "University of Hyderabad, Hyderabad, Telangana, India", "__typename": "ArticleAuthorType" }, { "givenName": "Rajkumar", "surname": "Buyya", "fullName": "Rajkumar Buyya", "affiliation": "University of Melbourne, Melbourne, Parkville, VIC, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2021-01-01 00:00:00", "pubType": "trans", "pages": "300-314", "year": "2021", "issn": "1939-1374", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/apsec/2009/3909/0/3909a507", "title": "A Method for Modeling and Analyzing Fault-Tolerant Service Composition", "doi": null, "abstractUrl": "/proceedings-article/apsec/2009/3909a507/12OmNAlNiJX", "parentPublication": { "id": "proceedings/apsec/2009/3909/0", "title": "2009 16th Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/4/3570d233", "title": "Research on Reachability Verification of Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570d233/12OmNBpmDQY", "parentPublication": { "id": "proceedings/wcse/2009/3570/4", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsd/1998/8350/0/83500239", "title": "Recursive Nets in the Box Algebra", "doi": null, "abstractUrl": "/proceedings-article/acsd/1998/83500239/12OmNqFrGww", "parentPublication": { "id": "proceedings/acsd/1998/8350/0", "title": "Proceedings 1998 International Conference on Application of Concurrency to System Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acomp/2016/6143/0/07809555", "title": "An Application of Bitwise-Based Indexing to Web Service Composition and Verification", "doi": null, "abstractUrl": "/proceedings-article/acomp/2016/07809555/12OmNs0kyyT", "parentPublication": { "id": "proceedings/acomp/2016/6143/0", "title": "2016 International Conference on Advanced Computing and Applications (ACOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2014/7425/1/07091295", "title": "Formal Modeling and Analyzing the Reliability for Service Composition", "doi": null, "abstractUrl": "/proceedings-article/apsec/2014/07091295/12OmNwFid6z", "parentPublication": { "id": "proceedings/apsec/2014/7425/1", "title": "2014 21st Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2014/5066/0/5066a179", "title": "A Survey of Formalization Approaches to Service Composition", "doi": null, "abstractUrl": "/proceedings-article/scc/2014/5066a179/12OmNx7XH8l", "parentPublication": { "id": "proceedings/scc/2014/5066/0", "title": "2014 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2009/3709/0/3709a952", "title": "A Petri Net Siphon Based Solution to Protocol-Level Service Composition Mismatches", "doi": null, "abstractUrl": "/proceedings-article/icws/2009/3709a952/12OmNyaoDwz", "parentPublication": { "id": "proceedings/icws/2009/3709/0", "title": "2009 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2007/3007/0/30070467", "title": "Research on Web Service Composition and Verification", "doi": null, "abstractUrl": "/proceedings-article/skg/2007/30070467/12OmNyr8Yov", "parentPublication": { "id": "proceedings/skg/2007/3007/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2007/2844/0/04222917", "title": "Web Service Composition Approaches: From Industrial Standards to Formal Methods", "doi": null, "abstractUrl": "/proceedings-article/iciw/2007/04222917/12OmNywxlMR", "parentPublication": { "id": "proceedings/iciw/2007/2844/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08254400", "articleId": "13rRUwInvpw", "__typename": "AdjacentArticleType" }, "next": { "fno": "09346134", "articleId": "1qV2L3JNRza", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxZ0o1B", "doi": "10.1109/TVCG.2014.2346298", "abstract": "When making an inference or comparison with uncertain, noisy, or incomplete data, measurement error and confidence intervals can be as important for judgment as the actual mean values of different groups. These often misunderstood statistical quantities are frequently represented by bar charts with error bars. This paper investigates drawbacks with this standard encoding, and considers a set of alternatives designed to more effectively communicate the implications of mean and error data to a general audience, drawing from lessons learned from the use of visual statistics in the information visualization community. We present a series of crowd-sourced experiments that confirm that the encoding of mean and error significantly changes how viewers make decisions about uncertain data. Careful consideration of design tradeoffs in the visual presentation of data results in human reasoning that is more consistently aligned with statistical inferences. We suggest the use of gradient plots (which use transparency to encode uncertainty) and violin plots (which use width) as better alternatives for inferential tasks than bar charts with error bars.", "abstracts": [ { "abstractType": "Regular", "content": "When making an inference or comparison with uncertain, noisy, or incomplete data, measurement error and confidence intervals can be as important for judgment as the actual mean values of different groups. These often misunderstood statistical quantities are frequently represented by bar charts with error bars. This paper investigates drawbacks with this standard encoding, and considers a set of alternatives designed to more effectively communicate the implications of mean and error data to a general audience, drawing from lessons learned from the use of visual statistics in the information visualization community. We present a series of crowd-sourced experiments that confirm that the encoding of mean and error significantly changes how viewers make decisions about uncertain data. Careful consideration of design tradeoffs in the visual presentation of data results in human reasoning that is more consistently aligned with statistical inferences. We suggest the use of gradient plots (which use transparency to encode uncertainty) and violin plots (which use width) as better alternatives for inferential tasks than bar charts with error bars.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When making an inference or comparison with uncertain, noisy, or incomplete data, measurement error and confidence intervals can be as important for judgment as the actual mean values of different groups. These often misunderstood statistical quantities are frequently represented by bar charts with error bars. This paper investigates drawbacks with this standard encoding, and considers a set of alternatives designed to more effectively communicate the implications of mean and error data to a general audience, drawing from lessons learned from the use of visual statistics in the information visualization community. We present a series of crowd-sourced experiments that confirm that the encoding of mean and error significantly changes how viewers make decisions about uncertain data. Careful consideration of design tradeoffs in the visual presentation of data results in human reasoning that is more consistently aligned with statistical inferences. We suggest the use of gradient plots (which use transparency to encode uncertainty) and violin plots (which use width) as better alternatives for inferential tasks than bar charts with error bars.", "title": "Error Bars Considered Harmful: Exploring Alternate Encodings for Mean and Error", "normalizedTitle": "Error Bars Considered Harmful: Exploring Alternate Encodings for Mean and Error", "fno": "06875915", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Encoding", "Information Analysis", "Data Visualization", "Standards", "Error Analysis", "Empirical Evaluation", "Visual Statistics", "Information Visualization", "Crowd Sourcing" ], "authors": [ { "givenName": "Michael", "surname": "Correll", "fullName": "Michael Correll", "affiliation": "Department of Computer Sciences, University of Wisconsin-Madison", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Gleicher", "fullName": "Michael Gleicher", "affiliation": "Department of Computer Sciences, University of Wisconsin-Madison", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "2142-2151", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2001/1342/0/13420113", "title": "Pixel Bar Charts: A New Technique for Visualizing Large Multi-Attribute Data Sets without Aggregation", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2001/13420113/12OmNwE9OuO", "parentPublication": { "id": "proceedings/ieee-infovis/2001/1342/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07043983", "title": "Your data deserve better than pies and bars: An R graphics workshop for the timid", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07043983/12OmNz3bdDC", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876021", "title": "Four Experiments on the Perception of Bar Charts", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876021/13rRUNvgz9Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192667", "title": "Visual Encodings of Temporal Uncertainty: A Comparative User Study", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192667/13rRUwjGoLH", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/03/v0255", "title": "Hierarchical Pixel Bar Charts", "doi": null, "abstractUrl": "/journal/tg/2002/03/v0255/13rRUyuegh1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a159", "title": "Improving Perception Accuracy in Bar Charts with Internal Contrast and Framing Enhancements", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a159/17D45WnnFWc", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443125", "title": "Glanceable Visualization: Studies of Data Comparison Performance on Smartwatches", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443125/17D45XDIXRv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/02/09756627", "title": "More Than Meets the Eye: A Closer Look at Encodings in Visualization", "doi": null, "abstractUrl": "/magazine/cg/2022/02/09756627/1CxvjdlL3TG", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a067", "title": "An Overview of the Design and Development for Dynamic and Physical Bar Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a067/1KaH61BvDWw", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222047", "title": "Truth or Square: Aspect Ratio Biases Recall of Position Encodings", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222047/1nTqj3fbFXq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06875927", "articleId": "13rRUxBa5bZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06876021", "articleId": "13rRUNvgz9Q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1cG6vBDoxji", "doi": "10.1109/TVCG.2019.2934670", "abstract": "Air pollution has become a serious public health problem for many cities around the world. To find the causes of air pollution, the propagation processes of air pollutants must be studied at a large spatial scale. However, the complex and dynamic wind fields lead to highly uncertain pollutant transportation. The state-of-the-art data mining approaches cannot fully support the extensive analysis of such uncertain spatiotemporal propagation processes across multiple districts without the integration of domain knowledge. The limitation of these automated approaches motivates us to design and develop AirVis, a novel visual analytics system that assists domain experts in efficiently capturing and interpreting the uncertain propagation patterns of air pollution based on graph visualizations. Designing such a system poses three challenges: a) the extraction of propagation patterns; b) the scalability of pattern presentations; and c) the analysis of propagation processes. To address these challenges, we develop a novel pattern mining framework to model pollutant transportation and extract frequent propagation patterns efficiently from large-scale atmospheric data. Furthermore, we organize the extracted patterns hierarchically based on the minimum description length (MDL) principle and empower expert users to explore and analyze these patterns effectively on the basis of pattern topologies. We demonstrated the effectiveness of our approach through two case studies conducted with a real-world dataset and positive feedback from domain experts.", "abstracts": [ { "abstractType": "Regular", "content": "Air pollution has become a serious public health problem for many cities around the world. To find the causes of air pollution, the propagation processes of air pollutants must be studied at a large spatial scale. However, the complex and dynamic wind fields lead to highly uncertain pollutant transportation. The state-of-the-art data mining approaches cannot fully support the extensive analysis of such uncertain spatiotemporal propagation processes across multiple districts without the integration of domain knowledge. The limitation of these automated approaches motivates us to design and develop AirVis, a novel visual analytics system that assists domain experts in efficiently capturing and interpreting the uncertain propagation patterns of air pollution based on graph visualizations. Designing such a system poses three challenges: a) the extraction of propagation patterns; b) the scalability of pattern presentations; and c) the analysis of propagation processes. To address these challenges, we develop a novel pattern mining framework to model pollutant transportation and extract frequent propagation patterns efficiently from large-scale atmospheric data. Furthermore, we organize the extracted patterns hierarchically based on the minimum description length (MDL) principle and empower expert users to explore and analyze these patterns effectively on the basis of pattern topologies. We demonstrated the effectiveness of our approach through two case studies conducted with a real-world dataset and positive feedback from domain experts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Air pollution has become a serious public health problem for many cities around the world. To find the causes of air pollution, the propagation processes of air pollutants must be studied at a large spatial scale. However, the complex and dynamic wind fields lead to highly uncertain pollutant transportation. The state-of-the-art data mining approaches cannot fully support the extensive analysis of such uncertain spatiotemporal propagation processes across multiple districts without the integration of domain knowledge. The limitation of these automated approaches motivates us to design and develop AirVis, a novel visual analytics system that assists domain experts in efficiently capturing and interpreting the uncertain propagation patterns of air pollution based on graph visualizations. Designing such a system poses three challenges: a) the extraction of propagation patterns; b) the scalability of pattern presentations; and c) the analysis of propagation processes. To address these challenges, we develop a novel pattern mining framework to model pollutant transportation and extract frequent propagation patterns efficiently from large-scale atmospheric data. Furthermore, we organize the extracted patterns hierarchically based on the minimum description length (MDL) principle and empower expert users to explore and analyze these patterns effectively on the basis of pattern topologies. We demonstrated the effectiveness of our approach through two case studies conducted with a real-world dataset and positive feedback from domain experts.", "title": "AirVis: Visual Analytics of Air Pollution Propagation", "normalizedTitle": "AirVis: Visual Analytics of Air Pollution Propagation", "fno": "08807233", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Air Pollution", "Data Analysis", "Data Mining", "Data Visualisation", "Environmental Science Computing", "Feature Extraction", "Graph Theory", "Visual Analytics System", "Air Pollution Propagation", "Air Pollutants", "Data Mining", "Uncertain Pollutant Transportation", "Uncertain Spatiotemporal Propagation Process", "Public Health Problem", "Air Vis", "Graph Visualizations", "Propagation Pattern Extraction", "Pattern Presentation Scalability", "Pattern Mining", "Minimum Description Length Principle", "Air Pollution", "Data Visualization", "Data Mining", "Atmospheric Modeling", "Transportation", "Spatiotemporal Phenomena", "Air Pollution Propagation", "Pattern Mining", "Graph Visualization" ], "authors": [ { "givenName": "Zikun", "surname": "Deng", "fullName": "Zikun Deng", "affiliation": "State Key Lab of CAD & CG, Zhejiang University", "__typename": "ArticleAuthorType" }, { "givenName": "Di", "surname": "Weng", "fullName": "Di Weng", "affiliation": "State Key Lab of CAD & CG, Zhejiang University", "__typename": "ArticleAuthorType" }, { "givenName": "Jiahui", "surname": "Chen", "fullName": "Jiahui Chen", "affiliation": "State Key Lab of CAD & CG, Zhejiang University", "__typename": "ArticleAuthorType" }, { "givenName": "Ren", "surname": "Liu", "fullName": "Ren Liu", "affiliation": "State Key Lab of CAD & CG, Zhejiang University", "__typename": "ArticleAuthorType" }, { "givenName": "Zhibin", "surname": "Wang", "fullName": "Zhibin Wang", "affiliation": "Research Center for Air Pollution and Health, Zhejiang University", "__typename": "ArticleAuthorType" }, { "givenName": "Jie", "surname": "Bao", "fullName": "Jie Bao", "affiliation": "JD Intelligent City Research, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu", "surname": "Zheng", "fullName": "Yu Zheng", "affiliation": "JD Intelligent City Research, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yingcai", "surname": "Wu", "fullName": "Yingcai Wu", "affiliation": "State Key Lab of CAD & CG, Zhejiang University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "800-810", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/lcn-workshops/2013/0540/0/06758498", "title": "HazeWatch: A participatory sensor system for monitoring air pollution in Sydney", "doi": null, "abstractUrl": "/proceedings-article/lcn-workshops/2013/06758498/12OmNrJAed6", "parentPublication": { "id": "proceedings/lcn-workshops/2013/0540/0", "title": "2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921638", "title": "Inferring air pollution by sniffing social media", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921638/12OmNrJRP8z", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a172", "title": "Modelling Air Pollution Crises Using Multi-agent Simulation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a172/12OmNrYCXYG", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2012/4772/0/4772a553", "title": "New Conception of Air Pollution Control in China", "doi": null, "abstractUrl": "/proceedings-article/icdma/2012/4772a553/12OmNyoAAbl", "parentPublication": { "id": "proceedings/icdma/2012/4772/0", "title": "2012 Third International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a913", "title": "Analyzing Correlation Between Air and Noise Pollution with Influence on Air Quality Prediction", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a913/18jXDQBLqsU", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020701", "title": "A Data Integration Approach to Estimating Personal Exposures to Air Pollution", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020701/1KfRPiaBw8o", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005574", "title": "MSSTN: Multi-Scale Spatial Temporal Network for Air Pollution Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005574/1hJsh9aiAlG", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a055", "title": "Spatiotemporal Deep Learning Model for Citywide Air Pollution Interpolation and Prediction", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a055/1jdDAeLv8FW", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a460", "title": "Visual analytics for spatio-temporal air quality data", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a460/1rSRcUAhJ8A", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400a521", "title": "Satellite Image Atmospheric Air Pollution Prediction through Meteorological Graph Convolutional Network with Deep Convolutional LSTM", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400a521/1uGYGTXllsY", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08809847", "articleId": "1cHE3DUq8OQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08809845", "articleId": "1cHEdqR4dHO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1fe9RihdfQ4", "name": "ttg202001-08807233s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202001-08807233s1.zip", "extension": "zip", "size": "29.6 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1DFd8NuTZXW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "td", "pubType": "journal", "volume": "33", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1B2DiKgAc2Q", "doi": "10.1109/TPDS.2022.3151895", "abstract": "Graph neural networks (GNNs) have received much attention as GNNs have recently been successfully applied on non-euclidean data. However, artificially designed graph neural networks often fail to get satisfactory model performance for a given graph data. Graph neural architecture search effectively constructs the GNNs that achieve the expected model performance with the rise of automatic machine learning. The challenge is efficiently and automatically getting the optimal GNN architecture in a vast search space. Existing search methods serially evaluate the GNN architectures, severely limiting system efficiency. To solve these problems, we develop an <bold>Auto</bold>matic <bold>G</bold>raph <bold>N</bold>eural <bold>A</bold>rchitecture <bold>S</bold>earch framework (Auto-GNAS) with parallel estimation to implement an automatic graph neural search process that requires almost no manual intervention. In Auto-GNAS, we design the search algorithm with multiple genetic searchers. Each searcher can simultaneously use evaluation feedback information, information entropy, and search results from other searchers based on sharing mechanism to improve the search efficiency. As far as we know, this is the first work using parallel computing to improve the system efficiency of graph neural architecture search. According to the experiment on the real datasets, Auto-GNAS obtain competitive model performance and better search efficiency than other search algorithms. Since the parallel estimation ability of Auto-GNAS is independent of search algorithms, we expand different search algorithms based on Auto-GNAS for scalability experiments. The results show that Auto-GNAS with varying search algorithms can achieve nearly linear acceleration with the increase of computing resources.", "abstracts": [ { "abstractType": "Regular", "content": "Graph neural networks (GNNs) have received much attention as GNNs have recently been successfully applied on non-euclidean data. However, artificially designed graph neural networks often fail to get satisfactory model performance for a given graph data. Graph neural architecture search effectively constructs the GNNs that achieve the expected model performance with the rise of automatic machine learning. The challenge is efficiently and automatically getting the optimal GNN architecture in a vast search space. Existing search methods serially evaluate the GNN architectures, severely limiting system efficiency. To solve these problems, we develop an <bold>Auto</bold>matic <bold>G</bold>raph <bold>N</bold>eural <bold>A</bold>rchitecture <bold>S</bold>earch framework (Auto-GNAS) with parallel estimation to implement an automatic graph neural search process that requires almost no manual intervention. In Auto-GNAS, we design the search algorithm with multiple genetic searchers. Each searcher can simultaneously use evaluation feedback information, information entropy, and search results from other searchers based on sharing mechanism to improve the search efficiency. As far as we know, this is the first work using parallel computing to improve the system efficiency of graph neural architecture search. According to the experiment on the real datasets, Auto-GNAS obtain competitive model performance and better search efficiency than other search algorithms. Since the parallel estimation ability of Auto-GNAS is independent of search algorithms, we expand different search algorithms based on Auto-GNAS for scalability experiments. The results show that Auto-GNAS with varying search algorithms can achieve nearly linear acceleration with the increase of computing resources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph neural networks (GNNs) have received much attention as GNNs have recently been successfully applied on non-euclidean data. However, artificially designed graph neural networks often fail to get satisfactory model performance for a given graph data. Graph neural architecture search effectively constructs the GNNs that achieve the expected model performance with the rise of automatic machine learning. The challenge is efficiently and automatically getting the optimal GNN architecture in a vast search space. Existing search methods serially evaluate the GNN architectures, severely limiting system efficiency. To solve these problems, we develop an Automatic Graph Neural Architecture Search framework (Auto-GNAS) with parallel estimation to implement an automatic graph neural search process that requires almost no manual intervention. In Auto-GNAS, we design the search algorithm with multiple genetic searchers. Each searcher can simultaneously use evaluation feedback information, information entropy, and search results from other searchers based on sharing mechanism to improve the search efficiency. As far as we know, this is the first work using parallel computing to improve the system efficiency of graph neural architecture search. According to the experiment on the real datasets, Auto-GNAS obtain competitive model performance and better search efficiency than other search algorithms. Since the parallel estimation ability of Auto-GNAS is independent of search algorithms, we expand different search algorithms based on Auto-GNAS for scalability experiments. The results show that Auto-GNAS with varying search algorithms can achieve nearly linear acceleration with the increase of computing resources.", "title": "Auto-GNAS: A Parallel Graph Neural Architecture Search Framework", "normalizedTitle": "Auto-GNAS: A Parallel Graph Neural Architecture Search Framework", "fno": "09714826", "hasPdf": true, "idPrefix": "td", "keywords": [ "Genetic Algorithms", "Graph Theory", "Neural Net Architecture", "Search Problems", "System Efficiency", "Auto GNAS", "Search Algorithms", "Artificially Designed Graph Neural Networks", "Satisfactory Model Performance", "Expected Model Performance", "Optimal GNN Architecture", "Vast Search Space", "Search Methods", "GNN Architectures", "Automatic Graph Neural Search Process", "Automatic Graph Neural Architecture Search Framework", "Graph Data", "Parallel Graph Neural Architecture Search Framework", "Computer Architecture", "Estimation", "Graph Neural Networks", "Genetics", "Search Problems", "Prediction Algorithms", "Parallel Processing", "Neural Architecture Search", "Parallel Search", "Graph Neural Network" ], "authors": [ { "givenName": "Jiamin", "surname": "Chen", "fullName": "Jiamin Chen", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianliang", "surname": "Gao", "fullName": "Jianliang Gao", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yibo", "surname": "Chen", "fullName": "Yibo Chen", "affiliation": "State Grid Hunan Electric Power Company Limited, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Babatounde Moctard", "surname": "Oloulade", "fullName": "Babatounde Moctard Oloulade", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tengfei", "surname": "Lyu", "fullName": "Tengfei Lyu", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhao", "surname": "Li", "fullName": "Zhao Li", "affiliation": "Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "3117-3128", "year": "2022", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2021/2398/0/239800a837", "title": "AS-GCN: Adaptive Semantic Architecture of Graph Convolutional Networks for Text-Rich Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a837/1Aqxo1FKxVK", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09782531", "title": "GraphNAS++: Distributed Architecture Search for Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/09782531/1DGRX0sXNJK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600k0853", "title": "Automatic Relation-aware Graph Network Proliferation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600k0853/1H0NsGhtidG", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09950609", "title": "Spectral Adversarial Training for Robust Graph Neural Network", "doi": null, "abstractUrl": "/journal/tk/5555/01/09950609/1Ik4HsmA7mg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09961144", "title": "On the Substructure Countability of Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/09961144/1IxvRpQWaZ2", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a783", "title": "Multi-Relational Graph Neural Architecture Search with Fine-grained Message Passing", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a783/1KpCC81QEXC", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/5555/01/10112632", "title": "CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection", "doi": null, "abstractUrl": "/journal/ec/5555/01/10112632/1MIcUrQUr1S", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378060", "title": "Graph Neural Network Architecture Search for Molecular Property Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378060/1s64ihs3tLy", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/12/09420316", "title": "Self-Propagation Graph Neural Network for Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/12/09420316/1tdUw1cU7Be", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900g653", "title": "Rethinking Graph Neural Architecture Search from Message-passing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900g653/1yeK7HsPDVe", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09635662", "articleId": "1z29dvTMqAg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09647869", "articleId": "1ziKjzt9BHq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KsRWKKVV7i", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1DhYyFBzSaA", "doi": "10.1109/TPAMI.2022.3174515", "abstract": "Training deep graph neural networks (GNNs) is notoriously hard. Besides the standard plights in training deep architectures such as vanishing gradients and overfitting, it also uniquely suffers from over-smoothing, information squashing, and so on, which limits their potential power for encoding the high-order neighbor structure in large-scale graphs. Although numerous efforts are proposed to address these limitations, such as various forms of skip connections, graph normalization, and random dropping, it is difficult to disentangle the advantages brought by a deep GNN architecture from those &#x201C;tricks&#x201D; necessary to train such an architecture. Moreover, the lack of a standardized benchmark with fair and consistent experimental settings poses an almost insurmountable obstacle to gauge the effectiveness of new mechanisms. In view of those, we present the first fair and reproducible benchmark dedicated to assessing the &#x201C;tricks&#x201D; of training deep GNNs. We categorize existing approaches, investigate their hyperparameter sensitivity, and unify the basic configuration. Comprehensive evaluations are then conducted on tens of representative graph datasets including the recent large-scale Open Graph Benchmark, with diverse deep GNN backbones. We demonstrate that an organic combo of initial connection, identity mapping, group and batch normalization attains the new state-of-the-art results for deep GNNs on large datasets. Codes are available: <uri>https://github.com/VITA-Group/Deep_GCN_Benchmarking</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Training deep graph neural networks (GNNs) is notoriously hard. Besides the standard plights in training deep architectures such as vanishing gradients and overfitting, it also uniquely suffers from over-smoothing, information squashing, and so on, which limits their potential power for encoding the high-order neighbor structure in large-scale graphs. Although numerous efforts are proposed to address these limitations, such as various forms of skip connections, graph normalization, and random dropping, it is difficult to disentangle the advantages brought by a deep GNN architecture from those &#x201C;tricks&#x201D; necessary to train such an architecture. Moreover, the lack of a standardized benchmark with fair and consistent experimental settings poses an almost insurmountable obstacle to gauge the effectiveness of new mechanisms. In view of those, we present the first fair and reproducible benchmark dedicated to assessing the &#x201C;tricks&#x201D; of training deep GNNs. We categorize existing approaches, investigate their hyperparameter sensitivity, and unify the basic configuration. Comprehensive evaluations are then conducted on tens of representative graph datasets including the recent large-scale Open Graph Benchmark, with diverse deep GNN backbones. We demonstrate that an organic combo of initial connection, identity mapping, group and batch normalization attains the new state-of-the-art results for deep GNNs on large datasets. Codes are available: <uri>https://github.com/VITA-Group/Deep_GCN_Benchmarking</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Training deep graph neural networks (GNNs) is notoriously hard. Besides the standard plights in training deep architectures such as vanishing gradients and overfitting, it also uniquely suffers from over-smoothing, information squashing, and so on, which limits their potential power for encoding the high-order neighbor structure in large-scale graphs. Although numerous efforts are proposed to address these limitations, such as various forms of skip connections, graph normalization, and random dropping, it is difficult to disentangle the advantages brought by a deep GNN architecture from those “tricks” necessary to train such an architecture. Moreover, the lack of a standardized benchmark with fair and consistent experimental settings poses an almost insurmountable obstacle to gauge the effectiveness of new mechanisms. In view of those, we present the first fair and reproducible benchmark dedicated to assessing the “tricks” of training deep GNNs. We categorize existing approaches, investigate their hyperparameter sensitivity, and unify the basic configuration. Comprehensive evaluations are then conducted on tens of representative graph datasets including the recent large-scale Open Graph Benchmark, with diverse deep GNN backbones. We demonstrate that an organic combo of initial connection, identity mapping, group and batch normalization attains the new state-of-the-art results for deep GNNs on large datasets. Codes are available: https://github.com/VITA-Group/Deep_GCN_Benchmarking.", "title": "Bag of Tricks for Training Deeper Graph Neural Networks: A Comprehensive Benchmark Study", "normalizedTitle": "Bag of Tricks for Training Deeper Graph Neural Networks: A Comprehensive Benchmark Study", "fno": "09773017", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Deep Learning Artificial Intelligence", "Graph Neural Networks", "Comprehensive Evaluations", "Deep Architectures", "Deep GNN Architecture", "Deeper Graph Neural Network Training", "Graph Datasets", "Graph Normalization", "High Order Neighbor Structure", "Information Squashing", "Large Scale Graphs", "Random Dropping", "Skip Connections", "Training", "Benchmark Testing", "Standards", "Peer To Peer Computing", "Graph Neural Networks", "Computer Architecture", "Task Analysis", "Deep Graph Neural Networks", "Over Smoothing", "Training Technique", "Benchmark" ], "authors": [ { "givenName": "Tianlong", "surname": "Chen", "fullName": "Tianlong Chen", "affiliation": "Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kaixiong", "surname": "Zhou", "fullName": "Kaixiong Zhou", "affiliation": "Department of Computer Science, Rice University, Houston, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Keyu", "surname": "Duan", "fullName": "Keyu Duan", "affiliation": "Department of Computer Science, Rice University, Houston, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Wenqing", "surname": "Zheng", "fullName": "Wenqing Zheng", "affiliation": "Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Peihao", "surname": "Wang", "fullName": "Peihao Wang", "affiliation": "Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xia", "surname": "Hu", "fullName": "Xia Hu", "affiliation": "Department of Computer Science, Rice University, Houston, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zhangyang", "surname": "Wang", "fullName": "Zhangyang Wang", "affiliation": "Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2769-2781", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ism/2021/3734/0/373400a249", "title": "Edge-Level Explanations for Graph Neural Networks by Extending Explainability Methods for Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/ism/2021/373400a249/1A3j8OOLHa0", "parentPublication": { "id": "proceedings/ism/2021/3734/0", "title": "2021 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2021/1623/0/162300a011", "title": "Membership Inference Attack on Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2021/162300a011/1CzeyRu16tG", "parentPublication": { "id": "proceedings/tps-isa/2021/1623/0", "title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2022/9548/0/954800a152", "title": "Attentive Graph Neural Networks for Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/mipr/2022/954800a152/1Gvd7t6THNK", "parentPublication": { "id": "proceedings/mipr/2022/9548/0", "title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiswc/2022/8798/0/879800a146", "title": "gSuite: A Flexible and Framework Independent Benchmark Suite for Graph Neural Network Inference on GPUs", "doi": null, "abstractUrl": "/proceedings-article/iiswc/2022/879800a146/1J4ChyLdhOo", "parentPublication": { "id": "proceedings/iiswc/2022/8798/0", "title": "2022 IEEE International Symposium on Workload Characterization (IISWC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a231", "title": "CC-GNN: A Community and Contraction-based Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a231/1KpCGX7nMmk", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10114622", "title": "<monospace>PoisonedGNN</monospace>: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems", "doi": null, "abstractUrl": "/journal/tc/5555/01/10114622/1MQvszyCmLS", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b487", "title": "Bag of Tricks and a Strong Baseline for Deep Person Re-Identification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b487/1iTvhVhTxLy", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2021/1219/0/121900a013", "title": "GraphGallery: A Platform for Fast Benchmarking and Easy Development of Graph Neural Networks Based Intelligent Software", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2021/121900a013/1sET5DXNWJG", "parentPublication": { "id": "proceedings/icse-companion/2021/1219/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispass/2021/8643/0/864300a013", "title": "GNNMark: A Benchmark Suite to Characterize Graph Neural Network Training on GPUs", "doi": null, "abstractUrl": "/proceedings-article/ispass/2021/864300a013/1taFkJphQhG", "parentPublication": { "id": "proceedings/ispass/2021/8643/0", "title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09540311", "title": "Eigen-GNN: A Graph Structure Preserving Plug-in for GNNs", "doi": null, "abstractUrl": "/journal/tk/2023/03/09540311/1wWCbkQuLrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09796468", "articleId": "1EexiN6tWYU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09774929", "articleId": "1Dlifb1d2c8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KsSoT0AdUY", "name": "ttp202303-09773017s1-supp1-3174515.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202303-09773017s1-supp1-3174515.pdf", "extension": "pdf", "size": "202 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Fisq5OcXeg", "doi": "10.1109/TKDE.2022.3193725", "abstract": "Graph neural networks (GNNs) have achieved impressive performance when testing and training graph data come from identical distribution. However, existing GNNs lack out-of-distribution generalization abilities so that their performance substantially degrades when there exist distribution shifts between testing and training graph data. To solve this problem, in this work, we propose an out-of-distribution generalized graph neural network (<bold>OOD-GNN</bold>) for achieving satisfactory performance on unseen testing graphs that have different distributions with training graphs. Our proposed <bold>OOD-GNN</bold> employs a novel nonlinear graph representation decorrelation method utilizing random Fourier features, which encourages the model to eliminate the statistical dependence between relevant and irrelevant graph representations through iteratively optimizing the sample graph weights and graph encoder. We further present a global weight estimator to learn weights for training graphs such that variables in graph representations are forced to be independent. The learned weights help the graph encoder to get rid of spurious correlations and, in turn, concentrate more on the true connection between learned discriminative graph representations and their ground-truth labels. We conduct extensive experiments to validate the out-of-distribution generalization abilities on two synthetic and 12 real-world datasets with distribution shifts. The results demonstrate that our proposed <bold>OOD-GNN</bold> significantly outperforms state-of-the-art baselines.", "abstracts": [ { "abstractType": "Regular", "content": "Graph neural networks (GNNs) have achieved impressive performance when testing and training graph data come from identical distribution. However, existing GNNs lack out-of-distribution generalization abilities so that their performance substantially degrades when there exist distribution shifts between testing and training graph data. To solve this problem, in this work, we propose an out-of-distribution generalized graph neural network (<bold>OOD-GNN</bold>) for achieving satisfactory performance on unseen testing graphs that have different distributions with training graphs. Our proposed <bold>OOD-GNN</bold> employs a novel nonlinear graph representation decorrelation method utilizing random Fourier features, which encourages the model to eliminate the statistical dependence between relevant and irrelevant graph representations through iteratively optimizing the sample graph weights and graph encoder. We further present a global weight estimator to learn weights for training graphs such that variables in graph representations are forced to be independent. The learned weights help the graph encoder to get rid of spurious correlations and, in turn, concentrate more on the true connection between learned discriminative graph representations and their ground-truth labels. We conduct extensive experiments to validate the out-of-distribution generalization abilities on two synthetic and 12 real-world datasets with distribution shifts. The results demonstrate that our proposed <bold>OOD-GNN</bold> significantly outperforms state-of-the-art baselines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph neural networks (GNNs) have achieved impressive performance when testing and training graph data come from identical distribution. However, existing GNNs lack out-of-distribution generalization abilities so that their performance substantially degrades when there exist distribution shifts between testing and training graph data. To solve this problem, in this work, we propose an out-of-distribution generalized graph neural network (OOD-GNN) for achieving satisfactory performance on unseen testing graphs that have different distributions with training graphs. Our proposed OOD-GNN employs a novel nonlinear graph representation decorrelation method utilizing random Fourier features, which encourages the model to eliminate the statistical dependence between relevant and irrelevant graph representations through iteratively optimizing the sample graph weights and graph encoder. We further present a global weight estimator to learn weights for training graphs such that variables in graph representations are forced to be independent. The learned weights help the graph encoder to get rid of spurious correlations and, in turn, concentrate more on the true connection between learned discriminative graph representations and their ground-truth labels. We conduct extensive experiments to validate the out-of-distribution generalization abilities on two synthetic and 12 real-world datasets with distribution shifts. The results demonstrate that our proposed OOD-GNN significantly outperforms state-of-the-art baselines.", "title": "OOD-GNN: Out-of-Distribution Generalized Graph Neural Network", "normalizedTitle": "OOD-GNN: Out-of-Distribution Generalized Graph Neural Network", "fno": "09839432", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Testing", "Decorrelation", "Correlation", "Training", "Random Variables", "Predictive Models", "Data Models", "Graph Neural Networks", "Graph Representation Learning", "Out Of Distribution Generalization" ], "authors": [ { "givenName": "Haoyang", "surname": "Li", "fullName": "Haoyang Li", "affiliation": "Department of Computer Science and Technology, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xin", "surname": "Wang", "fullName": "Xin Wang", "affiliation": "Department of Computer Science and Technology, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ziwei", "surname": "Zhang", "fullName": "Ziwei Zhang", "affiliation": "Department of Computer Science and Technology, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenwu", "surname": "Zhu", "fullName": "Wenwu Zhu", "affiliation": "Department of Computer Science and Technology, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200b133", "title": "CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b133/1BmFaDYHtgA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i281", "title": "Semantically Coherent Out-of-Distribution Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i281/1BmFq1tAb16", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i300", "title": "NAS-OoD: Neural Architecture Search for Out-of-Distribution Generalization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i300/1BmHUreVhmM", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900e350", "title": "PyTorch-OOD: A Library for Out-of-Distribution Detection based on PyTorch", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900e350/1G56ntxOSY0", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h937", "title": "OoD-Bench: Quantifying and Understanding Two Dimensions of Out-of-Distribution Generalization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h937/1H1klJ2mJ9e", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9195", "title": "Neural Mean Discrepancy for Efficient Out-of-Distribution Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9195/1H1mfixU9JC", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c602", "title": "Heatmap-based Out-of-Distribution Detection", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c602/1L8qqu8Q3OU", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10107423", "title": "NExT-OOD: Overcoming Dual Multiple-choice VQA Biases", "doi": null, "abstractUrl": "/journal/tp/5555/01/10107423/1MDFd4rHtF6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j517", "title": "Unsupervised Out-of-Distribution Detection by Maximum Classifier Discrepancy", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j517/1hVl9mSRtfO", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800k0948", "title": "Generalized ODIN: Detecting Out-of-Distribution Image Without Learning From Out-of-Distribution Data", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800k0948/1m3ofcCTYha", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09837455", "articleId": "1FdICjrjPgs", "__typename": "AdjacentArticleType" }, "next": { "fno": "09839555", "articleId": "1FisqjkI1sQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Fk74bC83Ic", "name": "ttk555501-09839432s1-supp1-3193725.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk555501-09839432s1-supp1-3193725.pdf", "extension": "pdf", "size": "119 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1M2IpVB2R3i", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GZogth7KFy", "doi": "10.1109/TPAMI.2022.3209686", "abstract": "Noninvasive medical neuroimaging has yielded many discoveries about the brain connectivity. Several substantial techniques mapping morphological, structural and functional brain connectivities were developed to create a comprehensive road map of neuronal activities in the human brain &#x2013;namely brain graph. Relying on its non-euclidean data type, graph neural network (GNN) provides a clever way of learning the deep graph structure and it is rapidly becoming the state-of-the-art leading to enhanced performance in various network neuroscience tasks. Here we review current GNN-based methods, highlighting the ways that they have been used in several applications related to brain graphs such as missing brain graph synthesis and disease classification. We conclude by charting a path toward a better application of GNN models in network neuroscience field for neurological disorder diagnosis and population graph integration. The list of papers cited in our work is available at <uri>https://github.com/basiralab/GNNs-in-Network-Neuroscience</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Noninvasive medical neuroimaging has yielded many discoveries about the brain connectivity. Several substantial techniques mapping morphological, structural and functional brain connectivities were developed to create a comprehensive road map of neuronal activities in the human brain &#x2013;namely brain graph. Relying on its non-euclidean data type, graph neural network (GNN) provides a clever way of learning the deep graph structure and it is rapidly becoming the state-of-the-art leading to enhanced performance in various network neuroscience tasks. Here we review current GNN-based methods, highlighting the ways that they have been used in several applications related to brain graphs such as missing brain graph synthesis and disease classification. We conclude by charting a path toward a better application of GNN models in network neuroscience field for neurological disorder diagnosis and population graph integration. The list of papers cited in our work is available at <uri>https://github.com/basiralab/GNNs-in-Network-Neuroscience</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Noninvasive medical neuroimaging has yielded many discoveries about the brain connectivity. Several substantial techniques mapping morphological, structural and functional brain connectivities were developed to create a comprehensive road map of neuronal activities in the human brain –namely brain graph. Relying on its non-euclidean data type, graph neural network (GNN) provides a clever way of learning the deep graph structure and it is rapidly becoming the state-of-the-art leading to enhanced performance in various network neuroscience tasks. Here we review current GNN-based methods, highlighting the ways that they have been used in several applications related to brain graphs such as missing brain graph synthesis and disease classification. We conclude by charting a path toward a better application of GNN models in network neuroscience field for neurological disorder diagnosis and population graph integration. The list of papers cited in our work is available at https://github.com/basiralab/GNNs-in-Network-Neuroscience.", "title": "Graph Neural Networks in Network Neuroscience", "normalizedTitle": "Graph Neural Networks in Network Neuroscience", "fno": "09903566", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Brain", "Diseases", "Graph Neural Networks", "Graph Theory", "Image Classification", "Learning Artificial Intelligence", "Neurophysiology", "Brain Connectivity", "Brain Graph Synthesis", "Brain Graphs", "Comprehensive Road Map", "Current GNN Based Methods", "Deep Graph Structure", "Disease Classification", "Functional Brain Connectivities", "Graph Neural Network", "Human Brain Namely Brain Graph", "Network Neuroscience Field", "Network Neuroscience Tasks", "Neurological Disorder Diagnosis", "Noneuclidean Data Type", "Noninvasive Medical Neuroimaging", "Population Graph Integration", "Brain Modeling", "Neuroscience", "Diseases", "Task Analysis", "Sociology", "Magnetic Resonance Imaging", "Graph Neural Networks", "Brain Graph", "Connectome", "Graph Neural Network", "Graph Topology", "Graph Theory", "Geometric Deep Learning" ], "authors": [ { "givenName": "Alaa", "surname": "Bessadok", "fullName": "Alaa Bessadok", "affiliation": "BASIRA Lab, Faculty of Computer and Informatics, Istanbul Technical University, Istanbul, Turkey", "__typename": "ArticleAuthorType" }, { "givenName": "Mohamed Ali", "surname": "Mahjoub", "fullName": "Mohamed Ali Mahjoub", "affiliation": "LATIS Lab, ISITCOM, ENISo, University of Sousse, Sousse, BP, Tunisia", "__typename": "ArticleAuthorType" }, { "givenName": "Islem", "surname": "Rekik", "fullName": "Islem Rekik", "affiliation": "BASIRA Lab, Faculty of Computer and Informatics, Istanbul Technical University, Istanbul, Turkey", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "5833-5848", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2017/3800/0/3800a978", "title": "Inferring, Summarizing and Mining Multi-source Graph Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a978/12OmNyQGSi1", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1993/3940/0/00398885", "title": "MRIVIEW: An interactive computational tool for investigation of brain structure and function", "doi": null, "abstractUrl": "/proceedings-article/visual/1993/00398885/12OmNyeECzF", "parentPublication": { "id": "proceedings/visual/1993/3940/0", "title": "Proceedings Visualization '93", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a471", "title": "Designing a Topic-Based Literature Exploration Tool in AR - An exploratory study for neuroscience", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a471/1J7W8iZAsBG", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994963", "title": "BrainVGAE: End-to-End Graph Neural Networks for Noisy fMRI Dataset", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994963/1JC2Pa2luPS", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020955", "title": "Learning Task-Aware Effective Brain Connectivity for fMRI Analysis with Graph Neural Networks (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020955/1KfS1ySJjEc", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021060", "title": "BraceNet: Graph-Embedded Neural Network For Brain Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021060/1KfS2MzX4gU", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020314", "title": "Pre-train Graph Neural Networks for Brain Network Analysis (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020314/1KfSe5Vmi88", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005586", "title": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005586/1hJs7dKObXq", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a394", "title": "From Virtual Reality to Neuroscience and Back: a Use Case on Peripersonal Hand Space Plasticity", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a394/1qpzA18I95C", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2021/4261/0/09635538", "title": "Harmonization of Multi-site Dynamic Functional Connectivity Network Data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2021/09635538/1zmvjVe75BK", "parentPublication": { "id": "proceedings/bibe/2021/4261/0", "title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09918058", "articleId": "1HrevA5D8qY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09913723", "articleId": "1Hmg5roj5le", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IUAvQtX5zW", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1sF3AZnbTd6", "doi": "10.1109/TKDE.2021.3072345", "abstract": "Graph Neural Networks (GNNs) have proved to be an effective representation learning framework for graph-structured data, and have achieved state-of-the-art performance on many practical predictive tasks, such as node classification, link prediction and graph classification. Among the variants of GNNs, Graph Attention Networks (GATs) learn to assign dense attention coefficients over all neighbors of a node for feature aggregation, and improve the performance of many graph learning tasks. However, real-world graphs are often very large and noisy, and GATs are prone to overfitting if not regularized properly. Even worse, the local aggregation mechanism of GATs may fail on disassortative graphs, where nodes within local neighborhood provide more noise than useful information for feature aggregation. In this paper, we propose Sparse Graph Attention Networks (SGATs) that learn sparse attention coefficients under an <inline-formula><tex-math notation=\"LaTeX\">Z_$L_0$_Z</tex-math></inline-formula>-norm regularization, and the learned sparse attentions are then used for all GNN layers, resulting in an edge-sparsified graph. By doing so, we can identify noisy/task-irrelevant edges, and thus perform feature aggregation on most informative neighbors. Extensive experiments on synthetic and real-world (assortative and disassortative) graph learning benchmarks demonstrate the superior performance of SGATs. In particular, SGATs can remove about 50-80 percent edges from large assortative graphs, such as PPI and Reddit, while retaining similar classification accuracies. On disassortative graphs, SGATs prune majority of noisy edges and outperform GATs in classification accuracies by significant margins. Furthermore, the removed edges can be interpreted intuitively and quantitatively. To the best of our knowledge, this is the first graph learning algorithm that shows significant redundancies in graphs and edge-sparsified graphs can achieve similar (on assortative graphs) or sometimes higher (on disassortative graphs) predictive performances than original graphs. Our code is available at <uri>https://github.com/Yangyeeee/SGAT</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Graph Neural Networks (GNNs) have proved to be an effective representation learning framework for graph-structured data, and have achieved state-of-the-art performance on many practical predictive tasks, such as node classification, link prediction and graph classification. Among the variants of GNNs, Graph Attention Networks (GATs) learn to assign dense attention coefficients over all neighbors of a node for feature aggregation, and improve the performance of many graph learning tasks. However, real-world graphs are often very large and noisy, and GATs are prone to overfitting if not regularized properly. Even worse, the local aggregation mechanism of GATs may fail on disassortative graphs, where nodes within local neighborhood provide more noise than useful information for feature aggregation. In this paper, we propose Sparse Graph Attention Networks (SGATs) that learn sparse attention coefficients under an <inline-formula><tex-math notation=\"LaTeX\">$L_0$</tex-math><alternatives><mml:math><mml:msub><mml:mi>L</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math><inline-graphic xlink:href=\"ji-ieq1-3072345.gif\"/></alternatives></inline-formula>-norm regularization, and the learned sparse attentions are then used for all GNN layers, resulting in an edge-sparsified graph. By doing so, we can identify noisy/task-irrelevant edges, and thus perform feature aggregation on most informative neighbors. Extensive experiments on synthetic and real-world (assortative and disassortative) graph learning benchmarks demonstrate the superior performance of SGATs. In particular, SGATs can remove about 50-80 percent edges from large assortative graphs, such as PPI and Reddit, while retaining similar classification accuracies. On disassortative graphs, SGATs prune majority of noisy edges and outperform GATs in classification accuracies by significant margins. Furthermore, the removed edges can be interpreted intuitively and quantitatively. To the best of our knowledge, this is the first graph learning algorithm that shows significant redundancies in graphs and edge-sparsified graphs can achieve similar (on assortative graphs) or sometimes higher (on disassortative graphs) predictive performances than original graphs. Our code is available at <uri>https://github.com/Yangyeeee/SGAT</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph Neural Networks (GNNs) have proved to be an effective representation learning framework for graph-structured data, and have achieved state-of-the-art performance on many practical predictive tasks, such as node classification, link prediction and graph classification. Among the variants of GNNs, Graph Attention Networks (GATs) learn to assign dense attention coefficients over all neighbors of a node for feature aggregation, and improve the performance of many graph learning tasks. However, real-world graphs are often very large and noisy, and GATs are prone to overfitting if not regularized properly. Even worse, the local aggregation mechanism of GATs may fail on disassortative graphs, where nodes within local neighborhood provide more noise than useful information for feature aggregation. In this paper, we propose Sparse Graph Attention Networks (SGATs) that learn sparse attention coefficients under an --norm regularization, and the learned sparse attentions are then used for all GNN layers, resulting in an edge-sparsified graph. By doing so, we can identify noisy/task-irrelevant edges, and thus perform feature aggregation on most informative neighbors. Extensive experiments on synthetic and real-world (assortative and disassortative) graph learning benchmarks demonstrate the superior performance of SGATs. In particular, SGATs can remove about 50-80 percent edges from large assortative graphs, such as PPI and Reddit, while retaining similar classification accuracies. On disassortative graphs, SGATs prune majority of noisy edges and outperform GATs in classification accuracies by significant margins. Furthermore, the removed edges can be interpreted intuitively and quantitatively. To the best of our knowledge, this is the first graph learning algorithm that shows significant redundancies in graphs and edge-sparsified graphs can achieve similar (on assortative graphs) or sometimes higher (on disassortative graphs) predictive performances than original graphs. Our code is available at https://github.com/Yangyeeee/SGAT.", "title": "Sparse Graph Attention Networks", "normalizedTitle": "Sparse Graph Attention Networks", "fno": "09399811", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Neural Nets", "Pattern Classification", "Assortative Graphs", "Dense Attention Coefficients", "Disassortative Graphs", "Edge Sparsified Graph", "Effective Representation Learning Framework", "Feature Aggregation", "Graph Classification", "Graph Learning Algorithm", "Graph Learning Tasks", "Graph Neural Networks", "Graph Structured Data", "Learned Sparse Attentions", "Link Prediction", "Local Aggregation Mechanism", "Node Classification", "Original Graphs", "Practical Predictive Tasks", "Real World Graphs", "SGAT", "Sparse Attention Coefficients", "Sparse Graph Attention Networks", "Task Analysis", "Noise Measurement", "Training", "Redundancy", "Convolution", "Aggregates", "Social Networking Online", "Graph Neural Networks", "Attention Networks", "Sparsity Learning" ], "authors": [ { "givenName": "Yang", "surname": "Ye", "fullName": "Yang Ye", "affiliation": "Department of Computer Science, Georgia State University, Atlanta, GA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Shihao", "surname": "Ji", "fullName": "Shihao Ji", "affiliation": "Department of Computer Science, Georgia State University, Atlanta, GA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "905-916", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2021/2398/0/239800b234", "title": "Semi-Supervised Graph Attention Networks for Event Representation Learning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b234/1Aqx7HAYgTK", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a108", "title": "Graph Neural Networks with Stability and Discernability", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a108/1BYIEhM2D6w", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020664", "title": "Distributed Node Classification with Graph Attention Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020664/1KfRcxJ8XxC", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09252164", "title": "GAIN: Graph Attention &#x0026; Interaction Network for Inductive Semi-Supervised Learning Over Large-Scale Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/09/09252164/1oCiYbhqmjK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2020/9274/0/927400a203", "title": "Superpixel Image Classification with Graph Attention Networks", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2020/927400a203/1p2VzatbHAA", "parentPublication": { "id": "proceedings/sibgrapi/2020/9274/0", "title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/06/09435103", "title": "Hyperbolic Graph Attention Network", "doi": null, "abstractUrl": "/journal/bd/2022/06/09435103/1tHMM26h69y", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icispc/2020/8548/0/854800a054", "title": "Hierarchical Attention Signed Network", "doi": null, "abstractUrl": "/proceedings-article/icispc/2020/854800a054/1u6KDAAnfNu", "parentPublication": { "id": "proceedings/icispc/2020/8548/0", "title": "2020 4th International Conference on Imaging, Signal Processing and Communications (ICISPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09536420", "title": "EdgeNets: Edge Varying Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2022/11/09536420/1wRDxwzdUQ0", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09645300", "title": "Non-Local Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2022/12/09645300/1zc6xBu6qu4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2021/3933/0/393300a298", "title": "Attention based Subregion Aggregation Graph Convolution Networks with Extended Neighborhood", "doi": null, "abstractUrl": "/proceedings-article/iccia/2021/393300a298/1zpzPVyPAIw", "parentPublication": { "id": "proceedings/iccia/2021/3933/0", "title": "2021 6th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09448379", "articleId": "1ugDPUuEZBS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09423547", "articleId": "1tky8vEyQj6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1I6No9Att7y", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tdUw1cU7Be", "doi": "10.1109/TKDE.2021.3076772", "abstract": "In recommendation tasks, we model user preferences by learning node representations (i.e., user and item embeddings) based on the observed user-item interaction data, which is a bipartite graph. <bold>G</bold>raph <bold>N</bold>eural <bold>N</bold>etworks (<bold>GNN</bold>s) are widely used to refine the representations by exploring the topology of the graph: embeddings of neighbors are propagated to each node to reconstruct its embeddings. However, the propagation strategy in existing GNNs is empirical and defective: (1) a substantial proportion of links are missed in the sparse observed graph, which causes ineffective and biased propagation; and (2) the propagation weights are determined by a coarse pre-defined rule, which only takes the degree of nodes into consideration. In this paper, we propose a dense and data-driven propagation mechanism for GNNs. Considering the graph we use to propagate embeddings in recommendation tasks is extremely sparse, we complement it and use the predicted graph as the new propagation tool. We learn the propagation matrix from the data, and propose a <bold>S</bold>elf-propagation <bold>G</bold>raph <bold>N</bold>eural <bold>N</bold>etwork (<bold>SGNN</bold>). Since it is very space- and time-consuming to maintain a large and dense propagation matrix, we factorize it for storing and updating. In this paper, we propose three methods to complete the sparse graph and construct the propagation matrix: (1) we complete the graph based on a recommendation model; (2) we measure the node distance based on spectral clustering; (3) we predict missing links of the graph based on predictive embeddings. In SGNN, the embeddings can be propagated to not only the observed neighbors, but also the potential yet unobserved neighbors, and the propagation weights are learned based on the connection strength. Comprehensive experiments on three real-world datasets demonstrate the effectiveness and efficiency of our proposed model: SGNN outperforms recent state-of-the-art GNNs significantly. Codes are available on <uri>https://github.com/Wenhui-Yu/LCFN</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "In recommendation tasks, we model user preferences by learning node representations (i.e., user and item embeddings) based on the observed user-item interaction data, which is a bipartite graph. <bold>G</bold>raph <bold>N</bold>eural <bold>N</bold>etworks (<bold>GNN</bold>s) are widely used to refine the representations by exploring the topology of the graph: embeddings of neighbors are propagated to each node to reconstruct its embeddings. However, the propagation strategy in existing GNNs is empirical and defective: (1) a substantial proportion of links are missed in the sparse observed graph, which causes ineffective and biased propagation; and (2) the propagation weights are determined by a coarse pre-defined rule, which only takes the degree of nodes into consideration. In this paper, we propose a dense and data-driven propagation mechanism for GNNs. Considering the graph we use to propagate embeddings in recommendation tasks is extremely sparse, we complement it and use the predicted graph as the new propagation tool. We learn the propagation matrix from the data, and propose a <bold>S</bold>elf-propagation <bold>G</bold>raph <bold>N</bold>eural <bold>N</bold>etwork (<bold>SGNN</bold>). Since it is very space- and time-consuming to maintain a large and dense propagation matrix, we factorize it for storing and updating. In this paper, we propose three methods to complete the sparse graph and construct the propagation matrix: (1) we complete the graph based on a recommendation model; (2) we measure the node distance based on spectral clustering; (3) we predict missing links of the graph based on predictive embeddings. In SGNN, the embeddings can be propagated to not only the observed neighbors, but also the potential yet unobserved neighbors, and the propagation weights are learned based on the connection strength. Comprehensive experiments on three real-world datasets demonstrate the effectiveness and efficiency of our proposed model: SGNN outperforms recent state-of-the-art GNNs significantly. Codes are available on <uri>https://github.com/Wenhui-Yu/LCFN</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recommendation tasks, we model user preferences by learning node representations (i.e., user and item embeddings) based on the observed user-item interaction data, which is a bipartite graph. Graph Neural Networks (GNNs) are widely used to refine the representations by exploring the topology of the graph: embeddings of neighbors are propagated to each node to reconstruct its embeddings. However, the propagation strategy in existing GNNs is empirical and defective: (1) a substantial proportion of links are missed in the sparse observed graph, which causes ineffective and biased propagation; and (2) the propagation weights are determined by a coarse pre-defined rule, which only takes the degree of nodes into consideration. In this paper, we propose a dense and data-driven propagation mechanism for GNNs. Considering the graph we use to propagate embeddings in recommendation tasks is extremely sparse, we complement it and use the predicted graph as the new propagation tool. We learn the propagation matrix from the data, and propose a Self-propagation Graph Neural Network (SGNN). Since it is very space- and time-consuming to maintain a large and dense propagation matrix, we factorize it for storing and updating. In this paper, we propose three methods to complete the sparse graph and construct the propagation matrix: (1) we complete the graph based on a recommendation model; (2) we measure the node distance based on spectral clustering; (3) we predict missing links of the graph based on predictive embeddings. In SGNN, the embeddings can be propagated to not only the observed neighbors, but also the potential yet unobserved neighbors, and the propagation weights are learned based on the connection strength. Comprehensive experiments on three real-world datasets demonstrate the effectiveness and efficiency of our proposed model: SGNN outperforms recent state-of-the-art GNNs significantly. Codes are available on https://github.com/Wenhui-Yu/LCFN.", "title": "Self-Propagation Graph Neural Network for Recommendation", "normalizedTitle": "Self-Propagation Graph Neural Network for Recommendation", "fno": "09420316", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Matrix Algebra", "Neural Nets", "Pattern Clustering", "Recommender Systems", "Biased Propagation", "Bipartite Graph", "Dense Propagation Matrix", "GNN", "Ineffective Propagation", "Item Embeddings", "Large Propagation Matrix", "Learning Node Representations", "Model User Preferences", "Node Representations", "Observed User Item Interaction Data", "Predicted Graph", "Predictive Embeddings", "Propagation Strategy", "Propagation Tool", "Propagation Weights", "Recommendation Model", "Recommendation Tasks", "Self Propagation Graph Neural Network", "SGNN", "Sparse Observed Graph", "Task Analysis", "Feature Extraction", "Collaboration", "Bipartite Graph", "Tools", "Recommender Systems", "Graph Neural Networks", "Graph Neural Network", "Self Propagation", "Collaborative Filtering", "Item Recommendation" ], "authors": [ { "givenName": "Wenhui", "surname": "Yu", "fullName": "Wenhui Yu", "affiliation": "Alibaba Group, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiao", "surname": "Lin", "fullName": "Xiao Lin", "affiliation": "Alibaba Group, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jinfei", "surname": "Liu", "fullName": "Jinfei Liu", "affiliation": "Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junfeng", "surname": "Ge", "fullName": "Junfeng Ge", "affiliation": "Alibaba Group, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenwu", "surname": "Ou", "fullName": "Wenwu Ou", "affiliation": "Alibaba Group, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zheng", "surname": "Qin", "fullName": "Zheng Qin", "affiliation": "School of Software, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "5993-6002", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2022/11/09714826", "title": "Auto-GNAS: A Parallel Graph Neural Architecture Search Framework", "doi": null, "abstractUrl": "/journal/td/2022/11/09714826/1B2DiKgAc2Q", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09933729", "title": "Sylvester Equation Induced Collaborative Representation Learning for Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/09933729/1HVsg5x40E0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09950609", "title": "Spectral Adversarial Training for Robust Graph Neural Network", "doi": null, "abstractUrl": "/journal/tk/5555/01/09950609/1Ik4HsmA7mg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021033", "title": "Asymmetric Self-Supervised Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021033/1KfQZDBC4ms", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09139346", "title": "A Graph Neural Network Framework for Social Recommendations", "doi": null, "abstractUrl": "/journal/tk/2022/05/09139346/1ls8NKJ0Qww", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a701", "title": "Global Context Enhanced Social Recommendation with Hierarchical Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a701/1r54HldwfEA", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377860", "title": "Self-supervised Hierarchical Graph Neural Network for Graph Representation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377860/1s64M5Jpm5a", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09428609", "title": "Heterogeneous Graph Propagation Network", "doi": null, "abstractUrl": "/journal/tk/2023/01/09428609/1twaBkzBB2E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2021/9630/0/963000a036", "title": "Graph Neural Network Based Collaborative Filtering for API Usage Recommendation", "doi": null, "abstractUrl": "/proceedings-article/saner/2021/963000a036/1twfvTcQERa", "parentPublication": { "id": "proceedings/saner/2021/9630/0", "title": "2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09645300", "title": "Non-Local Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2022/12/09645300/1zc6xBu6qu4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09357949", "articleId": "1rjVOReEhIk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09384305", "articleId": "1scDm0PuYQU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IUAvQtX5zW", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1twaBkzBB2E", "doi": "10.1109/TKDE.2021.3079239", "abstract": "Graph neural network (GNN), as a powerful graph representation technique based on deep learning, has shown superior performance and attracted considerable research interest. Recently, some works attempt to generalize GNN to heterogeneous graph which contains different types of nodes and links. Heterogeneous graph neural networks (HeteGNNs) usually follow two steps: aggregate neighbors via single meta-path and then aggregate rich semantics via multiple meta-paths. However, we discover an important <italic>semantic confusion</italic> phenomenon in HeteGNNs, i.e., with the growth of model depth, the learned node embeddings become indistinguishable, leading to the performance degradation of HeteGNNs. We explain semantic confusion by theoretically deriving that HeteGNNs and multiple meta-paths based random walk are essentially equivalent. Following the theoretical analysis, we propose a novel <bold>H</bold>eterogeneous graph <bold>P</bold>ropagation <bold>N</bold>etwork (HPN) to alleviate the semantic confusion. Specifically, the semantic propagation mechanism improves the node-level aggregating process via absorbing node&#x0027;s local semantic with a proper weight, which makes HPN capture the characteristics of each node and learn distinguishable node embedding with deeper HeteGNN architecture. Then, the semantic fusion mechanism is designed to learn the importance of meta-path and fuse them judiciously. Extensive experimental results show the superior performance of the proposed HPN over the state-of-the-arts.", "abstracts": [ { "abstractType": "Regular", "content": "Graph neural network (GNN), as a powerful graph representation technique based on deep learning, has shown superior performance and attracted considerable research interest. Recently, some works attempt to generalize GNN to heterogeneous graph which contains different types of nodes and links. Heterogeneous graph neural networks (HeteGNNs) usually follow two steps: aggregate neighbors via single meta-path and then aggregate rich semantics via multiple meta-paths. However, we discover an important <italic>semantic confusion</italic> phenomenon in HeteGNNs, i.e., with the growth of model depth, the learned node embeddings become indistinguishable, leading to the performance degradation of HeteGNNs. We explain semantic confusion by theoretically deriving that HeteGNNs and multiple meta-paths based random walk are essentially equivalent. Following the theoretical analysis, we propose a novel <bold>H</bold>eterogeneous graph <bold>P</bold>ropagation <bold>N</bold>etwork (HPN) to alleviate the semantic confusion. Specifically, the semantic propagation mechanism improves the node-level aggregating process via absorbing node&#x0027;s local semantic with a proper weight, which makes HPN capture the characteristics of each node and learn distinguishable node embedding with deeper HeteGNN architecture. Then, the semantic fusion mechanism is designed to learn the importance of meta-path and fuse them judiciously. Extensive experimental results show the superior performance of the proposed HPN over the state-of-the-arts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph neural network (GNN), as a powerful graph representation technique based on deep learning, has shown superior performance and attracted considerable research interest. Recently, some works attempt to generalize GNN to heterogeneous graph which contains different types of nodes and links. Heterogeneous graph neural networks (HeteGNNs) usually follow two steps: aggregate neighbors via single meta-path and then aggregate rich semantics via multiple meta-paths. However, we discover an important semantic confusion phenomenon in HeteGNNs, i.e., with the growth of model depth, the learned node embeddings become indistinguishable, leading to the performance degradation of HeteGNNs. We explain semantic confusion by theoretically deriving that HeteGNNs and multiple meta-paths based random walk are essentially equivalent. Following the theoretical analysis, we propose a novel Heterogeneous graph Propagation Network (HPN) to alleviate the semantic confusion. Specifically, the semantic propagation mechanism improves the node-level aggregating process via absorbing node's local semantic with a proper weight, which makes HPN capture the characteristics of each node and learn distinguishable node embedding with deeper HeteGNN architecture. Then, the semantic fusion mechanism is designed to learn the importance of meta-path and fuse them judiciously. Extensive experimental results show the superior performance of the proposed HPN over the state-of-the-arts.", "title": "Heterogeneous Graph Propagation Network", "normalizedTitle": "Heterogeneous Graph Propagation Network", "fno": "09428609", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Deep Learning Artificial Intelligence", "Graph Theory", "Network Theory Graphs", "Absorbing Node Local Semantic", "Aggregate Neighbors", "Deep Learning", "Deeper Hete GNN Architecture", "Distinguishable Node Learning", "Graph Neural Network", "Graph Representation Technique", "Heterogeneous Graph Neural Networks", "Heterogeneous Graph Propagation Network", "HPN", "Learned Node Embeddings", "Model Depth", "Multiple Meta Path Based Random Walk", "Node Level Aggregating Process", "Performance Degradation", "Semantic Confusion", "Semantic Confusion Phenomenon", "Semantic Fusion Mechanism", "Semantic Propagation Mechanism", "Single Meta Path", "Theoretical Analysis", "Semantics", "Graph Neural Networks", "Fuses", "Aggregates", "Task Analysis", "Deep Learning", "Telecommunications", "Heterogeneous Graph", "Graph Neural Network", "Representation Learning", "Deep Learning" ], "authors": [ { "givenName": "Houye", "surname": "Ji", "fullName": "Houye Ji", "affiliation": "Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiao", "surname": "Wang", "fullName": "Xiao Wang", "affiliation": "Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chuan", "surname": "Shi", "fullName": "Chuan Shi", "affiliation": "Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bai", "surname": "Wang", "fullName": "Bai Wang", "affiliation": "Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Philip S.", "surname": "Yu", "fullName": "Philip S. Yu", "affiliation": "University of Illinois at Chicago, IL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "521-532", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/06/09737399", "title": "Heterogeneous Graph Representation Learning With Relation Awareness", "doi": null, "abstractUrl": "/journal/tk/2023/06/09737399/1BQi9s33pfy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09802746", "title": "Explicit Message-Passing Heterogeneous Graph Neural Network", "doi": null, "abstractUrl": "/journal/tk/5555/01/09802746/1Eo1tvOKn0k", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2023/01/09906312", "title": "HetGRec: Heterogeneous Graph Attention Network for Group Recommendation", "doi": null, "abstractUrl": "/magazine/ex/2023/01/09906312/1H5F3slGuME", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aemcse/2022/8474/0/847400a411", "title": "A Double-layer Attention Heterogeneous Graph Neural Network Based on Coupled P System", "doi": null, "abstractUrl": "/proceedings-article/aemcse/2022/847400a411/1IlNYWbKX2o", "parentPublication": { "id": "proceedings/aemcse/2022/8474/0", "title": "2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09954185", "title": "Learning Bi-typed Multi-relational Heterogeneous Graph via Dual Hierarchical Attention Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/09954185/1Inor2WubzG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a759", "title": "Deep Heterogeneous Graph Neural Networks via Similarity Regularization Loss and Hierarchical Fusion", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a759/1KBqRsFqZHy", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194495", "title": "Heterogeneous Dynamic Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194495/1n2nidnHf9u", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800b012", "title": "GAHNE: Graph-Aggregated Heterogeneous Network Embedding", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800b012/1pP3v0dBvQ4", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/12/09420316", "title": "Self-Propagation Graph Neural Network for Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/12/09420316/1tdUw1cU7Be", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09483653", "title": "Heterogeneous Information Network Embedding With Adversarial Disentangler", "doi": null, "abstractUrl": "/journal/tk/2023/02/09483653/1vcJofYIDi8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09422168", "articleId": "1tiTpeFNEXe", "__typename": "AdjacentArticleType" }, "next": { "fno": "09422195", "articleId": "1tiToLl9GzS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1MQvcIkoAko", "title": "June", "year": "2023", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1As7aEVtgNW", "doi": "10.1109/TVCG.2022.3146000", "abstract": "Coloring line art images based on the colors of reference images is a crucial stage in animation production, which is time-consuming and tedious. This paper proposes a deep architecture to automatically color line art videos with the same color style as the given reference images. Our framework consists of a color transform network and a temporal refinement network based on 3U-net. The color transform network takes the target line art images as well as the line art and color images of the reference images as input and generates corresponding target color images. To cope with the large differences between each target line art image and the reference color images, we propose a distance attention layer that utilizes non-local similarity matching to determine the region correspondences between the target image and the reference images and transforms the local color information from the references to the target. To ensure global color style consistency, we further incorporate Adaptive Instance Normalization (AdaIN) with the transformation parameters obtained from a multiple-layer AdaIN that describes the global color style of the references extracted by an embedder network. The temporal refinement network learns spatiotemporal features through 3D convolutions to ensure the temporal color consistency of the results. Our model can achieve even better coloring results by fine-tuning the parameters with only a small number of samples when dealing with an animation of a new style. To evaluate our method, we build a line art coloring dataset. Experiments show that our method achieves the best performance on line art video coloring compared to the current state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Coloring line art images based on the colors of reference images is a crucial stage in animation production, which is time-consuming and tedious. This paper proposes a deep architecture to automatically color line art videos with the same color style as the given reference images. Our framework consists of a color transform network and a temporal refinement network based on 3U-net. The color transform network takes the target line art images as well as the line art and color images of the reference images as input and generates corresponding target color images. To cope with the large differences between each target line art image and the reference color images, we propose a distance attention layer that utilizes non-local similarity matching to determine the region correspondences between the target image and the reference images and transforms the local color information from the references to the target. To ensure global color style consistency, we further incorporate Adaptive Instance Normalization (AdaIN) with the transformation parameters obtained from a multiple-layer AdaIN that describes the global color style of the references extracted by an embedder network. The temporal refinement network learns spatiotemporal features through 3D convolutions to ensure the temporal color consistency of the results. Our model can achieve even better coloring results by fine-tuning the parameters with only a small number of samples when dealing with an animation of a new style. To evaluate our method, we build a line art coloring dataset. Experiments show that our method achieves the best performance on line art video coloring compared to the current state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Coloring line art images based on the colors of reference images is a crucial stage in animation production, which is time-consuming and tedious. This paper proposes a deep architecture to automatically color line art videos with the same color style as the given reference images. Our framework consists of a color transform network and a temporal refinement network based on 3U-net. The color transform network takes the target line art images as well as the line art and color images of the reference images as input and generates corresponding target color images. To cope with the large differences between each target line art image and the reference color images, we propose a distance attention layer that utilizes non-local similarity matching to determine the region correspondences between the target image and the reference images and transforms the local color information from the references to the target. To ensure global color style consistency, we further incorporate Adaptive Instance Normalization (AdaIN) with the transformation parameters obtained from a multiple-layer AdaIN that describes the global color style of the references extracted by an embedder network. The temporal refinement network learns spatiotemporal features through 3D convolutions to ensure the temporal color consistency of the results. Our model can achieve even better coloring results by fine-tuning the parameters with only a small number of samples when dealing with an animation of a new style. To evaluate our method, we build a line art coloring dataset. Experiments show that our method achieves the best performance on line art video coloring compared to the current state-of-the-art methods.", "title": "Reference-Based Deep Line Art Video Colorization", "normalizedTitle": "Reference-Based Deep Line Art Video Colorization", "fno": "09693178", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Image Color Analysis", "Art", "Animation", "Feature Extraction", "Three Dimensional Displays", "Transforms", "Color", "Line Art Colorization", "Color Transform", "Temporal Coherence", "Few Shot Learning" ], "authors": [ { "givenName": "Min", "surname": "Shi", "fullName": "Min Shi", "affiliation": "North China Electric Power University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jia-Qi", "surname": "Zhang", "fullName": "Jia-Qi Zhang", "affiliation": "Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shu-Yu", "surname": "Chen", "fullName": "Shu-Yu Chen", "affiliation": "Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lin", "surname": "Gao", "fullName": "Lin Gao", "affiliation": "Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu-Kun", "surname": "Lai", "fullName": "Yu-Kun Lai", "affiliation": "School of Computer Science & Informatics, Cardiff University, Wales, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Fang-Lue", "surname": "Zhang", "fullName": "Fang-Lue Zhang", "affiliation": "School of Engineering and Computer Science, Victoria University of Wellington, Wellington, New Zealand", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2023-06-01 00:00:00", "pubType": "trans", "pages": "2965-2979", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391a415", "title": "Deep Colorization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a415/12OmNBNM93v", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500a965", "title": "Late-resizing: A Simple but Effective Sketch Extraction Strategy for Improving Generalization of Line-art Colorization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500a965/1B13HiwSCBy", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j055", "title": "Tag2Pix: Line Art Colorization Using Text Tag With SECat and Changing Loss", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j055/1hVlpf5xOp2", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d157", "title": "Artist-Guided Semiautomatic Animation Colorization", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d157/1i5mP2ezeqQ", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09143503", "title": "Active Colorization for Cartoon Line Drawings", "doi": null, "abstractUrl": "/journal/tg/2022/02/09143503/1lxmsQXZ36U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09234714", "title": "WYSIWYG Design of Hypnotic Line Art", "doi": null, "abstractUrl": "/journal/tg/2022/06/09234714/1o6IGahpX6o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2020/8138/0/813800a435", "title": "Cartoon image colorization based on emotion recognition and superpixel color resolution", "doi": null, "abstractUrl": "/proceedings-article/iccst/2020/813800a435/1p1gtwbDSH6", "parentPublication": { "id": "proceedings/iccst/2020/8138/0", "title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412756", "title": "Stylized-Colorization for Line Arts", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412756/1tmiCa6wp8c", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700d871", "title": "Line Art Correlation Matching Feature Transfer Network for Automatic Animation Colorization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700d871/1uqGPvnkBUI", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d941", "title": "Line Art Colorization with Concatenated Spatial Attention", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d941/1yVzYqkncJy", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09693232", "articleId": "1As79CUmeZO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09695173", "articleId": "1AvqJqAJOKY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1MQvoZuUgQE", "name": "ttg202306-09693178s1-supp2-3146000.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202306-09693178s1-supp2-3146000.pdf", "extension": "pdf", "size": "27.9 MB", "__typename": "WebExtraType" }, { "id": "1MQvp6q5Lwc", "name": "ttg202306-09693178s1-supp1-3146000.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202306-09693178s1-supp1-3146000.mp4", "extension": "mp4", "size": "29.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwl8GGQ", "title": "October", "year": "2011", "issueNum": "10", "idPrefix": "tg", "pubType": "journal", "volume": "17", "label": "October", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxASuMz", "doi": "10.1109/TVCG.2010.249", "abstract": "This paper presents a study where Augmented Reality (AR) technology has been used as a tool for supporting collaboration between the rescue services, the police and military personnel in a crisis management scenario. There are few studies on how AR systems should be designed to improve cooperation between actors from different organizations while at the same time supporting individual needs. In the present study, an AR system was utilized for supporting joint planning tasks by providing organization specific views of a shared map. The study involved a simulated emergency event conducted in close to real settings with representatives from the organizations for which the system is developed. As a baseline, a series of trials without the AR system was carried out. Results show that the users were positive toward the AR system and would like to use it in real work. They also experience some performance benefits of using the AR system compared to their traditional tools. Finally, the problem of designing for collaborative work as well as the benefits of using an iterative design processes is discussed.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a study where Augmented Reality (AR) technology has been used as a tool for supporting collaboration between the rescue services, the police and military personnel in a crisis management scenario. There are few studies on how AR systems should be designed to improve cooperation between actors from different organizations while at the same time supporting individual needs. In the present study, an AR system was utilized for supporting joint planning tasks by providing organization specific views of a shared map. The study involved a simulated emergency event conducted in close to real settings with representatives from the organizations for which the system is developed. As a baseline, a series of trials without the AR system was carried out. Results show that the users were positive toward the AR system and would like to use it in real work. They also experience some performance benefits of using the AR system compared to their traditional tools. Finally, the problem of designing for collaborative work as well as the benefits of using an iterative design processes is discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a study where Augmented Reality (AR) technology has been used as a tool for supporting collaboration between the rescue services, the police and military personnel in a crisis management scenario. There are few studies on how AR systems should be designed to improve cooperation between actors from different organizations while at the same time supporting individual needs. In the present study, an AR system was utilized for supporting joint planning tasks by providing organization specific views of a shared map. The study involved a simulated emergency event conducted in close to real settings with representatives from the organizations for which the system is developed. As a baseline, a series of trials without the AR system was carried out. Results show that the users were positive toward the AR system and would like to use it in real work. They also experience some performance benefits of using the AR system compared to their traditional tools. Finally, the problem of designing for collaborative work as well as the benefits of using an iterative design processes is discussed.", "title": "Cross-Organizational Collaboration Supported by Augmented Reality", "normalizedTitle": "Cross-Organizational Collaboration Supported by Augmented Reality", "fno": "ttg2011101380", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Collaborative Augmented Reality", "Augmented Reality", "User Evaluation" ], "authors": [ { "givenName": "Susanna", "surname": "Nilsson", "fullName": "Susanna Nilsson", "affiliation": "Linköping University, Linköping", "__typename": "ArticleAuthorType" }, { "givenName": "Björn J.E.", "surname": "Johansson", "fullName": "Björn J.E. Johansson", "affiliation": "The Swedish Defence Research Institute, Linköping", "__typename": "ArticleAuthorType" }, { "givenName": "Arne", "surname": "Jönsson", "fullName": "Arne Jönsson", "affiliation": "Santa Anna IT Research Institute, Linköping", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2011-10-01 00:00:00", "pubType": "trans", "pages": "1380-1392", "year": "2011", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2016/0662/0/0662a358", "title": "Mobile Augmented Reality Authoring Tool", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a358/12OmNAXglVC", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2002/1492/0/14920287", "title": "Tinmith-Hand: Unified User Interface Technology for Mobile Outdoor Augmented Reality and Indoor Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2002/14920287/12OmNqH9htu", "parentPublication": { "id": "proceedings/vr/2002/1492/0", "title": "Proceedings IEEE Virtual Reality 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icimt/2009/3922/0/3922a019", "title": "Collaborative Augmented Reality Approach for Multi-user Interaction in Urban Simulation", "doi": null, "abstractUrl": "/proceedings-article/icimt/2009/3922a019/12OmNwDACCo", "parentPublication": { "id": "proceedings/icimt/2009/3922/0", "title": "Information and Multimedia Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240249", "title": "Augmented Reality for Urban Skills Training", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240249/12OmNx4yvB1", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836453", "title": "Challenges for Asynchronous Collaboration in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836453/12OmNxaw5c0", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2014/4249/0/4249a243", "title": "Fostering Collaboration among Restoration Professionals Using Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/wetice/2014/4249a243/12OmNy50g7G", "parentPublication": { "id": "proceedings/wetice/2014/4249/0", "title": "2014 IEEE 23rd International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprise (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948517", "title": "Collaboration in mediated and augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948517/12OmNy6HQPU", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a320", "title": "Influences of AR-Supported Simulation on Learning Effectiveness in Face-to-face Collaborative Learning for Physics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a320/12OmNylKAPE", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699183", "title": "Industrial Augmented Reality: Requirements for an Augmented Reality Maintenance Worker Support System", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699183/19F1MWRWSqs", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a279", "title": "Enhancing Visitor Experience or Hindering Docent Roles: Attentional Issues in Augmented Reality Supported Installations", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a279/1pysvRpTvr2", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2011101369", "articleId": "13rRUyft7D0", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2011101393", "articleId": "13rRUwkxc5m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1D34HQ1zUNa", "doi": "10.1109/TVCG.2022.3169980", "abstract": "Learning physics is often difficult for students because concepts such as electricity, magnetism and sound, cannot be seen with the naked eye. Emerging technologies such as Augmented Reality (AR) can transform education by making challenging concepts visible and accessible to novices. We present a Hololens-based augmented reality system where collaborators learn about the invisible electromagnetism phenomena involved in audio speakers, and we measure the benefits of AR technology through quantitative and qualitative methods. Specifically, we measure learning (knowledge gains and transfer) and collaborative knowledge exchange behaviors. Our results indicate that, while AR generally provides a novelty effect, specific educational AR visualizations can be both beneficial and detrimental to learning they helped students to learn spatial content and structural relationships, but hindered their understanding of kinesthetic content. Furthermore, AR facilitated learning in collaborations by providing representational common ground, which improved communication and peer teaching. We discuss these effects, as well as identify factors that have positive impact (e.g., co-located representations, easier access to resources, better grounding) or negative impact (e.g., tunnel vision, overlooking kinesthetic feedback) on student collaborative learning with augmented reality applications.", "abstracts": [ { "abstractType": "Regular", "content": "Learning physics is often difficult for students because concepts such as electricity, magnetism and sound, cannot be seen with the naked eye. Emerging technologies such as Augmented Reality (AR) can transform education by making challenging concepts visible and accessible to novices. We present a Hololens-based augmented reality system where collaborators learn about the invisible electromagnetism phenomena involved in audio speakers, and we measure the benefits of AR technology through quantitative and qualitative methods. Specifically, we measure learning (knowledge gains and transfer) and collaborative knowledge exchange behaviors. Our results indicate that, while AR generally provides a novelty effect, specific educational AR visualizations can be both beneficial and detrimental to learning they helped students to learn spatial content and structural relationships, but hindered their understanding of kinesthetic content. Furthermore, AR facilitated learning in collaborations by providing representational common ground, which improved communication and peer teaching. We discuss these effects, as well as identify factors that have positive impact (e.g., co-located representations, easier access to resources, better grounding) or negative impact (e.g., tunnel vision, overlooking kinesthetic feedback) on student collaborative learning with augmented reality applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Learning physics is often difficult for students because concepts such as electricity, magnetism and sound, cannot be seen with the naked eye. Emerging technologies such as Augmented Reality (AR) can transform education by making challenging concepts visible and accessible to novices. We present a Hololens-based augmented reality system where collaborators learn about the invisible electromagnetism phenomena involved in audio speakers, and we measure the benefits of AR technology through quantitative and qualitative methods. Specifically, we measure learning (knowledge gains and transfer) and collaborative knowledge exchange behaviors. Our results indicate that, while AR generally provides a novelty effect, specific educational AR visualizations can be both beneficial and detrimental to learning they helped students to learn spatial content and structural relationships, but hindered their understanding of kinesthetic content. Furthermore, AR facilitated learning in collaborations by providing representational common ground, which improved communication and peer teaching. We discuss these effects, as well as identify factors that have positive impact (e.g., co-located representations, easier access to resources, better grounding) or negative impact (e.g., tunnel vision, overlooking kinesthetic feedback) on student collaborative learning with augmented reality applications.", "title": "How Augmented Reality (AR) Can Help and Hinder Collaborative Learning: A Study of AR in Electromagnetism Education", "normalizedTitle": "How Augmented Reality (AR) Can Help and Hinder Collaborative Learning: A Study of AR in Electromagnetism Education", "fno": "09766081", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Augmented Reality", "Visualization", "Collaborative Work", "Collaboration", "Magnetic Fields", "Headphones", "Education", "Augmented Reality", "Collaboration", "Education", "Makerspaces" ], "authors": [ { "givenName": "Iulian", "surname": "Radu", "fullName": "Iulian Radu", "affiliation": "Graduate School of Education, Harvard University, 1812 Cambridge, Massachusetts, United States, 02138", "__typename": "ArticleAuthorType" }, { "givenName": "Bertrand", "surname": "Schneider", "fullName": "Bertrand Schneider", "affiliation": "Technology, Innovation, Education, Harvard Graduate School of Education, 80330 Cambridge, Massachusetts, United States", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-04-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2016/3641/0/3641a107", "title": "The Influence of using Augmented Reality on Textbook Support for Learners of Different Learning Styles", "doi": null, "abstractUrl": "/proceedings-article/ismar/2016/3641a107/12OmNBzAciw", "parentPublication": { "id": "proceedings/ismar/2016/3641/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836510", "title": "Integrating Building Information Modeling with Augmented Reality for Interdisciplinary Learning", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836510/12OmNCgrD16", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a132", "title": "Augmented Reality Laboratory for High School Electrochemistry Course", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a132/12OmNqBbHAA", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2016/6119/0/6119a129", "title": "Applying Augmented Reality Technology to E-Learning: Science Educational AR Products as an Example", "doi": null, "abstractUrl": "/proceedings-article/icebe/2016/6119a129/12OmNs4S8DX", "parentPublication": { "id": "proceedings/icebe/2016/6119/0", "title": "2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitcs/2014/6541/0/07021784", "title": "JPEG-AR Standard Enabling Augmented Marketing", "doi": null, "abstractUrl": "/proceedings-article/icitcs/2014/07021784/12OmNxj239c", "parentPublication": { "id": "proceedings/icitcs/2014/6541/0", "title": "2014 International Conference on IT Convergence and Security (ICITCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948402", "title": "AR-IVI — Implementation of In-Vehicle Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948402/12OmNySosKY", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a389", "title": "Implementation of Augmented Reality Globe in Teaching-Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a389/19wB38QGJS8", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797908", "title": "Determining Design Requirements for AR Physics Education Applications", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797908/1cJ11eG0SeA", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155919", "title": "Effects of Augmented Reality Assisted Learning Materials on Students&#x2019; Learning Outcomes", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155919/1m1j7NOETSg", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a090", "title": "First Steps Towards Augmented Reality Interactive Electronic Music Production", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a090/1tnWYWjfAFa", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09765476", "articleId": "1CY3PmkyDMk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09767783", "articleId": "1D4MIotOemQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1HMOit1lSk8", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1vNfMDGrQUU", "doi": "10.1109/TVCG.2021.3101545", "abstract": "To support the nuances of collaborative work, many researchers have been exploring the field of Augmented Reality (AR), aiming to assist in co-located or remote scenarios. Solutions using AR allow taking advantage from seamless integration of virtual objects and real-world objects, thus providing collaborators with a shared understanding or common ground environment. However, most of the research efforts, so far, have been devoted to experiment with technology and mature methods to support its design and development. Therefore, it is now time to understand where the field stands and how well can it address collaborative work with AR, to better characterize and evaluate the collaboration process. In this article, we perform an analysis of the different dimensions that should be taken into account when analysing the contributions of AR to the collaborative work effort. Then, we bring these dimensions forward into a conceptual framework and propose an extended human-centered taxonomy for the categorization of the main features of Collaborative AR. Our goal is to foster harmonization of perspectives for the field, which may help create a common ground for systematization and discussion. We hope to influence and improve how research in this field is reported by providing a structured list of the defining characteristics. Finally, some examples of the use of the taxonomy are presented to show how it can serve to gather information for characterizing AR-supported collaborative work, and illustrate its potential as the grounds to elicit further studies.", "abstracts": [ { "abstractType": "Regular", "content": "To support the nuances of collaborative work, many researchers have been exploring the field of Augmented Reality (AR), aiming to assist in co-located or remote scenarios. Solutions using AR allow taking advantage from seamless integration of virtual objects and real-world objects, thus providing collaborators with a shared understanding or common ground environment. However, most of the research efforts, so far, have been devoted to experiment with technology and mature methods to support its design and development. Therefore, it is now time to understand where the field stands and how well can it address collaborative work with AR, to better characterize and evaluate the collaboration process. In this article, we perform an analysis of the different dimensions that should be taken into account when analysing the contributions of AR to the collaborative work effort. Then, we bring these dimensions forward into a conceptual framework and propose an extended human-centered taxonomy for the categorization of the main features of Collaborative AR. Our goal is to foster harmonization of perspectives for the field, which may help create a common ground for systematization and discussion. We hope to influence and improve how research in this field is reported by providing a structured list of the defining characteristics. Finally, some examples of the use of the taxonomy are presented to show how it can serve to gather information for characterizing AR-supported collaborative work, and illustrate its potential as the grounds to elicit further studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To support the nuances of collaborative work, many researchers have been exploring the field of Augmented Reality (AR), aiming to assist in co-located or remote scenarios. Solutions using AR allow taking advantage from seamless integration of virtual objects and real-world objects, thus providing collaborators with a shared understanding or common ground environment. However, most of the research efforts, so far, have been devoted to experiment with technology and mature methods to support its design and development. Therefore, it is now time to understand where the field stands and how well can it address collaborative work with AR, to better characterize and evaluate the collaboration process. In this article, we perform an analysis of the different dimensions that should be taken into account when analysing the contributions of AR to the collaborative work effort. Then, we bring these dimensions forward into a conceptual framework and propose an extended human-centered taxonomy for the categorization of the main features of Collaborative AR. Our goal is to foster harmonization of perspectives for the field, which may help create a common ground for systematization and discussion. We hope to influence and improve how research in this field is reported by providing a structured list of the defining characteristics. Finally, some examples of the use of the taxonomy are presented to show how it can serve to gather information for characterizing AR-supported collaborative work, and illustrate its potential as the grounds to elicit further studies.", "title": "A Conceptual Model and Taxonomy for Collaborative Augmented Reality", "normalizedTitle": "A Conceptual Model and Taxonomy for Collaborative Augmented Reality", "fno": "09506837", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Augmented Reality", "Groupware", "AR Supported Collaborative Work", "Collaboration Process", "Collaborative AR", "Collaborative Augmented Reality", "Conceptual Model", "Extended Human Centered Taxonomy", "Real World Objects", "Virtual Objects", "Collaboration", "Taxonomy", "Collaborative Work", "Augmented Reality", "Visualization", "Augmented Reality", "Three Dimensional Displays", "Human Computer Interaction", "Collaboration", "Augmented Reality", "Conceptual Model", "Taxonomy", "Human Centered", "Systematization" ], "authors": [ { "givenName": "Bernardo", "surname": "Marques", "fullName": "Bernardo Marques", "affiliation": "IEETA, DETI, University of Aveiro, Aveiro, Portugal", "__typename": "ArticleAuthorType" }, { "givenName": "Samuel", "surname": "Silva", "fullName": "Samuel Silva", "affiliation": "IEETA, DETI, University of Aveiro, Aveiro, Portugal", "__typename": "ArticleAuthorType" }, { "givenName": "João", "surname": "Alves", "fullName": "João Alves", "affiliation": "IEETA, DETI, University of Aveiro, Aveiro, Portugal", "__typename": "ArticleAuthorType" }, { "givenName": "Tiago", "surname": "Araújo", "fullName": "Tiago Araújo", "affiliation": "PPGCC, Federal University of Pará, Belém, Brasil", "__typename": "ArticleAuthorType" }, { "givenName": "Paulo", "surname": "Dias", "fullName": "Paulo Dias", "affiliation": "IEETA, DETI, University of Aveiro, Aveiro, Portugal", "__typename": "ArticleAuthorType" }, { "givenName": "Beatriz Sousa", "surname": "Santos", "fullName": "Beatriz Sousa Santos", "affiliation": "IEETA, DETI, University of Aveiro, Aveiro, Portugal", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "5113-5133", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icimt/2009/3922/0/3922a019", "title": "Collaborative Augmented Reality Approach for Multi-user Interaction in Urban Simulation", "doi": null, "abstractUrl": "/proceedings-article/icimt/2009/3922a019/12OmNwDACCo", "parentPublication": { "id": "proceedings/icimt/2009/3922/0", "title": "Information and Multimedia Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2014/3592/0/3592a078", "title": "Collaborative Augmented Reality in Education: A Review", "doi": null, "abstractUrl": "/proceedings-article/latice/2014/3592a078/12OmNwekjxi", "parentPublication": { "id": "proceedings/latice/2014/3592/0", "title": "2014 International Conference on Teaching and Learning in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2012/4702/0/4702a113", "title": "Behavioral Patterns and Learning Performance of Collaborative Knowledge Construction on an Augmented Reality System", "doi": null, "abstractUrl": "/proceedings-article/icalt/2012/4702a113/12OmNwpoFGH", "parentPublication": { "id": "proceedings/icalt/2012/4702/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isar/2001/1375/0/13750114", "title": "Mobile Collaborative Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/isar/2001/13750114/12OmNxFaLwB", "parentPublication": { "id": "proceedings/isar/2001/1375/0", "title": "Proceedings IEEE and ACM International Symposium on Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2014/4261/0/4261a053", "title": "Usability Heuristics for Collaborative Augmented Reality Remote Systems", "doi": null, "abstractUrl": "/proceedings-article/svr/2014/4261a053/12OmNyPQ4xE", "parentPublication": { "id": "proceedings/svr/2014/4261/0", "title": "2014 XVI Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a293", "title": "Collaborative Learning with Augmented Reality Tornado Simulator", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a293/1CJdbIR328g", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09060980", "title": "Visualization Techniques in Augmented Reality: A Taxonomy, Methods and Patterns", "doi": null, "abstractUrl": "/journal/tg/2021/09/09060980/1iRo7RmpTa0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09234650", "title": "Collaborative Work in Augmented Reality: A Survey", "doi": null, "abstractUrl": "/journal/tg/2022/06/09234650/1o6HGtTxGPS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a094", "title": "Visually exploring a Collaborative Augmented Reality Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a094/1y4oG2A0VLW", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a431", "title": "A Taxonomy of Interaction Techniques for Immersive Augmented Reality based on an Iterative Literature Review", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a431/1yeD62B4zza", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09497654", "articleId": "1vzYfkJCG64", "__typename": "AdjacentArticleType" }, "next": { "fno": "09523770", "articleId": "1wnLgd43B5K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNrFBPWq", "title": "September-October", "year": "2006", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "12", "label": "September-October", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwfZC05", "doi": "10.1109/TVCG.2006.171", "abstract": "We describe a new progressive technique that allows real-time rendering of extremely large tetrahedral meshes. Our approach uses a client-server architecture to incrementally stream portions of the mesh from a server to a client which refines the quality of the approximate rendering until it converges to a full quality rendering. The results of previous steps are re-used in each subsequent refinement, thus leading to an efficient rendering. Our novel approach keeps very little geometry on the client and works by refining a set of rendered images at each step. Our interactive representation of the dataset is efficient, light-weight, and high quality. We present a framework for the exploration of large datasets stored on a remote server with a thin client that is capable of rendering and managing full quality volume visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "We describe a new progressive technique that allows real-time rendering of extremely large tetrahedral meshes. Our approach uses a client-server architecture to incrementally stream portions of the mesh from a server to a client which refines the quality of the approximate rendering until it converges to a full quality rendering. The results of previous steps are re-used in each subsequent refinement, thus leading to an efficient rendering. Our novel approach keeps very little geometry on the client and works by refining a set of rendered images at each step. Our interactive representation of the dataset is efficient, light-weight, and high quality. We present a framework for the exploration of large datasets stored on a remote server with a thin client that is capable of rendering and managing full quality volume visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We describe a new progressive technique that allows real-time rendering of extremely large tetrahedral meshes. Our approach uses a client-server architecture to incrementally stream portions of the mesh from a server to a client which refines the quality of the approximate rendering until it converges to a full quality rendering. The results of previous steps are re-used in each subsequent refinement, thus leading to an efficient rendering. Our novel approach keeps very little geometry on the client and works by refining a set of rendered images at each step. Our interactive representation of the dataset is efficient, light-weight, and high quality. We present a framework for the exploration of large datasets stored on a remote server with a thin client that is capable of rendering and managing full quality volume visualizations.", "title": "Progressive Volume Rendering of Large Unstructured Grids", "normalizedTitle": "Progressive Volume Rendering of Large Unstructured Grids", "fno": "v1307", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Client Server Systems", "Grid Computing", "Rendering Computer Graphics", "Volume Rendering", "Unstructured Grids", "Real Time Rendering", "Tetrahedral Mesh", "Client Server Architecture", "Remote Server", "Rendering Computer Graphics", "Data Visualization", "Portable Computers", "Geometry", "Graphics", "Quality Management", "Computational Modeling", "Displays", "Hardware", "Image Storage", "Volume Rendering", "Large Unstructured Grids", "Client Server", "Progressive Rendering", "Level Of Detail" ], "authors": [ { "givenName": "Steven P.", "surname": "Callahan", "fullName": "Steven P. Callahan", "affiliation": "Scientific Computing and Imaging Institute at the University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Louis", "surname": "Bavoil", "fullName": "Louis Bavoil", "affiliation": "Scientific Computing and Imaging Institute at the University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Valerio", "surname": "Pascucci", "fullName": "Valerio Pascucci", "affiliation": "Lawrence Livermore National Laboratory", "__typename": "ArticleAuthorType" }, { "givenName": "Claudio T.", "surname": "Silva", "fullName": "Claudio T. Silva", "affiliation": "Scientific Computing and Imaging Institute at the University of Utah", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2006-09-01 00:00:00", "pubType": "trans", "pages": "1307-1314", "year": "2006", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504773", "title": "Progressive feedback point cloud rendering for virtual reality display", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504773/12OmNApcuq5", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vv/2002/7641/0/76410023", "title": "A Two-Step Approach for Interactive Pre-Integrated Volume Rendering of Unstructured Grids", "doi": null, "abstractUrl": "/proceedings-article/vv/2002/76410023/12OmNqHItvv", "parentPublication": { "id": "proceedings/vv/2002/7641/0", "title": "Volume Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2016/2675/0/2675a602", "title": "A Hybrid Web Rendering Framework on Cloud", "doi": null, "abstractUrl": "/proceedings-article/icws/2016/2675a602/12OmNvjyxVz", "parentPublication": { "id": "proceedings/icws/2016/2675/0", "title": "2016 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780015", "title": "On-the-Fly Rendering of Losslessly Compressed Irregular Volume Grids", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780015/12OmNxFJXEw", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532796", "title": "Interactive rendering of large unstructured grids using dynamic level-of-detail", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532796/12OmNyvY9ut", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2002/1489/0/14890193", "title": "Haptic Rendering of Data on Unstructured Tetrahedral Grids", "doi": null, "abstractUrl": "/proceedings-article/haptics/2002/14890193/12OmNz5s0PQ", "parentPublication": { "id": "proceedings/haptics/2002/1489/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2004/8788/0/87880433", "title": "TetSplat Real-Time Rendering and Volume Clipping of Large Unstructured Tetrahedral Meshes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880433/12OmNzRHOOj", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1993/3940/0/00398853", "title": "Rapid exploration of curvilinear grids using direct volume rendering", "doi": null, "abstractUrl": "/proceedings-article/visual/1993/00398853/12OmNzlD9sU", "parentPublication": { "id": "proceedings/visual/1993/3940/0", "title": "Proceedings Visualization '93", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2003/02/mcg2003020022", "title": "Enabling View-Dependent Progressive Volume Visualization on the Grid", "doi": null, "abstractUrl": "/magazine/cg/2003/02/mcg2003020022/13rRUwhpBSv", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/03/ttg2008030576", "title": "Interactive View-Dependent Rendering over Networks", "doi": null, "abstractUrl": "/journal/tg/2008/03/ttg2008030576/13rRUxC0SOT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "v1299", "articleId": "13rRUxOdD2x", "__typename": "AdjacentArticleType" }, "next": { "fno": "v1315", "articleId": "13rRUwInuWq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNx4yvun", "title": "March", "year": "2015", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "21", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwI5TXA", "doi": "10.1109/TVCG.2014.2377773", "abstract": "In this paper, we introduce a novel approach to bas-relief generation and shape editing that uses gradient-based mesh deformation as the theoretical foundation. Our approach differs from image-based methods in that it operates directly on the triangular mesh, and ensures that the mesh topology remains unchanged during geometric processing. By implicitly deforming the input mesh through gradient manipulation, our approach is applicable to both plane surface bas-relief generation and curved surface bas-relief generation. We propose a series of gradient-based algorithms, such as height field deformation, high slope optimization, fine detail preservation, curved surface flattening and relief mapping. Additionally, we present two types of shape editing tools that allow the user to interactively modify the bas-relief to exhibit a desired shape. Experimental results indicate that the proposed approach is effective in producing plausible and impressive bas-reliefs.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we introduce a novel approach to bas-relief generation and shape editing that uses gradient-based mesh deformation as the theoretical foundation. Our approach differs from image-based methods in that it operates directly on the triangular mesh, and ensures that the mesh topology remains unchanged during geometric processing. By implicitly deforming the input mesh through gradient manipulation, our approach is applicable to both plane surface bas-relief generation and curved surface bas-relief generation. We propose a series of gradient-based algorithms, such as height field deformation, high slope optimization, fine detail preservation, curved surface flattening and relief mapping. Additionally, we present two types of shape editing tools that allow the user to interactively modify the bas-relief to exhibit a desired shape. Experimental results indicate that the proposed approach is effective in producing plausible and impressive bas-reliefs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we introduce a novel approach to bas-relief generation and shape editing that uses gradient-based mesh deformation as the theoretical foundation. Our approach differs from image-based methods in that it operates directly on the triangular mesh, and ensures that the mesh topology remains unchanged during geometric processing. By implicitly deforming the input mesh through gradient manipulation, our approach is applicable to both plane surface bas-relief generation and curved surface bas-relief generation. We propose a series of gradient-based algorithms, such as height field deformation, high slope optimization, fine detail preservation, curved surface flattening and relief mapping. Additionally, we present two types of shape editing tools that allow the user to interactively modify the bas-relief to exhibit a desired shape. Experimental results indicate that the proposed approach is effective in producing plausible and impressive bas-reliefs.", "title": "Bas-Relief Generation and Shape Editing through Gradient-Based Mesh Deformation", "normalizedTitle": "Bas-Relief Generation and Shape Editing through Gradient-Based Mesh Deformation", "fno": "06975236", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Shape", "Surface Treatment", "Three Dimensional Displays", "Vectors", "Image Coding", "Poisson Equations", "Topology", "Detail Preservation", "Bas Relief Generation", "Bas Relief Shape Editing", "Gradient Based Mesh Deformation", "Detail Preservation", "Bas Relief Generation", "Bas Relief Shape Editing", "Gradient Based Mesh Deformation" ], "authors": [ { "givenName": "Yu-Wei", "surname": "Zhang", "fullName": "Yu-Wei Zhang", "affiliation": "School of Mechanical and Automotive Engineering, Qilu University of Technology, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yi-Qi", "surname": "Zhou", "fullName": "Yi-Qi Zhou", "affiliation": "School of Mechanical Engineering, Shandong University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xue-Lin", "surname": "Li", "fullName": "Xue-Lin Li", "affiliation": "School of Mechanical and Automotive Engineering, Qilu University of Technology, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hui", "surname": "Liu", "fullName": "Hui Liu", "affiliation": "School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Li-Li", "surname": "Zhang", "fullName": "Li-Li Zhang", "affiliation": "School of Mechanical and Automotive Engineering, Qilu University of Technology, Jinan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2015-03-01 00:00:00", "pubType": "trans", "pages": "328-338", "year": "2015", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ciis/2017/3886/0/3886a294", "title": "Watermarking Algorithm for Bas-Relief Based on Depth Grayscale Image", "doi": null, "abstractUrl": "/proceedings-article/ciis/2017/3886a294/12OmNAPjA5w", "parentPublication": { "id": "proceedings/ciis/2017/3886/0", "title": "2017 International Conference on Computing Intelligence and Information System (CIIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smi/2007/2815/0/28150211", "title": "Automatic Generation of Bas-reliefs from 3D Shapes", "doi": null, "abstractUrl": "/proceedings-article/smi/2007/28150211/12OmNB7LvFW", "parentPublication": { "id": "proceedings/smi/2007/2815/0", "title": "Shape Modeling and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270232", "title": "Isotropy, Reciprocity and the Generalized Bas-Relief Ambiguity", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270232/12OmNxRnvW1", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78221060", "title": "The Bas-Relief Ambiguity", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78221060/12OmNyRPgwe", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/05/06684153", "title": "Bas-Relief Modeling from Normal Images with Intuitive Styles", "doi": null, "abstractUrl": "/journal/tg/2014/05/06684153/13rRUx0xPia", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/04/ttg2009040642", "title": "Bas-Relief Generation Using Adaptive Histogram Equalization", "doi": null, "abstractUrl": "/journal/tg/2009/04/ttg2009040642/13rRUyogGA7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08322258", "title": "Bas-Relief Modeling from Normal Layers", "doi": null, "abstractUrl": "/journal/tg/2019/04/08322258/17YCN5E6cAE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09852330", "title": "Neural Modeling of Portrait Bas-relief from a Single Photograph", "doi": null, "abstractUrl": "/journal/tg/5555/01/09852330/1FFHdt1RWHC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a510", "title": "Sketch2Relief: Generating Bas-relief from Sketches with Deep Generative Networks", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a510/1pP3DzePTB6", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09468903", "title": "Human Bas-Relief Generation From a Single Photograph", "doi": null, "abstractUrl": "/journal/tg/2022/12/09468903/1uR9KNPeety", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06933942", "articleId": "13rRUxly8XG", "__typename": "AdjacentArticleType" }, "next": { "fno": "06965627", "articleId": "13rRUwI5TXz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyeWdDc", "title": "May", "year": "2014", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPia", "doi": "10.1109/TVCG.2013.267", "abstract": "Traditional 3D model-based bas-relief modeling methods are often limited to model-dependent and monotonic relief styles. This paper presents a novel method for digital bas-relief modeling with intuitive style control. Given a composite normal image, the problem discussed in this paper involves generating a discontinuity-free depth field with high compression of depth data while preserving or even enhancing fine details. In our framework, several layers of normal images are composed into a single normal image. The original normal image on each layer is usually generated from 3D models or through other techniques as described in this paper. The bas-relief style is controlled by choosing a parameter and setting a targeted height for them. Bas-relief modeling and stylization are achieved simultaneously by solving a sparse linear system. Different from previous work, our method can be used to freely design bas-reliefs in normal image space instead of in object space, which makes it possible to use any popular image editing tools for bas-relief modeling. Experiments with a wide range of 3D models and scenes show that our method can effectively generate digital bas-reliefs.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional 3D model-based bas-relief modeling methods are often limited to model-dependent and monotonic relief styles. This paper presents a novel method for digital bas-relief modeling with intuitive style control. Given a composite normal image, the problem discussed in this paper involves generating a discontinuity-free depth field with high compression of depth data while preserving or even enhancing fine details. In our framework, several layers of normal images are composed into a single normal image. The original normal image on each layer is usually generated from 3D models or through other techniques as described in this paper. The bas-relief style is controlled by choosing a parameter and setting a targeted height for them. Bas-relief modeling and stylization are achieved simultaneously by solving a sparse linear system. Different from previous work, our method can be used to freely design bas-reliefs in normal image space instead of in object space, which makes it possible to use any popular image editing tools for bas-relief modeling. Experiments with a wide range of 3D models and scenes show that our method can effectively generate digital bas-reliefs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional 3D model-based bas-relief modeling methods are often limited to model-dependent and monotonic relief styles. This paper presents a novel method for digital bas-relief modeling with intuitive style control. Given a composite normal image, the problem discussed in this paper involves generating a discontinuity-free depth field with high compression of depth data while preserving or even enhancing fine details. In our framework, several layers of normal images are composed into a single normal image. The original normal image on each layer is usually generated from 3D models or through other techniques as described in this paper. The bas-relief style is controlled by choosing a parameter and setting a targeted height for them. Bas-relief modeling and stylization are achieved simultaneously by solving a sparse linear system. Different from previous work, our method can be used to freely design bas-reliefs in normal image space instead of in object space, which makes it possible to use any popular image editing tools for bas-relief modeling. Experiments with a wide range of 3D models and scenes show that our method can effectively generate digital bas-reliefs.", "title": "Bas-Relief Modeling from Normal Images with Intuitive Styles", "normalizedTitle": "Bas-Relief Modeling from Normal Images with Intuitive Styles", "fno": "06684153", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Three Dimensional Displays", "Solid Modeling", "Laplace Equations", "Image Coding", "Computational Modeling", "Shape", "Optimization", "Layer Based", "Bas Relief", "Normal Image", "Relief Style", "Feature Preserving" ], "authors": [ { "givenName": "Zhongping", "surname": "Ji", "fullName": "Zhongping Ji", "affiliation": "School of Computer Science, Hangzhou Dianzi University, Xiasha Higher Education Zone, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weiyin", "surname": "Ma", "fullName": "Weiyin Ma", "affiliation": "Department of Mechanical and Biomedical Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Xianfang", "surname": "Sun", "fullName": "Xianfang Sun", "affiliation": "School of Computer Science and Informatics, Cardiff University, 5 The Parade, Roath, CF24 3AA, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2014-05-01 00:00:00", "pubType": "trans", "pages": "675-685", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ciis/2017/3886/0/3886a294", "title": "Watermarking Algorithm for Bas-Relief Based on Depth Grayscale Image", "doi": null, "abstractUrl": "/proceedings-article/ciis/2017/3886a294/12OmNAPjA5w", "parentPublication": { "id": "proceedings/ciis/2017/3886/0", "title": "2017 International Conference on Computing Intelligence and Information System (CIIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1994/6952/2/00413673", "title": "Solving the bas-relief ambiguity", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413673/12OmNApu5kt", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78221060", "title": "The Bas-Relief Ambiguity", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78221060/12OmNyRPgwe", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06975236", "title": "Bas-Relief Generation and Shape Editing through Gradient-Based Mesh Deformation", "doi": null, "abstractUrl": "/journal/tg/2015/03/06975236/13rRUwI5TXA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/04/ttg2009040642", "title": "Bas-Relief Generation Using Adaptive Histogram Equalization", "doi": null, "abstractUrl": "/journal/tg/2009/04/ttg2009040642/13rRUyogGA7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/08/08611145", "title": "Portrait Relief Modeling from a Single Image", "doi": null, "abstractUrl": "/journal/tg/2020/08/08611145/17D45XDIXSX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08322258", "title": "Bas-Relief Modeling from Normal Layers", "doi": null, "abstractUrl": "/journal/tg/2019/04/08322258/17YCN5E6cAE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09852330", "title": "Neural Modeling of Portrait Bas-relief from a Single Photograph", "doi": null, "abstractUrl": "/journal/tg/5555/01/09852330/1FFHdt1RWHC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a510", "title": "Sketch2Relief: Generating Bas-relief from Sketches with Deep Generative Networks", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a510/1pP3DzePTB6", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09468903", "title": "Human Bas-Relief Generation From a Single Photograph", "doi": null, "abstractUrl": "/journal/tg/2022/12/09468903/1uR9KNPeety", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06654129", "articleId": "13rRUyuegp7", "__typename": "AdjacentArticleType" }, "next": { "fno": "06702500", "articleId": "13rRUxBJhFx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qdSTDvknHa", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tp", "pubType": "journal", "volume": "43", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1c5tfe1vTmU", "doi": "10.1109/TPAMI.2019.2931897", "abstract": "We propose a novel algorithm for stabilizing selfie videos. Our goal is to automatically generate stabilized video that has optimal smooth motion in the sense of both foreground and background. The key insight is that non-rigid foreground motion in selfie videos can be analyzed using a 3D face model, and background motion can be analyzed using optical flow. We use second derivative of temporal trajectory of selected pixels as the measure of smoothness. Our algorithm stabilizes selfie videos by minimizing the smoothness measure of the background, regularized by the motion of the foreground. Experiments show that our method outperforms state-of-the-art general video stabilization techniques in selfie videos.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel algorithm for stabilizing selfie videos. Our goal is to automatically generate stabilized video that has optimal smooth motion in the sense of both foreground and background. The key insight is that non-rigid foreground motion in selfie videos can be analyzed using a 3D face model, and background motion can be analyzed using optical flow. We use second derivative of temporal trajectory of selected pixels as the measure of smoothness. Our algorithm stabilizes selfie videos by minimizing the smoothness measure of the background, regularized by the motion of the foreground. Experiments show that our method outperforms state-of-the-art general video stabilization techniques in selfie videos.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel algorithm for stabilizing selfie videos. Our goal is to automatically generate stabilized video that has optimal smooth motion in the sense of both foreground and background. The key insight is that non-rigid foreground motion in selfie videos can be analyzed using a 3D face model, and background motion can be analyzed using optical flow. We use second derivative of temporal trajectory of selected pixels as the measure of smoothness. Our algorithm stabilizes selfie videos by minimizing the smoothness measure of the background, regularized by the motion of the foreground. Experiments show that our method outperforms state-of-the-art general video stabilization techniques in selfie videos.", "title": "Selfie Video Stabilization", "normalizedTitle": "Selfie Video Stabilization", "fno": "08781904", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Image Motion Analysis", "Image Sequences", "Optimisation", "Stereo Image Processing", "Video Signal Processing", "Selfie Video Stabilization", "Optimal Smooth Motion", "Foreground Motion", "Background Motion", "Optical Flow", "3 D Face Model", "Face", "Three Dimensional Displays", "Two Dimensional Displays", "Solid Modeling", "Tracking", "Cameras", "Video Stabilization", "Face Modeling" ], "authors": [ { "givenName": "Jiyang", "surname": "Yu", "fullName": "Jiyang Yu", "affiliation": "Department of Electrical and Computer Engineering, University of California, San Diego, La Jolla, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ravi", "surname": "Ramamoorthi", "fullName": "Ravi Ramamoorthi", "affiliation": "Department of Computer Science and Engineering, University of California, San Diego, La Jolla, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "701-711", "year": "2021", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851b781", "title": "A Hole Filling Approach Based on Background Reconstruction for View Synthesis in 3D Video", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851b781/12OmNBqdr8O", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a777", "title": "Realtime Dynamic 3D Facial Reconstruction for Monocular Video In-the-Wild", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a777/12OmNxaNGhz", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2017/2941/0/2941a135", "title": "Innovative Drone Selfie System and Implementation", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2017/2941a135/12OmNzTYC4U", "parentPublication": { "id": "proceedings/iscsic/2017/2941/0", "title": "2017 International Symposium on Computer Science and Intelligent Controls (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/06/08642935", "title": "A Disocclusion Inpainting Framework for Depth-Based View Synthesis", "doi": null, "abstractUrl": "/journal/tp/2020/06/08642935/17PYElAbxtK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08737754", "title": "Effective Video Stabilization via Joint Trajectory Smoothing and Frame Warping", "doi": null, "abstractUrl": "/journal/tg/2020/11/08737754/1bcHtOFxACQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d351", "title": "Quotienting Impertinent Camera Kinematics for 3D Video Stabilization", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d351/1i5mHYfdVKM", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a371", "title": "Visual-GPS: Ego-Downward and Ambient Video Based Person Location Association", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a371/1iTvqkW52gw", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2031", "title": "Real-Time Selfie Video Stabilization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2031/1yeL54DvAnC", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900k0616", "title": "3D Video Stabilization with Depth Estimation by CNN-based Optimization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900k0616/1yeLRwhnDCo", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b085", "title": "NVSS: High-quality Novel View Selfie Synthesis", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b085/1zWEkHZPpnO", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08805409", "articleId": "1cG4oumJbna", "__typename": "AdjacentArticleType" }, "next": { "fno": "08781758", "articleId": "1c5tfVUwGfm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzmclo0", "title": "May-June", "year": "2017", "issueNum": "03", "idPrefix": "cg", "pubType": "magazine", "volume": "37", "label": "May-June", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyoPSRC", "doi": "10.1109/MCG.2017.50", "abstract": "Computer graphics research is increasingly interested in the high-level analysis and processing of geometric objects. By acquiring a structural or functional understanding of 3D shapes, researchers are able to tackle mid- to high-level design problems for which machine computations can replace or at least relieve human efforts. In parallel, with the rapid advances in 3D printing technologies, many design solutions explored by researchers and practitioners are focusing on the needs and constraints arising from physical fabrication. The contributions in this special issue are cross-disciplinary, connecting physical fabrication with design and processing tasks in new domains including circuit design, geospatial visualization, and 3D scanning, leading to never-before-seen 3D printing applications.", "abstracts": [ { "abstractType": "Regular", "content": "Computer graphics research is increasingly interested in the high-level analysis and processing of geometric objects. By acquiring a structural or functional understanding of 3D shapes, researchers are able to tackle mid- to high-level design problems for which machine computations can replace or at least relieve human efforts. In parallel, with the rapid advances in 3D printing technologies, many design solutions explored by researchers and practitioners are focusing on the needs and constraints arising from physical fabrication. The contributions in this special issue are cross-disciplinary, connecting physical fabrication with design and processing tasks in new domains including circuit design, geospatial visualization, and 3D scanning, leading to never-before-seen 3D printing applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Computer graphics research is increasingly interested in the high-level analysis and processing of geometric objects. By acquiring a structural or functional understanding of 3D shapes, researchers are able to tackle mid- to high-level design problems for which machine computations can replace or at least relieve human efforts. In parallel, with the rapid advances in 3D printing technologies, many design solutions explored by researchers and practitioners are focusing on the needs and constraints arising from physical fabrication. The contributions in this special issue are cross-disciplinary, connecting physical fabrication with design and processing tasks in new domains including circuit design, geospatial visualization, and 3D scanning, leading to never-before-seen 3D printing applications.", "title": "Computational Design and Fabrication", "normalizedTitle": "Computational Design and Fabrication", "fno": "mcg2017030032", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Special Issues And Sections", "Fabrication", "Three Dimensional Printing", "Three Dimensional Displays", "Computer Graphics", "Computer Graphics Research", "Computational Design", "Computational Fabrication", "Prototype Fabrication", "3 D Printing", "3 D Scanning", "Geospatial Visualization" ], "authors": [ { "givenName": "Bedrich", "surname": "Benes", "fullName": "Bedrich Benes", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "David J.", "surname": "Kasik", "fullName": "David J. Kasik", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Wilmot", "surname": "Li", "fullName": "Wilmot Li", "affiliation": "Adobe Research", "__typename": "ArticleAuthorType" }, { "givenName": "Hao", "surname": "Zhang", "fullName": "Hao Zhang", "affiliation": "Simon Fraser University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "03", "pubDate": "2017-05-01 00:00:00", "pubType": "mags", "pages": "32-33", "year": "2017", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bwcca/2014/4173/0/4173a395", "title": "A Digital Fabrication Assistant for 3D Arts and Crafts", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2014/4173a395/12OmNvT2p0p", "parentPublication": { "id": "proceedings/bwcca/2014/4173/0", "title": "2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbec/2016/2132/0/07458988", "title": "Fabrication Method for Paper Microfluidics Utilizing 3D Printing and PDMS Stamps", "doi": null, "abstractUrl": "/proceedings-article/sbec/2016/07458988/12OmNx1Iwfo", "parentPublication": { "id": "proceedings/sbec/2016/2132/0", "title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/06/mcg2013060024", "title": "Computational Aspects of Fabrication: Modeling, Design, and 3D Printing", "doi": null, "abstractUrl": "/magazine/cg/2013/06/mcg2013060024/13rRUwbJCZh", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/06/mcg2013060048", "title": "3D-Printing Spatially Varying BRDFs", "doi": null, "abstractUrl": "/magazine/cg/2013/06/mcg2013060048/13rRUxly97Z", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/10/08086214", "title": "Toward Support-Free 3D Printing: A Skeletal Approach for Partitioning Models", "doi": null, "abstractUrl": "/journal/tg/2018/10/08086214/13rRUy0HYRy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08327516", "title": "PaperCraft3D: Paper-Based 3D Modeling and Scene Fabrication", "doi": null, "abstractUrl": "/journal/tg/2019/04/08327516/181W9moJfxQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fas*w/2019/2406/0/240600a225", "title": "Swarm Materialization Through Discrete, Nonsequential Additive Fabrication", "doi": null, "abstractUrl": "/proceedings-article/fas*w/2019/240600a225/1ckrvjWfiUw", "parentPublication": { "id": "proceedings/fas*w/2019/2406/0", "title": "2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2019/04/08922601", "title": "Printing Wearable Devices in 2D and 3D: An Overview on Mechanical and Electronic Digital Co-design", "doi": null, "abstractUrl": "/magazine/pc/2019/04/08922601/1fvZaX6oAWA", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400b491", "title": "Generative Truss Optimization for Support-Free Fused Filament Fabrication", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400b491/1uGZ7m91hIc", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2021/3954/0/395400a074", "title": "Skeleton-Based Interactive Fabrication for Large-Scale Newspaper Sculpture", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2021/395400a074/1wnPsk1b7xK", "parentPublication": { "id": "proceedings/nicoint/2021/3954/0", "title": "2021 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2017030024", "articleId": "13rRUypp5ao", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2017030034", "articleId": "13rRUyYBlji", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwGqBqv", "title": "Oct.-Dec.", "year": "2019", "issueNum": "04", "idPrefix": "pc", "pubType": "magazine", "volume": "18", "label": "Oct.-Dec.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1fvZaX6oAWA", "doi": "10.1109/MPRV.2019.2948819", "abstract": "Multiprocess Additive Manufacturing (AM) offers system designers new, exciting computational tools to rapidly realise smart wearable sensing devices in two-dimensional (2D) and 3D shapes. We guide readers through the novel development and fabrication process based on a digital co-design framework and highlight AM techniques, functional materials, and assembly procedures for designing wearables as flexible and stretchable on-skin patches, e-textiles, and smart accessories for everyday use.", "abstracts": [ { "abstractType": "Regular", "content": "Multiprocess Additive Manufacturing (AM) offers system designers new, exciting computational tools to rapidly realise smart wearable sensing devices in two-dimensional (2D) and 3D shapes. We guide readers through the novel development and fabrication process based on a digital co-design framework and highlight AM techniques, functional materials, and assembly procedures for designing wearables as flexible and stretchable on-skin patches, e-textiles, and smart accessories for everyday use.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multiprocess Additive Manufacturing (AM) offers system designers new, exciting computational tools to rapidly realise smart wearable sensing devices in two-dimensional (2D) and 3D shapes. We guide readers through the novel development and fabrication process based on a digital co-design framework and highlight AM techniques, functional materials, and assembly procedures for designing wearables as flexible and stretchable on-skin patches, e-textiles, and smart accessories for everyday use.", "title": "Printing Wearable Devices in 2D and 3D: An Overview on Mechanical and Electronic Digital Co-design", "normalizedTitle": "Printing Wearable Devices in 2D and 3D: An Overview on Mechanical and Electronic Digital Co-design", "fno": "08922601", "hasPdf": true, "idPrefix": "pc", "keywords": [ "Body Sensor Networks", "Flexible Electronics", "Patient Monitoring", "Skin", "Textiles", "Printing Wearable Devices", "Smart Wearable Sensing Devices", "Smart Accessories", "Digital Codesign Framework", "Multiprocess Additive Manufacturing", "Electronic Digital Codesign", "On Skin Patches", "E Textiles", "Three Dimensional Displays", "Fabrication", "Two Dimensional Displays", "Printing", "Three Dimensional Printing", "Substrates", "Manufacturing Processes" ], "authors": [ { "givenName": "Samira", "surname": "Tansaz", "fullName": "Samira Tansaz", "affiliation": "Chair of Digital HealthFriedrich-Alexander Universität Erlangen-Nürnberg", "__typename": "ArticleAuthorType" }, { "givenName": "Annalisa", "surname": "Baronetto", "fullName": "Annalisa Baronetto", "affiliation": "Chair of Digital HealthFriedrich-Alexander Universität Erlangen-Nürnberg", "__typename": "ArticleAuthorType" }, { "givenName": "Rui", "surname": "Zhang", "fullName": "Rui Zhang", "affiliation": "Chair of Digital HealthFriedrich-Alexander Universität Erlangen-Nürnberg", "__typename": "ArticleAuthorType" }, { "givenName": "Adrian", "surname": "Derungs", "fullName": "Adrian Derungs", "affiliation": "Chair of Digital HealthFriedrich-Alexander Universität Erlangen-Nürnberg", "__typename": "ArticleAuthorType" }, { "givenName": "Oliver", "surname": "Amft", "fullName": "Oliver Amft", "affiliation": "Chair of Digital HealthFriedrich-Alexander Universität Erlangen-Nürnberg", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2019-10-01 00:00:00", "pubType": "mags", "pages": "38-50", "year": "2019", "issn": "1536-1268", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccce/2016/2427/0/2427a406", "title": "Design of a Circular Patch Antenna for 3D Printing", "doi": null, "abstractUrl": "/proceedings-article/iccce/2016/2427a406/12OmNCgJe6f", "parentPublication": { "id": "proceedings/iccce/2016/2427/0", "title": "2016 International Conference on Computer and Communication Engineering (ICCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ectc/2017/6315/0/07999818", "title": "3D Printing as a New Packaging Approach for MEMS and Electronic Devices", "doi": null, "abstractUrl": "/proceedings-article/ectc/2017/07999818/12OmNqJq4l0", "parentPublication": { "id": "proceedings/ectc/2017/6315/0", "title": "2017 IEEE 67th Electronic Components and Technology Conference (ECTC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2014/04/mpc2014040006", "title": "From 3D Printing to Spy Cats", "doi": null, "abstractUrl": "/magazine/pc/2014/04/mpc2014040006/13rRUwbs1Y1", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2014/01/mpc2014010006", "title": "3D Printing, Smart Cities, Robots, and More", "doi": null, "abstractUrl": "/magazine/pc/2014/01/mpc2014010006/13rRUx0xPsA", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/03/mcg2017030034", "title": "FabSquare: Fabricating Photopolymer Objects by Mold 3D Printing and UV Curing", "doi": null, "abstractUrl": "/magazine/cg/2017/03/mcg2017030034/13rRUyYBlji", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/10/08703138", "title": "Strong 3D Printing by TPMS Injection", "doi": null, "abstractUrl": "/journal/tg/2020/10/08703138/19Er78PKJKE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2022/8152/0/815200a311", "title": "3D Marketplace: Distributed Attestation of 3D Designs on Blockchain", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2022/815200a311/1F0gAV7WGk0", "parentPublication": { "id": "proceedings/smartcomp/2022/8152/0", "title": "2022 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2023/4839/0/483900a384", "title": "Towards Augmented Reality Guiding Systems: An Engineering Design of an Immersive System for Complex 3D Printing Repair Process", "doi": null, "abstractUrl": "/proceedings-article/vrw/2023/483900a384/1MTTgkFi4c8", "parentPublication": { "id": "proceedings/vrw/2023/4839/null", "title": "2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a978", "title": "IoT Controlled Screw-Type 3D Food Printer Using Single Line Design Technique", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a978/1gjRCVyCLyU", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/09/09347725", "title": "Wearable 3D Machine Knitting: Automatic Generation of Shaped Knit Sheets to Cover Real-World Objects", "doi": null, "abstractUrl": "/journal/tg/2022/09/09347725/1qWIIciXw76", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08928977", "articleId": "1gKuhzSk9Ko", "__typename": "AdjacentArticleType" }, "next": { "fno": "08968794", "articleId": "1gQYn6jXWEg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xjR1zzHe6s", "doi": "10.1109/TVCG.2021.3114810", "abstract": "Although cancer patients survive years after oncologic therapy, they are plagued with long-lasting or permanent residual symptoms, whose severity, rate of development, and resolution after treatment vary largely between survivors. The analysis and interpretation of symptoms is complicated by their partial co-occurrence, variability across populations and across time, and, in the case of cancers that use radiotherapy, by further symptom dependency on the tumor location and prescribed treatment. We describe THALIS, an environment for visual analysis and knowledge discovery from cancer therapy symptom data, developed in close collaboration with oncology experts. Our approach leverages unsupervised machine learning methodology over cohorts of patients, and, in conjunction with custom visual encodings and interactions, provides context for new patients based on patients with similar diagnostic features and symptom evolution. We evaluate this approach on data collected from a cohort of head and neck cancer patients. Feedback from our clinician collaborators indicates that THALIS supports knowledge discovery beyond the limits of machines or humans alone, and that it serves as a valuable tool in both the clinic and symptom research.", "abstracts": [ { "abstractType": "Regular", "content": "Although cancer patients survive years after oncologic therapy, they are plagued with long-lasting or permanent residual symptoms, whose severity, rate of development, and resolution after treatment vary largely between survivors. The analysis and interpretation of symptoms is complicated by their partial co-occurrence, variability across populations and across time, and, in the case of cancers that use radiotherapy, by further symptom dependency on the tumor location and prescribed treatment. We describe THALIS, an environment for visual analysis and knowledge discovery from cancer therapy symptom data, developed in close collaboration with oncology experts. Our approach leverages unsupervised machine learning methodology over cohorts of patients, and, in conjunction with custom visual encodings and interactions, provides context for new patients based on patients with similar diagnostic features and symptom evolution. We evaluate this approach on data collected from a cohort of head and neck cancer patients. Feedback from our clinician collaborators indicates that THALIS supports knowledge discovery beyond the limits of machines or humans alone, and that it serves as a valuable tool in both the clinic and symptom research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although cancer patients survive years after oncologic therapy, they are plagued with long-lasting or permanent residual symptoms, whose severity, rate of development, and resolution after treatment vary largely between survivors. The analysis and interpretation of symptoms is complicated by their partial co-occurrence, variability across populations and across time, and, in the case of cancers that use radiotherapy, by further symptom dependency on the tumor location and prescribed treatment. We describe THALIS, an environment for visual analysis and knowledge discovery from cancer therapy symptom data, developed in close collaboration with oncology experts. Our approach leverages unsupervised machine learning methodology over cohorts of patients, and, in conjunction with custom visual encodings and interactions, provides context for new patients based on patients with similar diagnostic features and symptom evolution. We evaluate this approach on data collected from a cohort of head and neck cancer patients. Feedback from our clinician collaborators indicates that THALIS supports knowledge discovery beyond the limits of machines or humans alone, and that it serves as a valuable tool in both the clinic and symptom research.", "title": "THALIS: Human-Machine Analysis of Longitudinal Symptoms in Cancer Therapy", "normalizedTitle": "THALIS: Human-Machine Analysis of Longitudinal Symptoms in Cancer Therapy", "fno": "09555227", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Cancer", "Visualization", "Medical Treatment", "Data Visualization", "Encoding", "Principal Component Analysis", "Neck", "Temporal Data", "Application Motivated Visualization", "Life Sciences", "Mixed Initiative Human Machine Analysis" ], "authors": [ { "givenName": "Carla", "surname": "Floricel", "fullName": "Carla Floricel", "affiliation": "University of Illinois, Chicago, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Nafiul", "surname": "Nipu", "fullName": "Nafiul Nipu", "affiliation": "University of Illinois, Chicago, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Mikayla", "surname": "Biggs", "fullName": "Mikayla Biggs", "affiliation": "University of Iowa, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Andrew", "surname": "Wentzel", "fullName": "Andrew Wentzel", "affiliation": "University of Illinois, Chicago, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Guadalupe", "surname": "Canahuate", "fullName": "Guadalupe Canahuate", "affiliation": "University of Iowa, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Lisanne", "surname": "Van Dijk", "fullName": "Lisanne Van Dijk", "affiliation": "MD Anderson Cancer Center at the University of Texas, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Abdallah", "surname": "Mohamed", "fullName": "Abdallah Mohamed", "affiliation": "MD Anderson Cancer Center at the University of Texas, USA", "__typename": "ArticleAuthorType" }, { "givenName": "C.David", "surname": "Fuller", "fullName": "C.David Fuller", "affiliation": "MD Anderson Cancer Center at the University of Texas, USA", "__typename": "ArticleAuthorType" }, { "givenName": "G.Elisabeta", "surname": "Marai", "fullName": "G.Elisabeta Marai", "affiliation": "University of Illinois, Chicago, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "151-161", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2016/6117/0/6117a504", "title": "Serenity: A Low-Cost and Patient-Guided Mobile Virtual Reality Intervention for Cancer Coping", "doi": null, "abstractUrl": "/proceedings-article/ichi/2016/6117a504/12OmNAkWvD4", "parentPublication": { "id": "proceedings/ichi/2016/6117/0", "title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a264", "title": "The Analysis of Endoscopic-Assisted Neck Minimally Invasive Radical Operation of Thyroid Cancer (Experience of 402 Cases)", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a264/12OmNCm7BHY", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/2/3118b718", "title": "Measurements of Radiation-Induced Skin Changes in Breast-Cancer Radiation Therapy Using Ultrasonic Imaging", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118b718/12OmNvAAtBf", "parentPublication": { "id": "proceedings/bmei/2008/3118/2", "title": "BioMedical Engineering and Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2017/3839/0/08115825", "title": "Smart-phone based monitoring of cancer related fatigue", "doi": null, "abstractUrl": "/proceedings-article/wimob/2017/08115825/12OmNwEJ0EW", "parentPublication": { "id": "proceedings/wimob/2017/3839/0", "title": "2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999169", "title": "VISWES: A system for finding related vaccinia virus protein sequences in cancer immune therapy", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999169/12OmNyGtjlN", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2011/4410/0/4410a151", "title": "Comparison of Machine Learning Techniques using the WEKA Environment for Prostate Cancer Therapy Plan", "doi": null, "abstractUrl": "/proceedings-article/wetice/2011/4410a151/12OmNyYm2px", "parentPublication": { "id": "proceedings/wetice/2011/4410/0", "title": "2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a217", "title": "Intensity Modulated Arc Therapy (IMAT) vs. IMRT in Glottic Cancer: A Treatment Planning Comparison on Conventional Linac", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a217/17D45WWzW5p", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08320386", "title": "Precision Risk Analysis of Cancer Therapy with Interactive Nomograms and Survival Plots", "doi": null, "abstractUrl": "/journal/tg/2019/04/08320386/181W9pIePIs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2021/0679/0/067900a446", "title": "TraditionalChineseMedicine characteristic therapy treats obstinate hiccup", "doi": null, "abstractUrl": "/proceedings-article/itme/2021/067900a446/1CATshHvh2E", "parentPublication": { "id": "proceedings/itme/2021/0679/0", "title": "2021 11th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313509", "title": "A multi-task learning method for analyzing microbiota as cancer immunotherapy signal", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313509/1qmg4AVFi80", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09557192", "articleId": "1xlw1UFWxDa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552449", "articleId": "1xic65iQBoY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNy4IF39", "title": "Jan.", "year": "2013", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "35", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxCitzI", "doi": "10.1109/TPAMI.2012.61", "abstract": "We propose a simulation-based dynamical motion prior for tracking human motion from video in presence of physical ground-person interactions. Most tracking approaches to date have focused on efficient inference algorithms and/or learning of prior kinematic motion models; however, few can explicitly account for the physical plausibility of recovered motion. Here, we aim to recover physically plausible motion of a single articulated human subject. Toward this end, we propose a full-body 3D physical simulation-based prior that explicitly incorporates a model of human dynamics into the Bayesian filtering framework. We consider the motion of the subject to be generated by a feedback “control loop” in which Newtonian physics approximates the rigid-body motion dynamics of the human and the environment through the application and integration of interaction forces, motor forces, and gravity. Interaction forces prevent physically impossible hypotheses, enable more appropriate reactions to the environment (e.g., ground contacts), and are produced from detected human-environment collisions. Motor forces actuate the body, ensure that proposed pose transitions are physically feasible, and are generated using a motion controller. For efficient inference in the resulting high-dimensional state space, we utilize an exemplar-based control strategy that reduces the effective search space of motor forces. As a result, we are able to recover physically plausible motion of human subjects from monocular and multiview video. We show, both quantitatively and qualitatively, that our approach performs favorably with respect to Bayesian filtering methods with standard motion priors.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a simulation-based dynamical motion prior for tracking human motion from video in presence of physical ground-person interactions. Most tracking approaches to date have focused on efficient inference algorithms and/or learning of prior kinematic motion models; however, few can explicitly account for the physical plausibility of recovered motion. Here, we aim to recover physically plausible motion of a single articulated human subject. Toward this end, we propose a full-body 3D physical simulation-based prior that explicitly incorporates a model of human dynamics into the Bayesian filtering framework. We consider the motion of the subject to be generated by a feedback “control loop” in which Newtonian physics approximates the rigid-body motion dynamics of the human and the environment through the application and integration of interaction forces, motor forces, and gravity. Interaction forces prevent physically impossible hypotheses, enable more appropriate reactions to the environment (e.g., ground contacts), and are produced from detected human-environment collisions. Motor forces actuate the body, ensure that proposed pose transitions are physically feasible, and are generated using a motion controller. For efficient inference in the resulting high-dimensional state space, we utilize an exemplar-based control strategy that reduces the effective search space of motor forces. As a result, we are able to recover physically plausible motion of human subjects from monocular and multiview video. We show, both quantitatively and qualitatively, that our approach performs favorably with respect to Bayesian filtering methods with standard motion priors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a simulation-based dynamical motion prior for tracking human motion from video in presence of physical ground-person interactions. Most tracking approaches to date have focused on efficient inference algorithms and/or learning of prior kinematic motion models; however, few can explicitly account for the physical plausibility of recovered motion. Here, we aim to recover physically plausible motion of a single articulated human subject. Toward this end, we propose a full-body 3D physical simulation-based prior that explicitly incorporates a model of human dynamics into the Bayesian filtering framework. We consider the motion of the subject to be generated by a feedback “control loop” in which Newtonian physics approximates the rigid-body motion dynamics of the human and the environment through the application and integration of interaction forces, motor forces, and gravity. Interaction forces prevent physically impossible hypotheses, enable more appropriate reactions to the environment (e.g., ground contacts), and are produced from detected human-environment collisions. Motor forces actuate the body, ensure that proposed pose transitions are physically feasible, and are generated using a motion controller. For efficient inference in the resulting high-dimensional state space, we utilize an exemplar-based control strategy that reduces the effective search space of motor forces. As a result, we are able to recover physically plausible motion of human subjects from monocular and multiview video. We show, both quantitatively and qualitatively, that our approach performs favorably with respect to Bayesian filtering methods with standard motion priors.", "title": "Dynamical Simulation Priors for Human Motion Tracking", "normalizedTitle": "Dynamical Simulation Priors for Human Motion Tracking", "fno": "ttp2013010052", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Kinematics", "Tracking", "Humans", "Dynamics", "Joints", "Biological System Modeling", "Trajectory", "Particle Filtering", "Articulated Tracking", "Human Pose Tracking", "Human Motion", "Physical Simulation", "Physics Based Priors", "Bayesian Filtering" ], "authors": [ { "givenName": "Marek", "surname": "Vondrak", "fullName": "Marek Vondrak", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI, USA", "__typename": "ArticleAuthorType" }, { "givenName": "L.", "surname": "Sigal", "fullName": "L. Sigal", "affiliation": "Disney Res., Pittsburgh, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "O. C.", "surname": "Jenkins", "fullName": "O. C. Jenkins", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2013-01-01 00:00:00", "pubType": "trans", "pages": "52-65", "year": "2013", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cw/2014/4677/0/4677a411", "title": "Virtual Human Behavioural Profile Extraction Using Kinect Based Motion Tracking", "doi": null, "abstractUrl": "/proceedings-article/cw/2014/4677a411/12OmNAJm0lA", "parentPublication": { "id": "proceedings/cw/2014/4677/0", "title": "2014 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460279", "title": "Fusion of low-and high-dimensional approaches by trackers sampling for generic human motion tracking", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460279/12OmNBU1jNJ", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2008/2242/0/04587580", "title": "Physical simulation for probabilistic motion tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2008/04587580/12OmNqzcvDC", "parentPublication": { "id": "proceedings/cvpr/2008/2242/0", "title": "2008 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a191", "title": "Forecasting Human Pose and Motion with Multibody Dynamic Model", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a191/12OmNrAv3Rz", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2005/2397/0/23970017", "title": "MotionLab Sonify: A Framework for the Sonification of Human Motion Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970017/12OmNweBUNu", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459291", "title": "Stabilizing motion tracking using retrieved motion priors", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459291/12OmNxcMSk9", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a496", "title": "Predicting Dynamical Evolution of Human Activities from a Single Image", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a496/17D45WgziQD", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200l1512", "title": "Physics-based Human Motion Estimation and Synthesis from Videos", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200l1512/1BmIT74w9rO", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200l1323", "title": "Learning Motion Priors for 4D Human Body Capture in 3D Scenes", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200l1323/1BmLs4NuZAQ", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h155", "title": "SimPoE: Simulated Character Control for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h155/1yeLkLEshDa", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttp2013010039", "articleId": "13rRUwjoNym", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttp2013010066", "articleId": "13rRUwI5Uhv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesRh", "name": "ttp2013010052s.wmv", "location": "https://www.computer.org/csdl/api/v1/extra/ttp2013010052s.wmv", "extension": "wmv", "size": "21.6 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBOUxmQ", "title": "November/December", "year": "2008", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "14", "label": "November/December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwghd4W", "doi": "10.1109/TVCG.2008.179", "abstract": "Understanding the structure of microvasculature structures and their relationship to cells in biological tissue is an important and complex problem. Brain microvasculature in particular is known to play an important role in chronic diseases. However, these networks are only visible at the microscopic level and can span large volumes of tissue. Due to recent advances in microscopy, large volumes of data can be imaged at the resolution necessary to reconstruct these structures. Due to the dense and complex nature of microscopy data sets, it is important to limit the amount of information displayed. In this paper, we describe methods for encoding the unique structure of microvascular data, allowing researchers to selectively explore microvascular anatomy. We also identify the queries most useful to researchers studying microvascular and cellular relationships. By associating cellular structures with our microvascular framework, we allow researchers to explore interesting anatomical relationships in dense and complex data sets.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding the structure of microvasculature structures and their relationship to cells in biological tissue is an important and complex problem. Brain microvasculature in particular is known to play an important role in chronic diseases. However, these networks are only visible at the microscopic level and can span large volumes of tissue. Due to recent advances in microscopy, large volumes of data can be imaged at the resolution necessary to reconstruct these structures. Due to the dense and complex nature of microscopy data sets, it is important to limit the amount of information displayed. In this paper, we describe methods for encoding the unique structure of microvascular data, allowing researchers to selectively explore microvascular anatomy. We also identify the queries most useful to researchers studying microvascular and cellular relationships. By associating cellular structures with our microvascular framework, we allow researchers to explore interesting anatomical relationships in dense and complex data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding the structure of microvasculature structures and their relationship to cells in biological tissue is an important and complex problem. Brain microvasculature in particular is known to play an important role in chronic diseases. However, these networks are only visible at the microscopic level and can span large volumes of tissue. Due to recent advances in microscopy, large volumes of data can be imaged at the resolution necessary to reconstruct these structures. Due to the dense and complex nature of microscopy data sets, it is important to limit the amount of information displayed. In this paper, we describe methods for encoding the unique structure of microvascular data, allowing researchers to selectively explore microvascular anatomy. We also identify the queries most useful to researchers studying microvascular and cellular relationships. By associating cellular structures with our microvascular framework, we allow researchers to explore interesting anatomical relationships in dense and complex data sets.", "title": "Visualization of Cellular and Microvascular Relationships", "normalizedTitle": "Visualization of Cellular and Microvascular Relationships", "fno": "ttg2008061611", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Index Terms Vascular", "Microscopy", "Fibers", "Cells", "Complex Data" ], "authors": [ { "givenName": "David", "surname": "Mayerich", "fullName": "David Mayerich", "affiliation": "Texas A&M University", "__typename": "ArticleAuthorType" }, { "givenName": "Louise", "surname": "Abbott", "fullName": "Louise Abbott", "affiliation": "Texas A&M University", "__typename": "ArticleAuthorType" }, { "givenName": "John", "surname": "Keyser", "fullName": "John Keyser", "affiliation": "Texas A&M University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2008-11-01 00:00:00", "pubType": "trans", "pages": "1611-1618", "year": "2008", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sbec/2016/2132/0/07458995", "title": "Interaction of Degradable and Non-degradable Biomaterial with Brain Cells for Tissue Engineering and Cancer Treatment", "doi": null, "abstractUrl": "/proceedings-article/sbec/2016/07458995/12OmNrEL2Cq", "parentPublication": { "id": "proceedings/sbec/2016/2132/0", "title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1990/2083/0/00146378", "title": "Volume visualization in cell biology", "doi": null, "abstractUrl": "/proceedings-article/visual/1990/00146378/12OmNxvO02U", "parentPublication": { "id": "proceedings/visual/1990/2083/0", "title": "1990 First IEEE Conference on Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biovis/2012/4729/0/06378578", "title": "Volume visualization in serial electron microscopy using local variance", "doi": null, "abstractUrl": "/proceedings-article/biovis/2012/06378578/12OmNzVoBIv", "parentPublication": { "id": "proceedings/biovis/2012/4729/0", "title": "2012 IEEE Symposium on Biological Data Visualization (BioVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/04/mcg2013040050", "title": "Exploring the Connectome: Petascale Volume Visualization of Microscopy Data Streams", "doi": null, "abstractUrl": "/magazine/cg/2013/04/mcg2013040050/13rRUEgarDL", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v1165", "title": "Visualization of Fibrous and Thread-like Data", "doi": null, "abstractUrl": "/journal/tg/2006/05/v1165/13rRUwjXZS4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c302", "title": "Three Dimensional Fluorescence Microscopy Image Synthesis and Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c302/17D45WGGoLP", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08326724", "title": "Robust Tracing and Visualization of Heterogeneous Microvascular Networks", "doi": null, "abstractUrl": "/journal/tg/2019/04/08326724/181W9mA5cKk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2018/9306/0/08707387", "title": "Patch-Based Semantic Segmentation for Detecting Arterioles and Venules in Epifluorescence Imagery", "doi": null, "abstractUrl": "/proceedings-article/aipr/2018/08707387/19ZKZxZ4GHu", "parentPublication": { "id": "proceedings/aipr/2018/9306/0", "title": "2018 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2021/2471/0/09762193", "title": "Ensemble of Deep Learning Cascades for Segmentation of Blood Vessels in Confocal Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/aipr/2021/09762193/1CT96leIeRi", "parentPublication": { "id": "proceedings/aipr/2021/2471/0", "title": "2021 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933682", "title": "Graph-Assisted Visualization of Microvascular Networks", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933682/1fTgIZDrG9O", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2008061595", "articleId": "13rRUxOdD8d", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2008061739", "articleId": "13rRUxE04tv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgxC", "name": "ttg2008061611.wmv", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2008061611.wmv", "extension": "wmv", "size": "16.8 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwdL7lQ", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tm", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1EcpaqQI25y", "doi": "10.1109/TMC.2022.3182876", "abstract": "Federated Learning (FL) is a new distributed machine learning (ML) approach which enables thousands of mobile devices to collaboratively train artificial intelligence (AI) models using local data without compromising user privacy. Although FL represents a promising computing paradigm, such training process can not be fully realized without an appropriate economic mechanism that incentivizes the participation of heterogeneous clients. This work targets social cost minimization, and studies the incentive mechanism design in FL through a procurement auction. Different from existing literature, we consider a practical scenario of FL where clients are selected and scheduled at different global iterations to guarantee the completion of the FL job, and capture the distinct feature of FL that the number of global iterations is determined by the local accuracy of all participants to balance between computation and communication. Our auction framework <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL}$_Z</tex-math></inline-formula> first decomposes the social cost minimization problem into a series of winner determination problems (WDPs) based on the number of global iterations. To solve each WDP, <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL}$_Z</tex-math></inline-formula> invokes a greedy algorithm to determine the winners, and a payment algorithm for computing remuneration to winners. Finally, <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL}$_Z</tex-math></inline-formula> returns the best solution among all WDPs. We carried out theoretical analysis to prove that <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL}$_Z</tex-math></inline-formula> is truthful, individual rational, computationally efficient, and achieves a near-optimal social cost. We further extend our model to consider multiple FL jobs with corresponding budgets and propose another efficient algorithm <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL-M}$_Z</tex-math></inline-formula> to solve the extended problem. We conduct large-scale simulations based on the real-world data and testbed experiments by adopting FL frameworks FAVOR and CoCoA. Simulation and experiment results show that both <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$A_{FL-M}$_Z</tex-math></inline-formula> can reduce the social cost by up to 55&#x0025; compared with state-of-the-art algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Federated Learning (FL) is a new distributed machine learning (ML) approach which enables thousands of mobile devices to collaboratively train artificial intelligence (AI) models using local data without compromising user privacy. Although FL represents a promising computing paradigm, such training process can not be fully realized without an appropriate economic mechanism that incentivizes the participation of heterogeneous clients. This work targets social cost minimization, and studies the incentive mechanism design in FL through a procurement auction. Different from existing literature, we consider a practical scenario of FL where clients are selected and scheduled at different global iterations to guarantee the completion of the FL job, and capture the distinct feature of FL that the number of global iterations is determined by the local accuracy of all participants to balance between computation and communication. Our auction framework <inline-formula><tex-math notation=\"LaTeX\">$A_{FL}$</tex-math></inline-formula> first decomposes the social cost minimization problem into a series of winner determination problems (WDPs) based on the number of global iterations. To solve each WDP, <inline-formula><tex-math notation=\"LaTeX\">$A_{FL}$</tex-math></inline-formula> invokes a greedy algorithm to determine the winners, and a payment algorithm for computing remuneration to winners. Finally, <inline-formula><tex-math notation=\"LaTeX\">$A_{FL}$</tex-math></inline-formula> returns the best solution among all WDPs. We carried out theoretical analysis to prove that <inline-formula><tex-math notation=\"LaTeX\">$A_{FL}$</tex-math></inline-formula> is truthful, individual rational, computationally efficient, and achieves a near-optimal social cost. We further extend our model to consider multiple FL jobs with corresponding budgets and propose another efficient algorithm <inline-formula><tex-math notation=\"LaTeX\">$A_{FL-M}$</tex-math></inline-formula> to solve the extended problem. We conduct large-scale simulations based on the real-world data and testbed experiments by adopting FL frameworks FAVOR and CoCoA. Simulation and experiment results show that both <inline-formula><tex-math notation=\"LaTeX\">$A_{FL}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$A_{FL-M}$</tex-math></inline-formula> can reduce the social cost by up to 55&#x0025; compared with state-of-the-art algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated Learning (FL) is a new distributed machine learning (ML) approach which enables thousands of mobile devices to collaboratively train artificial intelligence (AI) models using local data without compromising user privacy. Although FL represents a promising computing paradigm, such training process can not be fully realized without an appropriate economic mechanism that incentivizes the participation of heterogeneous clients. This work targets social cost minimization, and studies the incentive mechanism design in FL through a procurement auction. Different from existing literature, we consider a practical scenario of FL where clients are selected and scheduled at different global iterations to guarantee the completion of the FL job, and capture the distinct feature of FL that the number of global iterations is determined by the local accuracy of all participants to balance between computation and communication. Our auction framework - first decomposes the social cost minimization problem into a series of winner determination problems (WDPs) based on the number of global iterations. To solve each WDP, - invokes a greedy algorithm to determine the winners, and a payment algorithm for computing remuneration to winners. Finally, - returns the best solution among all WDPs. We carried out theoretical analysis to prove that - is truthful, individual rational, computationally efficient, and achieves a near-optimal social cost. We further extend our model to consider multiple FL jobs with corresponding budgets and propose another efficient algorithm - to solve the extended problem. We conduct large-scale simulations based on the real-world data and testbed experiments by adopting FL frameworks FAVOR and CoCoA. Simulation and experiment results show that both - and - can reduce the social cost by up to 55% compared with state-of-the-art algorithms.", "title": "An Incentive Auction for Heterogeneous Client Selection in Federated Learning", "normalizedTitle": "An Incentive Auction for Heterogeneous Client Selection in Federated Learning", "fno": "09795863", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Costs", "Computational Modeling", "Biological System Modeling", "Training", "Schedules", "Mobile Handsets", "Servers", "Federated Learning", "Incentive Mechanism", "Auction" ], "authors": [ { "givenName": "Jinlong", "surname": "Pang", "fullName": "Jinlong Pang", "affiliation": "Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jieling", "surname": "Yu", "fullName": "Jieling Yu", "affiliation": "Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ruiting", "surname": "Zhou", "fullName": "Ruiting Zhou", "affiliation": "Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "John C.S.", "surname": "Lui", "fullName": "John C.S. Lui", "affiliation": "The Chinese University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/bd/5555/01/09809786", "title": "MarS-FL: Enabling Competitors to Collaborate in Federated Learning", "doi": null, "abstractUrl": "/journal/bd/5555/01/09809786/1EzDKm6BgSQ", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10024795", "title": "PILE: Robust Privacy-Preserving Federated Learning via Verifiable Perturbations", "doi": null, "abstractUrl": "/journal/tq/5555/01/10024795/1KaBpoEUnK0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10025677", "title": "Privacy-Enhanced Decentralized Federated Learning at Dynamic Edge", "doi": null, "abstractUrl": "/journal/tc/5555/01/10025677/1KdUSqKKwAo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10093038", "title": "Privacy-Preserving and Byzantine-Robust Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/10093038/1M61YImr8dO", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/10094013", "title": "Enhancing Federated Learning With Server-Side Unlabeled Data by Adaptive Client and Data Selection", "doi": null, "abstractUrl": "/journal/tm/5555/01/10094013/1M80GME8wjC", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/03/09492755", "title": "Multi-Task Federated Learning for Personalised Deep Neural Networks in Edge Computing", "doi": null, "abstractUrl": "/journal/td/2022/03/09492755/1vq0IneiQA8", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09664296", "title": "Blockchain Assisted Decentralized Federated Learning (BLADE-FL): Performance Analysis and Resource Allocation", "doi": null, "abstractUrl": "/journal/td/2022/10/09664296/1zHDLnUSPgA", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09647969", "title": "Flexible Clustered Federated Learning for Client-Level Data Distribution Shift", "doi": null, "abstractUrl": "/journal/td/2022/11/09647969/1ziKk2OmMkU", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09650669", "title": "LoMar: A Local Defense Against Poisoning Attack on Federated Learning", "doi": null, "abstractUrl": "/journal/tq/2023/01/09650669/1zkp2xp5tWU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2023/06/09656631", "title": "Joint Client Selection and Bandwidth Allocation Algorithm for Federated Learning", "doi": null, "abstractUrl": "/journal/tm/2023/06/09656631/1zummu4KtB6", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09795895", "articleId": "1EcpagqWBaM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09796588", "articleId": "1EexjzrGrq8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1HWLN6aNgDS", "doi": "10.1109/TDSC.2022.3218570", "abstract": "Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one data hider and cannot resist the single point of failure. Besides, the image security is determined by one party, rather than multiple parties. Thus, it is valuable to design RDH-EI schemes with multiple data hiders for stronger security. In this paper, we propose a multiple data hiders-based RDH-EI scheme using a new secret sharing technique. First, we devise an <inline-formula><tex-math notation=\"LaTeX\">Z_$(r,n)$_Z</tex-math></inline-formula>-threshold <inline-formula><tex-math notation=\"LaTeX\">Z_$(r\\leq n)$_Z</tex-math></inline-formula> matrix-based secret sharing (MSS) using matrix theory, and theoretically verify its efficacy and security properties. Then, using the MSS, we propose an <inline-formula><tex-math notation=\"LaTeX\">Z_$(r,n)$_Z</tex-math></inline-formula>-threshold RDH-EI scheme called MSS-RDHEI. The content owner encrypts an image to be <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula> encrypted images using the MSS with an encryption key, and outsources these encrypted images to <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula> data hiders. Each data hider can embed some data, e.g., copyright and identification information, into the encrypted image for the purposes of storage, management, or other processing, and these data can also be losslessly extracted. An authorized receiver can recover the confidential image from <inline-formula><tex-math notation=\"LaTeX\">Z_$r$_Z</tex-math></inline-formula> encrypted images. By designing, our MSS-RDHEI scheme can withstand <inline-formula><tex-math notation=\"LaTeX\">Z_$n-r$_Z</tex-math></inline-formula> points of failure. Experimental results show that it ensures the image content confidentiality and achieves a much larger embedding capacity than state-of-the-art schemes.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one data hider and cannot resist the single point of failure. Besides, the image security is determined by one party, rather than multiple parties. Thus, it is valuable to design RDH-EI schemes with multiple data hiders for stronger security. In this paper, we propose a multiple data hiders-based RDH-EI scheme using a new secret sharing technique. First, we devise an <inline-formula><tex-math notation=\"LaTeX\">$(r,n)$</tex-math></inline-formula>-threshold <inline-formula><tex-math notation=\"LaTeX\">$(r\\leq n)$</tex-math></inline-formula> matrix-based secret sharing (MSS) using matrix theory, and theoretically verify its efficacy and security properties. Then, using the MSS, we propose an <inline-formula><tex-math notation=\"LaTeX\">$(r,n)$</tex-math></inline-formula>-threshold RDH-EI scheme called MSS-RDHEI. The content owner encrypts an image to be <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula> encrypted images using the MSS with an encryption key, and outsources these encrypted images to <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula> data hiders. Each data hider can embed some data, e.g., copyright and identification information, into the encrypted image for the purposes of storage, management, or other processing, and these data can also be losslessly extracted. An authorized receiver can recover the confidential image from <inline-formula><tex-math notation=\"LaTeX\">$r$</tex-math></inline-formula> encrypted images. By designing, our MSS-RDHEI scheme can withstand <inline-formula><tex-math notation=\"LaTeX\">$n-r$</tex-math></inline-formula> points of failure. Experimental results show that it ensures the image content confidentiality and achieves a much larger embedding capacity than state-of-the-art schemes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional schemes for reversible data hiding in encrypted images (RDH-EI) focus on one data hider and cannot resist the single point of failure. Besides, the image security is determined by one party, rather than multiple parties. Thus, it is valuable to design RDH-EI schemes with multiple data hiders for stronger security. In this paper, we propose a multiple data hiders-based RDH-EI scheme using a new secret sharing technique. First, we devise an --threshold - matrix-based secret sharing (MSS) using matrix theory, and theoretically verify its efficacy and security properties. Then, using the MSS, we propose an --threshold RDH-EI scheme called MSS-RDHEI. The content owner encrypts an image to be - encrypted images using the MSS with an encryption key, and outsources these encrypted images to - data hiders. Each data hider can embed some data, e.g., copyright and identification information, into the encrypted image for the purposes of storage, management, or other processing, and these data can also be losslessly extracted. An authorized receiver can recover the confidential image from - encrypted images. By designing, our MSS-RDHEI scheme can withstand - points of failure. Experimental results show that it ensures the image content confidentiality and achieves a much larger embedding capacity than state-of-the-art schemes.", "title": "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", "normalizedTitle": "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", "fno": "09933877", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Cryptography", "Biomedical Imaging", "Cloud Computing", "Servers", "Internet Of Things", "Redundancy", "Receivers", "Encrypted Image", "Information Processing In Encrypted Domain", "Multiple Data Hiders", "Reversible Data Hiding", "Secret Sharing" ], "authors": [ { "givenName": "Zhongyun", "surname": "Hua", "fullName": "Zhongyun Hua", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yanxiang", "surname": "Wang", "fullName": "Yanxiang Wang", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuang", "surname": "Yi", "fullName": "Shuang Yi", "affiliation": "Engineering Research Center of Forensic Science, Chongqing Education Committee, College of Criminal Investigation, Southwest University of Political Science and Law, Chongqing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yifeng", "surname": "Zheng", "fullName": "Yifeng Zheng", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xingyu", "surname": "Liu", "fullName": "Xingyu Liu", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yongyong", "surname": "Chen", "fullName": "Yongyong Chen", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinpeng", "surname": "Zhang", "fullName": "Xinpeng Zhang", "affiliation": "School of Computer Science, Fudan University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "1-18", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tq/5555/01/09816369", "title": "Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT", "doi": null, "abstractUrl": "/journal/tq/5555/01/09816369/1EMV8T2kRFu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09842386", "title": "Verifiable Homomorphic Secret Sharing for Low Degree Polynomials", "doi": null, "abstractUrl": "/journal/tq/5555/01/09842386/1FlM51CnLeo", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09893402", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "doi": null, "abstractUrl": "/journal/tk/5555/01/09893402/1GGLdY0vH0c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/5555/01/09987649", "title": "Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health", "doi": null, "abstractUrl": "/journal/cc/5555/01/09987649/1J7RK3HdSpO", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/qe/2022/01/10012045", "title": "Quantum Resources Required to Block-Encode a Matrix of Classical Data", "doi": null, "abstractUrl": "/journal/qe/2022/01/10012045/1JNmKsSq2CQ", "parentPublication": { "id": "trans/qe", "title": "IEEE Transactions on Quantum Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10056861", "title": "I <inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula> RNN: An Incremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification", "doi": null, "abstractUrl": "/journal/tq/5555/01/10056861/1La0zrgaFyg", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/01/08826379", "title": "Achieving One-Round Password-Based Authenticated Key Exchange over Lattices", "doi": null, "abstractUrl": "/journal/sc/2022/01/08826379/1d6xzconoJO", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/05/09347732", "title": "Data Access Control in Cloud Computing: Flexible and Receiver Extendable", "doi": null, "abstractUrl": "/journal/sc/2022/05/09347732/1qWHor9uiRy", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/04/09381688", "title": "Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication", "doi": null, "abstractUrl": "/journal/tc/2022/04/09381688/1s4kZAMaGwE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2021/06/09472871", "title": "Single-Forking of Coded Subtasks for Straggler Mitigation", "doi": null, "abstractUrl": "/journal/nt/2021/06/09472871/1uUtrhhWh5C", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09933631", "articleId": "1HVsCZtr0ty", "__typename": "AdjacentArticleType" }, "next": { "fno": "09935312", "articleId": "1HYqN44L65G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1IHMPhf3uW4", "doi": "10.1109/TPAMI.2022.3225418", "abstract": "This paper presents a generic probabilistic framework for estimating the statistical dependency and finding the anatomical correspondences among an arbitrary number of medical images. The method builds on a novel formulation of the <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula>-dimensional joint intensity distribution by representing the common anatomy as latent variables and estimating the appearance model with nonparametric estimators. Through connection to maximum likelihood and the expectation-maximization algorithm, an information-theoretic metric called <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {X}$_Z</tex-math></inline-formula>-metric and a co-registration algorithm named <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {X}$_Z</tex-math></inline-formula>-CoReg are induced, allowing groupwise registration of the <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> observed images with computational complexity of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {O}(N)$_Z</tex-math></inline-formula>. Moreover, the method naturally extends for a weakly-supervised scenario where anatomical labels of certain images are provided. This leads to a combined-computing framework implemented with deep learning, which performs registration and segmentation simultaneously and collaboratively in an end-to-end fashion. Extensive experiments were conducted to demonstrate the versatility and applicability of our model, including multimodal groupwise registration, motion correction for dynamic contrast enhanced magnetic resonance images, and deep combined computing for multimodal medical images. Results show the superiority of our method in various applications in terms of both accuracy and efficiency, highlighting the advantage of the proposed representation of the imaging process.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a generic probabilistic framework for estimating the statistical dependency and finding the anatomical correspondences among an arbitrary number of medical images. The method builds on a novel formulation of the <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math></inline-formula>-dimensional joint intensity distribution by representing the common anatomy as latent variables and estimating the appearance model with nonparametric estimators. Through connection to maximum likelihood and the expectation-maximization algorithm, an information-theoretic metric called <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {X}$</tex-math></inline-formula>-metric and a co-registration algorithm named <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {X}$</tex-math></inline-formula>-CoReg are induced, allowing groupwise registration of the <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math></inline-formula> observed images with computational complexity of <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {O}(N)$</tex-math></inline-formula>. Moreover, the method naturally extends for a weakly-supervised scenario where anatomical labels of certain images are provided. This leads to a combined-computing framework implemented with deep learning, which performs registration and segmentation simultaneously and collaboratively in an end-to-end fashion. Extensive experiments were conducted to demonstrate the versatility and applicability of our model, including multimodal groupwise registration, motion correction for dynamic contrast enhanced magnetic resonance images, and deep combined computing for multimodal medical images. Results show the superiority of our method in various applications in terms of both accuracy and efficiency, highlighting the advantage of the proposed representation of the imaging process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a generic probabilistic framework for estimating the statistical dependency and finding the anatomical correspondences among an arbitrary number of medical images. The method builds on a novel formulation of the --dimensional joint intensity distribution by representing the common anatomy as latent variables and estimating the appearance model with nonparametric estimators. Through connection to maximum likelihood and the expectation-maximization algorithm, an information-theoretic metric called --metric and a co-registration algorithm named --CoReg are induced, allowing groupwise registration of the - observed images with computational complexity of -. Moreover, the method naturally extends for a weakly-supervised scenario where anatomical labels of certain images are provided. This leads to a combined-computing framework implemented with deep learning, which performs registration and segmentation simultaneously and collaboratively in an end-to-end fashion. Extensive experiments were conducted to demonstrate the versatility and applicability of our model, including multimodal groupwise registration, motion correction for dynamic contrast enhanced magnetic resonance images, and deep combined computing for multimodal medical images. Results show the superiority of our method in various applications in terms of both accuracy and efficiency, highlighting the advantage of the proposed representation of the imaging process.", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {X}$_Z</tex-math></inline-formula>-Metric: An N-Dimensional Information-Theoretic Framework for Groupwise Registration and Deep Combined Computing", "normalizedTitle": "--Metric: An N-Dimensional Information-Theoretic Framework for Groupwise Registration and Deep Combined Computing", "fno": "09965747", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Maximum Likelihood Estimation", "Information Theory", "Image Segmentation", "Computational Modeling", "Measurement", "Entropy", "Biomedical Imaging", "Combined Computing", "Groupwise Registration", "Information Theory", "Maximum Likelihood", "Segmentation" ], "authors": [ { "givenName": "Xinzhe", "surname": "Luo", "fullName": "Xinzhe Luo", "affiliation": "School of Data Science, Fudan University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiahai", "surname": "Zhuang", "fullName": "Xiahai Zhuang", "affiliation": "School of Data Science, Fudan University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-18", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/5555/01/09860045", "title": "Searching Personalized <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-wing in Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09860045/1FUYx502pJC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09893402", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "doi": null, "abstractUrl": "/journal/tk/5555/01/09893402/1GGLdY0vH0c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09894070", "title": "mCore <inline-formula><tex-math notation=\"LaTeX\">Z_$+$_Z</tex-math></inline-formula>: A Real-Time Design Achieving <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim 500~\\mu$_Z</tex-math></inline-formula> s Scheduling for 5G MU-MIMO Systems", "doi": null, "abstractUrl": "/journal/tm/5555/01/09894070/1GIqn6CnOY8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09914660", "title": "(<inline-formula><tex-math notation=\"LaTeX\">Z_$k,\\alpha$_Z</tex-math></inline-formula>)-Coverage for RIS-Aided Mmwave Directional Communication", "doi": null, "abstractUrl": "/journal/tm/5555/01/09914660/1Hmg6qLDz68", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09944955", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$kt$_Z</tex-math></inline-formula>-Safety: Graph Release via <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Anonymity and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>-Closeness", "doi": null, "abstractUrl": "/journal/tk/5555/01/09944955/1IbM9dSufYI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/09996549", "title": "Non-Graph Data Clustering via <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {O}(n)$_Z</tex-math></inline-formula> Bipartite Graph Convolution", "doi": null, "abstractUrl": "/journal/tp/5555/01/09996549/1Jju3GyUgog", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10053638", "title": "A 0.0043-mm<inline-formula> <tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math> </inline-formula> 0.085-<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\mu$_Z</tex-math> </inline-formula>W/MHz Relaxation Oscillator Using Charge-Prestored Asymmetric Swings R-RC Network", "doi": null, "abstractUrl": "/journal/si/5555/01/10053638/1L1HYpMHqmY", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10078319", "title": "Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> Community Similarity Search Over Large-Scale Road Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/10078319/1LIN5YpM6HK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/5555/01/10093117", "title": "An Efficient Algorithm for Hamiltonian Path Embedding of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-Cubes under the Partitioned Edge Fault Model", "doi": null, "abstractUrl": "/journal/td/5555/01/10093117/1M61XDsMpB6", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10108909", "title": "A 0.3-V 8.5-<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\mu $_Z</tex-math> </inline-formula>A Bulk-Driven OTA", "doi": null, "abstractUrl": "/journal/si/5555/01/10108909/1MDGl5NnAmA", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09965744", "articleId": "1IHMOPipYYg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09966835", "articleId": "1IIYh4Cs9na", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IIYhC0Sk7K", "name": "ttp555501-09965747s1-supp1-3225418.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-09965747s1-supp1-3225418.pdf", "extension": "pdf", "size": "4.84 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1M61YImr8dO", "doi": "10.1109/TDSC.2023.3264697", "abstract": "Federated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications. Since the model parameters can leak information about the training datasets, it is necessary to preserve the privacy of the FL participants&#x0027; local models. Furthermore, FL is vulnerable to poisoning attacks which can significantly decrease the model utility. To settle the above issues, we propose a privacy-preserving and Byzantine-robust FL scheme <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi _{\\rm{P2Brofl}}$_Z</tex-math></inline-formula> that maintains robustness in the presence of poisoning attacks and preserves the privacy of local models simultaneously. Specifically, <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi _{\\rm{P2Brofl}}$_Z</tex-math></inline-formula> leverages three-party computation (3PC) to securely achieve a Byzantine-robust aggregation method. To improve the efficiency of privacy-preserving local model selection and aggregation, we propose a maliciously secure top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> protocol <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi _{\\rm{top}-k}$_Z</tex-math></inline-formula> that has low communication overhead. Moreover, we present an efficient maliciously secure shuffling protocol <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi _{\\rm{shuffle}}$_Z</tex-math></inline-formula> since secure shuffling is necessary for our secure top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> protocol. The security proof of the scheme is given and experiments on real-world datasets are conducted in this paper. When the proportion of Byzantine participants is 50&#x0025;, the error rate of the model only increases by 1.05&#x0025; while it increases by 23.78&#x0025; without using our protection.", "abstracts": [ { "abstractType": "Regular", "content": "Federated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications. Since the model parameters can leak information about the training datasets, it is necessary to preserve the privacy of the FL participants&#x0027; local models. Furthermore, FL is vulnerable to poisoning attacks which can significantly decrease the model utility. To settle the above issues, we propose a privacy-preserving and Byzantine-robust FL scheme <inline-formula><tex-math notation=\"LaTeX\">$\\Pi _{\\rm{P2Brofl}}$</tex-math></inline-formula> that maintains robustness in the presence of poisoning attacks and preserves the privacy of local models simultaneously. Specifically, <inline-formula><tex-math notation=\"LaTeX\">$\\Pi _{\\rm{P2Brofl}}$</tex-math></inline-formula> leverages three-party computation (3PC) to securely achieve a Byzantine-robust aggregation method. To improve the efficiency of privacy-preserving local model selection and aggregation, we propose a maliciously secure top-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> protocol <inline-formula><tex-math notation=\"LaTeX\">$\\Pi _{\\rm{top}-k}$</tex-math></inline-formula> that has low communication overhead. Moreover, we present an efficient maliciously secure shuffling protocol <inline-formula><tex-math notation=\"LaTeX\">$\\Pi _{\\rm{shuffle}}$</tex-math></inline-formula> since secure shuffling is necessary for our secure top-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> protocol. The security proof of the scheme is given and experiments on real-world datasets are conducted in this paper. When the proportion of Byzantine participants is 50&#x0025;, the error rate of the model only increases by 1.05&#x0025; while it increases by 23.78&#x0025; without using our protection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications. Since the model parameters can leak information about the training datasets, it is necessary to preserve the privacy of the FL participants' local models. Furthermore, FL is vulnerable to poisoning attacks which can significantly decrease the model utility. To settle the above issues, we propose a privacy-preserving and Byzantine-robust FL scheme - that maintains robustness in the presence of poisoning attacks and preserves the privacy of local models simultaneously. Specifically, - leverages three-party computation (3PC) to securely achieve a Byzantine-robust aggregation method. To improve the efficiency of privacy-preserving local model selection and aggregation, we propose a maliciously secure top-- protocol - that has low communication overhead. Moreover, we present an efficient maliciously secure shuffling protocol - since secure shuffling is necessary for our secure top-- protocol. The security proof of the scheme is given and experiments on real-world datasets are conducted in this paper. When the proportion of Byzantine participants is 50%, the error rate of the model only increases by 1.05% while it increases by 23.78% without using our protection.", "title": "Privacy-Preserving and Byzantine-Robust Federated Learning", "normalizedTitle": "Privacy-Preserving and Byzantine-Robust Federated Learning", "fno": "10093038", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Computational Modeling", "Privacy", "Servers", "Protocols", "Data Models", "Cryptography", "Arithmetic", "Federated Learning", "Three Party Computation 3 PC", "Privacy Preservation", "Poisoning Attacks", "Byzantine Robust" ], "authors": [ { "givenName": "Caiqin", "surname": "Dong", "fullName": "Caiqin Dong", "affiliation": "College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jian", "surname": "Weng", "fullName": "Jian Weng", "affiliation": "College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ming", "surname": "Li", "fullName": "Ming Li", "affiliation": "College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jia-Nan", "surname": "Liu", "fullName": "Jia-Nan Liu", "affiliation": "School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiquan", "surname": "Liu", "fullName": "Zhiquan Liu", "affiliation": "College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yudan", "surname": "Cheng", "fullName": "Yudan Cheng", "affiliation": "College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shui", "surname": "Yu", "fullName": "Shui Yu", "affiliation": "School of Computer Science, University of Technology Sydney, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-16", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tq/5555/01/09816369", "title": "Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT", "doi": null, "abstractUrl": "/journal/tq/5555/01/09816369/1EMV8T2kRFu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09887909", "title": "TDFL: Truth Discovery Based Byzantine Robust Federated Learning", "doi": null, "abstractUrl": "/journal/td/2022/12/09887909/1GBRpr0IWS4", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/09925109", "title": "Privacy-Preserving and Publicly Verifiable Matrix Multiplication", "doi": null, "abstractUrl": "/journal/sc/5555/01/09925109/1HBHUwyHb6o", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/06/09927425", "title": "A Privacy-Preserving Comparison Protocol", "doi": null, "abstractUrl": "/journal/tc/2023/06/09927425/1HJuLchrDsA", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09935302", "title": "Hercules: Boosting the Performance of Privacy-preserving Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/09935302/1HYqNfSfohW", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10024795", "title": "PILE: Robust Privacy-Preserving Federated Learning via Verifiable Perturbations", "doi": null, "abstractUrl": "/journal/tq/5555/01/10024795/1KaBpoEUnK0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10025677", "title": "Privacy-Enhanced Decentralized Federated Learning at Dynamic Edge", "doi": null, "abstractUrl": "/journal/tc/5555/01/10025677/1KdUSqKKwAo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2021/04/08756044", "title": "Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter", "doi": null, "abstractUrl": "/journal/ec/2021/04/08756044/1bpYNh1btQs", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/03/09219246", "title": "Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions", "doi": null, "abstractUrl": "/journal/tq/2022/03/09219246/1nMMo03q2zu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09615013", "title": "Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering", "doi": null, "abstractUrl": "/journal/tq/2023/01/09615013/1yyhBtMPBss", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10093112", "articleId": "1M61YzJ5EU8", "__typename": "AdjacentArticleType" }, "next": { "fno": "10093123", "articleId": "1M61YQ12rHG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1z294Ye074c", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tm", "pubType": "journal", "volume": "21", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1l3uixrN1eg", "doi": "10.1109/TMC.2020.3005737", "abstract": "This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem <inline-formula><tex-math notation=\"LaTeX\">Z_$A$_Z</tex-math></inline-formula>) through ever-changing network conditions (problem <inline-formula><tex-math notation=\"LaTeX\">Z_$B$_Z</tex-math></inline-formula>) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem <inline-formula><tex-math notation=\"LaTeX\">Z_$A|B$_Z</tex-math></inline-formula>). We introduce two stochastic models to create sequences of QoS-constrained messages (<inline-formula><tex-math notation=\"LaTeX\">Z_$A$_Z</tex-math></inline-formula>) and to create ever-changing network conditions (<inline-formula><tex-math notation=\"LaTeX\">Z_$B$_Z</tex-math></inline-formula>). In sequence, we sketch a control loop to shape <inline-formula><tex-math notation=\"LaTeX\">Z_$A$_Z</tex-math></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">Z_$B\\;$_Z</tex-math></inline-formula> to test our hypothesis using model <inline-formula><tex-math notation=\"LaTeX\">Z_$A|B$_Z</tex-math></inline-formula>, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems <inline-formula><tex-math notation=\"LaTeX\">Z_$A$_Z</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">Z_$B$_Z</tex-math></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">Z_$A|B$_Z</tex-math></inline-formula>.", "abstracts": [ { "abstractType": "Regular", "content": "This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem <inline-formula><tex-math notation=\"LaTeX\">$A$</tex-math><alternatives><mml:math><mml:mi>A</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq1-3005737.gif\"/></alternatives></inline-formula>) through ever-changing network conditions (problem <inline-formula><tex-math notation=\"LaTeX\">$B$</tex-math><alternatives><mml:math><mml:mi>B</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq2-3005737.gif\"/></alternatives></inline-formula>) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem <inline-formula><tex-math notation=\"LaTeX\">$A|B$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>A</mml:mi><mml:mo>|</mml:mo><mml:mi>B</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq3-3005737.gif\"/></alternatives></inline-formula>). We introduce two stochastic models to create sequences of QoS-constrained messages (<inline-formula><tex-math notation=\"LaTeX\">$A$</tex-math><alternatives><mml:math><mml:mi>A</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq4-3005737.gif\"/></alternatives></inline-formula>) and to create ever-changing network conditions (<inline-formula><tex-math notation=\"LaTeX\">$B$</tex-math><alternatives><mml:math><mml:mi>B</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq5-3005737.gif\"/></alternatives></inline-formula>). In sequence, we sketch a control loop to shape <inline-formula><tex-math notation=\"LaTeX\">$A$</tex-math><alternatives><mml:math><mml:mi>A</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq6-3005737.gif\"/></alternatives></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">$B\\;$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>B</mml:mi><mml:mspace width=\"0.277778em\"/></mml:mrow></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq7-3005737.gif\"/></alternatives></inline-formula> to test our hypothesis using model <inline-formula><tex-math notation=\"LaTeX\">$A|B$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>A</mml:mi><mml:mo>|</mml:mo><mml:mi>B</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq8-3005737.gif\"/></alternatives></inline-formula>, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems <inline-formula><tex-math notation=\"LaTeX\">$A$</tex-math><alternatives><mml:math><mml:mi>A</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq9-3005737.gif\"/></alternatives></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">$B$</tex-math><alternatives><mml:math><mml:mi>B</mml:mi></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq10-3005737.gif\"/></alternatives></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">$A|B$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>A</mml:mi><mml:mo>|</mml:mo><mml:mi>B</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"rigolinferreiralopes-ieq11-3005737.gif\"/></alternatives></inline-formula>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper introduces a hierarchy of queues complementing each other to handle ever-changing communication scenarios in tactical networks. The first queue stores the QoS-constrained messages from command and control systems. These messages are fragmented into IP packets, which are stored in a queue of packets (second) to be sent to the radio buffer (third), which is a queue with limited space therefore, open to overflow. We start with the hypothesis that these three queues can handle ever-changing user(s) data flows (problem -) through ever-changing network conditions (problem -) using cross-layer information exchange, such as buffer occupancy, data rate, queue size and latency (problem -). We introduce two stochastic models to create sequences of QoS-constrained messages (-) and to create ever-changing network conditions (-). In sequence, we sketch a control loop to shape - to - to test our hypothesis using model -, which defines enforcement points at the incoming/outgoing chains of the system together with a control plane. Then, we discuss experimental results in a network with VHF radios using data flows that overflows the radio buffer over ever-changing data rate patterns. We discuss quantitative results showing the performance and limitations of our solutions for problems -, -, and -.", "title": "Queuing Over Ever-Changing Communication Scenarios in Tactical Networks", "normalizedTitle": "Queuing Over Ever-Changing Communication Scenarios in Tactical Networks", "fno": "09128029", "hasPdf": true, "idPrefix": "tm", "keywords": [ "IP Networks", "Military Communication", "Quality Of Service", "Queueing Theory", "Telecommunication Traffic", "Problem AA", "Ever Changing Network Conditions", "Problem BB", "Buffer Occupancy", "Queue Size", "Qo S Constrained Messages", "Radio Buffer", "Data Rate Patterns", "Communication Scenarios", "Tactical Networks", "Queue Stores", "Command", "Control Systems", "IP Packets", "Ever Changing User", "Cross Layer Information Exchange", "Quality Of Service", "Data Models", "Mobile Computing", "Command And Control Systems", "Taxonomy", "Markov Processes", "Ever Changing Communication Scenarios", "Tactical Networks", "Hierarchical Queuing", "Robust Control Loop" ], "authors": [ { "givenName": "Roberto Rigolin F.", "surname": "Lopes", "fullName": "Roberto Rigolin F. Lopes", "affiliation": "Communications Systems Department, Fraunhofer FKIE, Bonn, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Pooja Hanavadi", "surname": "Balaraju", "fullName": "Pooja Hanavadi Balaraju", "affiliation": "Communication and Distributed Systems Institute, RWTH Aachen University, Aachen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Paulo H. L.", "surname": "Rettore", "fullName": "Paulo H. L. Rettore", "affiliation": "Communications Systems Department, Fraunhofer FKIE, Bonn, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Sevenich", "fullName": "Peter Sevenich", "affiliation": "Communications Systems Department, Fraunhofer FKIE, Bonn, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "291-305", "year": "2022", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2020/02/08624452", "title": "A Reaction-Based Model of the State Space of Chemical Reaction Systems Enables Efficient Simulations", "doi": null, "abstractUrl": "/journal/tb/2020/02/08624452/17D45Xh13sh", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09681238", "title": "M<sup>2</sup>: Mixed Models With Preferences, Popularities and Transitions for Next-Basket Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/04/09681238/1A8c5TwZjtS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/05/08910380", "title": "Alignment-Free Sequence Comparison With Multiple k Values", "doi": null, "abstractUrl": "/journal/tb/2021/05/08910380/1faprrA6gAo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/02/09063514", "title": "Maximizing the Utility in Location-Based Mobile Advertising", "doi": null, "abstractUrl": "/journal/tk/2022/02/09063514/1iUHKIP3UHu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09110776", "title": "Accelerated Variance Reduction Stochastic ADMM for Large-Scale Machine Learning", "doi": null, "abstractUrl": "/journal/tp/2021/12/09110776/1kuDlRSAfuw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09151362", "title": "A Hybrid Data Cleaning Framework Using Markov Logic Networks", "doi": null, "abstractUrl": "/journal/tk/2022/05/09151362/1lPChVesdUs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09134823", "title": "An Anonymous Authentication System for Pay-As-You-Go Cloud Computing<inline-formula><tex-math notation=\"LaTeX\">Z_$^*$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tq/2022/02/09134823/1lgLxv3Unm0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/05/09197644", "title": "Probabilistic Preference Planning Problem for Markov Decision Processes", "doi": null, "abstractUrl": "/journal/ts/2022/05/09197644/1n8WP0GLDHi", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09316235", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {HAM}}$_Z</tex-math></inline-formula>: Hybrid Associations Models for Sequential Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/10/09316235/1qaz7C1V5pm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09573484", "title": "Adaptive Temporal Difference Learning With Linear Function Approximation", "doi": null, "abstractUrl": "/journal/tp/2022/12/09573484/1xH5DVmWYP6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09123603", "articleId": "1kTwILi3pHa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09121767", "articleId": "1kMT5Ac1Beg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1EOzVCQBwyI", "title": "Aug.", "year": "2022", "issueNum": "08", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nxQ8MeuyY0", "doi": "10.1109/TKDE.2020.3028025", "abstract": "Periodicity is a frequently happening phenomenon for social interactions in temporal networks. Mining periodic communities are essential to understanding periodic group behaviors in temporal networks. Unfortunately, most previous studies for community mining in temporal networks ignore the periodic patterns of communities. In this paper, we study the problem of seeking periodic communities in a temporal network, where each edge is associated with a set of timestamps. We propose novel models, including <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-clique, that represent periodic communities in temporal networks. Specifically, a <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core (or <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-clique) is a <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core (or clique with size larger than <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>) that appears at least <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula> times periodically in the temporal graph. The problem of searching periodic core is efficient but the resulting communities may be not enough cohesive; the problem of enumerating all periodic cliques is not efficient (NP-hard) but the resulting communities are very cohesive. To compute all of them efficiently, we first develop two effective graph reduction techniques to significantly prune the temporal graph. Then, we transform the temporal graph into a static graph and prove that mining the periodic communities in the temporal graph equals mining communities in the transformed graph. Subsequently, we propose a decomposition algorithm to search maximal <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core, a Bron-Kerbosch style algorithm to enumerate all maximal <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-cliques, and a branch-and-bound style algorithm to find the maximum <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sigma$_Z</tex-math></inline-formula>-periodic clique. The results of extensive experiments on five real-life datasets demonstrate the efficiency, scalability, and effectiveness of our algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Periodicity is a frequently happening phenomenon for social interactions in temporal networks. Mining periodic communities are essential to understanding periodic group behaviors in temporal networks. Unfortunately, most previous studies for community mining in temporal networks ignore the periodic patterns of communities. In this paper, we study the problem of seeking periodic communities in a temporal network, where each edge is associated with a set of timestamps. We propose novel models, including <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq1-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq2-3028025.gif\"/></alternatives></inline-formula>-core and <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq3-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq4-3028025.gif\"/></alternatives></inline-formula>-clique, that represent periodic communities in temporal networks. Specifically, a <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq5-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq6-3028025.gif\"/></alternatives></inline-formula>-core (or <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq7-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq8-3028025.gif\"/></alternatives></inline-formula>-clique) is a <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq9-3028025.gif\"/></alternatives></inline-formula>-core (or clique with size larger than <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq10-3028025.gif\"/></alternatives></inline-formula>) that appears at least <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq11-3028025.gif\"/></alternatives></inline-formula> times periodically in the temporal graph. The problem of searching periodic core is efficient but the resulting communities may be not enough cohesive; the problem of enumerating all periodic cliques is not efficient (NP-hard) but the resulting communities are very cohesive. To compute all of them efficiently, we first develop two effective graph reduction techniques to significantly prune the temporal graph. Then, we transform the temporal graph into a static graph and prove that mining the periodic communities in the temporal graph equals mining communities in the transformed graph. Subsequently, we propose a decomposition algorithm to search maximal <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq12-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq13-3028025.gif\"/></alternatives></inline-formula>-core, a Bron-Kerbosch style algorithm to enumerate all maximal <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq14-3028025.gif\"/></alternatives></inline-formula>-periodic <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq15-3028025.gif\"/></alternatives></inline-formula>-cliques, and a branch-and-bound style algorithm to find the maximum <inline-formula><tex-math notation=\"LaTeX\">$\\sigma$</tex-math><alternatives><mml:math><mml:mi>&#x03C3;</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq16-3028025.gif\"/></alternatives></inline-formula>-periodic clique. The results of extensive experiments on five real-life datasets demonstrate the efficiency, scalability, and effectiveness of our algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Periodicity is a frequently happening phenomenon for social interactions in temporal networks. Mining periodic communities are essential to understanding periodic group behaviors in temporal networks. Unfortunately, most previous studies for community mining in temporal networks ignore the periodic patterns of communities. In this paper, we study the problem of seeking periodic communities in a temporal network, where each edge is associated with a set of timestamps. We propose novel models, including --periodic --core and --periodic --clique, that represent periodic communities in temporal networks. Specifically, a --periodic --core (or --periodic --clique) is a --core (or clique with size larger than -) that appears at least - times periodically in the temporal graph. The problem of searching periodic core is efficient but the resulting communities may be not enough cohesive; the problem of enumerating all periodic cliques is not efficient (NP-hard) but the resulting communities are very cohesive. To compute all of them efficiently, we first develop two effective graph reduction techniques to significantly prune the temporal graph. Then, we transform the temporal graph into a static graph and prove that mining the periodic communities in the temporal graph equals mining communities in the transformed graph. Subsequently, we propose a decomposition algorithm to search maximal --periodic --core, a Bron-Kerbosch style algorithm to enumerate all maximal --periodic --cliques, and a branch-and-bound style algorithm to find the maximum --periodic clique. The results of extensive experiments on five real-life datasets demonstrate the efficiency, scalability, and effectiveness of our algorithms.", "title": "Periodic Communities Mining in Temporal Networks: Concepts and Algorithms", "normalizedTitle": "Periodic Communities Mining in Temporal Networks: Concepts and Algorithms", "fno": "09210070", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Animals", "Data Mining", "Electronic Mail", "Transforms", "Collaboration", "Field Flow Fractionation", "Biological System Modeling", "Periodic Community", "Temporal Networks", "Maximal Clique", "Maximum Clique", "K Core" ], "authors": [ { "givenName": "Hongchao", "surname": "Qin", "fullName": "Hongchao Qin", "affiliation": "Department of Computer Science, Beijing Institute of Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Rong-Hua", "surname": "Li", "fullName": "Rong-Hua Li", "affiliation": "Department of Computer Science, Beijing Institute of Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ye", "surname": "Yuan", "fullName": "Ye Yuan", "affiliation": "Department of Computer Science, Beijing Institute of Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Guoren", "surname": "Wang", "fullName": "Guoren Wang", "affiliation": "Department of Computer Science, Beijing Institute of Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weihua", "surname": "Yang", "fullName": "Weihua Yang", "affiliation": "Taiyuan University of Technology, Taiyuan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lu", "surname": "Qin", "fullName": "Lu Qin", "affiliation": "University of Technology Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "3927-3945", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2022/01/09028268", "title": "Cohesive Subgraph Search Using Keywords in Large Networks", "doi": null, "abstractUrl": "/journal/tk/2022/01/09028268/1i3ALWb6q6A", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/11/09099372", "title": "On Heterogeneous Sensing Capability for Distributed Rendezvous in Cognitive Radio Networks", "doi": null, "abstractUrl": "/journal/tm/2021/11/09099372/1k7oCRHzGAE", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/03/09078874", "title": "Evaluating Public Anxiety for Topic-Based Communities in Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/03/09078874/1kepTZLjNlK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09141372", "title": "Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity", "doi": null, "abstractUrl": "/journal/tq/2022/02/09141372/1lu2SzkDEpG", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09186333", "title": "<italic>LShape</italic> Partitioning: Parallel Skyline Query Processing Using <inline-formula><tex-math notation=\"LaTeX\">Z_$MapReduce$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tk/2022/07/09186333/1mP21G1r2QE", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09269479", "title": "Efficient Radius-Bounded Community Search in Geo-Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09269479/1p1c8tla0DK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09457127", "title": "Finding Critical Users in Social Communities via Graph Convolutions", "doi": null, "abstractUrl": "/journal/tk/2023/01/09457127/1utV0WfVCFi", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09534476", "title": "Discovering Significant Communities on Bipartite Graphs: An Index-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2023/03/09534476/1wLbitNpdle", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09573484", "title": "Adaptive Temporal Difference Learning With Linear Function Approximation", "doi": null, "abstractUrl": "/journal/tp/2022/12/09573484/1xH5DVmWYP6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09214981", "articleId": "1nHNE9d14bu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09226110", "articleId": "1nWJDvJsMow", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1EECwg7RIqY", "title": "Aug.", "year": "2022", "issueNum": "08", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1r8kp3TeKGY", "doi": "10.1109/TPAMI.2021.3058891", "abstract": "Deep convolutional neural networks (DCNNs) are currently the method of choice both for generative, as well as for discriminative learning in computer vision and machine learning. The success of DCNNs can be attributed to the careful selection of their building blocks (e.g., residual blocks, rectifiers, sophisticated normalization schemes, to mention but a few). In this paper, we propose <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi$_Z</tex-math></inline-formula>-Nets, a new class of function approximators based on polynomial expansions. <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi$_Z</tex-math></inline-formula>-Nets are polynomial neural networks, i.e., the output is a high-order polynomial of the input. The unknown parameters, which are naturally represented by high-order tensors, are estimated through a collective tensor factorization with factors sharing. We introduce three tensor decompositions that significantly reduce the number of parameters and show how they can be efficiently implemented by hierarchical neural networks. We empirically demonstrate that <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi$_Z</tex-math></inline-formula>-Nets are very expressive and they even produce good results without the use of non-linear activation functions in a large battery of tasks and signals, i.e., images, graphs, and audio. When used in conjunction with activation functions, <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Pi$_Z</tex-math></inline-formula>-Nets produce state-of-the-art results in three challenging tasks, i.e., image generation, face verification and 3D mesh representation learning. The source code is available at <uri>https://github.com/grigorisg9gr/polynomial_nets</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Deep convolutional neural networks (DCNNs) are currently the method of choice both for generative, as well as for discriminative learning in computer vision and machine learning. The success of DCNNs can be attributed to the careful selection of their building blocks (e.g., residual blocks, rectifiers, sophisticated normalization schemes, to mention but a few). In this paper, we propose <inline-formula><tex-math notation=\"LaTeX\">$\\Pi$</tex-math><alternatives><mml:math><mml:mi>&#x03A0;</mml:mi></mml:math><inline-graphic xlink:href=\"chrysos-ieq1-3058891.gif\"/></alternatives></inline-formula>-Nets, a new class of function approximators based on polynomial expansions. <inline-formula><tex-math notation=\"LaTeX\">$\\Pi$</tex-math><alternatives><mml:math><mml:mi>&#x03A0;</mml:mi></mml:math><inline-graphic xlink:href=\"chrysos-ieq2-3058891.gif\"/></alternatives></inline-formula>-Nets are polynomial neural networks, i.e., the output is a high-order polynomial of the input. The unknown parameters, which are naturally represented by high-order tensors, are estimated through a collective tensor factorization with factors sharing. We introduce three tensor decompositions that significantly reduce the number of parameters and show how they can be efficiently implemented by hierarchical neural networks. We empirically demonstrate that <inline-formula><tex-math notation=\"LaTeX\">$\\Pi$</tex-math><alternatives><mml:math><mml:mi>&#x03A0;</mml:mi></mml:math><inline-graphic xlink:href=\"chrysos-ieq3-3058891.gif\"/></alternatives></inline-formula>-Nets are very expressive and they even produce good results without the use of non-linear activation functions in a large battery of tasks and signals, i.e., images, graphs, and audio. When used in conjunction with activation functions, <inline-formula><tex-math notation=\"LaTeX\">$\\Pi$</tex-math><alternatives><mml:math><mml:mi>&#x03A0;</mml:mi></mml:math><inline-graphic xlink:href=\"chrysos-ieq4-3058891.gif\"/></alternatives></inline-formula>-Nets produce state-of-the-art results in three challenging tasks, i.e., image generation, face verification and 3D mesh representation learning. The source code is available at <uri>https://github.com/grigorisg9gr/polynomial_nets</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep convolutional neural networks (DCNNs) are currently the method of choice both for generative, as well as for discriminative learning in computer vision and machine learning. The success of DCNNs can be attributed to the careful selection of their building blocks (e.g., residual blocks, rectifiers, sophisticated normalization schemes, to mention but a few). In this paper, we propose --Nets, a new class of function approximators based on polynomial expansions. --Nets are polynomial neural networks, i.e., the output is a high-order polynomial of the input. The unknown parameters, which are naturally represented by high-order tensors, are estimated through a collective tensor factorization with factors sharing. We introduce three tensor decompositions that significantly reduce the number of parameters and show how they can be efficiently implemented by hierarchical neural networks. We empirically demonstrate that --Nets are very expressive and they even produce good results without the use of non-linear activation functions in a large battery of tasks and signals, i.e., images, graphs, and audio. When used in conjunction with activation functions, --Nets produce state-of-the-art results in three challenging tasks, i.e., image generation, face verification and 3D mesh representation learning. The source code is available at https://github.com/grigorisg9gr/polynomial_nets.", "title": "Deep Polynomial Neural Networks", "normalizedTitle": "Deep Polynomial Neural Networks", "fno": "09353253", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computer Vision", "Convolution", "Function Approximation", "Image Representation", "Learning Artificial Intelligence", "Neural Nets", "Polynomials", "Tensors", "Collective Tensor Factorization", "Tensor Decompositions", "Hierarchical Neural Networks", "X 03 A 0 Nets", "Nonlinear Activation Functions", "Image Generation", "3 D Mesh Representation Learning", "Deep Polynomial Neural Networks", "Convolutional Neural Networks", "DCN Ns", "Discriminative Learning", "Computer Vision", "Machine Learning", "Building Blocks", "Residual Blocks", "Sophisticated Normalization Schemes", "Function Approximators", "Polynomial Expansions", "High Order Polynomial", "Unknown Parameters", "High Order Tensors", "Tensors", "Neural Networks", "Task Analysis", "Faces", "Training", "Matrix Decomposition", "Convolutional Neural Networks", "Polynomial Neural Networks", "Tensor Decompositions", "High Order Polynomials", "Generative Models", "Discriminative Models", "Face Verification" ], "authors": [ { "givenName": "Grigorios G.", "surname": "Chrysos", "fullName": "Grigorios G. Chrysos", "affiliation": "Department of Electrical Engineering, Ecole Polytechnique Federale de Lausanne (EPFL), Lausanne, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Stylianos", "surname": "Moschoglou", "fullName": "Stylianos Moschoglou", "affiliation": "Department of Computing, Imperial College London, London, U.K", "__typename": "ArticleAuthorType" }, { "givenName": "Giorgos", "surname": "Bouritsas", "fullName": "Giorgos Bouritsas", "affiliation": "Department of Computing, Imperial College London, London, U.K", "__typename": "ArticleAuthorType" }, { "givenName": "Jiankang", "surname": "Deng", "fullName": "Jiankang Deng", "affiliation": "Department of Computing, Imperial College London, London, U.K", "__typename": "ArticleAuthorType" }, { "givenName": "Yannis", "surname": "Panagakis", "fullName": "Yannis Panagakis", "affiliation": "Department of Informatics and Telecommunications, University of Athens, Athens, Greece", "__typename": "ArticleAuthorType" }, { "givenName": "Stefanos", "surname": "Zafeiriou", "fullName": "Stefanos Zafeiriou", "affiliation": "Department of Computing, Imperial College London, London, U.K", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "4021-4034", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2020/02/08453008", "title": "Extracting Biomedical Events with Parallel Multi-Pooling Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tb/2020/02/08453008/13rRUEgs2Aq", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2019/04/08494787", "title": "Better Circuits for Binary Polynomial Multiplication", "doi": null, "abstractUrl": "/journal/tc/2019/04/08494787/14s8M4Sn2IE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/11/08709774", "title": "Deep Learning Driven Venue Recommender for Event-Based Social Networks", "doi": null, "abstractUrl": "/journal/tk/2020/11/08709774/19TwotsjgpG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09693260", "title": "Bridging the Gap between Deep Learning and Frustrated Quantum Spin System for Extreme-Scale Simulations on New Generation of Sunway Supercomputer", "doi": null, "abstractUrl": "/journal/td/2022/11/09693260/1As7vjErLnG", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/06/09924585", "title": "Tensor Based Multivariate Polynomial Modulo Multiplier for Cryptographic Applications", "doi": null, "abstractUrl": "/journal/tc/2023/06/09924585/1HBI0BSZqjC", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/06/09007371", "title": "On the Capacity of Fractal D2D Social Networks with Hierarchical Communications", "doi": null, "abstractUrl": "/journal/tm/2021/06/09007371/1hJKjvhn8nm", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09122448", "title": "ManifoldNet: A Deep Neural Network for Manifold-Valued Data With Applications", "doi": null, "abstractUrl": "/journal/tp/2022/02/09122448/1kRRwHRZ1Li", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09159878", "title": "Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training", "doi": null, "abstractUrl": "/journal/tq/2022/02/09159878/1m3mcOUAHtK", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09369083", "title": "Robust Low-Tubal-Rank Tensor Recovery From Binary Measurements", "doi": null, "abstractUrl": "/journal/tp/2022/08/09369083/1rFvS23KDAI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09450011", "title": "S<sup>2</sup> Engine: A Novel Systolic Architecture for Sparse Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tc/2022/06/09450011/1uiiTrEWIlG", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09373945", "articleId": "1rPt54DbTwc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09384353", "articleId": "1scDnhZSG4w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1EECHFrpRUk", "name": "ttp202208-09353253s1-supp1-3058891.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202208-09353253s1-supp1-3058891.pdf", "extension": "pdf", "size": "4.52 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1KsRzJZl0ly", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xPnZzu3u9O", "doi": "10.1109/TKDE.2021.3120722", "abstract": "Data summarization that presents a small subset of a dataset to users has been widely applied in numerous applications and systems. Many datasets are coded with hierarchical terminologies, e.g., gene ontology, disease ontology, to name a few. In this paper, we study the weighted tree summarization. We motivate and formulate our <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {kWTS}}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {problem}}$_Z</tex-math></inline-formula> as selecting a diverse set of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> nodes to <underline>s</underline>ummarize a hierarchical <underline>t</underline>ree <inline-formula><tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> with <underline>w</underline>eighted terminologies. We first propose an efficient greedy tree summarization algorithm <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {GTS}}$_Z</tex-math></inline-formula>. It solves the problem with <inline-formula><tex-math notation=\"LaTeX\">Z_$(1-1/e)$_Z</tex-math></inline-formula>-approximation guarantee. Although <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {GTS}}$_Z</tex-math></inline-formula> achieves quality-guaranteed answers approximately, but it is still not optimal. To tackle the problem optimally, we further develop a dynamic programming algorithm <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {OTS}}$_Z</tex-math></inline-formula> to obtain optimal answers for <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {kWTS}}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {problem}}$_Z</tex-math></inline-formula> in <inline-formula><tex-math notation=\"LaTeX\">Z_$O(nhk^3)$_Z</tex-math></inline-formula> time, where <inline-formula><tex-math notation=\"LaTeX\">Z_$n, h$_Z</tex-math></inline-formula> are the node size and height in tree <inline-formula><tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula>. The algorithm complexity and correctness of <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {OTS}}$_Z</tex-math></inline-formula> are theoretically analyzed. In addition, we propose a useful optimization technique of tree reduction to remove useless nodes with zero weights and shrink the tree into a smaller one, which ensures the efficiency acceleration of both <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {GTS}}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {OTS}}$_Z</tex-math></inline-formula> in real-world datasets. Moreover, we illustrate one useful application of graph visualization based on the answer of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-sized tree summarization and show it in a novel case study. Extensive experimental results on real-world datasets show the effectiveness and efficiency of our proposed approximate and optimal algorithms for tree summarization. Furthermore, we conduct a usability evaluation of attractive topic recommendation on ACM Computing Classification System dataset to validate the usefulness of our model and algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Data summarization that presents a small subset of a dataset to users has been widely applied in numerous applications and systems. Many datasets are coded with hierarchical terminologies, e.g., gene ontology, disease ontology, to name a few. In this paper, we study the weighted tree summarization. We motivate and formulate our <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {kWTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">kWTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq1-3120722.gif\"/></alternatives></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {problem}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">problem</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq2-3120722.gif\"/></alternatives></inline-formula> as selecting a diverse set of <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq3-3120722.gif\"/></alternatives></inline-formula> nodes to <underline>s</underline>ummarize a hierarchical <underline>t</underline>ree <inline-formula><tex-math notation=\"LaTeX\">$T$</tex-math><alternatives><mml:math><mml:mi>T</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq4-3120722.gif\"/></alternatives></inline-formula> with <underline>w</underline>eighted terminologies. We first propose an efficient greedy tree summarization algorithm <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {GTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">GTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq5-3120722.gif\"/></alternatives></inline-formula>. It solves the problem with <inline-formula><tex-math notation=\"LaTeX\">$(1-1/e)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:mn>1</mml:mn><mml:mo>/</mml:mo><mml:mi>e</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"zhu-ieq6-3120722.gif\"/></alternatives></inline-formula>-approximation guarantee. Although <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {GTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">GTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq7-3120722.gif\"/></alternatives></inline-formula> achieves quality-guaranteed answers approximately, but it is still not optimal. To tackle the problem optimally, we further develop a dynamic programming algorithm <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {OTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">OTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq8-3120722.gif\"/></alternatives></inline-formula> to obtain optimal answers for <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {kWTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">kWTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq9-3120722.gif\"/></alternatives></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {problem}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">problem</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq10-3120722.gif\"/></alternatives></inline-formula> in <inline-formula><tex-math notation=\"LaTeX\">$O(nhk^3)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mi>h</mml:mi><mml:msup><mml:mi>k</mml:mi><mml:mn>3</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"zhu-ieq11-3120722.gif\"/></alternatives></inline-formula> time, where <inline-formula><tex-math notation=\"LaTeX\">$n, h$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>n</mml:mi><mml:mo>,</mml:mo><mml:mi>h</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"zhu-ieq12-3120722.gif\"/></alternatives></inline-formula> are the node size and height in tree <inline-formula><tex-math notation=\"LaTeX\">$T$</tex-math><alternatives><mml:math><mml:mi>T</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq13-3120722.gif\"/></alternatives></inline-formula>. The algorithm complexity and correctness of <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {OTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">OTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq14-3120722.gif\"/></alternatives></inline-formula> are theoretically analyzed. In addition, we propose a useful optimization technique of tree reduction to remove useless nodes with zero weights and shrink the tree into a smaller one, which ensures the efficiency acceleration of both <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {GTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">GTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq15-3120722.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {OTS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">OTS</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq16-3120722.gif\"/></alternatives></inline-formula> in real-world datasets. Moreover, we illustrate one useful application of graph visualization based on the answer of <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq17-3120722.gif\"/></alternatives></inline-formula>-sized tree summarization and show it in a novel case study. Extensive experimental results on real-world datasets show the effectiveness and efficiency of our proposed approximate and optimal algorithms for tree summarization. Furthermore, we conduct a usability evaluation of attractive topic recommendation on ACM Computing Classification System dataset to validate the usefulness of our model and algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data summarization that presents a small subset of a dataset to users has been widely applied in numerous applications and systems. Many datasets are coded with hierarchical terminologies, e.g., gene ontology, disease ontology, to name a few. In this paper, we study the weighted tree summarization. We motivate and formulate our --- as selecting a diverse set of - nodes to summarize a hierarchical tree - with weighted terminologies. We first propose an efficient greedy tree summarization algorithm -. It solves the problem with --approximation guarantee. Although - achieves quality-guaranteed answers approximately, but it is still not optimal. To tackle the problem optimally, we further develop a dynamic programming algorithm - to obtain optimal answers for --- in - time, where - are the node size and height in tree -. The algorithm complexity and correctness of - are theoretically analyzed. In addition, we propose a useful optimization technique of tree reduction to remove useless nodes with zero weights and shrink the tree into a smaller one, which ensures the efficiency acceleration of both - and - in real-world datasets. Moreover, we illustrate one useful application of graph visualization based on the answer of --sized tree summarization and show it in a novel case study. Extensive experimental results on real-world datasets show the effectiveness and efficiency of our proposed approximate and optimal algorithms for tree summarization. Furthermore, we conduct a usability evaluation of attractive topic recommendation on ACM Computing Classification System dataset to validate the usefulness of our model and algorithms.", "title": "Efficient and Optimal Algorithms for Tree Summarization With Weighted Terminologies", "normalizedTitle": "Efficient and Optimal Algorithms for Tree Summarization With Weighted Terminologies", "fno": "09580703", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Approximation Theory", "Computational Complexity", "Data Mining", "Data Visualisation", "Diseases", "Dynamic Programming", "Graph Theory", "Greedy Algorithms", "Ontologies Artificial Intelligence", "Optimisation", "Pattern Classification", "Query Processing", "Tree Data Structures", "Trees Mathematics", "ACM Computing Classification System Dataset", "Algorithm Complexity", "Although GT Sachieves Quality Guaranteed Answers", "Answer Ofk Sized Tree Summarization", "Approximation Guarantee", "Data Summarization", "Disease Ontology", "Diverse Set Ofknodes", "Efficiency Acceleration", "Efficient Greedy Tree Summarization Algorithm GTS", "Gene Ontology", "Hierarchicaltree Twithweighted Terminologies", "Node Size", "Optimal Algorithms", "Optimal Answers Fork WTS Problemin O", "Ourk WTS Problemas", "Tree Reduction", "Useful Application", "Useful Optimization Technique", "Weighted Terminologies", "Weighted Tree Summarization", "Zero Weights", "Diseases", "Heuristic Algorithms", "Terminology", "Approximation Algorithms", "Ontologies", "Dynamic Programming", "Optimization", "Hierarchy", "Tree", "Data Summarization", "Optimal Algorithm", "Top K" ], "authors": [ { "givenName": "Xuliang", "surname": "Zhu", "fullName": "Xuliang Zhu", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xin", "surname": "Huang", "fullName": "Xin Huang", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Byron", "surname": "Choi", "fullName": "Byron Choi", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianliang", "surname": "Xu", "fullName": "Jianliang Xu", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "William K.", "surname": "Cheung", "fullName": "William K. Cheung", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yanchun", "surname": "Zhang", "fullName": "Yanchun Zhang", "affiliation": "Guangzhou University, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiming", "surname": "Liu", "fullName": "Jiming Liu", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2500-2514", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/12/09007415", "title": "Flexible Aggregate Nearest Neighbor Queries and its Keyword-Aware Variant on Road Networks", "doi": null, "abstractUrl": "/journal/tk/2021/12/09007415/1hJKhc0u1So", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09119142", "title": "An Efficient Split-Merge Re-Start for the <inline-formula><tex-math notation=\"LaTeX\">Z_$K$_Z</tex-math></inline-formula>-Means Algorithm", "doi": null, "abstractUrl": "/journal/tk/2022/04/09119142/1kHUCLcBjDa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09269479", "title": "Efficient Radius-Bounded Community Search in Geo-Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09269479/1p1c8tla0DK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09354552", "title": "An Asymmetric Alignment Algorithm for Estimating Ancestor-Descendant Edit Distance for Tandem Repeats", "doi": null, "abstractUrl": "/journal/tb/2022/04/09354552/1reXbdTv8QM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/05/09431707", "title": "Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe", "doi": null, "abstractUrl": "/journal/tq/2022/05/09431707/1tB9khbrCKc", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/09/09591378", "title": "Deadlock Avoidance Algorithms for Recursion-Tree Modeled Requests in Parallel Executions", "doi": null, "abstractUrl": "/journal/tc/2022/09/09591378/1y2FzFYBvwc", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09616390", "title": "Checking Phylogenetics Decisiveness in Theory and in Practice", "doi": null, "abstractUrl": "/journal/tb/2022/06/09616390/1yA73pVevu0", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09531531", "articleId": "1wJkZ2H6fhC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09536432", "articleId": "1wRDvFHVpzq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1BhzoX5mYSY", "title": "April", "year": "2022", "issueNum": "04", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nzvbOKX280", "doi": "10.1109/TVCG.2020.3026785", "abstract": "We propose a robust normal estimation method for both point clouds and meshes using a low rank matrix approximation algorithm. First, we compute a local isotropic structure for each point and find its similar, non-local structures that we organize into a matrix. We then show that a low rank matrix approximation algorithm can robustly estimate normals for both point clouds and meshes. Furthermore, we provide a new filtering method for point cloud data to smooth the position data to fit the estimated normals. We show the applications of our method to point cloud filtering, point set upsampling, surface reconstruction, mesh denoising, and geometric texture removal. Our experiments show that our method generally achieves better results than existing methods.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a robust normal estimation method for both point clouds and meshes using a low rank matrix approximation algorithm. First, we compute a local isotropic structure for each point and find its similar, non-local structures that we organize into a matrix. We then show that a low rank matrix approximation algorithm can robustly estimate normals for both point clouds and meshes. Furthermore, we provide a new filtering method for point cloud data to smooth the position data to fit the estimated normals. We show the applications of our method to point cloud filtering, point set upsampling, surface reconstruction, mesh denoising, and geometric texture removal. Our experiments show that our method generally achieves better results than existing methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a robust normal estimation method for both point clouds and meshes using a low rank matrix approximation algorithm. First, we compute a local isotropic structure for each point and find its similar, non-local structures that we organize into a matrix. We then show that a low rank matrix approximation algorithm can robustly estimate normals for both point clouds and meshes. Furthermore, we provide a new filtering method for point cloud data to smooth the position data to fit the estimated normals. We show the applications of our method to point cloud filtering, point set upsampling, surface reconstruction, mesh denoising, and geometric texture removal. Our experiments show that our method generally achieves better results than existing methods.", "title": "Low Rank Matrix Approximation for 3D Geometry Filtering", "normalizedTitle": "Low Rank Matrix Approximation for 3D Geometry Filtering", "fno": "09210753", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Approximation Theory", "Computational Geometry", "Computer Graphics", "Estimation Theory", "Filtering Theory", "Image Denoising", "Image Reconstruction", "Image Texture", "Iterative Methods", "Matrix Algebra", "Mesh Generation", "Solid Modelling", "3 D Geometry Filtering", "Robust Normal Estimation Method", "Point Clouds", "Low Rank Matrix Approximation Algorithm", "Local Isotropic Structure", "Nonlocal Structures", "Filtering Method", "Point Cloud Data", "Estimated Normals", "Point Set Upsampling", "Three Dimensional Displays", "Estimation", "Shape", "Faces", "Robustness", "Noise Reduction", "Geometry", "3 D Geometry Filtering", "Point Cloud Filtering", "Mesh Denoising", "Point Upsampling", "Surface Reconstruction", "Geometric Texture Removal" ], "authors": [ { "givenName": "Xuequan", "surname": "Lu", "fullName": "Xuequan Lu", "affiliation": "School of Information Technology, Deakin University, Geelong, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Scott", "surname": "Schaefer", "fullName": "Scott Schaefer", "affiliation": "Department of Computer Science, Texas A&M University, College Station, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Luo", "fullName": "Jun Luo", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Lizhuang", "surname": "Ma", "fullName": "Lizhuang Ma", "affiliation": "Department of Computer Science, Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ying", "surname": "He", "fullName": "Ying He", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2022-04-01 00:00:00", "pubType": "trans", "pages": "1835-1847", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sibgra/2003/2032/0/01240987", "title": "Moving least squares multiresolution surface approximation", "doi": null, "abstractUrl": "/proceedings-article/sibgra/2003/01240987/12OmNqBbHBh", "parentPublication": { "id": "proceedings/sibgra/2003/2032/0", "title": "16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06238917", "title": "Similarity based filtering of point clouds", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06238917/12OmNvk7JOA", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a083", "title": "Robust Feature-Preserving Denoising of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a083/12OmNyRxFIQ", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/08/07974776", "title": "GPF: GMM-Inspired Feature-Preserving Point Set Filtering", "doi": null, "abstractUrl": "/journal/tg/2018/08/07974776/13rRUy0HYRx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08434353", "title": "Mesh Denoising Guided by Patch Normal Co-Filtering via Kernel Low-Rank Recovery", "doi": null, "abstractUrl": "/journal/tg/2019/10/08434353/13rRUy2YLYE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a444", "title": "Structured Low-Rank Matrix Factorization for Point-Cloud Denoising", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a444/17D45XacGiJ", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08327892", "title": "Static/Dynamic Filtering for Mesh Geometry", "doi": null, "abstractUrl": "/journal/tg/2019/04/08327892/17YCN5yqdZn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2003/2032/0/01240987", "title": "Moving least squares multiresolution surface approximation", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2003/01240987/1h0F2U06q3e", "parentPublication": { "id": "proceedings/sibgrapi/2003/2032/0", "title": "16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/10/09115285", "title": "DNF-Net: A Deep Normal Filtering Network for Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2021/10/09115285/1kzC0PMrQXu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09543583", "title": "GeoDualCNN: Geometry-Supporting Dual Convolutional Neural Network for Noisy Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2023/02/09543583/1x4UL7WJCKI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09194085", "articleId": "1n0Ehetbdo4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09207965", "articleId": "1nuwBNaxzjy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNz5apwV", "title": "July", "year": "2005", "issueNum": "07", "idPrefix": "tk", "pubType": "journal", "volume": "17", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwdrdL0", "doi": "10.1109/TKDE.2005.114", "abstract": "Periodicity mining is used for predicting trends in time series data. Discovering the rate at which the time series is periodic has always been an obstacle for fully automated periodicity mining. Existing periodicity mining algorithms assume that the periodicity rate (or simply the period) is user-specified. This assumption is a considerable limitation, especially in time series data where the period is not known a priori. In this paper, we address the problem of detecting the periodicity rate of a time series database. Two types of periodicities are defined, and a scalable, computationally efficient algorithm is proposed for each type. The algorithms perform in O(n\\log n) time for a time series of length n. Moreover, the proposed algorithms are extended in order to discover the periodic patterns of unknown periods at the same time without affecting the time complexity. Experimental results show that the proposed algorithms are highly accurate with respect to the discovered periodicity rates and periodic patterns. Real-data experiments demonstrate the practicality of the discovered periodic patterns.", "abstracts": [ { "abstractType": "Regular", "content": "Periodicity mining is used for predicting trends in time series data. Discovering the rate at which the time series is periodic has always been an obstacle for fully automated periodicity mining. Existing periodicity mining algorithms assume that the periodicity rate (or simply the period) is user-specified. This assumption is a considerable limitation, especially in time series data where the period is not known a priori. In this paper, we address the problem of detecting the periodicity rate of a time series database. Two types of periodicities are defined, and a scalable, computationally efficient algorithm is proposed for each type. The algorithms perform in O(n\\log n) time for a time series of length n. Moreover, the proposed algorithms are extended in order to discover the periodic patterns of unknown periods at the same time without affecting the time complexity. Experimental results show that the proposed algorithms are highly accurate with respect to the discovered periodicity rates and periodic patterns. Real-data experiments demonstrate the practicality of the discovered periodic patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Periodicity mining is used for predicting trends in time series data. Discovering the rate at which the time series is periodic has always been an obstacle for fully automated periodicity mining. Existing periodicity mining algorithms assume that the periodicity rate (or simply the period) is user-specified. This assumption is a considerable limitation, especially in time series data where the period is not known a priori. In this paper, we address the problem of detecting the periodicity rate of a time series database. Two types of periodicities are defined, and a scalable, computationally efficient algorithm is proposed for each type. The algorithms perform in O(n\\log n) time for a time series of length n. Moreover, the proposed algorithms are extended in order to discover the periodic patterns of unknown periods at the same time without affecting the time complexity. Experimental results show that the proposed algorithms are highly accurate with respect to the discovered periodicity rates and periodic patterns. Real-data experiments demonstrate the practicality of the discovered periodic patterns.", "title": "Periodicity Detection in Time Series Databases", "normalizedTitle": "Periodicity Detection in Time Series Databases", "fno": "k0875", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Index Terms Periodic Patterns Mining", "Temporal Data Mining", "Time Series Forecasting", "Time Series Analysis" ], "authors": [ { "givenName": "Mohamed G.", "surname": "Elfeky", "fullName": "Mohamed G. Elfeky", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Walid G.", "surname": "Aref", "fullName": "Walid G. Aref", "affiliation": "IEEE", "__typename": "ArticleAuthorType" }, { "givenName": "Ahmed K.", "surname": "Elmagarmid", "fullName": "Ahmed K. Elmagarmid", "affiliation": "IEEE", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2005-07-01 00:00:00", "pubType": "trans", "pages": "875-887", "year": "2005", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iscid/2008/3311/2/3311b098", "title": "A Moving-Window based Partial Periodic Patterns Update Technology in Time Series Databases", "doi": null, "abstractUrl": "/proceedings-article/iscid/2008/3311b098/12OmNAJVcCX", "parentPublication": { "id": "proceedings/iscid/2008/3311/2", "title": "2008 International Symposium on Computational Intelligence and Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2005/2278/0/22780138", "title": "WARP: Time Warping for Periodicity Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2005/22780138/12OmNAKuoUC", "parentPublication": { "id": "proceedings/icdm/2005/2278/0", "title": "Fifth IEEE International Conference on Data Mining (ICDM'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2014/5618/0/5618a402", "title": "Detecting Time Series Periodicity Using Complex Networks", "doi": null, "abstractUrl": "/proceedings-article/bracis/2014/5618a402/12OmNB9t6l9", "parentPublication": { "id": "proceedings/bracis/2014/5618/0", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsym/2016/3438/0/07858488", "title": "A Time-Position Join Method for Periodicity Mining in Time Series Databases", "doi": null, "abstractUrl": "/proceedings-article/compsym/2016/07858488/12OmNBKW9wN", "parentPublication": { "id": "proceedings/compsym/2016/3438/0", "title": "2016 International Computer Symposium (ICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/1999/0071/0/00710106", "title": "Efficient Mining of Partial Periodic Patterns in Time Series Database", "doi": null, "abstractUrl": "/proceedings-article/icde/1999/00710106/12OmNBOllnA", "parentPublication": { "id": "proceedings/icde/1999/0071/0", "title": "Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1991/0003/0/00151085", "title": "Instantaneous frequency and its periodicity for cyclostationary time-series", "doi": null, "abstractUrl": "/proceedings-article/icassp/1991/00151085/12OmNvkplb0", "parentPublication": { "id": "proceedings/icassp/1991/0003/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2004/03/k0332", "title": "Incremental, Online, and Merge Mining of Partial Periodic Patterns in Time-Series Databases", "doi": null, "abstractUrl": "/journal/tk/2004/03/k0332/13rRUNvyafj", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/ttk2010990059", "title": "Efficient Periodicity Mining in Time Series Databases Using Suffix Trees", "doi": null, "abstractUrl": "/journal/tk/5555/01/ttk2010990059/13rRUwgQpra", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/01/ttk2011010079", "title": "Efficient Periodicity Mining in Time Series Databases Using Suffix Trees", "doi": null, "abstractUrl": "/journal/tk/2011/01/ttk2011010079/13rRUxAASWg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a543", "title": "Anomaly Detection of Periodic Multivariate Time Series under High Acquisition Frequency Scene in IoT", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a543/1rgGn4JIlB6", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "k0888", "articleId": "13rRUwbs2bl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1MtgpjufAOc", "doi": "10.1109/TKDE.2023.3268199", "abstract": "Multivariate time series (MTS) forecasting plays an important role in the automation and optimization of intelligent applications. It is a challenging task, as we need to consider both complex intra-variable dependencies and inter-variable dependencies. Existing works only learn temporal patterns with the help of single inter-variable dependencies. However, there are multi-scale temporal patterns in many real-world MTS. Single inter-variable dependencies make the model prefer to learn one type of prominent and shared temporal patterns. In this paper, we propose a multi-scale adaptive graph neural network (MAGNN) to address the above issue. MAGNN exploits a multi-scale pyramid network to preserve the underlying temporal dependencies at different time scales. Since the inter-variable dependencies may be different under distinct time scales, an adaptive graph learning module is designed to infer the scale-specific inter-variable dependencies without pre-defined priors. Given the multi-scale feature representations and scale-specific inter-variable dependencies, a multi-scale temporal graph neural network is introduced to jointly model intra-variable dependencies and inter-variable dependencies. After that, we develop a scale-wise fusion module to effectively promote the collaboration across different time scales, and automatically capture the importance of contributed temporal patterns. Experiments on six real-world datasets demonstrate that MAGNN outperforms the state-of-the-art methods across various settings.", "abstracts": [ { "abstractType": "Regular", "content": "Multivariate time series (MTS) forecasting plays an important role in the automation and optimization of intelligent applications. It is a challenging task, as we need to consider both complex intra-variable dependencies and inter-variable dependencies. Existing works only learn temporal patterns with the help of single inter-variable dependencies. However, there are multi-scale temporal patterns in many real-world MTS. Single inter-variable dependencies make the model prefer to learn one type of prominent and shared temporal patterns. In this paper, we propose a multi-scale adaptive graph neural network (MAGNN) to address the above issue. MAGNN exploits a multi-scale pyramid network to preserve the underlying temporal dependencies at different time scales. Since the inter-variable dependencies may be different under distinct time scales, an adaptive graph learning module is designed to infer the scale-specific inter-variable dependencies without pre-defined priors. Given the multi-scale feature representations and scale-specific inter-variable dependencies, a multi-scale temporal graph neural network is introduced to jointly model intra-variable dependencies and inter-variable dependencies. After that, we develop a scale-wise fusion module to effectively promote the collaboration across different time scales, and automatically capture the importance of contributed temporal patterns. Experiments on six real-world datasets demonstrate that MAGNN outperforms the state-of-the-art methods across various settings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multivariate time series (MTS) forecasting plays an important role in the automation and optimization of intelligent applications. It is a challenging task, as we need to consider both complex intra-variable dependencies and inter-variable dependencies. Existing works only learn temporal patterns with the help of single inter-variable dependencies. However, there are multi-scale temporal patterns in many real-world MTS. Single inter-variable dependencies make the model prefer to learn one type of prominent and shared temporal patterns. In this paper, we propose a multi-scale adaptive graph neural network (MAGNN) to address the above issue. MAGNN exploits a multi-scale pyramid network to preserve the underlying temporal dependencies at different time scales. Since the inter-variable dependencies may be different under distinct time scales, an adaptive graph learning module is designed to infer the scale-specific inter-variable dependencies without pre-defined priors. Given the multi-scale feature representations and scale-specific inter-variable dependencies, a multi-scale temporal graph neural network is introduced to jointly model intra-variable dependencies and inter-variable dependencies. After that, we develop a scale-wise fusion module to effectively promote the collaboration across different time scales, and automatically capture the importance of contributed temporal patterns. Experiments on six real-world datasets demonstrate that MAGNN outperforms the state-of-the-art methods across various settings.", "title": "Multi-Scale Adaptive Graph Neural Network for Multivariate Time Series Forecasting", "normalizedTitle": "Multi-Scale Adaptive Graph Neural Network for Multivariate Time Series Forecasting", "fno": "10105527", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Forecasting", "Time Series Analysis", "Predictive Models", "Graph Neural Networks", "Adaptive Systems", "Adaptation Models", "Power Demand", "Graph Learning", "Graph Neural Network", "Multi Scale Modeling", "Multivariate Time Series Forecasting" ], "authors": [ { "givenName": "Ling", "surname": "Chen", "fullName": "Ling Chen", "affiliation": "College of Computer Science and Technology, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Donghui", "surname": "Chen", "fullName": "Donghui Chen", "affiliation": "College of Computer Science and Technology, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zongjiang", "surname": "Shang", "fullName": "Zongjiang Shang", "affiliation": "College of Computer Science and Technology, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Binqing", "surname": "Wu", "fullName": "Binqing Wu", "affiliation": "College of Computer Science and Technology, Zhejiang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Cen", "surname": "Zheng", "fullName": "Cen Zheng", "affiliation": "Alibaba Group, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bo", "surname": "Wen", "fullName": "Bo Wen", "affiliation": "Alibaba Group, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Zhang", "fullName": "Wei Zhang", "affiliation": "Alibaba Group, Hangzhou, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2017/3835/0/3835a705", "title": "Spatio-Temporal Neural Networks for Space-Time Series Forecasting and Relations Discovery", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a705/12OmNC2fGx4", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a924", "title": "Improving Multivariate Time Series Forecasting with Random Walks with Restarts on Causality Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a924/12OmNzC5SWG", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a083", "title": "Sequence Attention for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a083/1CuhWbfuEYU", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09950330", "title": "Multivariate Time Series Forecasting with Dynamic Graph Neural ODEs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09950330/1IiLdUwEK7m", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/5555/01/10026346", "title": "Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach", "doi": null, "abstractUrl": "/magazine/ex/5555/01/10026346/1KkXtjX73cQ", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a785", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a785/1LSPpseFmo0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006103", "title": "seq2graph: Discovering Dynamic Non-linear Dependencies from Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006103/1hJsjZYpqDe", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378264", "title": "Streaming Time Series Forecasting using Multi-Target Regression with Dynamic Ensemble Selection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378264/1s64GL6pBC0", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09416768", "title": "Pay Attention to Evolution: Time Series Forecasting With Deep Graph-Evolution Learning", "doi": null, "abstractUrl": "/journal/tp/2022/09/09416768/1t8VSzT9Cj6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/05/08723119", "title": "Grasping Inter-Attribute and Temporal Variability in Multivariate Time Series", "doi": null, "abstractUrl": "/journal/bd/2021/05/08723119/1x9TmZrGCUo", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10105466", "articleId": "1MtgpbZRQ0E", "__typename": "AdjacentArticleType" }, "next": { "fno": "10105521", "articleId": "1MtgpqtYFyM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvkpkSQ", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "ta", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1v2LXMHQUAo", "doi": "10.1109/TAFFC.2021.3095425", "abstract": "This work investigates classification of emotions from full-body movements by using a novel Convolutional Neural Network-based architecture. The model is composed of two shallow networks processing in parallel where the 8-bit RGB images obtained from time intervals of 3D-positional data are the inputs. One network performs a coarse-grained modelling in the time domain while the other one applies a fine-grained modelling. We show that combining different temporal scales into one architecture improves the classification results of a dataset composed of short excerpts of the performances of professional dancers who interpreted four affective states: anger, happiness, sadness, and insecurity. Additionally, we investigate the effect of data chunk duration, overlapping, the size of the input images and the contribution of several data augmentation strategies for our proposed method. Better recognition results were obtained when the duration of a data chunk was longer, and this was further improved by applying balanced data augmentation. Moreover, we test our method on other existing motion capture datasets and compare the results with prior art. In all of the experiments, our results surpassed the state-of-the-art approaches, showing that this method generalizes across diverse settings and contexts.", "abstracts": [ { "abstractType": "Regular", "content": "This work investigates classification of emotions from full-body movements by using a novel Convolutional Neural Network-based architecture. The model is composed of two shallow networks processing in parallel where the 8-bit RGB images obtained from time intervals of 3D-positional data are the inputs. One network performs a coarse-grained modelling in the time domain while the other one applies a fine-grained modelling. We show that combining different temporal scales into one architecture improves the classification results of a dataset composed of short excerpts of the performances of professional dancers who interpreted four affective states: anger, happiness, sadness, and insecurity. Additionally, we investigate the effect of data chunk duration, overlapping, the size of the input images and the contribution of several data augmentation strategies for our proposed method. Better recognition results were obtained when the duration of a data chunk was longer, and this was further improved by applying balanced data augmentation. Moreover, we test our method on other existing motion capture datasets and compare the results with prior art. In all of the experiments, our results surpassed the state-of-the-art approaches, showing that this method generalizes across diverse settings and contexts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work investigates classification of emotions from full-body movements by using a novel Convolutional Neural Network-based architecture. The model is composed of two shallow networks processing in parallel where the 8-bit RGB images obtained from time intervals of 3D-positional data are the inputs. One network performs a coarse-grained modelling in the time domain while the other one applies a fine-grained modelling. We show that combining different temporal scales into one architecture improves the classification results of a dataset composed of short excerpts of the performances of professional dancers who interpreted four affective states: anger, happiness, sadness, and insecurity. Additionally, we investigate the effect of data chunk duration, overlapping, the size of the input images and the contribution of several data augmentation strategies for our proposed method. Better recognition results were obtained when the duration of a data chunk was longer, and this was further improved by applying balanced data augmentation. Moreover, we test our method on other existing motion capture datasets and compare the results with prior art. In all of the experiments, our results surpassed the state-of-the-art approaches, showing that this method generalizes across diverse settings and contexts.", "title": "Modeling Multiple Temporal Scales of Full-body Movements for Emotion Classification", "normalizedTitle": "Modeling Multiple Temporal Scales of Full-body Movements for Emotion Classification", "fno": "09477164", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Emotion Recognition", "Computer Architecture", "Hidden Markov Models", "Legged Locomotion", "Data Models", "Computational Modeling", "Videos", "Emotion Recognition", "Convolutional Neural Network", "Full Body Movements", "Kinematics", "Multiple Temporal Scales", "Motion Capture" ], "authors": [ { "givenName": "Cigdem", "surname": "Beyan", "fullName": "Cigdem Beyan", "affiliation": "Department of Information Engineering and Computer Science, University of Trento, 19034 Trento, Trentino-Alto Adige, Italy, (e-mail: cigdem.beyan@unitn.it)", "__typename": "ArticleAuthorType" }, { "givenName": "Sukumar", "surname": "Karumuri", "fullName": "Sukumar Karumuri", "affiliation": "DIBRIS, University of Genoa, 9302 Genova, Liguria, Italy, (e-mail: kai.sukumar@gmail.com)", "__typename": "ArticleAuthorType" }, { "givenName": "Gualtiero", "surname": "Volpe", "fullName": "Gualtiero Volpe", "affiliation": "DIBRIS, University of Genoa, 9302 Genova, Liguria, Italy, (e-mail: gualtiero.volpe@unige.it)", "__typename": "ArticleAuthorType" }, { "givenName": "Antonio", "surname": "Camurri", "fullName": "Antonio Camurri", "affiliation": "DIBRIS, University of Genoa, 9302 Genova, Ge, Italy, 16145 (e-mail: antonio.camurri@unige.it)", "__typename": "ArticleAuthorType" }, { "givenName": "Radoslaw", "surname": "Niewiadomski", "fullName": "Radoslaw Niewiadomski", "affiliation": "Department of Psychology and Cognitive Science, University of Trento, 19034 Rovereto, Trento, Italy, (e-mail: r.niewiadomski@unitn.it)", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2021-07-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sitis/2016/5698/0/07907459", "title": "Emotion Identification from Spontaneous Communication", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907459/12OmNBoNrsk", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2014/6572/0/6572a627", "title": "Full Body Person Identification Using the Kinect Sensor", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a627/12OmNrNh0Q2", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2014/4171/0/4171a290", "title": "Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2014/4171a290/12OmNwe2Ipk", "parentPublication": { "id": "proceedings/3pgcic/2014/4171/0", "title": "2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/02/07390037", "title": "Emotion Rendering in Auditory Simulations of Imagined Walking Styles", "doi": null, "abstractUrl": "/journal/ta/2017/02/07390037/13rRUwbaqK9", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2018/01/07511699", "title": "Perception of Emotions and Body Movement in the Emilya Database", "doi": null, "abstractUrl": "/journal/ta/2018/01/07511699/13rRUwd9CJY", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/08/ttg2013081405", "title": "Trajectory Optimization for Full-Body Movements with Complex Contacts", "doi": null, "abstractUrl": "/journal/tg/2013/08/ttg2013081405/13rRUxD9h59", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2018/3227/0/08480374", "title": "Emotion Recognition through Gait on Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/percomw/2018/08480374/17D45Wuc35S", "parentPublication": { "id": "proceedings/percomw/2018/3227/0", "title": "2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2021/3176/0/09667052", "title": "Skeleton-Based Explainable Bodily Expressed Emotion Recognition Through Graph Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/fg/2021/09667052/1A6BuqmxsPu", "parentPublication": { "id": "proceedings/fg/2021/3176/0", "title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a355", "title": "On the Detection of Video's Ethnic Vietnamese Thai Dance Movements", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a355/1j9xGeTUZcQ", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/01/08408525", "title": "Empirical Evidence Relating EEG Signal Duration to Emotion Classification Performance", "doi": null, "abstractUrl": "/journal/ta/2021/01/08408525/1rxd5wQf89G", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09477021", "articleId": "1v2LXvFlUsg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09484714", "articleId": "1veohNWu5Wg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1vb4tVIj4nm", "name": "tta555501-09477164s1-supp1-3095425.avi", "location": "https://www.computer.org/csdl/api/v1/extra/tta555501-09477164s1-supp1-3095425.avi", "extension": "avi", "size": "38.4 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvGPE8n", "title": "Jan.", "year": "2016", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwwJWFP", "doi": "10.1109/TVCG.2015.2467757", "abstract": "Bibliographic data such as collections of scientific articles and citation networks have been studied extensively in information visualization and visual analytics research. Powerful systems have been built to support various types of bibliographic analysis, but they require some training and cannot be used to disseminate the insights gained. In contrast, we focused on developing a more accessible visual analytics system, called SurVis, that is ready to disseminate a carefully surveyed literature collection. The authors of a survey may use our Web-based system to structure and analyze their literature database. Later, readers of the survey can obtain an overview, quickly retrieve specific publications, and reproduce or extend the original bibliographic analysis. Our system employs a set of selectors that enable users to filter and browse the literature collection as well as to control interactive visualizations. The versatile selector concept includes selectors for textual search, filtering by keywords and meta-information, selection and clustering of similar publications, and following citation links. Agreement to the selector is represented by word-sized sparkline visualizations seamlessly integrated into the user interface. Based on an analysis of the analytical reasoning process, we derived requirements for the system. We developed the system in a formative way involving other researchers writing literature surveys. A questionnaire study with 14 visual analytics experts confirms that SurVis meets the initially formulated requirements.", "abstracts": [ { "abstractType": "Regular", "content": "Bibliographic data such as collections of scientific articles and citation networks have been studied extensively in information visualization and visual analytics research. Powerful systems have been built to support various types of bibliographic analysis, but they require some training and cannot be used to disseminate the insights gained. In contrast, we focused on developing a more accessible visual analytics system, called SurVis, that is ready to disseminate a carefully surveyed literature collection. The authors of a survey may use our Web-based system to structure and analyze their literature database. Later, readers of the survey can obtain an overview, quickly retrieve specific publications, and reproduce or extend the original bibliographic analysis. Our system employs a set of selectors that enable users to filter and browse the literature collection as well as to control interactive visualizations. The versatile selector concept includes selectors for textual search, filtering by keywords and meta-information, selection and clustering of similar publications, and following citation links. Agreement to the selector is represented by word-sized sparkline visualizations seamlessly integrated into the user interface. Based on an analysis of the analytical reasoning process, we derived requirements for the system. We developed the system in a formative way involving other researchers writing literature surveys. A questionnaire study with 14 visual analytics experts confirms that SurVis meets the initially formulated requirements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Bibliographic data such as collections of scientific articles and citation networks have been studied extensively in information visualization and visual analytics research. Powerful systems have been built to support various types of bibliographic analysis, but they require some training and cannot be used to disseminate the insights gained. In contrast, we focused on developing a more accessible visual analytics system, called SurVis, that is ready to disseminate a carefully surveyed literature collection. The authors of a survey may use our Web-based system to structure and analyze their literature database. Later, readers of the survey can obtain an overview, quickly retrieve specific publications, and reproduce or extend the original bibliographic analysis. Our system employs a set of selectors that enable users to filter and browse the literature collection as well as to control interactive visualizations. The versatile selector concept includes selectors for textual search, filtering by keywords and meta-information, selection and clustering of similar publications, and following citation links. Agreement to the selector is represented by word-sized sparkline visualizations seamlessly integrated into the user interface. Based on an analysis of the analytical reasoning process, we derived requirements for the system. We developed the system in a formative way involving other researchers writing literature surveys. A questionnaire study with 14 visual analytics experts confirms that SurVis meets the initially formulated requirements.", "title": "Visual Analysis and Dissemination of Scientific Literature Collections with SurVis", "normalizedTitle": "Visual Analysis and Dissemination of Scientific Literature Collections with SurVis", "fno": "07192633", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Browsers", "Tag Clouds", "Libraries", "Visualization", "Cognition", "Literature Browser", "Visual Analytics Of Documents", "Bibliographic Data", "Dissemination", "Literature Browser", "Visual Analytics Of Documents", "Bibliographic Data", "Dissemination" ], "authors": [ { "givenName": "Fabian", "surname": "Beck", "fullName": "Fabian Beck", "affiliation": "VISUS, University of Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Sebastian", "surname": "Koch", "fullName": "Sebastian Koch", "affiliation": "VISUS, University of Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Daniel", "surname": "Weiskopf", "fullName": "Daniel Weiskopf", "affiliation": "VISUS, University of Stuttgart, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2016-01-01 00:00:00", "pubType": "trans", "pages": "180-189", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042497", "title": "Visual exploratory tool for storyline generation", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042497/12OmNAThXU2", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314304", "title": "Visual Analytics of Gene Sets Comparison", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314304/12OmNC3FGdO", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2013/5765/0/06636762", "title": "Visual analytics for software requirements engineering", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636762/12OmNrJ11yp", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070403", "title": "Evaluating visual and statistical exploration of scientific literature networks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070403/12OmNyrIaKU", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883520", "title": "Visual analysis and coding of data-rich user behavior", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883520/12OmNzXFoyS", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2018/01/07888968", "title": "Viziometrics: Analyzing Visual Information in the Scientific Literature", "doi": null, "abstractUrl": "/journal/bd/2018/01/07888968/13rRUwghdb5", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07536217", "title": "Visual Interaction with Dimensionality Reduction: A Structured Literature Analysis", "doi": null, "abstractUrl": "/journal/tg/2017/01/07536217/13rRUwhpBE9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1996/05/r5028", "title": "Federating Diverse Collections of Scientific Literature", "doi": null, "abstractUrl": "/magazine/co/1996/05/r5028/13rRUwjXZMV", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2018/4063/0/10075564", "title": "Computer-supported Interactive Assignment of Keywords for Literature Collections", "doi": null, "abstractUrl": "/proceedings-article/mlui/2018/10075564/1LIRyOHphFC", "parentPublication": { "id": "proceedings/mlui/2018/4063/0", "title": "2018 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274178", "title": "A Literature Study of Visual Analysis in an Educational Context", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274178/1phRS0TEfra", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07192706", "articleId": "13rRUwvBy8V", "__typename": "AdjacentArticleType" }, "next": { "fno": "07192685", "articleId": "13rRUwd9CG5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesSc", "name": "ttg201601-07192633s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201601-07192633s1.zip", "extension": "zip", "size": "840 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNx4gUpS", "title": "May./Jun.", "year": "2018", "issueNum": "03", "idPrefix": "cg", "pubType": "magazine", "volume": "38", "label": "May./Jun.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPOi", "doi": "10.1109/MCG.2018.032421656", "abstract": "Few tools for career exploration utilize visualizations despite their potential to help students understand the intangible relationships between jobs and majors. Our application-driven design combines the intuitiveness of node-link diagrams and the scalability of aggregation-based techniques to combine an overview of a job database with the option for individualized exploration.", "abstracts": [ { "abstractType": "Regular", "content": "Few tools for career exploration utilize visualizations despite their potential to help students understand the intangible relationships between jobs and majors. Our application-driven design combines the intuitiveness of node-link diagrams and the scalability of aggregation-based techniques to combine an overview of a job database with the option for individualized exploration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Few tools for career exploration utilize visualizations despite their potential to help students understand the intangible relationships between jobs and majors. Our application-driven design combines the intuitiveness of node-link diagrams and the scalability of aggregation-based techniques to combine an overview of a job database with the option for individualized exploration.", "title": "Application-Driven Design: Help Students Understand Employment and See the &#x201C;Big Picture&#x201D;", "normalizedTitle": "Application-Driven Design: Help Students Understand Employment and See the “Big Picture”", "fno": "mcg2018030090", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Education", "Employment", "Organisational Aspects", "Application Driven Design", "Node Link Diagrams", "Job Database", "Employment", "Students Career Exploration", "Aggregation Based Technique", "Engineering Profession", "Data Visualization", "Tag Clouds", "Education", "Career Counseling", "Categorical Data", "Circular Layout", "Visualization" ], "authors": [ { "givenName": "Li", "surname": "Liu", "fullName": "Li Liu", "affiliation": "Rutgers University", "__typename": "ArticleAuthorType" }, { "givenName": "Deborah", "surname": "Silver", "fullName": "Deborah Silver", "affiliation": "Rutgers University", "__typename": "ArticleAuthorType" }, { "givenName": "Karen", "surname": "Bemis", "fullName": "Karen Bemis", "affiliation": "Rutgers University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2018-05-01 00:00:00", "pubType": "mags", "pages": "90-105", "year": "2018", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ase/2015/0025/0/0025a894", "title": "A Generic Framework for Concept-Based Exploration of Semi-Structured Software Engineering Data", "doi": null, "abstractUrl": "/proceedings-article/ase/2015/0025a894/12OmNAle6Wg", "parentPublication": { "id": "proceedings/ase/2015/0025/0", "title": "2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314304", "title": "Visual Analytics of Gene Sets Comparison", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314304/12OmNC3FGdO", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004033", "title": "Visualization of Sensory Perception Descriptions", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004033/12OmNCbCrO4", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biovis/2013/1658/0/06664352", "title": "Hummod browser: An exploratory visualization tool for the analysis of whole-body physiology simulation data", "doi": null, "abstractUrl": "/proceedings-article/biovis/2013/06664352/12OmNqGitXC", "parentPublication": { "id": "proceedings/biovis/2013/1658/0", "title": "2013 IEEE Symposium on Biological Data Visualization (BioVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571243", "title": "Taggram: Exploring Geo-data on Maps through a Tag Cloud-Based Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571243/12OmNvrdI4Y", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192685", "title": "CiteRivers: Visual Analytics of Citation Patterns", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192685/13rRUwd9CG5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000b585", "title": "VizCS: Online Searching and Visualizing Communities in Dynamic Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000b585/14Fq0XvEPkh", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/04/08334579", "title": "Visualizing a Thinker&#x0027;s Life", "doi": null, "abstractUrl": "/journal/tg/2019/04/08334579/17YCN2ZsR9e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028556", "title": "Senioritis From the Student&#x2019;s Perspective", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028556/1ifffscZpJu", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/12/09143452", "title": "PyramidTags: Context-, Time- and Word Order-Aware Tag Maps to Explore Large Document Collections", "doi": null, "abstractUrl": "/journal/tg/2021/12/09143452/1lxmwM0AM9O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2018030073", "articleId": "13rRUypGGdb", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2018030106", "articleId": "13rRUxYIMXC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04Q", "title": "Jan.", "year": "2017", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxYIMV3", "doi": "10.1109/TVCG.2016.2598590", "abstract": "We introduce SentenTree, a novel technique for visualizing the content of unstructured social media text. SentenTree displays frequent sentence patterns abstracted from a corpus of social media posts. The technique employs design ideas from word clouds and the Word Tree, but overcomes a number of limitations of both those visualizations. SentenTree displays a node-link diagram where nodes are words and links indicate word co-occurrence within the same sentence. The spatial arrangement of nodes gives cues to the syntactic ordering of words while the size of nodes gives cues to their frequency of occurrence. SentenTree can help people gain a rapid understanding of key concepts and opinions in a large social media text collection. It is implemented as a lightweight application that runs in the browser.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce SentenTree, a novel technique for visualizing the content of unstructured social media text. SentenTree displays frequent sentence patterns abstracted from a corpus of social media posts. The technique employs design ideas from word clouds and the Word Tree, but overcomes a number of limitations of both those visualizations. SentenTree displays a node-link diagram where nodes are words and links indicate word co-occurrence within the same sentence. The spatial arrangement of nodes gives cues to the syntactic ordering of words while the size of nodes gives cues to their frequency of occurrence. SentenTree can help people gain a rapid understanding of key concepts and opinions in a large social media text collection. It is implemented as a lightweight application that runs in the browser.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce SentenTree, a novel technique for visualizing the content of unstructured social media text. SentenTree displays frequent sentence patterns abstracted from a corpus of social media posts. The technique employs design ideas from word clouds and the Word Tree, but overcomes a number of limitations of both those visualizations. SentenTree displays a node-link diagram where nodes are words and links indicate word co-occurrence within the same sentence. The spatial arrangement of nodes gives cues to the syntactic ordering of words while the size of nodes gives cues to their frequency of occurrence. SentenTree can help people gain a rapid understanding of key concepts and opinions in a large social media text collection. It is implemented as a lightweight application that runs in the browser.", "title": "Visualizing Social Media Content with SentenTree", "normalizedTitle": "Visualizing Social Media Content with SentenTree", "fno": "07536200", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Visualization", "Tag Clouds", "Media", "Context", "Twitter", "Games", "Layout", "Twitter", "Text Visualization", "Social Media", "Natural Language Processing", "Word Cloud" ], "authors": [ { "givenName": "Mengdie", "surname": "Hu", "fullName": "Mengdie Hu", "affiliation": "Georgia Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Krist", "surname": "Wongsuphasawat", "fullName": "Krist Wongsuphasawat", "affiliation": "Twitter Inc.", "__typename": "ArticleAuthorType" }, { "givenName": "John", "surname": "Stasko", "fullName": "John Stasko", "affiliation": "Georgia Institute of Technology", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "trans", "pages": "621-630", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/passat-socialcom/2011/1931/0/06113088", "title": "Finding Credible Information Sources in Social Networks Based on Content and Social Structure", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113088/12OmNBCHMK0", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493b375", "title": "Grandmaster: Interactive Text-Based Analytics of Social Media", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493b375/12OmNBPc8zA", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2015/9371/0/07396607", "title": "Emerging Rumor Identification for Social Media with Hot Topic Detection", "doi": null, "abstractUrl": "/proceedings-article/wisa/2015/07396607/12OmNvkpkU9", "parentPublication": { "id": "proceedings/wisa/2015/9371/0", "title": "2015 12th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c033", "title": "Perspective Matters: Sharing of Crisis Information in Social Media", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c033/12OmNwNeYvM", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b745", "title": "Link Sharing on Twitter during Popular Events: Implications for Social Navigation on Websites", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b745/12OmNwtWfPM", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a021", "title": "Correlation of Brand Mentions in Social Media and Web Searching Before and After Real Life Events: Phase Analysis of Social Media and Search Data for Super Bowl 2015 Commercials", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a021/12OmNyQ7FHU", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b453", "title": "Linky: Visualizing User Identity Linkage Results for Multiple Online Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b453/18jXGg8GbM4", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069113", "title": "Medical Persona Classification in Social Media", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069113/1j9xXazYNwI", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a428", "title": "Deep learning for Antisocial Behaviour Analysis on Social Media", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a428/1rSReRELTUI", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2021/1627/0/162700a127", "title": "Social Media Named Entity Recognition Based On Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2021/162700a127/1zzpptinj8Y", "parentPublication": { "id": "proceedings/iscsic/2021/1627/0", "title": "2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07536133", "articleId": "13rRUyuNsx1", "__typename": "AdjacentArticleType" }, "next": { "fno": "07536174", "articleId": "13rRUwI5TXB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzFdtc6", "title": "November/December", "year": "2010", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "16", "label": "November/December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxjyX3T", "doi": "10.1109/TVCG.2010.194", "abstract": "Tag clouds have proliferated over the web over the last decade. They provide a visual summary of a collection of texts by visually depicting the tag frequency by font size. In use, tag clouds can evolve as the associated data source changes over time. Interesting discussions around tag clouds often include a series of tag clouds and consider how they evolve over time. However, since tag clouds do not explicitly represent trends or support comparisons, the cognitive demands placed on the person for perceiving trends in multiple tag clouds are high. In this paper, we introduce SparkClouds, which integrate sparklines [23] into a tag cloud to convey trends between multiple tag clouds. We present results from a controlled study that compares SparkClouds with two traditional trend visualizations—multiple line graphs and stacked bar charts—as well as Parallel Tag Clouds [4]. Results show that SparkClouds ability to show trends compares favourably to the alternative visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "Tag clouds have proliferated over the web over the last decade. They provide a visual summary of a collection of texts by visually depicting the tag frequency by font size. In use, tag clouds can evolve as the associated data source changes over time. Interesting discussions around tag clouds often include a series of tag clouds and consider how they evolve over time. However, since tag clouds do not explicitly represent trends or support comparisons, the cognitive demands placed on the person for perceiving trends in multiple tag clouds are high. In this paper, we introduce SparkClouds, which integrate sparklines [23] into a tag cloud to convey trends between multiple tag clouds. We present results from a controlled study that compares SparkClouds with two traditional trend visualizations—multiple line graphs and stacked bar charts—as well as Parallel Tag Clouds [4]. Results show that SparkClouds ability to show trends compares favourably to the alternative visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tag clouds have proliferated over the web over the last decade. They provide a visual summary of a collection of texts by visually depicting the tag frequency by font size. In use, tag clouds can evolve as the associated data source changes over time. Interesting discussions around tag clouds often include a series of tag clouds and consider how they evolve over time. However, since tag clouds do not explicitly represent trends or support comparisons, the cognitive demands placed on the person for perceiving trends in multiple tag clouds are high. In this paper, we introduce SparkClouds, which integrate sparklines [23] into a tag cloud to convey trends between multiple tag clouds. We present results from a controlled study that compares SparkClouds with two traditional trend visualizations—multiple line graphs and stacked bar charts—as well as Parallel Tag Clouds [4]. Results show that SparkClouds ability to show trends compares favourably to the alternative visualizations.", "title": "SparkClouds: Visualizing Trends in Tag Clouds", "normalizedTitle": "SparkClouds: Visualizing Trends in Tag Clouds", "fno": "ttg2010061182", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Tag Clouds", "Trend Visualization", "Multiple Line Graphs", "Stacked Bar Charts", "Evaluation" ], "authors": [ { "givenName": "Bongshin", "surname": "Lee", "fullName": "Bongshin Lee", "affiliation": "Microsoft Research", "__typename": "ArticleAuthorType" }, { "givenName": "Nathalie Henry", "surname": "Riche", "fullName": "Nathalie Henry Riche", "affiliation": "Microsoft Research", "__typename": "ArticleAuthorType" }, { "givenName": "Amy K.", "surname": "Karlson", "fullName": "Amy K. Karlson", "affiliation": "Microsoft Research", "__typename": "ArticleAuthorType" }, { "givenName": "Sheelash", "surname": "Carpendale", "fullName": "Sheelash Carpendale", "affiliation": "University of Calgary", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2010-11-01 00:00:00", "pubType": "trans", "pages": "1182-1189", "year": "2010", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ism/2012/4875/0/4875a318", "title": "Tag Cloud++ - Scalable Tag Clouds for Arbitrary Layouts", "doi": null, "abstractUrl": "/proceedings-article/ism/2012/4875a318/12OmNC2fGAI", "parentPublication": { "id": "proceedings/ism/2012/4875/0", "title": "2012 IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2013/5049/0/5049a045", "title": "Prefix Tag Clouds", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a045/12OmNvpNIsn", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718617", "title": "WordBridge: Using Composite Tag Clouds in Node-Link Diagrams for Visualizing Content and Relations in Text Corpora", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718617/12OmNwwMf1y", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icn/2008/3106/0/3106a686", "title": "MobileAERO: Using Tag Clouds for Mobile Knowledge Management", "doi": null, "abstractUrl": "/proceedings-article/icn/2008/3106a686/12OmNx9FhSF", "parentPublication": { "id": "proceedings/icn/2008/3106/0", "title": "International Conference on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04438863", "title": "Tag Clouds: Data Analysis Tool or Social Signaller?", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04438863/12OmNyGbIgI", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816707", "title": "Interactive hierarchical tag clouds for summarizing spatiotemporal social contents", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816707/12OmNz6iOxa", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a017", "title": "On the Beauty and Usability of Tag Clouds", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a017/12OmNzYNNgD", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c129", "title": "Differential Tag Clouds: Highlighting Particular Features in Documents", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c129/12OmNzayN1n", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2012/2621/0/06327416", "title": "Improving Tag Clouds with Ontologies and Semantics", "doi": null, "abstractUrl": "/proceedings-article/dexa/2012/06327416/12OmNznkKbk", "parentPublication": { "id": "proceedings/dexa/2012/2621/0", "title": "2012 23rd International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2018/7325/0/732500a680", "title": "PubTag: Generating Research Tag-Clouds with Keyphrase Extraction and Learning-to-Rank", "doi": null, "abstractUrl": "/proceedings-article/wi/2018/732500a680/17D45WZZ7Gv", "parentPublication": { "id": "proceedings/wi/2018/7325/0", "title": "2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2010061164", "articleId": "13rRUEgs2to", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2010061190", "articleId": "13rRUwvBy8R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBBzofH", "title": "June", "year": "2011", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "17", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxZ0o1w", "doi": "10.1109/TVCG.2010.114", "abstract": "We present practical algorithms for accelerating distance queries on models made of trimmed NURBS surfaces using programmable Graphics Processing Units (GPUs). We provide a generalized framework for using GPUs as coprocessors in accelerating CAD operations. By supplementing surface data with a surface bounding-box hierarchy on the GPU, we answer distance queries such as finding the closest point on a curved NURBS surface given any point in space and evaluating the clearance between two solid models constructed using multiple NURBS surfaces. We simultaneously output the parameter values corresponding to the solution of these queries along with the model space values. Though our algorithms make use of the programmable fragment processor, the accuracy is based on the model space precision, unlike earlier graphics algorithms that were based only on image space precision. In addition, we provide theoretical bounds for both the computed minimum distance values as well as the location of the closest point. Our algorithms are at least an order of magnitude faster and about two orders of magnitude more accurate than the commercial solid modeling kernel ACIS.", "abstracts": [ { "abstractType": "Regular", "content": "We present practical algorithms for accelerating distance queries on models made of trimmed NURBS surfaces using programmable Graphics Processing Units (GPUs). We provide a generalized framework for using GPUs as coprocessors in accelerating CAD operations. By supplementing surface data with a surface bounding-box hierarchy on the GPU, we answer distance queries such as finding the closest point on a curved NURBS surface given any point in space and evaluating the clearance between two solid models constructed using multiple NURBS surfaces. We simultaneously output the parameter values corresponding to the solution of these queries along with the model space values. Though our algorithms make use of the programmable fragment processor, the accuracy is based on the model space precision, unlike earlier graphics algorithms that were based only on image space precision. In addition, we provide theoretical bounds for both the computed minimum distance values as well as the location of the closest point. Our algorithms are at least an order of magnitude faster and about two orders of magnitude more accurate than the commercial solid modeling kernel ACIS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present practical algorithms for accelerating distance queries on models made of trimmed NURBS surfaces using programmable Graphics Processing Units (GPUs). We provide a generalized framework for using GPUs as coprocessors in accelerating CAD operations. By supplementing surface data with a surface bounding-box hierarchy on the GPU, we answer distance queries such as finding the closest point on a curved NURBS surface given any point in space and evaluating the clearance between two solid models constructed using multiple NURBS surfaces. We simultaneously output the parameter values corresponding to the solution of these queries along with the model space values. Though our algorithms make use of the programmable fragment processor, the accuracy is based on the model space precision, unlike earlier graphics algorithms that were based only on image space precision. In addition, we provide theoretical bounds for both the computed minimum distance values as well as the location of the closest point. Our algorithms are at least an order of magnitude faster and about two orders of magnitude more accurate than the commercial solid modeling kernel ACIS.", "title": "GPU-Accelerated Minimum Distance and Clearance Queries", "normalizedTitle": "GPU-Accelerated Minimum Distance and Clearance Queries", "fno": "ttg2011060729", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Minimum Distance", "Closest Point", "Clearance Analysis", "NURBS", "GPU", "Hybrid CPU GPU Algorithms" ], "authors": [ { "givenName": "Adarsh", "surname": "Krishnamurthy", "fullName": "Adarsh Krishnamurthy", "affiliation": "University of California Berkeley, Berkeley", "__typename": "ArticleAuthorType" }, { "givenName": "Sara", "surname": "McMains", "fullName": "Sara McMains", "affiliation": "University of California Berkeley, Berkeley", "__typename": "ArticleAuthorType" }, { "givenName": "Kirk", "surname": "Haller", "fullName": "Kirk Haller", "affiliation": "SolidWorks Corporation, Concord", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2011-06-01 00:00:00", "pubType": "trans", "pages": "729-742", "year": "2011", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/rt/2006/0693/0/04061557", "title": "Ray Casting of Trimmed NURBS Surfaces on the GPU", "doi": null, "abstractUrl": "/proceedings-article/rt/2006/04061557/12OmNBNM8TN", "parentPublication": { "id": "proceedings/rt/2006/0693/0", "title": "IEEE Symposium on Interactive Ray Tracing 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1992/2900/0/0267816", "title": "Dynamic half-space reporting, geometric optimization, and minimum spanning trees", "doi": null, "abstractUrl": "/proceedings-article/focs/1992/0267816/12OmNBtl1Gx", "parentPublication": { "id": "proceedings/focs/1992/2900/0", "title": "Proceedings., 33rd Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waim/2008/3185/0/3185a099", "title": "Efficient k-Closest-Pair Range-Queries in Spatial Databases", "doi": null, "abstractUrl": "/proceedings-article/waim/2008/3185a099/12OmNC3FG4N", "parentPublication": { "id": "proceedings/waim/2008/3185/0", "title": "Web-Age Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/4/3804e554", "title": "Multiple-Points Constraints Based Deformation for NURBS Surfaces", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804e554/12OmNqHqSpd", "parentPublication": { "id": "proceedings/icicta/2009/3804/4", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoip/2010/4252/2/4252b055", "title": "Offset, Bisector and Medial Axis Construction on NURBS Surface Based on GPU", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252b055/12OmNrHjqQ1", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2011/4575/0/4575a009", "title": "Performance Optimization of Top-k Queries on GPU", "doi": null, "abstractUrl": "/proceedings-article/paap/2011/4575a009/12OmNvTTcgi", "parentPublication": { "id": "proceedings/paap/2011/4575/0", "title": "Parallel Architectures, Algorithms and Programming, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2011/4575/0/4575a190", "title": "Parallel Optimization of Queries in XML Dataset Using GPU", "doi": null, "abstractUrl": "/proceedings-article/paap/2011/4575a190/12OmNwoPtB6", "parentPublication": { "id": "proceedings/paap/2011/4575/0", "title": "Parallel Architectures, Algorithms and Programming, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c534", "title": "A Fast Collision Detection Algorithm Based on Distance Calculations between NURBS Surfaces", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c534/12OmNxeM482", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/04/ttg2009040530", "title": "Performing Efficient NURBS Modeling Operations on the GPU", "doi": null, "abstractUrl": "/journal/tg/2009/04/ttg2009040530/13rRUwInvsG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d190", "title": "Efficient GPU-accelerated Join Optimization for Complex Queries", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d190/1FwFrzxOnOE", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2011060715", "articleId": "13rRUxjQyhp", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2011060743", "articleId": "13rRUxZzAhB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRUs", "name": "ttg2011060729s.avi", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2011060729s.avi", "extension": "avi", "size": "6.88 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBVrjqW", "title": "March/April", "year": "2006", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "12", "label": "March/April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgyOjb", "doi": "10.1109/TVCG.2006.29", "abstract": "Abstract—We present a reliable culling algorithm that enables fast and accurate collision detection between triangulated models in a complex environment. Our algorithm performs fast visibility queries on the GPUs for eliminating a subset of primitives that are not in close proximity. In order to overcome the accuracy problems caused by the limited viewport resolution, we compute the Minkowski sum of each primitive with a sphere and perform reliable 2.5D overlap tests between the primitives. We are able to achieve more effective collision culling as compared to prior object-space culling algorithms. We integrate our culling algorithm with CULLIDE [CHECK END OF SENTENCE] and use it to perform reliable GPU-based collision queries at interactive rates on all types of models, including nonmanifold geometry, deformable models, and breaking objects.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—We present a reliable culling algorithm that enables fast and accurate collision detection between triangulated models in a complex environment. Our algorithm performs fast visibility queries on the GPUs for eliminating a subset of primitives that are not in close proximity. In order to overcome the accuracy problems caused by the limited viewport resolution, we compute the Minkowski sum of each primitive with a sphere and perform reliable 2.5D overlap tests between the primitives. We are able to achieve more effective collision culling as compared to prior object-space culling algorithms. We integrate our culling algorithm with CULLIDE [CHECK END OF SENTENCE] and use it to perform reliable GPU-based collision queries at interactive rates on all types of models, including nonmanifold geometry, deformable models, and breaking objects.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—We present a reliable culling algorithm that enables fast and accurate collision detection between triangulated models in a complex environment. Our algorithm performs fast visibility queries on the GPUs for eliminating a subset of primitives that are not in close proximity. In order to overcome the accuracy problems caused by the limited viewport resolution, we compute the Minkowski sum of each primitive with a sphere and perform reliable 2.5D overlap tests between the primitives. We are able to achieve more effective collision culling as compared to prior object-space culling algorithms. We integrate our culling algorithm with CULLIDE [CHECK END OF SENTENCE] and use it to perform reliable GPU-based collision queries at interactive rates on all types of models, including nonmanifold geometry, deformable models, and breaking objects.", "title": "Fast and Reliable Collision Culling Using Graphics Hardware", "normalizedTitle": "Fast and Reliable Collision Culling Using Graphics Hardware", "fno": "v0143", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Collision Detection", "Graphics Hardware", "Deformable Models", "Minkowski Sums" ], "authors": [ { "givenName": "Naga K.", "surname": "Govindaraju", "fullName": "Naga K. Govindaraju", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Ming C.", "surname": "Lin", "fullName": "Ming C. Lin", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Dinesh", "surname": "Manocha", "fullName": "Dinesh Manocha", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2006-03-01 00:00:00", "pubType": "trans", "pages": "143-154", "year": "2006", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccsee/2012/4647/3/4647c557", "title": "Collision Detection Research for Deformable Objects", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c557/12OmNAXxWYc", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2015/8020/0/07450271", "title": "A Simple Filtering Algorithm for Continuous Collision Detection Using Taylor Models", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2015/07450271/12OmNBTawni", "parentPublication": { "id": "proceedings/cad-graphics/2015/8020/0", "title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/4115/3/4115c185", "title": "Efficient Collision Detection Using a Dual K-DOP-Sphere Bounding Volume Hierarchy", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/4115c185/12OmNvwTGGt", "parentPublication": { "id": "proceedings/ifita/2010/4115/1", "title": "Information Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2008/3114/0/3114a122", "title": "A Composite Convex Hull Collision Detector for the Open Dynamics Engine", "doi": null, "abstractUrl": "/proceedings-article/uksim/2008/3114a122/12OmNx57HO7", "parentPublication": { "id": "proceedings/uksim/2008/3114/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a288", "title": "Parallel Spatial Hashing for Collision Detection of Deformable Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a288/12OmNybfr5g", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492754", "title": "Quick-CULLIDE: fast inter- and intra-object collision culling using graphics hardware", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492754/12OmNznkJU4", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/06/v0649", "title": "Image-Based Collision Detection for Deformable Cloth Models", "doi": null, "abstractUrl": "/journal/tg/2004/06/v0649/13rRUNvgz9z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/02/v0318", "title": "Interactive Collision Detection for Deformable Models Using Streaming AABBs", "doi": null, "abstractUrl": "/journal/tg/2007/02/v0318/13rRUwgyOjd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/ttg2012071146", "title": "Simple Culling Methods for Continuous Collision Detection of Deforming Triangles", "doi": null, "abstractUrl": "/journal/tg/2012/07/ttg2012071146/13rRUxcKzVj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/04/ttg2009040544", "title": "ICCD: Interactive Continuous Collision Detection between Deformable Models Using Connectivity-Based Culling", "doi": null, "abstractUrl": "/journal/tg/2009/04/ttg2009040544/13rRUyuegp3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "v0131", "articleId": "13rRUxZzAhw", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0155", "articleId": "13rRUwkfAZ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }