data
dict
{ "issue": { "id": "1xlvIBjDUyc", "title": "Nov.", "year": "2021", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "43", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1jLOJFsXlni", "doi": "10.1109/TPAMI.2020.2994190", "abstract": "Most robust estimators require tuning the parameters of the algorithm for the particular application, a bottleneck for practical applications. The paper presents the multiple input structures with robust estimator (MISRE), where each structure, inlier or outlier, is processed independently. The same two constants are used to find the scale estimates over expansions for each structure. The inlier/outlier classification is straightforward since the data is processed and ordered with the relevant inlier structures listed first. If the inlier noises are similar, MISRE’s performance is equivalent to RANSAC-type algorithms. MISRE still returns the correct inlier estimates when inlier noises are very different, while RANSAC-type algorithms do not perform as well. MISRE’s failures are gradual when too many outliers are present, beginning with the least significant inlier structure. Examples from 2D images and 3D point clouds illustrate the estimation.", "abstracts": [ { "abstractType": "Regular", "content": "Most robust estimators require tuning the parameters of the algorithm for the particular application, a bottleneck for practical applications. The paper presents the multiple input structures with robust estimator (MISRE), where each structure, inlier or outlier, is processed independently. The same two constants are used to find the scale estimates over expansions for each structure. The inlier/outlier classification is straightforward since the data is processed and ordered with the relevant inlier structures listed first. If the inlier noises are similar, MISRE’s performance is equivalent to RANSAC-type algorithms. MISRE still returns the correct inlier estimates when inlier noises are very different, while RANSAC-type algorithms do not perform as well. MISRE’s failures are gradual when too many outliers are present, beginning with the least significant inlier structure. Examples from 2D images and 3D point clouds illustrate the estimation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most robust estimators require tuning the parameters of the algorithm for the particular application, a bottleneck for practical applications. The paper presents the multiple input structures with robust estimator (MISRE), where each structure, inlier or outlier, is processed independently. The same two constants are used to find the scale estimates over expansions for each structure. The inlier/outlier classification is straightforward since the data is processed and ordered with the relevant inlier structures listed first. If the inlier noises are similar, MISRE’s performance is equivalent to RANSAC-type algorithms. MISRE still returns the correct inlier estimates when inlier noises are very different, while RANSAC-type algorithms do not perform as well. MISRE’s failures are gradual when too many outliers are present, beginning with the least significant inlier structure. Examples from 2D images and 3D point clouds illustrate the estimation.", "title": "A New Approach to Robust Estimation of Parametric Structures", "normalizedTitle": "A New Approach to Robust Estimation of Parametric Structures", "fno": "09091905", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computer Vision", "Estimation Theory", "Feature Extraction", "Hidden Feature Removal", "Image Motion Analysis", "Image Reconstruction", "Image Sequences", "Iterative Methods", "Video Signal Processing", "Inlier Noises", "RANSAC Type Algorithms", "Significant Inlier Structure", "Robust Estimation", "Parametric Structures", "Robust Estimator", "Multiple Input Structures", "Relevant Inlier Structures", "MISR Es Performance", "Correct Inlier", "Estimation", "Robustness", "Two Dimensional Displays", "Linear Programming", "Three Dimensional Displays", "Complexity Theory", "Covariance Matrices", "Scale Estimation", "Density Based Classification", "Structures Segmentation" ], "authors": [ { "givenName": "Xiang", "surname": "Yang", "fullName": "Xiang Yang", "affiliation": "Department of Mechanical and Aerospace Engineering, Advanced Corporation for Materials Equipments (ACME), Muyun Industrial Zone, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Meer", "fullName": "Peter Meer", "affiliation": "Department of Electrical and Computer Engineering, Rutgers University, NJ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jonathan", "surname": "Meer", "fullName": "Jonathan Meer", "affiliation": "Department of Economics, Texas A&M, College Station, TX, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2021-11-01 00:00:00", "pubType": "trans", "pages": "3754-3769", "year": "2021", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2015/6964/0/07298884", "title": "Practical robust two-view translation estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298884/12OmNAkWvmX", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118b606", "title": "Fast and Reliable Two-View Translation Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118b606/12OmNB7cjkl", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2006/2646/0/26460100", "title": "Ensemble Method for Robust Motion Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2006/26460100/12OmNyQ7G6f", "parentPublication": { "id": "proceedings/cvprw/2006/2646/0", "title": "2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c282", "title": "The Likelihood-Ratio Test and Efficient Robust Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c282/12OmNz6iOja", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2006/2646/0/26460102", "title": "Robust Estimation in the Presence of Spatially Coherent Outliers", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2006/26460102/12OmNzUPpho", "parentPublication": { "id": "proceedings/cvprw/2006/2646/0", "title": "2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/11/i1459", "title": "Robust Adaptive-Scale Parametric Model Estimation for Computer Vision", "doi": null, "abstractUrl": "/journal/tp/2004/11/i1459/13rRUxASucB", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a895", "title": "Robust Absolute and Relative Pose Estimation of a Central Camera System from 2D-3D Line Correspondences", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a895/1i5mxbBns0o", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09399280", "title": "Graph-Cut RANSAC: Local Optimization on Spatially Coherent Structures", "doi": null, "abstractUrl": "/journal/tp/2022/09/09399280/1sDoIFyKt44", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5854", "title": "PointDSC: Robust Point Cloud Registration using Deep Spatial Consistency", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5854/1yeHPco0aiY", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09091090", "articleId": "1jLOJKgqXGU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09091327", "articleId": "1jK9JPDHVni", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNAoDihg", "title": "May-June", "year": "2012", "issueNum": "03", "idPrefix": "ex", "pubType": "magazine", "volume": "27", "label": "May-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUILLkHQ", "doi": "10.1109/MIS.2012.56", "abstract": "Government data covers authoritative and valuable information about our society. Public access to government data, however, remains challenging largely due to the heterogeneity and complexity of the public information ecosystem which results in high costs for locating, decoding, inter-linking and reusing existing government data. Recently, linked data–based solutions have been adopted by the leading practitioners (such as Data.gov in the US and Data.gov.uk in the UK) to offer an open and incremental ecosystem that interconnects providers, consumers, and contributors of open government data. This article first reports a community consensus on the architecture of the linked open government data ecosystem, then reviews the key technologies reported by works included in this special issue, and finally concludes with three grand challenges towards opening, linking, and reusing government data.", "abstracts": [ { "abstractType": "Regular", "content": "Government data covers authoritative and valuable information about our society. Public access to government data, however, remains challenging largely due to the heterogeneity and complexity of the public information ecosystem which results in high costs for locating, decoding, inter-linking and reusing existing government data. Recently, linked data–based solutions have been adopted by the leading practitioners (such as Data.gov in the US and Data.gov.uk in the UK) to offer an open and incremental ecosystem that interconnects providers, consumers, and contributors of open government data. This article first reports a community consensus on the architecture of the linked open government data ecosystem, then reviews the key technologies reported by works included in this special issue, and finally concludes with three grand challenges towards opening, linking, and reusing government data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Government data covers authoritative and valuable information about our society. Public access to government data, however, remains challenging largely due to the heterogeneity and complexity of the public information ecosystem which results in high costs for locating, decoding, inter-linking and reusing existing government data. Recently, linked data–based solutions have been adopted by the leading practitioners (such as Data.gov in the US and Data.gov.uk in the UK) to offer an open and incremental ecosystem that interconnects providers, consumers, and contributors of open government data. This article first reports a community consensus on the architecture of the linked open government data ecosystem, then reviews the key technologies reported by works included in this special issue, and finally concludes with three grand challenges towards opening, linking, and reusing government data.", "title": "Linked Open Government Data", "normalizedTitle": "Linked Open Government Data", "fno": "mex2012030011", "hasPdf": true, "idPrefix": "ex", "keywords": [ "Open Government Data", "Information Management", "Linked Data", "Semantic Web", "Electronic Government", "Semantics", "Government Data Processing", "Challenge", "Data Oriented Architectures" ], "authors": [ { "givenName": "Li", "surname": "Ding", "fullName": "Li Ding", "affiliation": "Qualcomm", "__typename": "ArticleAuthorType" }, { "givenName": "Vassilios", "surname": "Peristeras", "fullName": "Vassilios Peristeras", "affiliation": "European Commission", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Hausenblas", "fullName": "Michael Hausenblas", "affiliation": "National University of Ireland, Galway", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "03", "pubDate": "2012-05-01 00:00:00", "pubType": "mags", "pages": "11-15", "year": "2012", "issn": "1541-1672", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892b890", "title": "From Open Data to Open Innovation Strategies: Creating E-Services Using Open Government Data", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b890/12OmNBTs7E8", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2011/4426/0/06037649", "title": "DIGO: An Open Data Architecture for e-Government", "doi": null, "abstractUrl": "/proceedings-article/edocw/2011/06037649/12OmNCwUmA9", "parentPublication": { "id": "proceedings/edocw/2011/4426/0", "title": "2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2013/2510/0/2510a594", "title": "A Lightweight Approach to Semantify Saudi Open Government Data", "doi": null, "abstractUrl": "/proceedings-article/nbis/2013/2510a594/12OmNqHItAy", "parentPublication": { "id": "proceedings/nbis/2013/2510/0", "title": "2013 16th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cedem/2017/6718/0/08046278", "title": "Legal Ontology for Open Government Data Mashups", "doi": null, "abstractUrl": "/proceedings-article/cedem/2017/08046278/12OmNxFJXKY", "parentPublication": { "id": "proceedings/cedem/2017/6718/0", "title": "2017 Conference for E-Democracy and Open Government (CeDEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670c595", "title": "Introduction to Big, Open and Linked Data (BOLD) in Government Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670c595/12OmNyuy9Z8", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eidwt/2011/4456/0/4456a107", "title": "Open Government Data on the Web: A Semantic Approach", "doi": null, "abstractUrl": "/proceedings-article/eidwt/2011/4456a107/12OmNzYeAPx", "parentPublication": { "id": "proceedings/eidwt/2011/4456/0", "title": "2011 International Conference on Emerging Intelligent Data and Web Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2012/03/mex2012030025", "title": "US Government Linked Open Data: Semantic.data.gov", "doi": null, "abstractUrl": "/magazine/ex/2012/03/mex2012030025/13rRUwj7crh", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2013/04/mic2013040072", "title": "Linked Data in Government", "doi": null, "abstractUrl": "/magazine/ic/2013/04/mic2013040072/13rRUxASury", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2012/03/mex2012030016", "title": "Linked Open Government Data: Lessons from Data.gov.uk", "doi": null, "abstractUrl": "/magazine/ex/2012/03/mex2012030016/13rRUxCitDQ", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2020/6975/0/697500a257", "title": "An End-to-End Framework for Integrating and Publishing Linked Open Government Data", "doi": null, "abstractUrl": "/proceedings-article/wetice/2020/697500a257/1qRP0Ez0Qak", "parentPublication": { "id": "proceedings/wetice/2020/6975/0", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mex2012030004", "articleId": "13rRUxCitFl", "__typename": "AdjacentArticleType" }, "next": { "fno": "mex2012030016", "articleId": "13rRUxCitDQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzA6GUp", "title": "Jan.-Feb.", "year": "2016", "issueNum": "01", "idPrefix": "tb", "pubType": "journal", "volume": "13", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgQpBH", "doi": "10.1109/TCBB.2015.2476790", "abstract": "Cervical cancer is the third most common malignancy in women worldwide. It remains a leading cause of cancer-related death for women in developing countries. In order to contribute to the treatment of the cervical cancer, in our work, we try to find a few key genes resulting in the cervical cancer. Employing functions of several bioinformatics tools, we selected 143 differentially expressed genes (DEGs) associated with the cervical cancer. The results of bioinformatics analysis show that these DEGs play important roles in the development of cervical cancer. Through comparing two differential co-expression networks (DCNs) at two different states, we found a common sub-network and two differential sub-networks as well as some hub genes in three sub-networks. Moreover, some of the hub genes have been reported to be related to the cervical cancer. Those hub genes were analyzed from Gene Ontology function enrichment, pathway enrichment and protein binding three aspects. The results can help us understand the development of the cervical cancer and guide further experiments about the cervical cancer.", "abstracts": [ { "abstractType": "Regular", "content": "Cervical cancer is the third most common malignancy in women worldwide. It remains a leading cause of cancer-related death for women in developing countries. In order to contribute to the treatment of the cervical cancer, in our work, we try to find a few key genes resulting in the cervical cancer. Employing functions of several bioinformatics tools, we selected 143 differentially expressed genes (DEGs) associated with the cervical cancer. The results of bioinformatics analysis show that these DEGs play important roles in the development of cervical cancer. Through comparing two differential co-expression networks (DCNs) at two different states, we found a common sub-network and two differential sub-networks as well as some hub genes in three sub-networks. Moreover, some of the hub genes have been reported to be related to the cervical cancer. Those hub genes were analyzed from Gene Ontology function enrichment, pathway enrichment and protein binding three aspects. The results can help us understand the development of the cervical cancer and guide further experiments about the cervical cancer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cervical cancer is the third most common malignancy in women worldwide. It remains a leading cause of cancer-related death for women in developing countries. In order to contribute to the treatment of the cervical cancer, in our work, we try to find a few key genes resulting in the cervical cancer. Employing functions of several bioinformatics tools, we selected 143 differentially expressed genes (DEGs) associated with the cervical cancer. The results of bioinformatics analysis show that these DEGs play important roles in the development of cervical cancer. Through comparing two differential co-expression networks (DCNs) at two different states, we found a common sub-network and two differential sub-networks as well as some hub genes in three sub-networks. Moreover, some of the hub genes have been reported to be related to the cervical cancer. Those hub genes were analyzed from Gene Ontology function enrichment, pathway enrichment and protein binding three aspects. The results can help us understand the development of the cervical cancer and guide further experiments about the cervical cancer.", "title": "Predicting Hub Genes Associated with Cervical Cancer through Gene Co-Expression Networks", "normalizedTitle": "Predicting Hub Genes Associated with Cervical Cancer through Gene Co-Expression Networks", "fno": "07277001", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Cervical Cancer", "Bioinformatics", "Correlation", "IEEE Transactions", "Computational Biology", "Gene Expression", "Hub Genes", "Cervical Cancer", "Co Expression Network", "Differentially Expressed Genes", "Hub Genes", "Cervical Cancer", "Co Expression Network", "Differentially Expressed Genes" ], "authors": [ { "givenName": "Su-Ping", "surname": "Deng", "fullName": "Su-Ping Deng", "affiliation": "Institute of Machine Learning and Systems Biology, College of Electronics and Information Engineering, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lin", "surname": "Zhu", "fullName": "Lin Zhu", "affiliation": "Institute of Machine Learning and Systems Biology, College of Electronics and Information Engineering, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "De-Shuang", "surname": "Huang", "fullName": "De-Shuang Huang", "affiliation": "Institute of Machine Learning and Systems Biology, College of Electronics and Information Engineering, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2016-01-01 00:00:00", "pubType": "trans", "pages": "27-35", "year": "2016", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hisb/2011/4407/0/4407a048", "title": "Cervical Cancer Classification Using Gabor Filters", "doi": null, "abstractUrl": "/proceedings-article/hisb/2011/4407a048/12OmNARRYhv", "parentPublication": { "id": "proceedings/hisb/2011/4407/0", "title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a117", "title": "Identification of Potential Non-invasive Biomarkers for Breast Cancer Prognosis and Treatment by Systematic Bioinformatics Analysis", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a117/12OmNCgJe36", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2009/3933/0/3933a079", "title": "Multi-agent System for Gene Expression Analysis to Identify Involved Genes in Cervical Cancer", "doi": null, "abstractUrl": "/proceedings-article/micai/2009/3933a079/12OmNs5rkPX", "parentPublication": { "id": "proceedings/micai/2009/3933/0", "title": "2009 Eighth Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/6079/1/05445778", "title": "Classification Cervical Cancer Using Histology Images", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/05445778/12OmNvD8RGp", "parentPublication": { "id": "proceedings/iccea/2010/6079/1", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eait/2014/4272/0/4272a077", "title": "Identification of Genetic Pathway for Cervical Cancer Development Using Rough and Bayesian Theory", "doi": null, "abstractUrl": "/proceedings-article/eait/2014/4272a077/12OmNzyp5ZJ", "parentPublication": { "id": "proceedings/eait/2014/4272/0", "title": "2014 Fourth International Conference of Emerging Applications of Information Technology (EAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2018/9156/0/915600a288", "title": "Stratifying Cervical Cancer Risk with Registry Data", "doi": null, "abstractUrl": "/proceedings-article/e-science/2018/915600a288/17D45WB0qbe", "parentPublication": { "id": "proceedings/e-science/2018/9156/0", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a740", "title": "Robust Computational Method for Identification of miRNA-mRNA Modules in Cervical Cancer", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a740/18jXDaome40", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/05/08691563", "title": "<italic>RFCM<sup>3</sup></italic>: Computational Method for Identification of miRNA-mRNA Regulatory Modules in Cervical Cancer", "doi": null, "abstractUrl": "/journal/tb/2020/05/08691563/1iB6BfWeLMk", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09167428", "title": "Deciphering Key Genes and miRNAs Associated With Hepatocellular Carcinoma via Network-Based Approach", "doi": null, "abstractUrl": "/journal/tb/2022/02/09167428/1mhPG9fHFbW", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2020/7397/0/739700a007", "title": "Extraction of Genes Associated with Liver Cancer Using Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2020/739700a007/1tGcviNQShq", "parentPublication": { "id": "proceedings/iiai-aai/2020/7397/0", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07229295", "articleId": "13rRUxlgyae", "__typename": "AdjacentArticleType" }, "next": { "fno": "07293146", "articleId": "13rRUxAASZA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNCd2rJl", "title": "March-April", "year": "2013", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "10", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPSq", "doi": "10.1109/TCBB.2013.12", "abstract": "The potential of microarray gene expression (MAGE) data is only partially explored due to the limited number of samples in individual studies. This limitation can be surmounted by merging or integrating data sets originating from independent MAGE experiments, which are designed to study the same biological problem. However, this process is hindered by batch effects that are study-dependent and result in random data distortion; therefore numerical transformations are needed to render the integration of different data sets accurate and meaningful. Our contribution in this paper is two-fold. First we propose GENESHIFT, a new nonparametric batch effect removal method based on two key elements from statistics: empirical density estimation and the inner product as a distance measure between two probability density functions; second we introduce a new validation index of batch effect removal methods based on the observation that samples from two independent studies drawn from a same population should exhibit similar probability density functions. We evaluated and compared the GENESHIFT method with four other state-of-the-art methods for batch effect removal: Batch-mean centering, empirical Bayes or COMBAT, distance-weighted discrimination, and cross-platform normalization. Several validation indices providing complementary information about the efficiency of batch effect removal methods have been employed in our validation framework. The results show that none of the methods clearly outperforms the others. More than that, most of the methods used for comparison perform very well with respect to some validation indices while performing very poor with respect to others. GENESHIFT exhibits robust performances and its average rank is the highest among the average ranks of all methods used for comparison.", "abstracts": [ { "abstractType": "Regular", "content": "The potential of microarray gene expression (MAGE) data is only partially explored due to the limited number of samples in individual studies. This limitation can be surmounted by merging or integrating data sets originating from independent MAGE experiments, which are designed to study the same biological problem. However, this process is hindered by batch effects that are study-dependent and result in random data distortion; therefore numerical transformations are needed to render the integration of different data sets accurate and meaningful. Our contribution in this paper is two-fold. First we propose GENESHIFT, a new nonparametric batch effect removal method based on two key elements from statistics: empirical density estimation and the inner product as a distance measure between two probability density functions; second we introduce a new validation index of batch effect removal methods based on the observation that samples from two independent studies drawn from a same population should exhibit similar probability density functions. We evaluated and compared the GENESHIFT method with four other state-of-the-art methods for batch effect removal: Batch-mean centering, empirical Bayes or COMBAT, distance-weighted discrimination, and cross-platform normalization. Several validation indices providing complementary information about the efficiency of batch effect removal methods have been employed in our validation framework. The results show that none of the methods clearly outperforms the others. More than that, most of the methods used for comparison perform very well with respect to some validation indices while performing very poor with respect to others. GENESHIFT exhibits robust performances and its average rank is the highest among the average ranks of all methods used for comparison.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The potential of microarray gene expression (MAGE) data is only partially explored due to the limited number of samples in individual studies. This limitation can be surmounted by merging or integrating data sets originating from independent MAGE experiments, which are designed to study the same biological problem. However, this process is hindered by batch effects that are study-dependent and result in random data distortion; therefore numerical transformations are needed to render the integration of different data sets accurate and meaningful. Our contribution in this paper is two-fold. First we propose GENESHIFT, a new nonparametric batch effect removal method based on two key elements from statistics: empirical density estimation and the inner product as a distance measure between two probability density functions; second we introduce a new validation index of batch effect removal methods based on the observation that samples from two independent studies drawn from a same population should exhibit similar probability density functions. We evaluated and compared the GENESHIFT method with four other state-of-the-art methods for batch effect removal: Batch-mean centering, empirical Bayes or COMBAT, distance-weighted discrimination, and cross-platform normalization. Several validation indices providing complementary information about the efficiency of batch effect removal methods have been employed in our validation framework. The results show that none of the methods clearly outperforms the others. More than that, most of the methods used for comparison perform very well with respect to some validation indices while performing very poor with respect to others. GENESHIFT exhibits robust performances and its average rank is the highest among the average ranks of all methods used for comparison.", "title": "GENESHIFT: A Nonparametric Approach for Integrating Microarray Gene Expression Data Based on the Inner Product as a Distance Measure between the Distributions of Genes", "normalizedTitle": "GENESHIFT: A Nonparametric Approach for Integrating Microarray Gene Expression Data Based on the Inner Product as a Distance Measure between the Distributions of Genes", "fno": "ttb2013020383", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bayes Methods", "Bioinformatics", "Data Analysis", "Data Integration", "Genetics", "Genomics", "Statistics", "Microarray Gene Expression Data", "Distance Measure", "Inner Product", "Gene Distribution", "MAGE Data", "Data Set Integration", "Independent MAGE Experiment", "Biological Problem", "Random Data Distortion", "Numerical Transformation", "Nonparametric Batch Effect Removal Method", "Statistics", "Empirical Density Estimation", "Probability Density Function", "Validation Index", "GENESHIFT Method", "Batch Mean Centering", "Empirical Bayes Method", "COMBAT", "Distance Weighted Discrimination", "Cross Platform Normalization", "Validation Framework", "Gene Expression", "Estimation", "Sociology", "Statistics", "Data Integration", "Lungs", "Gene Expression", "Estimation", "Sociology", "Statistics", "Data Integration", "Lungs", "Nonparametric Methods", "Batch Effects", "Microarray Data Integration", "Distance Measures Between Probability Density Functions", "Inner Product", "Density Estimation", "Integrative Analysis Of Gene Expression Microarrays" ], "authors": [ { "givenName": "Cosmin", "surname": "Lazar", "fullName": "Cosmin Lazar", "affiliation": "Vrije Universiteit Brussel, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Jonatan", "surname": "Taminau", "fullName": "Jonatan Taminau", "affiliation": "Vrije Universiteit Brussel, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Stijn", "surname": "Meganck", "fullName": "Stijn Meganck", "affiliation": "Vrije Universiteit Brussel, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "David", "surname": "Steenhoff", "fullName": "David Steenhoff", "affiliation": "Vrije Universiteit Brussel, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Alain", "surname": "Coletta", "fullName": "Alain Coletta", "affiliation": "Universit&#x00E9; Libre de Bruxelles, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "David Y. Weiss", "surname": "Solís", "fullName": "David Y. Weiss Solís", "affiliation": "Universit&#x00E9; Libre de Bruxelles, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Colin", "surname": "Molter", "fullName": "Colin Molter", "affiliation": "Universit&#x00E9; Libre de Bruxelles, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Robin", "surname": "Duque", "fullName": "Robin Duque", "affiliation": "Universit&#x00E9; Libre de Bruxelles, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Hugues", "surname": "Bersini", "fullName": "Hugues Bersini", "affiliation": "Universit&#x00E9; Libre de Bruxelles, Brussels", "__typename": "ArticleAuthorType" }, { "givenName": "Ann", "surname": "Nowé", "fullName": "Ann Nowé", "affiliation": "Vrije Universiteit Brussel, Brussels", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2013-03-01 00:00:00", "pubType": "trans", "pages": "383-392", "year": "2013", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2015/7983/0/07367704", "title": "Hybrid intelligent methods for microarray data analysis", "doi": null, "abstractUrl": "/proceedings-article/bibe/2015/07367704/12OmNAnuTpE", "parentPublication": { "id": "proceedings/bibe/2015/7983/0", "title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059852", "title": "Improving the Biological Relevance of Biclustering for Microarray Data in Using Ensemble Methods", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059852/12OmNCvumRb", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217888", "title": "Comparison of location-scale and matrix factorization batch effect removal methods on gene expression datasets", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217888/12OmNqEjhZw", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120454", "title": "Systems Approach to Identifying Relevant Pathways from Phenotype Information in Dose-Dependent Time Series Microarray Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120454/12OmNwAt1D4", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a001", "title": "Identifying Significant Genes from DNA Microarray Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a001/12OmNwcCIJz", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2014/7502/0/7502a212", "title": "An Improved Ratio-Based (IRB) Batch Effects Removal Algorithm for Cancer Data in a Co-Analysis Framework", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a212/12OmNyQ7FCy", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2008/03/ttb2008030423", "title": "Reproducibility-Optimized Test Statistic for Ranking Genes in Microarray Studies", "doi": null, "abstractUrl": "/journal/tb/2008/03/ttb2008030423/13rRUILtJxO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/03/ttb2011030723", "title": "Incorporating Nonlinear Relationships in Microarray Missing Value Imputation", "doi": null, "abstractUrl": "/journal/tb/2011/03/ttb2011030723/13rRUwInvjG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/01/07229295", "title": "Hybrid Framework Using Multiple-Filters and an Embedded Approach for an Efficient Selection and Classification of Microarray Data", "doi": null, "abstractUrl": "/journal/tb/2016/01/07229295/13rRUxlgyae", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995376", "title": "A Feature Weighting Particle Swarm Optimization Method to Identify Biomarker Genes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995376/1JC2UZ7OxGg", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttb2013020372", "articleId": "13rRUygBw5P", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttb2013020393", "articleId": "13rRUygBw5Q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgO9", "name": "ttb2013020383s1.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttb2013020383s1.pdf", "extension": "pdf", "size": "65.3 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1xvt7i59EGI", "title": "Sept.-Oct.", "year": "2021", "issueNum": "05", "idPrefix": "tb", "pubType": "journal", "volume": "18", "label": "Sept.-Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nwbaj17TQk", "doi": "10.1109/TCBB.2020.3027392", "abstract": "Identifying essential genes in comparison states (EGS) is vital to understanding cell differentiation, performing drug discovery, and identifying disease causes. Here, we present a machine learning method termed Prediction of Essential Genes in Comparison States (PreEGS). To capture the alteration of the network in comparison states, PreEGS extracts topological and gene expression features of each gene in a five-dimensional vector. PreEGS also recruits a positive sample expansion method to address the problem of unbalanced positive and negative samples, which is often encountered in practical applications. Different classifiers are applied to the simulated datasets, and the PreEGS based on the random forests model (PreEGSRF) was chosen for optimal performance. PreEGSRF was then compared with six other methods, including three machine learning methods, to predict EGS in a specific state. On real datasets with four gene regulatory networks, PreEGSRF predicted five essential genes related to leukemia and five enriched KEGG pathways. Four of the predicted essential genes and all predicted pathways were consistent with previous studies and highly correlated with leukemia. With high prediction accuracy and generalization ability, PreEGSRF is broadly applicable for the discovery of disease-causing genes, driver genes for cell fate decisions, and complex biomarkers of biological systems.", "abstracts": [ { "abstractType": "Regular", "content": "Identifying essential genes in comparison states (EGS) is vital to understanding cell differentiation, performing drug discovery, and identifying disease causes. Here, we present a machine learning method termed Prediction of Essential Genes in Comparison States (PreEGS). To capture the alteration of the network in comparison states, PreEGS extracts topological and gene expression features of each gene in a five-dimensional vector. PreEGS also recruits a positive sample expansion method to address the problem of unbalanced positive and negative samples, which is often encountered in practical applications. Different classifiers are applied to the simulated datasets, and the PreEGS based on the random forests model (PreEGSRF) was chosen for optimal performance. PreEGSRF was then compared with six other methods, including three machine learning methods, to predict EGS in a specific state. On real datasets with four gene regulatory networks, PreEGSRF predicted five essential genes related to leukemia and five enriched KEGG pathways. Four of the predicted essential genes and all predicted pathways were consistent with previous studies and highly correlated with leukemia. With high prediction accuracy and generalization ability, PreEGSRF is broadly applicable for the discovery of disease-causing genes, driver genes for cell fate decisions, and complex biomarkers of biological systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Identifying essential genes in comparison states (EGS) is vital to understanding cell differentiation, performing drug discovery, and identifying disease causes. Here, we present a machine learning method termed Prediction of Essential Genes in Comparison States (PreEGS). To capture the alteration of the network in comparison states, PreEGS extracts topological and gene expression features of each gene in a five-dimensional vector. PreEGS also recruits a positive sample expansion method to address the problem of unbalanced positive and negative samples, which is often encountered in practical applications. Different classifiers are applied to the simulated datasets, and the PreEGS based on the random forests model (PreEGSRF) was chosen for optimal performance. PreEGSRF was then compared with six other methods, including three machine learning methods, to predict EGS in a specific state. On real datasets with four gene regulatory networks, PreEGSRF predicted five essential genes related to leukemia and five enriched KEGG pathways. Four of the predicted essential genes and all predicted pathways were consistent with previous studies and highly correlated with leukemia. With high prediction accuracy and generalization ability, PreEGSRF is broadly applicable for the discovery of disease-causing genes, driver genes for cell fate decisions, and complex biomarkers of biological systems.", "title": "Prediction of Essential Genes in Comparison States Using Machine Learning", "normalizedTitle": "Prediction of Essential Genes in Comparison States Using Machine Learning", "fno": "09209196", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bioinformatics", "Cancer", "Cellular Biophysics", "Drugs", "Genetics", "Genomics", "Medical Computing", "Molecular Biophysics", "Random Forests", "Machine Learning", "Gene Expression", "Positive Sample Expansion", "Gene Regulatory Networks", "Disease Causing Genes", "Driver Genes", "Pre EGSRF Model", "EGS", "Cell Differentiation", "Prediction Of Essential Genes In Comparison States", "Pre EGS Model", "Random Forests", "Enriched KEGG Pathways", "Leukemia", "Cell Fate Decisions", "Complex Biomarkers", "Gene Expression", "Machine Learning", "Diseases", "Proteins", "Feature Extraction", "Drugs", "Organisms", "Differential Network Analysis", "Essential Genes In Comparison States", "Machine Learning", "Biomarker Discovery" ], "authors": [ { "givenName": "Jiang", "surname": "Xie", "fullName": "Jiang Xie", "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chang", "surname": "Zhao", "fullName": "Chang Zhao", "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiamin", "surname": "Sun", "fullName": "Jiamin Sun", "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiaxin", "surname": "Li", "fullName": "Jiaxin Li", "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Fuzhang", "surname": "Yang", "fullName": "Fuzhang Yang", "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiao", "surname": "Wang", "fullName": "Jiao Wang", "affiliation": "Laboratory of Molecular Neural Biology, School of Life Sciences, Shanghai University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qing", "surname": "Nie", "fullName": "Qing Nie", "affiliation": "Department of Mathematics, Center for Mathemati- cal and Computational Biology and the Center for Complex Biological Systems, University of California-Irvine, Irvine, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2021-09-01 00:00:00", "pubType": "trans", "pages": "1784-1792", "year": "2021", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2014/5669/0/06999163", "title": "Ranking of cancer genes in Markov chain model through integration of heterogeneous sources of data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999163/12OmNCesr33", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999204", "title": "Essential protein identification based on essential protein-protein interaction prediction by integrated edge weights", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999204/12OmNrY3Lxn", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999189", "title": "An integrative network-driven pipeline for the prioritization of Alzheimer's disease genes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999189/12OmNyL0TNY", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/02/06687204", "title": "Predicting Essential Proteins Based on Weighted Degree Centrality", "doi": null, "abstractUrl": "/journal/tb/2014/02/06687204/13rRUxAASRF", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07530893", "title": "Significance and Functional Similarity for Identification of Disease Genes", "doi": null, "abstractUrl": "/journal/tb/2017/06/07530893/13rRUxjQyfU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/03/08482286", "title": "Identifying Key Genes of Liver Cancer by Networking of Multiple Data Sets", "doi": null, "abstractUrl": "/journal/tb/2019/03/08482286/147pbPuzfpe", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09090280", "title": "Integrative Biological Network Analysis to Identify Shared Genes in Metabolic Disorders", "doi": null, "abstractUrl": "/journal/tb/2022/01/09090280/1jFb0Hx783K", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2021/04/09224179", "title": "A Computing System for Discovering Causal Relationships Among Human Genes to Improve Drug Repositioning", "doi": null, "abstractUrl": "/journal/ec/2021/04/09224179/1nV8m2G1ZWE", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09204826", "title": "Scalable Non-Linear Graph Fusion for Prioritizing Cancer-Causing Genes", "doi": null, "abstractUrl": "/journal/tb/2022/02/09204826/1nmdLbsdXoc", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/03/09336285", "title": "EPGAT: Gene Essentiality Prediction With Graph Attention Networks", "doi": null, "abstractUrl": "/journal/tb/2022/03/09336285/1qHL56E7ar6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09184270", "articleId": "1mLHST6LRh6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09204389", "articleId": "1nkyRLiZLMc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwFid7w", "title": "Jan.", "year": "2019", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45W2WyxG", "doi": "10.1109/TVCG.2018.2864907", "abstract": "Famous examples such as Anscombe's Quartet highlight that one of the core benefits of visualizations is allowing people to discover visual patterns that might otherwise be hidden by summary statistics. This visual inspection is particularly important in exploratory data analysis, where analysts can use visualizations such as histograms and dot plots to identify data quality issues. Yet, these visualizations are driven by parameters such as histogram bin size or mark opacity that have a great deal of impact on the final visual appearance of the chart, but are rarely optimized to make important features visible. In this paper, we show that data flaws have varying impact on the visual features of visualizations, and that the adversarial or merely uncritical setting of design parameters of visualizations can obscure the visual signatures of these flaws. Drawing on the framework of Algebraic Visualization Design, we present the results of a crowdsourced study showing that common visualization types can appear to reasonably summarize distributional data while hiding large and important flaws such as missing data and extraneous modes. We make use of these results to propose additional best practices for visualizations of distributions for data quality tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Famous examples such as Anscombe's Quartet highlight that one of the core benefits of visualizations is allowing people to discover visual patterns that might otherwise be hidden by summary statistics. This visual inspection is particularly important in exploratory data analysis, where analysts can use visualizations such as histograms and dot plots to identify data quality issues. Yet, these visualizations are driven by parameters such as histogram bin size or mark opacity that have a great deal of impact on the final visual appearance of the chart, but are rarely optimized to make important features visible. In this paper, we show that data flaws have varying impact on the visual features of visualizations, and that the adversarial or merely uncritical setting of design parameters of visualizations can obscure the visual signatures of these flaws. Drawing on the framework of Algebraic Visualization Design, we present the results of a crowdsourced study showing that common visualization types can appear to reasonably summarize distributional data while hiding large and important flaws such as missing data and extraneous modes. We make use of these results to propose additional best practices for visualizations of distributions for data quality tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Famous examples such as Anscombe's Quartet highlight that one of the core benefits of visualizations is allowing people to discover visual patterns that might otherwise be hidden by summary statistics. This visual inspection is particularly important in exploratory data analysis, where analysts can use visualizations such as histograms and dot plots to identify data quality issues. Yet, these visualizations are driven by parameters such as histogram bin size or mark opacity that have a great deal of impact on the final visual appearance of the chart, but are rarely optimized to make important features visible. In this paper, we show that data flaws have varying impact on the visual features of visualizations, and that the adversarial or merely uncritical setting of design parameters of visualizations can obscure the visual signatures of these flaws. Drawing on the framework of Algebraic Visualization Design, we present the results of a crowdsourced study showing that common visualization types can appear to reasonably summarize distributional data while hiding large and important flaws such as missing data and extraneous modes. We make use of these results to propose additional best practices for visualizations of distributions for data quality tasks.", "title": "Looks Good To Me: Visualizations As Sanity Checks", "normalizedTitle": "Looks Good To Me: Visualizations As Sanity Checks", "fno": "08440818", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Crowdsourcing", "Data Visualisation", "Statistical Analysis", "Visual Patterns", "Visual Inspection", "Final Visual Appearance", "Visual Features", "Visual Signatures", "Algebraic Visualization Design", "Data Visualization", "Visualization", "Histograms", "Bandwidth", "Data Integrity", "Kernel", "Data Analysis", "Graphical Perception", "Data Quality", "Univariate Visualizations" ], "authors": [ { "givenName": "Michael", "surname": "Correll", "fullName": "Michael Correll", "affiliation": "Tableau Research", "__typename": "ArticleAuthorType" }, { "givenName": "Mingwei", "surname": "Li", "fullName": "Mingwei Li", "affiliation": "University of Arizona", "__typename": "ArticleAuthorType" }, { "givenName": "Gordon", "surname": "Kindlmann", "fullName": "Gordon Kindlmann", "affiliation": "University of Chicago", "__typename": "ArticleAuthorType" }, { "givenName": "Carlos", "surname": "Scheidegger", "fullName": "Carlos Scheidegger", "affiliation": "University of Arizona", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "trans", "pages": "830-839", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ozchi/1996/7525/0/75250012", "title": "Automated General Visualizations", "doi": null, "abstractUrl": "/proceedings-article/ozchi/1996/75250012/12OmNBZYTnu", "parentPublication": { "id": "proceedings/ozchi/1996/7525/0", "title": "Proceedings Sixth Australian Conference on Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031580", "title": "Interaction+: Interaction enhancement for web-based visualizations", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031580/12OmNyQ7FJe", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/08/07563865", "title": "How Progressive Visualizations Affect Exploratory Analysis", "doi": null, "abstractUrl": "/journal/tg/2017/08/07563865/13rRUNvya9q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017597", "title": "Data Visualization Saliency Model: A Tool for Evaluating Abstract Data Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017597/13rRUNvyaf6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060943", "title": "How Information Visualization Novices Construct Visualizations", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08233127", "title": "Atom: A Grammar for Unit Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/12/08233127/14H4WLzSYsE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440860", "title": "Augmenting Visualizations with Interactive Data Facts to Facilitate Interpretation and Communication", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440860/17D45Vw15v5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506578", "title": "Comparative Visualizations through Parameterization and Variability", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506578/17D45WaTki5", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809832", "title": "Searching the Visual Style and Structure of D3 Visualizations", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809832/1cHEgg8WeNW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2019/5227/0/522700a084", "title": "Comparing the Effectiveness of Visualizations of Different Data Distributions", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2019/522700a084/1fHloum4ISY", "parentPublication": { "id": "proceedings/sibgrapi/2019/5227/0", "title": "2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08440853", "articleId": "17D45VTRoxJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08440843", "articleId": "17D45VTRowg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgBi", "name": "ttg201901-08440818s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201901-08440818s1.zip", "extension": "zip", "size": "355 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1DgjDz35pfi", "doi": "10.1109/TVCG.2022.3173889", "abstract": "Information uncertainty is ubiquitous in everyday life, including in domains as diverse as weather forecasts, investments, and health risks. Knowing how to interpret and integrate this uncertain information is vital for making good decisions, but this can be difficult for experts and novices alike. In this study, we examine whether brief, focused practice can improve peoples ability to understand and integrate bivariate Gaussian uncertainty visualized via ensemble displays, summary displays, and distributional displays, and we examine whether this is influenced by the complexity of the displayed information. In two experiments (N=118 and 56), decision making was faster and more accurate after practice relative to before practice. Furthermore, the performance improvements transferred to use of display types that were not practiced. This suggests that practice with feedback may improve underlying skills in probabilistic reasoning and provides a promising approach to improve peoples decision making under uncertainty.", "abstracts": [ { "abstractType": "Regular", "content": "Information uncertainty is ubiquitous in everyday life, including in domains as diverse as weather forecasts, investments, and health risks. Knowing how to interpret and integrate this uncertain information is vital for making good decisions, but this can be difficult for experts and novices alike. In this study, we examine whether brief, focused practice can improve peoples ability to understand and integrate bivariate Gaussian uncertainty visualized via ensemble displays, summary displays, and distributional displays, and we examine whether this is influenced by the complexity of the displayed information. In two experiments (N=118 and 56), decision making was faster and more accurate after practice relative to before practice. Furthermore, the performance improvements transferred to use of display types that were not practiced. This suggests that practice with feedback may improve underlying skills in probabilistic reasoning and provides a promising approach to improve peoples decision making under uncertainty.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Information uncertainty is ubiquitous in everyday life, including in domains as diverse as weather forecasts, investments, and health risks. Knowing how to interpret and integrate this uncertain information is vital for making good decisions, but this can be difficult for experts and novices alike. In this study, we examine whether brief, focused practice can improve peoples ability to understand and integrate bivariate Gaussian uncertainty visualized via ensemble displays, summary displays, and distributional displays, and we examine whether this is influenced by the complexity of the displayed information. In two experiments (N=118 and 56), decision making was faster and more accurate after practice relative to before practice. Furthermore, the performance improvements transferred to use of display types that were not practiced. This suggests that practice with feedback may improve underlying skills in probabilistic reasoning and provides a promising approach to improve peoples decision making under uncertainty.", "title": "Practice improves performance of a 2D uncertainty integration task within and across visualizations", "normalizedTitle": "Practice improves performance of a 2D uncertainty integration task within and across visualizations", "fno": "09772276", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Uncertainty", "Data Visualization", "Task Analysis", "Image Color Analysis", "Training", "Cognition", "Government", "Decision Making", "Training", "Visualization", "Uncertainty" ], "authors": [ { "givenName": "Sarah A", "surname": "Kusumastuti", "fullName": "Sarah A Kusumastuti", "affiliation": "Psychology, University of Southern California, 5116 Los Angeles, California, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Kimberly A", "surname": "Pollard", "fullName": "Kimberly A Pollard", "affiliation": "Human Research and Engineering Directorate, DEVCOM Army Research Laboratory, Los Angeles, California, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Ashley H", "surname": "Oiknine", "fullName": "Ashley H Oiknine", "affiliation": "Research and Engineering, DCS Corporation, 218964 Alexandria, Virginia, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Bianca", "surname": "Dalangin", "fullName": "Bianca Dalangin", "affiliation": "Research and Engineering, DCS Corporation, 218964 Alexandria, Virginia, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Tiffany R", "surname": "Raber", "fullName": "Tiffany R Raber", "affiliation": "Human Research and Engineering Directorate, DEVCOM Army Research Laboratory, Los Angeles, California, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Benjamin Taylor", "surname": "Files", "fullName": "Benjamin Taylor Files", "affiliation": "Human Research and Engineering Directorate, DEVCOM Army Research Laboratory, Los Angeles, California, United States, 90094", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-05-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2002/1751/0/17510037", "title": "Visualizing Data with Bounded Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2002/17510037/12OmNrFkeWk", "parentPublication": { "id": "proceedings/ieee-infovis/2002/1751/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2012/0430/0/06386365", "title": "Uncertainty management in remanufacturing: A review", "doi": null, "abstractUrl": "/proceedings-article/case/2012/06386365/12OmNwD1pWU", "parentPublication": { "id": "proceedings/case/2012/0430/0", "title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2015/7055/0/7055a007", "title": "Modularity for Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/mise/2015/7055a007/12OmNxG1yWW", "parentPublication": { "id": "proceedings/mise/2015/7055/0", "title": "2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2014/3031/0/06912245", "title": "Supporting early decision-making in the presence of uncertainty", "doi": null, "abstractUrl": "/proceedings-article/re/2014/06912245/12OmNzICEVd", "parentPublication": { "id": "proceedings/re/2014/3031/0", "title": "2014 IEEE 22nd International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017624", "title": "Imagining Replications: Graphical Prediction & Discrete Visualizations Improve Recall & Estimation of Effect Uncertainty", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017624/13rRUIM2VH5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2015/03/07058341", "title": "Uncertainty Representation in Visualizations of Learning Analytics for Learners: Current Approaches and Opportunities", "doi": null, "abstractUrl": "/journal/lt/2015/03/07058341/13rRUygT7pf", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08457476", "title": "In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation", "doi": null, "abstractUrl": "/journal/tg/2019/01/08457476/17D45WaTkcP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09217952", "title": "A Bayesian cognition approach for belief updating of correlation judgement through uncertainty visualizations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09217952/1nL7qhcUKPe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413010", "title": "On-manifold Adversarial Data Augmentation Improves Uncertainty Calibration", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413010/1tmj0SEORmE", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09548797", "title": "Effect of uncertainty visualizations on myopic loss aversion and the equity premium puzzle in retirement investment decisions", "doi": null, "abstractUrl": "/journal/tg/2022/01/09548797/1xeSlZqOf8A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09772329", "articleId": "1DgjDn5nymI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09773967", "articleId": "1DjDoKqOJz2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nJsGTrLDPO", "doi": "10.1109/TVCG.2020.3028984", "abstract": "A Bayesian view of data interpretation suggests that a visualization user should update their existing beliefs about a parameter's value in accordance with the amount of information about the parameter value captured by the new observations. Extending recent work applying Bayesian models to understand and evaluate belief updating from visualizations, we show how the predictions of Bayesian inference can be used to guide more rational belief updating. We design a Bayesian inference-assisted uncertainty analogy that numerically relates uncertainty in observed data to the user's subjective uncertainty, and a posterior visualization that prescribes how a user should update their beliefs given their prior beliefs and the observed data. In a pre-registered experiment on 4,800 people, we find that when a newly observed data sample is relatively small (N=158), both techniques reliably improve people's Bayesian updating on average compared to the current best practice of visualizing uncertainty in the observed data. For large data samples (N=5208), where people's updated beliefs tend to deviate more strongly from the prescriptions of a Bayesian model, we find evidence that the effectiveness of the two forms of Bayesian assistance may depend on people's proclivity toward trusting the source of the data. We discuss how our results provide insight into individual processes of belief updating and subjective uncertainty, and how understanding these aspects of interpretation paves the way for more sophisticated interactive visualizations for analysis and communication.", "abstracts": [ { "abstractType": "Regular", "content": "A Bayesian view of data interpretation suggests that a visualization user should update their existing beliefs about a parameter's value in accordance with the amount of information about the parameter value captured by the new observations. Extending recent work applying Bayesian models to understand and evaluate belief updating from visualizations, we show how the predictions of Bayesian inference can be used to guide more rational belief updating. We design a Bayesian inference-assisted uncertainty analogy that numerically relates uncertainty in observed data to the user's subjective uncertainty, and a posterior visualization that prescribes how a user should update their beliefs given their prior beliefs and the observed data. In a pre-registered experiment on 4,800 people, we find that when a newly observed data sample is relatively small (N=158), both techniques reliably improve people's Bayesian updating on average compared to the current best practice of visualizing uncertainty in the observed data. For large data samples (N=5208), where people's updated beliefs tend to deviate more strongly from the prescriptions of a Bayesian model, we find evidence that the effectiveness of the two forms of Bayesian assistance may depend on people's proclivity toward trusting the source of the data. We discuss how our results provide insight into individual processes of belief updating and subjective uncertainty, and how understanding these aspects of interpretation paves the way for more sophisticated interactive visualizations for analysis and communication.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A Bayesian view of data interpretation suggests that a visualization user should update their existing beliefs about a parameter's value in accordance with the amount of information about the parameter value captured by the new observations. Extending recent work applying Bayesian models to understand and evaluate belief updating from visualizations, we show how the predictions of Bayesian inference can be used to guide more rational belief updating. We design a Bayesian inference-assisted uncertainty analogy that numerically relates uncertainty in observed data to the user's subjective uncertainty, and a posterior visualization that prescribes how a user should update their beliefs given their prior beliefs and the observed data. In a pre-registered experiment on 4,800 people, we find that when a newly observed data sample is relatively small (N=158), both techniques reliably improve people's Bayesian updating on average compared to the current best practice of visualizing uncertainty in the observed data. For large data samples (N=5208), where people's updated beliefs tend to deviate more strongly from the prescriptions of a Bayesian model, we find evidence that the effectiveness of the two forms of Bayesian assistance may depend on people's proclivity toward trusting the source of the data. We discuss how our results provide insight into individual processes of belief updating and subjective uncertainty, and how understanding these aspects of interpretation paves the way for more sophisticated interactive visualizations for analysis and communication.", "title": "Bayesian-Assisted Inference from Visualized Data", "normalizedTitle": "Bayesian-Assisted Inference from Visualized Data", "fno": "09216507", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Bayes Methods", "Belief Networks", "Data Visualisation", "Inference Mechanisms", "Stochastic Processes", "Bayesian Assisted Inference", "Visualized Data", "Bayesian View", "Data Interpretation", "Visualization User", "Parameter Value", "Bayesian Model", "Rational Belief Updating", "Bayesian Inference Assisted Uncertainty Analogy", "Subjective Uncertainty", "Posterior Visualization", "Data Sample", "Bayesian Assistance", "Interactive Visualization", "Bayes Methods", "Data Visualization", "Uncertainty", "Data Models", "Cognition", "Mathematical Model", "Predictive Models", "Bayesian Cognition", "Belief Updating", "Uncertainty Visualization", "Adaptive Visualization" ], "authors": [ { "givenName": "Yea-Seul", "surname": "Kim", "fullName": "Yea-Seul Kim", "affiliation": "University of Washington", "__typename": "ArticleAuthorType" }, { "givenName": "Paula", "surname": "Kayongo", "fullName": "Paula Kayongo", "affiliation": "Northwestern University", "__typename": "ArticleAuthorType" }, { "givenName": "Madeleine", "surname": "Grunde-McLaughlin", "fullName": "Madeleine Grunde-McLaughlin", "affiliation": "University of Pennsylvania", "__typename": "ArticleAuthorType" }, { "givenName": "Jessica", "surname": "Hullman", "fullName": "Jessica Hullman", "affiliation": "University of Washington", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "989-999", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iri/2014/5880/0/07051973", "title": "Bayesian updating for time series missing data discovery and uncertainty estimation (TSMDDUE)", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051973/12OmNAm4TL2", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2012/0227/1/06495162", "title": "Cognitive Maps for Knowledge Represenation and Reasoning", "doi": null, "abstractUrl": "/proceedings-article/ictai/2012/06495162/12OmNqIhG2j", "parentPublication": { "id": "proceedings/ictai/2012/0227/1", "title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/11/06786502", "title": "Pseudo-Marginal Bayesian Inference for Gaussian Processes", "doi": null, "abstractUrl": "/journal/tp/2014/11/06786502/13rRUwbJD66", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispass/2019/0746/0/08695637", "title": "Demystifying Bayesian Inference Workloads", "doi": null, "abstractUrl": "/proceedings-article/ispass/2019/08695637/19wBf9owV68", "parentPublication": { "id": "proceedings/ispass/2019/0746/0", "title": "2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/5555/01/10044217", "title": "Energy-Efficient Bayesian Inference Using Bitstream Computing", "doi": null, "abstractUrl": "/journal/ca/5555/01/10044217/1KL71wAvPhe", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a479", "title": "Uncertainty Evaluation Method of Electric Field Probe Based on Bayesian Principle", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a479/1cI6pv99wAw", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g300", "title": "Uncertainty-Aware Audiovisual Activity Recognition Using Deep Bayesian Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g300/1hVlgMvYDMQ", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a773", "title": "Efficient Priors for Scalable Variational Inference in Bayesian Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a773/1i5mK1qWcj6", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093293", "title": "Deep Bayesian Network for Visual Question Generation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093293/1jPbcPb76hO", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09217952", "title": "A Bayesian cognition approach for belief updating of correlation judgement through uncertainty visualizations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09217952/1nL7qhcUKPe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09217952", "articleId": "1nL7qhcUKPe", "__typename": "AdjacentArticleType" }, "next": { "fno": "09229135", "articleId": "1o3npNp56Vi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLeKxkagTu", "name": "ttg202102-09216507s1-tvcg-3028984-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09216507s1-tvcg-3028984-mm.zip", "extension": "zip", "size": "5.29 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzn38Jg", "title": "Nov.", "year": "2014", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "36", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbJD66", "doi": "10.1109/TPAMI.2014.2316530", "abstract": "The main challenges that arise when adopting Gaussian process priors in probabilistic modeling are how to carry out exact Bayesian inference and how to account for uncertainty on model parameters when making model-based predictions on out-of-sample data. Using probit regression as an illustrative working example, this paper presents a general and effective methodology based on the pseudo-marginal approach to Markov chain Monte Carlo that efficiently addresses both of these issues. The results presented in this paper show improvements over existing sampling methods to simulate from the posterior distribution over the parameters defining the covariance function of the Gaussian Process prior. This is particularly important as it offers a powerful tool to carry out full Bayesian inference of Gaussian Process based hierarchic statistical models in general. The results also demonstrate that Monte Carlo based integration of all model parameters is actually feasible in this class of models providing a superior quantification of uncertainty in predictions. Extensive comparisons with respect to state-of-the-art probabilistic classifiers confirm this assertion.", "abstracts": [ { "abstractType": "Regular", "content": "The main challenges that arise when adopting Gaussian process priors in probabilistic modeling are how to carry out exact Bayesian inference and how to account for uncertainty on model parameters when making model-based predictions on out-of-sample data. Using probit regression as an illustrative working example, this paper presents a general and effective methodology based on the pseudo-marginal approach to Markov chain Monte Carlo that efficiently addresses both of these issues. The results presented in this paper show improvements over existing sampling methods to simulate from the posterior distribution over the parameters defining the covariance function of the Gaussian Process prior. This is particularly important as it offers a powerful tool to carry out full Bayesian inference of Gaussian Process based hierarchic statistical models in general. The results also demonstrate that Monte Carlo based integration of all model parameters is actually feasible in this class of models providing a superior quantification of uncertainty in predictions. Extensive comparisons with respect to state-of-the-art probabilistic classifiers confirm this assertion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The main challenges that arise when adopting Gaussian process priors in probabilistic modeling are how to carry out exact Bayesian inference and how to account for uncertainty on model parameters when making model-based predictions on out-of-sample data. Using probit regression as an illustrative working example, this paper presents a general and effective methodology based on the pseudo-marginal approach to Markov chain Monte Carlo that efficiently addresses both of these issues. The results presented in this paper show improvements over existing sampling methods to simulate from the posterior distribution over the parameters defining the covariance function of the Gaussian Process prior. This is particularly important as it offers a powerful tool to carry out full Bayesian inference of Gaussian Process based hierarchic statistical models in general. The results also demonstrate that Monte Carlo based integration of all model parameters is actually feasible in this class of models providing a superior quantification of uncertainty in predictions. Extensive comparisons with respect to state-of-the-art probabilistic classifiers confirm this assertion.", "title": "Pseudo-Marginal Bayesian Inference for Gaussian Processes", "normalizedTitle": "Pseudo-Marginal Bayesian Inference for Gaussian Processes", "fno": "06786502", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Approximation Methods", "Monte Carlo Methods", "Bayes Methods", "Predictive Models", "Gaussian Processes", "Data Models", "Uncertainty", "Approximate Bayesian Inference", "Hierarchic Bayesian Models", "Gaussian Processes", "Markov Chain Monte Carlo", "Pseudo Marginal Monte Carlo", "Kernel Methods" ], "authors": [ { "givenName": "Maurizio", "surname": "Filippone", "fullName": "Maurizio Filippone", "affiliation": "School of Computing Science, University of Glasgow, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Mark", "surname": "Girolami", "fullName": "Mark Girolami", "affiliation": "Department of Statistics, University of Warwick, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "11", "pubDate": "2014-11-01 00:00:00", "pubType": "trans", "pages": "2214-2226", "year": "2014", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209a614", "title": "Bayesian Inference for Gaussian Process Classifiers with Annealing and Pseudo-Marginal MCMC", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a614/12OmNAoUTpM", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1993/1381/0/00718418", "title": "Monte Carlo Estimation of Bayesian Robustness", "doi": null, "abstractUrl": "/proceedings-article/wsc/1993/00718418/12OmNC943IG", "parentPublication": { "id": "proceedings/wsc/1993/1381/0", "title": "Proceedings of 1993 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013a466", "title": "Monte-Carlo Bayesian Reinforcement Learning Using a Compact Factored Representation", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013a466/12OmNxiKscg", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d185", "title": "Pseudo-Marginal Bayesian Multiple-Class Multiple-Kernel Learning for Neuroimaging Data", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d185/12OmNzWfoV2", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/10/ttg2013101619", "title": "A Spherical Gaussian Framework for Bayesian Monte Carlo Rendering of Glossy Surfaces", "doi": null, "abstractUrl": "/journal/tg/2013/10/ttg2013101619/13rRUwbs20W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07286795", "title": "Detecting Multivariate Gene Interactions in RNA-Seq Data Using Optimal Bayesian Classification", "doi": null, "abstractUrl": "/journal/tb/2018/02/07286795/13rRUxASuEA", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2019/1337/0/133700a389", "title": "Fake News Detection Using Bayesian Inference", "doi": null, "abstractUrl": "/proceedings-article/iri/2019/133700a389/1dUnfD0wUrS", "parentPublication": { "id": "proceedings/iri/2019/1337/0", "title": "2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g300", "title": "Uncertainty-Aware Audiovisual Activity Recognition Using Deep Bayesian Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g300/1hVlgMvYDMQ", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2020/1054/0/09191380", "title": "Fully Bayesian Learning of Multivariate Beta Mixture Models", "doi": null, "abstractUrl": "/proceedings-article/iri/2020/09191380/1n0IwrSCwI8", "parentPublication": { "id": "proceedings/iri/2020/1054/0", "title": "2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378319", "title": "Consensus Variational and Monte Carlo Algorithms for Bayesian Nonparametric Clustering", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378319/1s646o6qJ0Y", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06787082", "articleId": "13rRUy2YLU8", "__typename": "AdjacentArticleType" }, "next": { "fno": "06809191", "articleId": "13rRUwInvC7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNqHItJo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "ca", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KL71wAvPhe", "doi": "10.1109/LCA.2023.3238584", "abstract": "Uncertainty quantification is critical to many machine learning applications especially in mobile and edge computing tasks like self-driving cars, robots, and mobile devices. Bayesian Neural Networks can be used to provide these uncertainty quantifications but they come at extra computation costs. However, power and energy can be limited at the edge. In this work, we propose using stochastic bitstream computing substrates for deploying BNNs which can significantly reduce power and costs. We design our Bayesian Bitstream Processor hardware for an audio classification task as a test case and show that it can outperform a micro-controller baseline in energy by two orders of magnitude and delay by an order of magnitude, at lower power.", "abstracts": [ { "abstractType": "Regular", "content": "Uncertainty quantification is critical to many machine learning applications especially in mobile and edge computing tasks like self-driving cars, robots, and mobile devices. Bayesian Neural Networks can be used to provide these uncertainty quantifications but they come at extra computation costs. However, power and energy can be limited at the edge. In this work, we propose using stochastic bitstream computing substrates for deploying BNNs which can significantly reduce power and costs. We design our Bayesian Bitstream Processor hardware for an audio classification task as a test case and show that it can outperform a micro-controller baseline in energy by two orders of magnitude and delay by an order of magnitude, at lower power.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Uncertainty quantification is critical to many machine learning applications especially in mobile and edge computing tasks like self-driving cars, robots, and mobile devices. Bayesian Neural Networks can be used to provide these uncertainty quantifications but they come at extra computation costs. However, power and energy can be limited at the edge. In this work, we propose using stochastic bitstream computing substrates for deploying BNNs which can significantly reduce power and costs. We design our Bayesian Bitstream Processor hardware for an audio classification task as a test case and show that it can outperform a micro-controller baseline in energy by two orders of magnitude and delay by an order of magnitude, at lower power.", "title": "Energy-Efficient Bayesian Inference Using Bitstream Computing", "normalizedTitle": "Energy-Efficient Bayesian Inference Using Bitstream Computing", "fno": "10044217", "hasPdf": true, "idPrefix": "ca", "keywords": [ "Uncertainty", "Bayes Methods", "Task Analysis", "Hardware", "Stochastic Processes", "Neural Networks", "Generators", "Bayesian Neural Networks", "Stochastic Computing", "Special Purpose Hardware" ], "authors": [ { "givenName": "Soroosh", "surname": "Khoram", "fullName": "Soroosh Khoram", "affiliation": "Department of Electrical and Computer Engineering, University of Wisconsin-Madison, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kyle", "surname": "Daruwalla", "fullName": "Kyle Daruwalla", "affiliation": "Department of Electrical and Computer Engineering, University of Wisconsin-Madison, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Mikko", "surname": "Lipasti", "fullName": "Mikko Lipasti", "affiliation": "Department of Electrical and Computer Engineering, University of Wisconsin-Madison, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "letters", "pages": "1-4", "year": "5555", "issn": "1556-6056", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2014/11/06786502", "title": "Pseudo-Marginal Bayesian Inference for Gaussian Processes", "doi": null, "abstractUrl": "/journal/tp/2014/11/06786502/13rRUwbJD66", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482028", "title": "A Cognitive Stochastic Machine Based on Bayesian Inference: A Behavioral Analysis", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482028/14dcEdidYgy", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispass/2019/0746/0/08695637", "title": "Demystifying Bayesian Inference Workloads", "doi": null, "abstractUrl": "/proceedings-article/ispass/2019/08695637/19wBf9owV68", "parentPublication": { "id": "proceedings/ispass/2019/0746/0", "title": "2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200m2138", "title": "Bayesian Triplet Loss: Uncertainty Quantification in Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200m2138/1BmIN4kBgJ2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a479", "title": "Uncertainty Evaluation Method of Electric Field Probe Based on Bayesian Principle", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a479/1cI6pv99wAw", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a318", "title": "Estimating Uncertainty in Deep Learning for Reporting Confidence to Clinicians when Segmenting Nuclei Image Data", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a318/1cdO35KKeWI", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g300", "title": "Uncertainty-Aware Audiovisual Activity Recognition Using Deep Bayesian Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g300/1hVlgMvYDMQ", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a773", "title": "Efficient Priors for Scalable Variational Inference in Bayesian Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a773/1i5mK1qWcj6", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093293", "title": "Deep Bayesian Network for Visual Question Generation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093293/1jPbcPb76hO", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216507", "title": "Bayesian-Assisted Inference from Visualized Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216507/1nJsGTrLDPO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08462736", "articleId": "13w3lpsaVoZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "10079098", "articleId": "1LKs5YFVm8M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxASuMD", "doi": "10.1109/TVCG.2014.2346323", "abstract": "We reflect on a four-year engagement with transport authorities and others involving a large dataset describing the use of a public bicycle-sharing scheme. We describe the role visualization of these data played in fostering engagement with policy makers, transport operators, the transport research community, the museum and gallery sector and the general public. We identify each of these as ‘channels’—evolving relationships between producers and consumers of visualization—where traditional roles of the visualization expert and domain expert are blurred. In each case, we identify the different design decisions that were required to support each of these channels and the role played by the visualization process. Using chauffeured interaction with a flexible visual analytics system we demonstrate how insight was gained by policy makers into gendered spatio-temporal cycle behaviors, how this led to further insight into workplace commuting activity, group cycling behavior and explanations for street navigation choice. We demonstrate how this supported, and was supported by, the seemingly unrelated development of narrative-driven visualization via TEDx, of the creation and the setting of an art installation and the curating of digital and physical artefacts. We assert that existing models of visualization design, of tool/technique development and of insight generation do not adequately capture the richness of parallel engagement via these multiple channels of communication. We argue that developing multiple channels in parallel opens up opportunities for visualization design and analysis by building trust and authority and supporting creativity. This rich, non-sequential approach to visualization design is likely to foster serendipity, deepen insight and increase impact.", "abstracts": [ { "abstractType": "Regular", "content": "We reflect on a four-year engagement with transport authorities and others involving a large dataset describing the use of a public bicycle-sharing scheme. We describe the role visualization of these data played in fostering engagement with policy makers, transport operators, the transport research community, the museum and gallery sector and the general public. We identify each of these as ‘channels’—evolving relationships between producers and consumers of visualization—where traditional roles of the visualization expert and domain expert are blurred. In each case, we identify the different design decisions that were required to support each of these channels and the role played by the visualization process. Using chauffeured interaction with a flexible visual analytics system we demonstrate how insight was gained by policy makers into gendered spatio-temporal cycle behaviors, how this led to further insight into workplace commuting activity, group cycling behavior and explanations for street navigation choice. We demonstrate how this supported, and was supported by, the seemingly unrelated development of narrative-driven visualization via TEDx, of the creation and the setting of an art installation and the curating of digital and physical artefacts. We assert that existing models of visualization design, of tool/technique development and of insight generation do not adequately capture the richness of parallel engagement via these multiple channels of communication. We argue that developing multiple channels in parallel opens up opportunities for visualization design and analysis by building trust and authority and supporting creativity. This rich, non-sequential approach to visualization design is likely to foster serendipity, deepen insight and increase impact.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We reflect on a four-year engagement with transport authorities and others involving a large dataset describing the use of a public bicycle-sharing scheme. We describe the role visualization of these data played in fostering engagement with policy makers, transport operators, the transport research community, the museum and gallery sector and the general public. We identify each of these as ‘channels’—evolving relationships between producers and consumers of visualization—where traditional roles of the visualization expert and domain expert are blurred. In each case, we identify the different design decisions that were required to support each of these channels and the role played by the visualization process. Using chauffeured interaction with a flexible visual analytics system we demonstrate how insight was gained by policy makers into gendered spatio-temporal cycle behaviors, how this led to further insight into workplace commuting activity, group cycling behavior and explanations for street navigation choice. We demonstrate how this supported, and was supported by, the seemingly unrelated development of narrative-driven visualization via TEDx, of the creation and the setting of an art installation and the curating of digital and physical artefacts. We assert that existing models of visualization design, of tool/technique development and of insight generation do not adequately capture the richness of parallel engagement via these multiple channels of communication. We argue that developing multiple channels in parallel opens up opportunities for visualization design and analysis by building trust and authority and supporting creativity. This rich, non-sequential approach to visualization design is likely to foster serendipity, deepen insight and increase impact.", "title": "Moving beyond sequential design: Reflections on a rich multi-channel approach to data visualization", "normalizedTitle": "Moving beyond sequential design: Reflections on a rich multi-channel approach to data visualization", "fno": "06875966", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Sequential Analysis", "Datasets", "Computer Interfaces", "Visual Analytics", "Design Study", "Movement Visualization", "Visual Analytics", "Bikeshare", "Impact", "Visualization Models" ], "authors": [ { "givenName": "Jo", "surname": "Wood", "fullName": "Jo Wood", "affiliation": ", giCentre, City University London", "__typename": "ArticleAuthorType" }, { "givenName": "Roger", "surname": "Beecham", "fullName": "Roger Beecham", "affiliation": ", giCentre, City University London", "__typename": "ArticleAuthorType" }, { "givenName": "Jason", "surname": "Dykes", "fullName": "Jason Dykes", "affiliation": ", giCentre, City University London", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "2171-2180", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2010/7846/0/05571207", "title": "Immersive Visualization Architectures and Situated Embodiments of Culture and Heritage", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571207/12OmNwFid56", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400484", "title": "Relative N-gram signatures: Document visualization at the level of character N-grams", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400484/12OmNy5hRkw", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883520", "title": "Visual analysis and coding of data-rich user behavior", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883520/12OmNzXFoyS", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/06/04012557", "title": "Bridging the gaps", "doi": null, "abstractUrl": "/magazine/cg/2006/06/04012557/13rRUwbs1UT", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122743", "title": "Comparative Visual Analysis of Lagrangian Transport in CFD Ensembles", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122743/13rRUwbs2b4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/02/mcg2009020014", "title": "Defining Insight for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2009/02/mcg2009020014/13rRUwh80JN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2011/03/mcg2011030014", "title": "Can Computers Master the Art of Communication?: A Focus on Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2011/03/mcg2011030014/13rRUxbCbnX", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070020", "title": "Visual Analytics: Seeking the Unknown", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070020/13rRUy0HYNj", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192662", "title": "A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192662/13rRUyuegha", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2020/2644/0/264400a017", "title": "Visualization Co-Design with Prostate Cancer Survivors who have Limited Graph Literacy", "doi": null, "abstractUrl": "/proceedings-article/vahc/2020/264400a017/1yhFE7okzgk", "parentPublication": { "id": "proceedings/vahc/2020/2644/0", "title": "2020 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06876043", "articleId": "13rRUytF41C", "__typename": "AdjacentArticleType" }, "next": { "fno": "06875930", "articleId": "13rRUxjQyhs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesWw", "name": "ttg201412-06875966s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201412-06875966s1.zip", "extension": "zip", "size": "295 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qLhZwxtEmA", "title": "March", "year": "2021", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1dia07zRywg", "doi": "10.1109/TVCG.2019.2941208", "abstract": "Corporate meetings are a crucial part of business activities. While numerous academic papers investigated how to make the scheduling process of meetings faster or even automatic, little work has been done yet to facilitate the retrospective reasoning about how time is spent on meetings. Traditional calendar applications do not allow users to extract actionable statistics although it has been shown that reflection-oriented design can increase the users' understanding of their habits and can thereby encourage a shift towards better practices. In this paper, we present MineTime Insight, a tool made of multiple coordinated views for the exploration of personal calendar data, with the overarching goal of improving short and long-term scheduling decisions. Despite being focused on the working environment, our work builds upon recent results in the field of Personal Visual Analytics, as it targets users not necessarily expert in visualization and data analysis. We demonstrate the potential of MineTime Insight, when applied to the agenda of an executive manager. Finally, we discuss the results of an informal user study and a field study. Our results suggest that our visual representations are perceived as easy to understand and helpful towards a change in the scheduling habits.", "abstracts": [ { "abstractType": "Regular", "content": "Corporate meetings are a crucial part of business activities. While numerous academic papers investigated how to make the scheduling process of meetings faster or even automatic, little work has been done yet to facilitate the retrospective reasoning about how time is spent on meetings. Traditional calendar applications do not allow users to extract actionable statistics although it has been shown that reflection-oriented design can increase the users' understanding of their habits and can thereby encourage a shift towards better practices. In this paper, we present MineTime Insight, a tool made of multiple coordinated views for the exploration of personal calendar data, with the overarching goal of improving short and long-term scheduling decisions. Despite being focused on the working environment, our work builds upon recent results in the field of Personal Visual Analytics, as it targets users not necessarily expert in visualization and data analysis. We demonstrate the potential of MineTime Insight, when applied to the agenda of an executive manager. Finally, we discuss the results of an informal user study and a field study. Our results suggest that our visual representations are perceived as easy to understand and helpful towards a change in the scheduling habits.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Corporate meetings are a crucial part of business activities. While numerous academic papers investigated how to make the scheduling process of meetings faster or even automatic, little work has been done yet to facilitate the retrospective reasoning about how time is spent on meetings. Traditional calendar applications do not allow users to extract actionable statistics although it has been shown that reflection-oriented design can increase the users' understanding of their habits and can thereby encourage a shift towards better practices. In this paper, we present MineTime Insight, a tool made of multiple coordinated views for the exploration of personal calendar data, with the overarching goal of improving short and long-term scheduling decisions. Despite being focused on the working environment, our work builds upon recent results in the field of Personal Visual Analytics, as it targets users not necessarily expert in visualization and data analysis. We demonstrate the potential of MineTime Insight, when applied to the agenda of an executive manager. Finally, we discuss the results of an informal user study and a field study. Our results suggest that our visual representations are perceived as easy to understand and helpful towards a change in the scheduling habits.", "title": "MineTime Insight: Visualizing Meeting Habits to Promote Informed Scheduling Decisions", "normalizedTitle": "MineTime Insight: Visualizing Meeting Habits to Promote Informed Scheduling Decisions", "fno": "08836104", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Promotion Marketing", "Scheduling", "Corporate Meetings", "Business Activities", "Scheduling Process", "Retrospective Reasoning", "Calendar Applications", "Actionable Statistics", "Reflection Oriented Design", "Multiple Coordinated Views", "Personal Calendar Data", "Overarching Goal", "Long Term Scheduling Decisions", "Working Environment", "Data Analysis", "Informal User Study", "Visual Representations", "Personal Visual Analytics", "Minetime Insight", "Data Visualization", "Scheduling", "Tools", "Visual Analytics", "Productivity", "Cognition", "Data Analysis", "Scheduling", "Calendar", "Personal Visual Analytics", "Casual Information Visualization", "Virtual Assistant" ], "authors": [ { "givenName": "Marco", "surname": "Ancona", "fullName": "Marco Ancona", "affiliation": "ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Marilou", "surname": "Beyeler", "fullName": "Marilou Beyeler", "affiliation": "ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Markus", "surname": "Gross", "fullName": "Markus Gross", "affiliation": "ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Gunther", "fullName": "Tobias Gunther", "affiliation": "ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2021-03-01 00:00:00", "pubType": "trans", "pages": "1986-1999", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iat/2005/2416/0/24160487", "title": "Learning Dynamic Preferences in Multi-Agent Meeting Scheduling", "doi": null, "abstractUrl": "/proceedings-article/iat/2005/24160487/12OmNs0kyAd", "parentPublication": { "id": "proceedings/iat/2005/2416/0", "title": "Proceedings. The 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicis/1993/3135/0/00291750", "title": "Using temporal abstractions and cancellations for efficiency in automated meeting scheduling", "doi": null, "abstractUrl": "/proceedings-article/icicis/1993/00291750/12OmNwoxSfC", "parentPublication": { "id": "proceedings/icicis/1993/3135/0", "title": "Proceedings of International Conference on Intelligent and Cooperative Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042482", "title": "An insight- and task-based methodology for evaluating spatiotemporal visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042482/12OmNwp74wP", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccima/2007/3050/2/30500110", "title": "Distributed Meeting Scheduler - A Knowledge Based Approach to Schedule Meetings", "doi": null, "abstractUrl": "/proceedings-article/iccima/2007/30500110/12OmNzmLxC6", "parentPublication": { "id": "iccima/2007/3050/2", "title": "Computational Intelligence and Multimedia Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/02/mcg2009020014", "title": "Defining Insight for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2009/02/mcg2009020014/13rRUwh80JN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1989/10/e1141", "title": "A Meeting Scheduler for Office Automation", "doi": null, "abstractUrl": "/journal/ts/1989/10/e1141/13rRUwj7cqz", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192662", "title": "A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192662/13rRUyuegha", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a074", "title": "Empirical Study on the Relationship Between Developer's Working Habits and Efficiency", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a074/17D45XeKgmy", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927835", "title": "An application of conversational systems to promote healthy lifestyle habits", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927835/1J4CzwTDCqA", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09511808", "title": "VisInReport: Complementing Visual Discourse Analytics Through Personalized Insight Reports", "doi": null, "abstractUrl": "/journal/tg/2022/12/09511808/1vYRHccYKDS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08834822", "articleId": "1dgv8seoz5u", "__typename": "AdjacentArticleType" }, "next": { "fno": "08861087", "articleId": "1dVZBUkiQnK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyoiZ1c", "title": "Sept.", "year": "2020", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "42", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "19HKQBoUMla", "doi": "10.1109/TPAMI.2019.2914392", "abstract": "Memorability of an image is a characteristic determined by the human observers' ability to remember images they have seen. Yet recent work on image memorability defines it as an intrinsic property that can be obtained independent of the observer. The current study aims to enhance our understanding and prediction of image memorability, improving upon existing approaches by incorporating the properties of cumulative human annotations. We propose a new concept called the Visual Memory Schema (VMS) referring to an organization of image components human observers share when encoding and recognizing images. The concept of VMS is operationalised by asking human observers to define memorable regions of images they were asked to remember during an episodic memory test. We then statistically assess the consistency of VMSs across observers for either correctly or incorrectly recognised images. The associations of the VMSs with eye fixations and saliency are analysed separately as well. Lastly, we adapt various deep learning architectures for the reconstruction and prediction of memorable regions in images and analyse the results when using transfer learning at the outputs of different convolutional network layers.", "abstracts": [ { "abstractType": "Regular", "content": "Memorability of an image is a characteristic determined by the human observers' ability to remember images they have seen. Yet recent work on image memorability defines it as an intrinsic property that can be obtained independent of the observer. The current study aims to enhance our understanding and prediction of image memorability, improving upon existing approaches by incorporating the properties of cumulative human annotations. We propose a new concept called the Visual Memory Schema (VMS) referring to an organization of image components human observers share when encoding and recognizing images. The concept of VMS is operationalised by asking human observers to define memorable regions of images they were asked to remember during an episodic memory test. We then statistically assess the consistency of VMSs across observers for either correctly or incorrectly recognised images. The associations of the VMSs with eye fixations and saliency are analysed separately as well. Lastly, we adapt various deep learning architectures for the reconstruction and prediction of memorable regions in images and analyse the results when using transfer learning at the outputs of different convolutional network layers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Memorability of an image is a characteristic determined by the human observers' ability to remember images they have seen. Yet recent work on image memorability defines it as an intrinsic property that can be obtained independent of the observer. The current study aims to enhance our understanding and prediction of image memorability, improving upon existing approaches by incorporating the properties of cumulative human annotations. We propose a new concept called the Visual Memory Schema (VMS) referring to an organization of image components human observers share when encoding and recognizing images. The concept of VMS is operationalised by asking human observers to define memorable regions of images they were asked to remember during an episodic memory test. We then statistically assess the consistency of VMSs across observers for either correctly or incorrectly recognised images. The associations of the VMSs with eye fixations and saliency are analysed separately as well. Lastly, we adapt various deep learning architectures for the reconstruction and prediction of memorable regions in images and analyse the results when using transfer learning at the outputs of different convolutional network layers.", "title": "Defining Image Memorability Using the Visual Memory Schema", "normalizedTitle": "Defining Image Memorability Using the Visual Memory Schema", "fno": "08704932", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Convolutional Neural Nets", "Image Coding", "Image Recognition", "Image Reconstruction", "Learning Artificial Intelligence", "Visual Perception", "Cumulative Human Annotations", "Image Components", "Memorable Regions", "Human Observers", "Visual Memory Schema", "Intrinsic Property", "Image Memorability Prediction", "Encoding Images", "Recognizing Images", "Episodic Memory Test", "Eye Fixations", "Eye Saliency", "Deep Learning Architectures", "Memorable Region Reconstruction", "Memorable Region Prediction", "Convolutional Network Layers", "Visualization", "Observers", "Semantics", "Psychology", "Organizations", "Image Recognition", "Computer Vision", "Image Memorability", "Visual Memory Schema", "Memory Experiments", "Deep Features" ], "authors": [ { "givenName": "Erdem", "surname": "Akagunduz", "fullName": "Erdem Akagunduz", "affiliation": "Department of Computer Science, University of York, York, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Adrian G.", "surname": "Bors", "fullName": "Adrian G. Bors", "affiliation": "Department of Computer Science, University of York, York, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Karla K.", "surname": "Evans", "fullName": "Karla K. Evans", "affiliation": "Department of Psychology, University of York, York, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2020-09-01 00:00:00", "pubType": "trans", "pages": "2165-2178", "year": "2020", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391b089", "title": "What Makes an Object Memorable?", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b089/12OmNC1Y5s2", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840d200", "title": "Modifying the Memorability of Face Photographs", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840d200/12OmNsbY6Ug", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2013/4990/0/4990a976", "title": "Visual Attention-Driven Spatial Pooling for Image Memorability", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2013/4990a976/12OmNwseERd", "parentPublication": { "id": "proceedings/cvprw/2013/4990/0", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c390", "title": "Understanding and Predicting Image Memorability at a Large Scale", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c390/12OmNyOHG5r", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2017/4062/0/08054945", "title": "Visual content learning for visualizations memorability classification", "doi": null, "abstractUrl": "/proceedings-article/iscv/2017/08054945/12OmNz6iOlU", "parentPublication": { "id": "proceedings/iscv/2017/4062/0", "title": "2017 Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/07/06629991", "title": "What Makes a Photograph Memorable?", "doi": null, "abstractUrl": "/journal/tp/2014/07/06629991/13rRUx0xPoc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2022/8350/0/09806772", "title": "Finding the Middle Ground: Measuring Passwords for Security and Memorability", "doi": null, "abstractUrl": "/proceedings-article/sera/2022/09806772/1ED1SIE9Sms", "parentPublication": { "id": "proceedings/sera/2022/8350/0", "title": "2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f743", "title": "GANalyze: Toward Visual Definitions of Cognitive Image Properties", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f743/1hQqjk13CBW", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a790", "title": "Changing the Image Memorability: From Basic Photo Editing to GANs", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a790/1iTvvnRpWKc", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2020/4272/0/427200a360", "title": "Aesthetics-Assisted Multi-task Learning with Attention for Image Memorability Prediction", "doi": null, "abstractUrl": "/proceedings-article/mipr/2020/427200a360/1mA9XM4Jbjy", "parentPublication": { "id": "proceedings/mipr/2020/4272/0", "title": "2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08704962", "articleId": "19HKPPaOg9y", "__typename": "AdjacentArticleType" }, "next": { "fno": "08705270", "articleId": "19JpVQ1sVb2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1cHEkrFpU76", "doi": "10.1109/TVCG.2019.2934432", "abstract": "The scalability of a particular visualization approach is limited by the ability for people to discern differences between plots made with different datasets. Ideally, when the data changes, the visualization changes in perceptible ways. This relation breaks down when there is a mismatch between the encoding and the character of the dataset being viewed. Unfortunately, visualizations are often designed and evaluated without fully exploring how they will respond to a wide variety of datasets. We explore the use of an image similarity measure, the Multi-Scale Structural Similarity Index (MS-SSIM), for testing the discriminability of a data visualization across a variety of datasets. MS-SSIM is able to capture the similarity of two visualizations across multiple scales, including low level granular changes and high level patterns. Significant data changes that are not captured by the MS-SSIM indicate visualizations of low discriminability and effectiveness. The measure's utility is demonstrated with two empirical studies. In the first, we compare human similarity judgments and MS-SSIM scores for a collection of scatterplots. In the second, we compute the discriminability values for a set of basic visualizations and compare them with empirical measurements of effectiveness. In both cases, the analyses show that the computational measure is able to approximate empirical results. Our approach can be used to rank competing encodings on their discriminability and to aid in selecting visualizations for a particular type of data distribution.", "abstracts": [ { "abstractType": "Regular", "content": "The scalability of a particular visualization approach is limited by the ability for people to discern differences between plots made with different datasets. Ideally, when the data changes, the visualization changes in perceptible ways. This relation breaks down when there is a mismatch between the encoding and the character of the dataset being viewed. Unfortunately, visualizations are often designed and evaluated without fully exploring how they will respond to a wide variety of datasets. We explore the use of an image similarity measure, the Multi-Scale Structural Similarity Index (MS-SSIM), for testing the discriminability of a data visualization across a variety of datasets. MS-SSIM is able to capture the similarity of two visualizations across multiple scales, including low level granular changes and high level patterns. Significant data changes that are not captured by the MS-SSIM indicate visualizations of low discriminability and effectiveness. The measure's utility is demonstrated with two empirical studies. In the first, we compare human similarity judgments and MS-SSIM scores for a collection of scatterplots. In the second, we compute the discriminability values for a set of basic visualizations and compare them with empirical measurements of effectiveness. In both cases, the analyses show that the computational measure is able to approximate empirical results. Our approach can be used to rank competing encodings on their discriminability and to aid in selecting visualizations for a particular type of data distribution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The scalability of a particular visualization approach is limited by the ability for people to discern differences between plots made with different datasets. Ideally, when the data changes, the visualization changes in perceptible ways. This relation breaks down when there is a mismatch between the encoding and the character of the dataset being viewed. Unfortunately, visualizations are often designed and evaluated without fully exploring how they will respond to a wide variety of datasets. We explore the use of an image similarity measure, the Multi-Scale Structural Similarity Index (MS-SSIM), for testing the discriminability of a data visualization across a variety of datasets. MS-SSIM is able to capture the similarity of two visualizations across multiple scales, including low level granular changes and high level patterns. Significant data changes that are not captured by the MS-SSIM indicate visualizations of low discriminability and effectiveness. The measure's utility is demonstrated with two empirical studies. In the first, we compare human similarity judgments and MS-SSIM scores for a collection of scatterplots. In the second, we compute the discriminability values for a set of basic visualizations and compare them with empirical measurements of effectiveness. In both cases, the analyses show that the computational measure is able to approximate empirical results. Our approach can be used to rank competing encodings on their discriminability and to aid in selecting visualizations for a particular type of data distribution.", "title": "Discriminability Tests for Visualization Effectiveness and Scalability", "normalizedTitle": "Discriminability Tests for Visualization Effectiveness and Scalability", "fno": "08809850", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Visual Perception", "Visualization Scalability", "Image Similarity Measure", "Visualization Approach", "Visualization Effectiveness", "Discriminability Tests", "Data Visualization", "Multi Scale Structural Similarity Index", "Data Visualization", "Visualization", "Encoding", "Scalability", "Image Coding", "Task Analysis", "Indexes", "Scalability", "Discriminability", "Simulation", "Perception" ], "authors": [ { "givenName": "Rafael", "surname": "Veras", "fullName": "Rafael Veras", "affiliation": "Ontario Tech University", "__typename": "ArticleAuthorType" }, { "givenName": "Christopher", "surname": "Collins", "fullName": "Christopher Collins", "affiliation": "Ontario Tech University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "749-758", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ism/2014/4311/0/4311a078", "title": "Objective Quality Comparison of 4K UHD and Up-Scaled 4K UHD Videos", "doi": null, "abstractUrl": "/proceedings-article/ism/2014/4311a078/12OmNBOCWhR", "parentPublication": { "id": "proceedings/ism/2014/4311/0", "title": "2014 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2013/5050/0/5050a400", "title": "Improving the Discriminability of Dictionary by Gist Information Detection", "doi": null, "abstractUrl": "/proceedings-article/icig/2013/5050a400/12OmNvD8RGa", "parentPublication": { "id": "proceedings/icig/2013/5050/0", "title": "2013 Seventh International Conference on Image and Graphics (ICIG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0837", "title": "The Perceptual Scalability of Visualization", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0837/13rRUwjXZS3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443125", "title": "Glanceable Visualization: Studies of Data Comparison Performance on Smartwatches", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443125/17D45XDIXRv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956466", "title": "FD-CAM: Improving Faithfulness and Discriminability of Visual Explanation for CNNs", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956466/1IHpYQO1b7a", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10003102", "title": "Scalability in Visualization", "doi": null, "abstractUrl": "/journal/tg/5555/01/10003102/1Jv6onSqGf6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2022/7172/0/717200a141", "title": "The Lottery Ticket Adaptation for Neural Video Coding", "doi": null, "abstractUrl": "/proceedings-article/ism/2022/717200a141/1KaHMVJl7yw", "parentPublication": { "id": "proceedings/ism/2022/7172/0", "title": "2022 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151080", "title": "Joint Learned and Traditional Video Compression for P Frame", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151080/1lPHpGYVTzO", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09239918", "title": "Semantic Discriminability for Visual Communication", "doi": null, "abstractUrl": "/journal/tg/2021/02/09239918/1oeZWSkMqre", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552216", "title": "Context Matters: A Theory of Semantic Discriminability for Perceptual Encoding Systems", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552216/1xic1HOWGli", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08807244", "articleId": "1cG6natfOKY", "__typename": "AdjacentArticleType" }, "next": { "fno": "08807247", "articleId": "1cG67fsQY0g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GjwQktLcB2", "title": "Oct.", "year": "2022", "issueNum": "10", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1seipuzsKis", "doi": "10.1109/TVCG.2021.3068337", "abstract": "Data visualization design has a powerful effect on which patterns we see as salient and how quickly we see them. The visualization practitioner community prescribes two popular guidelines for creating clear and efficient visualizations: declutter and focus. The <italic>declutter</italic> guidelines suggest removing non-critical gridlines, excessive labeling of data values, and color variability to improve aesthetics and to maximize the emphasis on the data relative to the design itself. The <italic>focus</italic> guidelines for explanatory communication recommend including a clear headline that describes the relevant data pattern, highlighting a subset of relevant data values with a unique color, and connecting those values to written annotations that contextualize them in a broader argument. We evaluated how these recommendations impact recall of the depicted information across cluttered, decluttered, and decluttered+focused designs of six graph topics. Undergraduate students were asked to redraw previously seen visualizations, to recall their topics and main conclusions, and to rate the varied designs on aesthetics, clarity, professionalism, and trustworthiness. Decluttering designs led to higher ratings on professionalism, and adding focus to the design led to higher ratings on aesthetics and clarity. They also showed better memory for the highlighted pattern in the data, as reflected across redrawings of the original visualization and typed free-response conclusions, though we do not know whether these results would generalize beyond our memory-based tasks. The results largely empirically validate the intuitions of visualization designers and practitioners. The stimuli, data, analysis code, and Supplementary Materials are available at <uri>https://osf.io/wes9u/</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Data visualization design has a powerful effect on which patterns we see as salient and how quickly we see them. The visualization practitioner community prescribes two popular guidelines for creating clear and efficient visualizations: declutter and focus. The <italic>declutter</italic> guidelines suggest removing non-critical gridlines, excessive labeling of data values, and color variability to improve aesthetics and to maximize the emphasis on the data relative to the design itself. The <italic>focus</italic> guidelines for explanatory communication recommend including a clear headline that describes the relevant data pattern, highlighting a subset of relevant data values with a unique color, and connecting those values to written annotations that contextualize them in a broader argument. We evaluated how these recommendations impact recall of the depicted information across cluttered, decluttered, and decluttered+focused designs of six graph topics. Undergraduate students were asked to redraw previously seen visualizations, to recall their topics and main conclusions, and to rate the varied designs on aesthetics, clarity, professionalism, and trustworthiness. Decluttering designs led to higher ratings on professionalism, and adding focus to the design led to higher ratings on aesthetics and clarity. They also showed better memory for the highlighted pattern in the data, as reflected across redrawings of the original visualization and typed free-response conclusions, though we do not know whether these results would generalize beyond our memory-based tasks. The results largely empirically validate the intuitions of visualization designers and practitioners. The stimuli, data, analysis code, and Supplementary Materials are available at <uri>https://osf.io/wes9u/</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data visualization design has a powerful effect on which patterns we see as salient and how quickly we see them. The visualization practitioner community prescribes two popular guidelines for creating clear and efficient visualizations: declutter and focus. The declutter guidelines suggest removing non-critical gridlines, excessive labeling of data values, and color variability to improve aesthetics and to maximize the emphasis on the data relative to the design itself. The focus guidelines for explanatory communication recommend including a clear headline that describes the relevant data pattern, highlighting a subset of relevant data values with a unique color, and connecting those values to written annotations that contextualize them in a broader argument. We evaluated how these recommendations impact recall of the depicted information across cluttered, decluttered, and decluttered+focused designs of six graph topics. Undergraduate students were asked to redraw previously seen visualizations, to recall their topics and main conclusions, and to rate the varied designs on aesthetics, clarity, professionalism, and trustworthiness. Decluttering designs led to higher ratings on professionalism, and adding focus to the design led to higher ratings on aesthetics and clarity. They also showed better memory for the highlighted pattern in the data, as reflected across redrawings of the original visualization and typed free-response conclusions, though we do not know whether these results would generalize beyond our memory-based tasks. The results largely empirically validate the intuitions of visualization designers and practitioners. The stimuli, data, analysis code, and Supplementary Materials are available at https://osf.io/wes9u/.", "title": "Declutter and Focus: Empirically Evaluating Design Guidelines for Effective Data Communication", "normalizedTitle": "Declutter and Focus: Empirically Evaluating Design Guidelines for Effective Data Communication", "fno": "09385921", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Guidelines", "Image Color Analysis", "Clutter", "Task Analysis", "Bars", "Visualization", "Data Visualization", "Data Communication", "Data Storytelling", "Empirical Evaluation", "Visualization Aesthetics" ], "authors": [ { "givenName": "Kiran", "surname": "Ajani", "fullName": "Kiran Ajani", "affiliation": "School of Medicine, Case Western Reserve University, Cleveland, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Elsie", "surname": "Lee", "fullName": "Elsie Lee", "affiliation": "School of Information, University of Michigan, Ann Arbor, MI, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Cindy", "surname": "Xiong", "fullName": "Cindy Xiong", "affiliation": "CICS, UMass Amherst, Amherst, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Cole Nussbaumer", "surname": "Knaflic", "fullName": "Cole Nussbaumer Knaflic", "affiliation": "Storytelling with Data, Milwaukee, WI, USA", "__typename": "ArticleAuthorType" }, { "givenName": "William", "surname": "Kemper", "fullName": "William Kemper", "affiliation": "Northwestern University, Evanston, IL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Steven", "surname": "Franconeri", "fullName": "Steven Franconeri", "affiliation": "Northwestern University, Evanston, IL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "3351-3364", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2015/7660/0/7660a120", "title": "[POSTER] Design Guidelines for Generating Augmented Reality Instructions", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a120/12OmNAle6zC", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2014/3187/0/06822253", "title": "Empirically Derived Guidelines for Multimodal Interaction in Knowledge-Based Environments", "doi": null, "abstractUrl": "/proceedings-article/itng/2014/06822253/12OmNAndigu", "parentPublication": { "id": "proceedings/itng/2014/3187/0", "title": "2014 Eleventh International Conference on Information Technology: New Generations (ITNG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000087", "title": "Towards a Model of Information Aesthetics in Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000087/12OmNAoDhQU", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192677", "title": "Evaluation of Parallel Coordinates: Overview, Categorization and Guidelines for Future Research", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192677/13rRUygT7ff", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534029", "title": "VISupply: A Supply-Chain Process Model for Visualization Guidelines", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534029/17D45WgziPO", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a044", "title": "Once Upon a Time in a Land Far Away: Guidelines for Spatio-Temporal Narrative Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a044/1cMF8rgW5na", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09039632", "title": "Steerable Self-Driving Data Visualization", "doi": null, "abstractUrl": "/journal/tk/2022/01/09039632/1igS2v9G6cw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09223736", "title": "Comparative Layouts Revisited: Design Space, Guidelines, and Future Directions", "doi": null, "abstractUrl": "/journal/tg/2021/02/09223736/1nV7HJ2WAak", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09246308", "title": "Guidelines For Pursuing and Revealing Data Abstractions", "doi": null, "abstractUrl": "/journal/tg/2021/02/09246308/1olDVqD8b0A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600a761", "title": "Don&#x2019;t Do That! Hunting Down Visual Design Smells in Complex UIs Against Design Guidelines", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600a761/1sEXovAYJdC", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09366825", "articleId": "1rDR1ZpCQ6Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "09374106", "articleId": "1rPtmp3tBSM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Gjx15TOMCc", "name": "ttg202210-09385921s1-tvcg-3068337-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202210-09385921s1-tvcg-3068337-mm.zip", "extension": "zip", "size": "42.5 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1vDhWHXEYZW", "title": "Sept.", "year": "2021", "issueNum": "09", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1qJqUNl4cIo", "doi": "10.1109/TVCG.2021.3054916", "abstract": "We present the VIS30K dataset, a collection of 29,689 images that represents 30 years of figures and tables from each track of the IEEE Visualization conference series (Vis, SciVis, InfoVis, VAST). VIS30K's comprehensive coverage of the scientific literature in visualization not only reflects the progress of the field but also enables researchers to study the evolution of the state-of-the-art and to find relevant work based on graphical content. We describe the dataset and our semi-automatic collection process, which couples convolutional neural networks (CNN) with curation. Extracting figures and tables semi-automatically allows us to verify that no images are overlooked or extracted erroneously. To improve quality further, we engaged in a peer-search process for high-quality figures from early IEEE Visualization papers. With the resulting data, we also contribute VISImageNavigator (VIN, <uri>visimagenavigator.github.io</uri>), a web-based tool that facilitates searching and exploring VIS30K by author names, paper keywords, title and abstract, and years.", "abstracts": [ { "abstractType": "Regular", "content": "We present the VIS30K dataset, a collection of 29,689 images that represents 30 years of figures and tables from each track of the IEEE Visualization conference series (Vis, SciVis, InfoVis, VAST). VIS30K's comprehensive coverage of the scientific literature in visualization not only reflects the progress of the field but also enables researchers to study the evolution of the state-of-the-art and to find relevant work based on graphical content. We describe the dataset and our semi-automatic collection process, which couples convolutional neural networks (CNN) with curation. Extracting figures and tables semi-automatically allows us to verify that no images are overlooked or extracted erroneously. To improve quality further, we engaged in a peer-search process for high-quality figures from early IEEE Visualization papers. With the resulting data, we also contribute VISImageNavigator (VIN, <uri>visimagenavigator.github.io</uri>), a web-based tool that facilitates searching and exploring VIS30K by author names, paper keywords, title and abstract, and years.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present the VIS30K dataset, a collection of 29,689 images that represents 30 years of figures and tables from each track of the IEEE Visualization conference series (Vis, SciVis, InfoVis, VAST). VIS30K's comprehensive coverage of the scientific literature in visualization not only reflects the progress of the field but also enables researchers to study the evolution of the state-of-the-art and to find relevant work based on graphical content. We describe the dataset and our semi-automatic collection process, which couples convolutional neural networks (CNN) with curation. Extracting figures and tables semi-automatically allows us to verify that no images are overlooked or extracted erroneously. To improve quality further, we engaged in a peer-search process for high-quality figures from early IEEE Visualization papers. With the resulting data, we also contribute VISImageNavigator (VIN, visimagenavigator.github.io), a web-based tool that facilitates searching and exploring VIS30K by author names, paper keywords, title and abstract, and years.", "title": "VIS30K: A Collection of Figures and Tables From IEEE Visualization Conference Publications", "normalizedTitle": "VIS30K: A Collection of Figures and Tables From IEEE Visualization Conference Publications", "fno": "09337213", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Convolutional Neural Nets", "Data Visualisation", "IEEE Visualization Conference Publications", "Graphical Content", "Semiautomatic Collection Process", "Convolutional Neural Networks", "Peer Search Process", "VIS 30 K", "VIS Image Navigator", "Data Visualization", "Visualization", "Conferences", "Metadata", "Tools", "Data Mining", "Electronic Mail", "Visualization", "IEEE VIS", "Info Vis", "Sci Vis", "VAST", "Dataset", "Bibliometrics", "Images", "Figures", "Tables" ], "authors": [ { "givenName": "Jian", "surname": "Chen", "fullName": "Jian Chen", "affiliation": "The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Meng", "surname": "Ling", "fullName": "Meng Ling", "affiliation": "The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Rui", "surname": "Li", "fullName": "Rui Li", "affiliation": "The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Petra", "surname": "Isenberg", "fullName": "Petra Isenberg", "affiliation": "CNRS, Inria, LISN, Université Paris-Saclay, Saint-Aubin, France", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Isenberg", "fullName": "Tobias Isenberg", "affiliation": "CNRS, Inria, LISN, Université Paris-Saclay, Saint-Aubin, France", "__typename": "ArticleAuthorType" }, { "givenName": "Michael", "surname": "Sedlmair", "fullName": "Michael Sedlmair", "affiliation": "University of Stuttgart, Stuttgart, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Torsten", "surname": "Moller", "fullName": "Torsten Moller", "affiliation": "University of Vienna, Wien, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Robert S.", "surname": "Laramee", "fullName": "Robert S. Laramee", "affiliation": "University of Nottingham, Nottingham, U.K", "__typename": "ArticleAuthorType" }, { "givenName": "Han-Wei", "surname": "Shen", "fullName": "Han-Wei Shen", "affiliation": "The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Katharina", "surname": "Wunsche", "fullName": "Katharina Wunsche", "affiliation": "University of Vienna, Wien, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Qiru", "surname": "Wang", "fullName": "Qiru Wang", "affiliation": "University of Nottingham, Nottingham, U.K", "__typename": "ArticleAuthorType" } ], "replicability": { "isEnabled": true, "codeDownloadUrl": "https://github.com/tobiasisenberg/VIS30KLink.git", "codeRepositoryUrl": "https://github.com/tobiasisenberg/VIS30KLink", "__typename": "ArticleReplicabilityType" }, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2021-09-01 00:00:00", "pubType": "trans", "pages": "3826-3833", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004072", "title": "Exploring the Origins of Tables for Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004072/12OmNqBtj54", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559577", "title": "PDFFigures 2.0: Mining figures from research papers", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559577/12OmNwE9OBq", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a283", "title": "Visualization for Changes in Relationships between Historical Figures in Chronicles", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a283/12OmNy7yEcR", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/09/07583708", "title": "Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications", "doi": null, "abstractUrl": "/journal/tg/2017/09/07583708/13rRUxd2aZ7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258564", "title": "Scalable spam classifier for web tables", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258564/17D45WIXbRp", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/06/09695348", "title": "Visual Reasoning for Uncertainty in Spatio-Temporal Events of Historical Figures", "doi": null, "abstractUrl": "/journal/tg/2023/06/09695348/1AvqJHyHeO4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903293", "title": "HiTailor: Interactive Transformation and Visualization for Hierarchical Tabular Data", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903293/1GZon61xLpK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2020/9153/0/915300a024", "title": "Pilaster: A Collection of Citation Metadata Extracted From Publications on Visualization for the Digital Humanities", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2020/915300a024/1pZ0XhtNffW", "parentPublication": { "id": "proceedings/vis4dh/2020/9153/0", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a156", "title": "Visually Connecting Historical Figures Through Event Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a156/1yXudtjcVMc", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09060980", "articleId": "1iRo7RmpTa0", "__typename": "AdjacentArticleType" }, "next": { "fno": "09325067", "articleId": "1qnQCmbSzUA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1vDi7Fe2Qw0", "name": "ttg202109-09337213s1-supp1-3054916.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202109-09337213s1-supp1-3054916.pdf", "extension": "pdf", "size": "10.6 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1HGJ6XQen96", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GjwOm9uWbe", "doi": "10.1109/TVCG.2022.3203091", "abstract": "Prior studies suggest that emotional empathy is one of the components of intercultural sensitivity - the affective dimension under the concept of intercultural communication competence. Based on existing theories and findings, this paper reports a randomised parallel longitudinal study investigating the use of virtual reality (VR) exposure to enhance intercultural sensitivity. A total of 80 participants (36 females and 44 males) joined the study and were included in the data analysis. The participants were randomly assigned to the VR group, the video group, and the control group. Their intercultural sensitivity was measured three times: one week before the exposure (Z_$T_{1}$_Z), right after the exposure (Z_$T_{2}$_Z), and three weeks after the exposure (Z_$T_{3}$_Z). The results suggested that (1) the intercultural sensitivity of the VR group was significantly enhanced in both within-subject comparisons and between-subject comparisons, (2) there were no significant differences in intercultural sensitivity between the VR group and the video group at Z_$T_{2}$_Z, but the VR group retained the enhancement better at Z_$T_{3}$_Z, and (3) the sense of presence and emotional empathy well predicted the change in intercultural sensitivity of the VR group. The results, together with the participants' feedback and comments, provide new insights into the practice of using VR for intercultural sensitivity training and encourage future research on exploring the contributing factors of the results.", "abstracts": [ { "abstractType": "Regular", "content": "Prior studies suggest that emotional empathy is one of the components of intercultural sensitivity - the affective dimension under the concept of intercultural communication competence. Based on existing theories and findings, this paper reports a randomised parallel longitudinal study investigating the use of virtual reality (VR) exposure to enhance intercultural sensitivity. A total of 80 participants (36 females and 44 males) joined the study and were included in the data analysis. The participants were randomly assigned to the VR group, the video group, and the control group. Their intercultural sensitivity was measured three times: one week before the exposure ($T_{1}$), right after the exposure ($T_{2}$), and three weeks after the exposure ($T_{3}$). The results suggested that (1) the intercultural sensitivity of the VR group was significantly enhanced in both within-subject comparisons and between-subject comparisons, (2) there were no significant differences in intercultural sensitivity between the VR group and the video group at $T_{2}$, but the VR group retained the enhancement better at $T_{3}$, and (3) the sense of presence and emotional empathy well predicted the change in intercultural sensitivity of the VR group. The results, together with the participants' feedback and comments, provide new insights into the practice of using VR for intercultural sensitivity training and encourage future research on exploring the contributing factors of the results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Prior studies suggest that emotional empathy is one of the components of intercultural sensitivity - the affective dimension under the concept of intercultural communication competence. Based on existing theories and findings, this paper reports a randomised parallel longitudinal study investigating the use of virtual reality (VR) exposure to enhance intercultural sensitivity. A total of 80 participants (36 females and 44 males) joined the study and were included in the data analysis. The participants were randomly assigned to the VR group, the video group, and the control group. Their intercultural sensitivity was measured three times: one week before the exposure (-), right after the exposure (-), and three weeks after the exposure (-). The results suggested that (1) the intercultural sensitivity of the VR group was significantly enhanced in both within-subject comparisons and between-subject comparisons, (2) there were no significant differences in intercultural sensitivity between the VR group and the video group at -, but the VR group retained the enhancement better at -, and (3) the sense of presence and emotional empathy well predicted the change in intercultural sensitivity of the VR group. The results, together with the participants' feedback and comments, provide new insights into the practice of using VR for intercultural sensitivity training and encourage future research on exploring the contributing factors of the results.", "title": "Use Virtual Reality to Enhance Intercultural Sensitivity: A Randomised Parallel Longitudinal Study", "normalizedTitle": "Use Virtual Reality to Enhance Intercultural Sensitivity: A Randomised Parallel Longitudinal Study", "fno": "09873978", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Biomechanics", "Computer Aided Instruction", "Computer Mediated Communication", "Cultural Aspects", "Data Analysis", "Human Factors", "Statistical Analysis", "Team Working", "Virtual Reality", "Enhance Intercultural Sensitivity", "Intercultural Communication Competence", "Intercultural Sensitivity Training", "Randomised Parallel Longitudinal Study", "Video Group", "Virtual Reality Exposure", "VR Group", "Sensitivity", "Cultural Differences", "Training", "Media", "Instruments", "Particle Measurements", "Atmospheric Measurements", "Virtual Reality", "Presence", "Intercultural Sensitivity", "Emotional Empathy" ], "authors": [ { "givenName": "Chen", "surname": "Li", "fullName": "Chen Li", "affiliation": "Department of Computing, The Hong Kong Polytechnic University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Angel Lo", "surname": "Lo Kon", "fullName": "Angel Lo Lo Kon", "affiliation": "Centre for Innovative Applications of Internet and Multimedia Technologies, City University of Hong Kong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Horace Ho", "surname": "Shing Ip", "fullName": "Horace Ho Shing Ip", "affiliation": "Department of Computer Science, Centre for Innovative Applications of Internet and Multimedia Technologies, City University of Hong Kong, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "3673-3683", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670c085", "title": "Behavioral Manifestations of Intercultural Competence in Computer-Mediated Intercultural Learning", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670c085/12OmNBh8gXp", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2016/2461/0/2461a171", "title": "Socio-Cultural Adaptation Approach to Enhance Intercultural Collaboration and Learning", "doi": null, "abstractUrl": "/proceedings-article/waina/2016/2461a171/12OmNButpWc", "parentPublication": { "id": "proceedings/waina/2016/2461/0", "title": "2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcgin/2012/4854/0/4854a343", "title": "Differences between Sino- American Cultural Values from Intercultural Communication Perspective", "doi": null, "abstractUrl": "/proceedings-article/bcgin/2012/4854a343/12OmNqAU6DA", "parentPublication": { "id": "proceedings/bcgin/2012/4854/0", "title": "2012 Second International Conference on Business Computing and Global Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417880", "title": "Work in progress - Development of intercultural sensitivity from study abroad programs", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417880/12OmNrK9q3m", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2016/02/07159093", "title": "Don't Be a Stranger-Designing a Digital Intercultural Sensitivity Training Tool that is Culture General", "doi": null, "abstractUrl": "/journal/lt/2016/02/07159093/13rRUygBwej", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659209", "title": "Facilitating Intercultural Development: Preparing Future Engineers for Multidisciplinary Teams and Multicultural Environments", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659209/18j98GoGIog", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a614", "title": "The Immediate and Retained Effects of One-time Virtual Reality Exposure on Intercultural Sensitivity", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a614/1CJdEJiFbBC", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274181", "title": "Cultural Intelligence and Experiences in International Engineering Programs", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274181/1phRTdiP7nG", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeim/2020/9623/0/962300a150", "title": "A Study on the Practical Teaching of Intercultural Communication Competence Based on the International Development of Higher Vocational College", "doi": null, "abstractUrl": "/proceedings-article/icmeim/2020/962300a150/1syveFmiYdW", "parentPublication": { "id": "proceedings/icmeim/2020/9623/0", "title": "2020 International Conference on Modern Education and Information Management (ICMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a613", "title": "Study of Intercultural Communication Training in Interpreting Teaching Based on Multimedia Technology", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a613/1wHKoq6Hrwc", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09874256", "articleId": "1GjwONKhl84", "__typename": "AdjacentArticleType" }, "next": { "fno": "09873853", "articleId": "1GjwMIuxYUE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04Q", "title": "Jan.", "year": "2017", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxOdD8l", "doi": "10.1109/TVCG.2016.2599338", "abstract": "Shifts in information visualization practice are forcing a reconsideration of how infovis is taught. Traditional curricula that focused on conveying research-derived knowledge are slowly integrating design thinking as a key learning objective. In part, this is motivated by the realization that infovis is a wicked design problem, requiring a different kind of design work. In this paper we describe, VizItCards, a card-driven workshop developed for our graduate infovis class. The workshop is intended to provide practice with good design techniques and to simultaneously reinforce key concepts. VizItCards relies on principles of collaborative-learning and research on parallel design to generate positive collaborations and high-quality designs. From our experience of simulating a realistic design scenario in a classroom setting, we find that our students were able to meet key learning objectives and their design performance improved during the class. We describe variants of the workshop, discussing which techniques we think match to which learning goals.", "abstracts": [ { "abstractType": "Regular", "content": "Shifts in information visualization practice are forcing a reconsideration of how infovis is taught. Traditional curricula that focused on conveying research-derived knowledge are slowly integrating design thinking as a key learning objective. In part, this is motivated by the realization that infovis is a wicked design problem, requiring a different kind of design work. In this paper we describe, VizItCards, a card-driven workshop developed for our graduate infovis class. The workshop is intended to provide practice with good design techniques and to simultaneously reinforce key concepts. VizItCards relies on principles of collaborative-learning and research on parallel design to generate positive collaborations and high-quality designs. From our experience of simulating a realistic design scenario in a classroom setting, we find that our students were able to meet key learning objectives and their design performance improved during the class. We describe variants of the workshop, discussing which techniques we think match to which learning goals.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shifts in information visualization practice are forcing a reconsideration of how infovis is taught. Traditional curricula that focused on conveying research-derived knowledge are slowly integrating design thinking as a key learning objective. In part, this is motivated by the realization that infovis is a wicked design problem, requiring a different kind of design work. In this paper we describe, VizItCards, a card-driven workshop developed for our graduate infovis class. The workshop is intended to provide practice with good design techniques and to simultaneously reinforce key concepts. VizItCards relies on principles of collaborative-learning and research on parallel design to generate positive collaborations and high-quality designs. From our experience of simulating a realistic design scenario in a classroom setting, we find that our students were able to meet key learning objectives and their design performance improved during the class. We describe variants of the workshop, discussing which techniques we think match to which learning goals.", "title": "VizItCards: A Card-Based Toolkit for Infovis Design Education", "normalizedTitle": "VizItCards: A Card-Based Toolkit for Infovis Design Education", "fno": "07539629", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Conferences", "Collaboration", "Visualization", "Education", "Data Visualization", "Human Computer Interaction", "Standards", "Design Workshop", "Information Visualization Education", "Peer Learning", "Toolkit", "Card" ], "authors": [ { "givenName": "Shiqing", "surname": "He", "fullName": "Shiqing He", "affiliation": "School of Information at the University of Michigan", "__typename": "ArticleAuthorType" }, { "givenName": "Eytan", "surname": "Adar", "fullName": "Eytan Adar", "affiliation": "School of Information at the University of Michigan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "trans", "pages": "561-570", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2004/8779/0/87790167", "title": "The InfoVis Toolkit", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790167/12OmNwCsdCO", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190671", "title": "Enabling access to engineering education materials everywhere by design", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190671/12OmNxETa5Z", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684857", "title": "A teaching method for using metaphors in interaction design", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684857/12OmNxFJXzx", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cseet/2003/1869/0/18690052", "title": "Soft(ware) Skills in Context: Corporate Usability Training Aiming at Cross-Disciplinary Collaboration", "doi": null, "abstractUrl": "/proceedings-article/cseet/2003/18690052/12OmNxiKrZt", "parentPublication": { "id": "proceedings/cseet/2003/1869/0", "title": "Software Engineering Education and Training, Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a242", "title": "Categorizing Issues in Mid-air InfoVis Interaction", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a242/12OmNyKrH2A", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192666", "title": "Speculative Practices: Utilizing InfoVis to Explore Untapped Literary Collections", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192666/13rRUB7a113", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122689", "title": "Beyond Mouse and Keyboard: Expanding Design Considerations for Information Visualization Interactions", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122689/13rRUwInvsO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2019/4064/0/10075560", "title": "Machine Learning from User Interaction for Visualization and Analytics: A Workshop-Generated Research Agenda", "doi": null, "abstractUrl": "/proceedings-article/mlui/2019/10075560/1LIRveJELtK", "parentPublication": { "id": "proceedings/mlui/2019/4064/0", "title": "2019 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-2/2019/2850/0/285000a052", "title": "A Card-Based Interaction to Design Visualizations in Augmented Reality Environments", "doi": null, "abstractUrl": "/proceedings-article/iv-2/2019/285000a052/1cMEQuDCbq8", "parentPublication": { "id": "proceedings/iv-2/2019/2850/0", "title": "2019 23rd International Conference in Information Visualization – Part II", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222293", "title": "Introducing Layers of Meaning (LoM): A Framework to Reduce Semantic Distance of Visualization In Humanistic Research", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222293/1nTrGyTQ0Pm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07539634", "articleId": "13rRUxASuhE", "__typename": "AdjacentArticleType" }, "next": { "fno": "07536150", "articleId": "13rRUxBa5s3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvsDHDY", "title": "Jan.", "year": "2020", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1cHEhulnRJK", "doi": "10.1109/TVCG.2019.2934539", "abstract": "We develop a new perspective on research conducted through visualization design study that emphasizes design as a method of inquiry and the broad range of knowledge-contributions achieved through it as multiple, subjective, and socially constructed. From this interpretivist position we explore the nature of visualization design study and develop six criteria for rigor. We propose that rigor is established and judged according to the extent to which visualization design study research and its reporting are INFORMED, REFLEXIVE, ABUNDANT, PLAUSIBLE, RESONANT, and TRANSPARENT. This perspective and the criteria were constructed through a four-year engagement with the discourse around rigor and the nature of knowledge in social science, information systems, and design. We suggest methods from cognate disciplines that can support visualization researchers in meeting these criteria during the planning, execution, and reporting of design study. Through a series of deliberately provocative questions, we explore implications of this new perspective for design study research in visualization, concluding that as a discipline, visualization is not yet well positioned to embrace, nurture, and fully benefit from a rigorous, interpretivist approach to design study. The perspective and criteria we present are intended to stimulate dialogue and debate around the nature of visualization design study and the broader underpinnings of the discipline.", "abstracts": [ { "abstractType": "Regular", "content": "We develop a new perspective on research conducted through visualization design study that emphasizes design as a method of inquiry and the broad range of knowledge-contributions achieved through it as multiple, subjective, and socially constructed. From this interpretivist position we explore the nature of visualization design study and develop six criteria for rigor. We propose that rigor is established and judged according to the extent to which visualization design study research and its reporting are INFORMED, REFLEXIVE, ABUNDANT, PLAUSIBLE, RESONANT, and TRANSPARENT. This perspective and the criteria were constructed through a four-year engagement with the discourse around rigor and the nature of knowledge in social science, information systems, and design. We suggest methods from cognate disciplines that can support visualization researchers in meeting these criteria during the planning, execution, and reporting of design study. Through a series of deliberately provocative questions, we explore implications of this new perspective for design study research in visualization, concluding that as a discipline, visualization is not yet well positioned to embrace, nurture, and fully benefit from a rigorous, interpretivist approach to design study. The perspective and criteria we present are intended to stimulate dialogue and debate around the nature of visualization design study and the broader underpinnings of the discipline.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We develop a new perspective on research conducted through visualization design study that emphasizes design as a method of inquiry and the broad range of knowledge-contributions achieved through it as multiple, subjective, and socially constructed. From this interpretivist position we explore the nature of visualization design study and develop six criteria for rigor. We propose that rigor is established and judged according to the extent to which visualization design study research and its reporting are INFORMED, REFLEXIVE, ABUNDANT, PLAUSIBLE, RESONANT, and TRANSPARENT. This perspective and the criteria were constructed through a four-year engagement with the discourse around rigor and the nature of knowledge in social science, information systems, and design. We suggest methods from cognate disciplines that can support visualization researchers in meeting these criteria during the planning, execution, and reporting of design study. Through a series of deliberately provocative questions, we explore implications of this new perspective for design study research in visualization, concluding that as a discipline, visualization is not yet well positioned to embrace, nurture, and fully benefit from a rigorous, interpretivist approach to design study. The perspective and criteria we present are intended to stimulate dialogue and debate around the nature of visualization design study and the broader underpinnings of the discipline.", "title": "Criteria for Rigor in Visualization Design Study", "normalizedTitle": "Criteria for Rigor in Visualization Design Study", "fno": "08809711", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Visualization Design Study Research", "Rigor Criteria", "Visualization", "Social Sciences", "Data Visualization", "Information Systems", "Context", "Production", "Design Study", "Relativism", "Interpretivism", "Knowledge Construction", "Qualitative Research", "Research Through Design" ], "authors": [ { "givenName": "Miriah", "surname": "Meyer", "fullName": "Miriah Meyer", "affiliation": "University of Utah", "__typename": "ArticleAuthorType" }, { "givenName": "Jason", "surname": "Dykes", "fullName": "Jason Dykes", "affiliation": "City, University of London", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "trans", "pages": "87-97", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367b128", "title": "Initial Steps for IT Incident Visualization: Understanding Leadership Needs, Design, and Evaluation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b128/12OmNAZx8L5", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a060", "title": "Validation of Software Visualization Tools: A Systematic Mapping Study", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a060/12OmNApu5Iy", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e434", "title": "Beyond Rigor and Relevance: Exploring Artifact Resonance", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e434/12OmNx0A7PE", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a396", "title": "ArchiBrain: A Conceptual Platform for the Visualization of Collaborative Design", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a396/12OmNxGSmeN", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pact/2012/1182/0/07842960", "title": "Speculative parallelization needs rigor", "doi": null, "abstractUrl": "/proceedings-article/pact/2012/07842960/12OmNy87QtW", "parentPublication": { "id": "proceedings/pact/2012/1182/0", "title": "2012 21st International Conference on Parallel Architectures and Compilation Techniques (PACT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122259", "title": "Design Study of LineSets, a Novel Set Visualization Technique", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122259/13rRUygBwhE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904866", "title": "Visualization Design Practices in a Crisis: Behind the Scenes with COVID-19 Dashboard Creators", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904866/1H2llxba9ws", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0/541700a470", "title": "Overview of Interactive Visualization Methods", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2022/541700a470/1HcmV9IYE9O", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0", "title": "2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222089", "title": "Insights From Experiments With Rigor in an EvoBio Design Study", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222089/1nTqCVWgoWk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555646", "title": "Understanding Data Visualization Design Practice", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555646/1xlw1u3Uiw8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08807354", "articleId": "1cG6pt9f4ly", "__typename": "AdjacentArticleType" }, "next": { "fno": "08807292", "articleId": "1cG65uolr9e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1por3E5EhCU", "doi": "10.1109/TVCG.2020.3028894", "abstract": "A key challenge HCl researchers face when designing a controlled experiment is choosing the appropriate number of participants, or sample size. A priori power analysis examines the relationships among multiple parameters, including the complexity associated with human participants, e.g., order and fatigue effects, to calculate the statistical power of a given experiment design. We created Argus, a tool that supports interactive exploration of statistical power: Researchers specify experiment design scenarios with varying confounds and effect sizes. Argus then simulates data and visualizes statistical power across these scenarios, which lets researchers interactively weigh various trade-offs and make informed decisions about sample size. We describe the design and implementation of Argus, a usage scenario designing a visualization experiment, and a think-aloud study.", "abstracts": [ { "abstractType": "Regular", "content": "A key challenge HCl researchers face when designing a controlled experiment is choosing the appropriate number of participants, or sample size. A priori power analysis examines the relationships among multiple parameters, including the complexity associated with human participants, e.g., order and fatigue effects, to calculate the statistical power of a given experiment design. We created Argus, a tool that supports interactive exploration of statistical power: Researchers specify experiment design scenarios with varying confounds and effect sizes. Argus then simulates data and visualizes statistical power across these scenarios, which lets researchers interactively weigh various trade-offs and make informed decisions about sample size. We describe the design and implementation of Argus, a usage scenario designing a visualization experiment, and a think-aloud study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A key challenge HCl researchers face when designing a controlled experiment is choosing the appropriate number of participants, or sample size. A priori power analysis examines the relationships among multiple parameters, including the complexity associated with human participants, e.g., order and fatigue effects, to calculate the statistical power of a given experiment design. We created Argus, a tool that supports interactive exploration of statistical power: Researchers specify experiment design scenarios with varying confounds and effect sizes. Argus then simulates data and visualizes statistical power across these scenarios, which lets researchers interactively weigh various trade-offs and make informed decisions about sample size. We describe the design and implementation of Argus, a usage scenario designing a visualization experiment, and a think-aloud study.", "title": "Argus: Interactive a priori Power Analysis", "normalizedTitle": "Argus: Interactive a priori Power Analysis", "fno": "09286505", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Design Of Experiments", "Human Computer Interaction", "Interactive Systems", "Statistical Analysis", "H Cl Researchers", "Interactive A Priori Power Analysis", "Visualization Experiment", "Statistical Power", "Experiment Design Scenarios", "Interactive Exploration", "Fatigue Effects", "Human Participants", "Multiple Parameters", "Argus", "Fatigue", "Tools", "Human Computer Interaction", "Statistics", "Sociology", "Task Analysis", "History", "Experiment Design", "Power Analysis", "Simulation" ], "authors": [ { "givenName": "Xiaoyi", "surname": "Wang", "fullName": "Xiaoyi Wang", "affiliation": "University of Copenhagen", "__typename": "ArticleAuthorType" }, { "givenName": "Alexander", "surname": "Eiselmayer", "fullName": "Alexander Eiselmayer", "affiliation": "University of Zurich", "__typename": "ArticleAuthorType" }, { "givenName": "Wendy E.", "surname": "Mackay", "fullName": "Wendy E. Mackay", "affiliation": "Univ. Paris-Sud, CNRS, Inria, Universit é Paris-Saclay", "__typename": "ArticleAuthorType" }, { "givenName": "Kasper", "surname": "Hornbaek", "fullName": "Kasper Hornbaek", "affiliation": "University of Copenhagen", "__typename": "ArticleAuthorType" }, { "givenName": "Chat", "surname": "Wacharamanotham", "fullName": "Chat Wacharamanotham", "affiliation": "University of Zurich", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "432-442", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/acit-csi/2015/9642/0/9642a369", "title": "Non-parametric Statistical Assistance in Virtual Sample Selection for Small Data Set Prediction", "doi": null, "abstractUrl": "/proceedings-article/acit-csi/2015/9642a369/12OmNC1Y5pX", "parentPublication": { "id": "proceedings/acit-csi/2015/9642/0", "title": "2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence (ACIT-CSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ontoract/2008/3542/0/3542a003", "title": "Ontologies in Interactive Systems - ONTORACT", "doi": null, "abstractUrl": "/proceedings-article/ontoract/2008/3542a003/12OmNwJgANF", "parentPublication": { "id": "proceedings/ontoract/2008/3542/0", "title": "Ontologies in Interactive Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cycon-u-s/2016/5258/0/07836610", "title": "Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power)", "doi": null, "abstractUrl": "/proceedings-article/cycon-u-s/2016/07836610/12OmNwkzuq5", "parentPublication": { "id": "proceedings/cycon-u-s/2016/5258/0", "title": "2016 International Conference on Cyber Conflict (CyCon U.S.)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iptc/2010/4196/0/4196a286", "title": "Power-Law Distribution of Human Behaviors in Internet Forums", "doi": null, "abstractUrl": "/proceedings-article/iptc/2010/4196a286/12OmNx2QUL1", "parentPublication": { "id": "proceedings/iptc/2010/4196/0", "title": "Intelligence Information Processing and Trusted Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2012/2120/0/06299254", "title": "The Efficiency of Interactive Differential Evolution in Creation of Sound Contents: In Comparison with Interactive Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/snpd/2012/06299254/12OmNxdVgP7", "parentPublication": { "id": "proceedings/snpd/2012/2120/0", "title": "2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2009/3634/4/3634d323", "title": "The Study on Reasonability of Retrospective Power", "doi": null, "abstractUrl": "/proceedings-article/icic/2009/3634d323/12OmNyxXlmH", "parentPublication": { "id": "proceedings/icic/2009/3634/4", "title": "2009 Second International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a164", "title": "Enhancement of State Estimation Power System Based Hybrid Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a164/17PYEjG6pn7", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a885", "title": "The ARgus Designer: Supporting experts while conducting user studies of AR/MR applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a885/1J7WssjkGSQ", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028358", "title": "Using Personas as Curricular Design Tools: Engaging the Boundaries of Engineering Culture", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028358/1iffkf5HSr6", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/02/09380869", "title": "The Next Billion Users of Visualization", "doi": null, "abstractUrl": "/magazine/cg/2021/02/09380869/1s2GwzLzAwU", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09230430", "articleId": "1o3nARHsQes", "__typename": "AdjacentArticleType" }, "next": { "fno": "09233469", "articleId": "1o52VTez1QY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLeRMxepnG", "name": "ttg202102-09286505s1-tvcg-3028894-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09286505s1-tvcg-3028894-mm.zip", "extension": "zip", "size": "17 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNrMZprc", "title": "March", "year": "2019", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WaTkmp", "doi": "10.1109/TVCG.2018.2810918", "abstract": "Recent visualization research efforts have incorporated experimental techniques and perceptual models from the vision science community. Perceptual laws such as Weber's law, for example, have been used to model the perception of correlation in scatterplots. While this thread of research has progressively refined the modeling of the perception of correlation in scatterplots, it remains unclear as to why such perception can be modeled using relatively simple functions, e.g., linear and log-linear. In this paper, we investigate a longstanding hypothesis that people use visual features in a chart as a proxy for statistical measures like correlation. For a given scatterplot, we extract 49 candidate visual features and evaluate which best align with existing models and participant judgments. The results support the hypothesis that people attend to a small number of visual features when discriminating correlation in scatterplots. We discuss how this result may account for prior conflicting findings, and how visual features provide a baseline for future model-based approaches in visualization evaluation and design.", "abstracts": [ { "abstractType": "Regular", "content": "Recent visualization research efforts have incorporated experimental techniques and perceptual models from the vision science community. Perceptual laws such as Weber's law, for example, have been used to model the perception of correlation in scatterplots. While this thread of research has progressively refined the modeling of the perception of correlation in scatterplots, it remains unclear as to why such perception can be modeled using relatively simple functions, e.g., linear and log-linear. In this paper, we investigate a longstanding hypothesis that people use visual features in a chart as a proxy for statistical measures like correlation. For a given scatterplot, we extract 49 candidate visual features and evaluate which best align with existing models and participant judgments. The results support the hypothesis that people attend to a small number of visual features when discriminating correlation in scatterplots. We discuss how this result may account for prior conflicting findings, and how visual features provide a baseline for future model-based approaches in visualization evaluation and design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent visualization research efforts have incorporated experimental techniques and perceptual models from the vision science community. Perceptual laws such as Weber's law, for example, have been used to model the perception of correlation in scatterplots. While this thread of research has progressively refined the modeling of the perception of correlation in scatterplots, it remains unclear as to why such perception can be modeled using relatively simple functions, e.g., linear and log-linear. In this paper, we investigate a longstanding hypothesis that people use visual features in a chart as a proxy for statistical measures like correlation. For a given scatterplot, we extract 49 candidate visual features and evaluate which best align with existing models and participant judgments. The results support the hypothesis that people attend to a small number of visual features when discriminating correlation in scatterplots. We discuss how this result may account for prior conflicting findings, and how visual features provide a baseline for future model-based approaches in visualization evaluation and design.", "title": "Correlation Judgment and Visualization Features: A Comparative Study", "normalizedTitle": "Correlation Judgment and Visualization Features: A Comparative Study", "fno": "08305493", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Feature Extraction", "Visual Perception", "Correlation Judgment", "Visualization Features", "Perceptual Models", "Vision Science Community", "Perceptual Laws", "Webers Law", "Scatterplots", "Visualization Evaluation", "Model Based Approaches", "Candidate Visual Features", "Correlation", "Visualization", "Data Visualization", "Psychology", "Feature Extraction", "Data Models", "Computational Modeling", "Information Visualization", "Perception And Psychophysics", "Evaluation Methodology", "Webers Law", "Power Law" ], "authors": [ { "givenName": "Fumeng", "surname": "Yang", "fullName": "Fumeng Yang", "affiliation": "Department of Computer Science, Brown University, Providence, RI", "__typename": "ArticleAuthorType" }, { "givenName": "Lane T.", "surname": "Harrison", "fullName": "Lane T. Harrison", "affiliation": "Department of Computer Science, Worcester Polytechnic Institute, Worcester, MA", "__typename": "ArticleAuthorType" }, { "givenName": "Ronald A.", "surname": "Rensink", "fullName": "Ronald A. Rensink", "affiliation": "Departments of Computer Science and Psychology, University of British Columbia, Vancouver, BC, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "Steven L.", "surname": "Franconeri", "fullName": "Steven L. Franconeri", "affiliation": "Psychology Department, Northwestern University, Evanston, IL", "__typename": "ArticleAuthorType" }, { "givenName": "Remco", "surname": "Chang", "fullName": "Remco Chang", "affiliation": "Department of Computer Science, Tufts University, Medford, MA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2019-03-01 00:00:00", "pubType": "trans", "pages": "1474-1488", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2010/6685/0/05429604", "title": "A model of symbol lightness discrimination in sparse scatterplots", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2010/05429604/12OmNBSSVnf", "parentPublication": { "id": "proceedings/pacificvis/2010/6685/0", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2017/6549/0/07966736", "title": "Correlation-Based Background Music Recommendation by Incorporating Temporal Sequence of Local Features", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2017/07966736/12OmNxvwp0d", "parentPublication": { "id": "proceedings/bigmm/2017/6549/0", "title": "2017 IEEE Third International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a621", "title": "Convolutional Features for Correlation Filter Based Visual Tracking", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a621/12OmNzT7Oww", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08022891", "title": "Priming and Anchoring Effects in Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08022891/13rRUwbaqLz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08490694", "title": "ScatterNet: A Deep Subjective Similarity Model for Visual Analysis of Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2020/03/08490694/14jQfPkRijD", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600i741", "title": "Correlation-Aware Deep Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i741/1H1nc0OVnfG", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794768", "title": "Evaluating Perceptual Bias During Geometric Scaling of Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794768/1cr2ZlCC2xG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/02/09039622", "title": "Fusing of Electroencephalogram and Eye Movement With Group Sparse Canonical Correlation Analysis for Anxiety Detection", "doi": null, "abstractUrl": "/journal/ta/2022/02/09039622/1igRZVW87EQ", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/04/09195155", "title": "Words of Estimative Correlation: Studying Verbalizations of Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2022/04/09195155/1n2jl9RTLBm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a038", "title": "Why Two Y-Axes (Y2Y): A Case Study for Visual Correlation with Dual Axes", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a038/1rSR97vRDy0", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08303701", "articleId": "17D45W2WyxH", "__typename": "AdjacentArticleType" }, "next": { "fno": "08314702", "articleId": "17D45VUZMUW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgFo", "name": "ttg201903-08305493s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201903-08305493s1.zip", "extension": "zip", "size": "5.04 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1uR9KQn3cNq", "title": "Aug.", "year": "2021", "issueNum": "08", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1i3AQ4Mu0qA", "doi": "10.1109/TVCG.2020.2979433", "abstract": "We present and report on Design Exposition Discussion Documents (DExDs), a new means of fostering collaboration between visualization designers and domain experts in applied visualization research. DExDs are a collection of semi-interactive web-based documents used to promote design discourse: to communicate new visualization designs, and their underlying rationale, and to elicit feedback and new design ideas. Developed and applied during a four-year visual data analysis project in criminal intelligence, these documents enabled a series of visualization re-designs to be explored by crime analysts remotely - in a flexible and authentic way. The DExDs were found to engender a level of engagement that is qualitatively distinct from more traditional methods of feedback elicitation, supporting the kind of informed, iterative and design-led feedback that is core to applied visualization research. They also offered a solution to limited and intermittent contact between analyst and visualization researcher and began to address more intractable deficiencies, such as social desirability-bias, common to applied visualization projects. Crucially, DExDs conferred to domain experts greater agency over the design process - collaborators proposed design suggestions, justified with design knowledge, that directly influenced the re-redesigns. We provide context that allows the contributions to be transferred to a range of settings.", "abstracts": [ { "abstractType": "Regular", "content": "We present and report on Design Exposition Discussion Documents (DExDs), a new means of fostering collaboration between visualization designers and domain experts in applied visualization research. DExDs are a collection of semi-interactive web-based documents used to promote design discourse: to communicate new visualization designs, and their underlying rationale, and to elicit feedback and new design ideas. Developed and applied during a four-year visual data analysis project in criminal intelligence, these documents enabled a series of visualization re-designs to be explored by crime analysts remotely - in a flexible and authentic way. The DExDs were found to engender a level of engagement that is qualitatively distinct from more traditional methods of feedback elicitation, supporting the kind of informed, iterative and design-led feedback that is core to applied visualization research. They also offered a solution to limited and intermittent contact between analyst and visualization researcher and began to address more intractable deficiencies, such as social desirability-bias, common to applied visualization projects. Crucially, DExDs conferred to domain experts greater agency over the design process - collaborators proposed design suggestions, justified with design knowledge, that directly influenced the re-redesigns. We provide context that allows the contributions to be transferred to a range of settings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present and report on Design Exposition Discussion Documents (DExDs), a new means of fostering collaboration between visualization designers and domain experts in applied visualization research. DExDs are a collection of semi-interactive web-based documents used to promote design discourse: to communicate new visualization designs, and their underlying rationale, and to elicit feedback and new design ideas. Developed and applied during a four-year visual data analysis project in criminal intelligence, these documents enabled a series of visualization re-designs to be explored by crime analysts remotely - in a flexible and authentic way. The DExDs were found to engender a level of engagement that is qualitatively distinct from more traditional methods of feedback elicitation, supporting the kind of informed, iterative and design-led feedback that is core to applied visualization research. They also offered a solution to limited and intermittent contact between analyst and visualization researcher and began to address more intractable deficiencies, such as social desirability-bias, common to applied visualization projects. Crucially, DExDs conferred to domain experts greater agency over the design process - collaborators proposed design suggestions, justified with design knowledge, that directly influenced the re-redesigns. We provide context that allows the contributions to be transferred to a range of settings.", "title": "Design Exposition Discussion Documents for Rich Design Discourse in Applied Visualization", "normalizedTitle": "Design Exposition Discussion Documents for Rich Design Discourse in Applied Visualization", "fno": "09028205", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Internet", "D Ex Ds", "Informed Design Led Feedback", "Iterative Design Led Feedback", "Applied Visualization Research", "Visualization Researcher", "Applied Visualization Projects", "Design Process", "Collaborators Proposed Design Suggestions", "Design Knowledge", "Rich Design Discourse", "Visualization Designers", "Semiinteractive Web Based Documents", "Visualization Designs", "Design Ideas", "Four Year Visual Data Analysis Project", "Design Exposition Discussion Documents", "Visualization Redesigns", "Data Visualization", "Task Analysis", "Law Enforcement", "Visualization", "Collaboration", "Data Analysis", "Process Control", "Design Methodology", "Design Study", "Concurrent Evaluation", "Design Exposition", "Design Discourse", "Remote Collaboration", "Crime Analysis", "Statistical Process Control", "Visual Representation Design", "Geospatial Data", "Temporal Data" ], "authors": [ { "givenName": "Roger", "surname": "Beecham", "fullName": "Roger Beecham", "affiliation": "University of Leeds, Leeds, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Jason", "surname": "Dykes", "fullName": "Jason Dykes", "affiliation": "giCentre, City, University of London, London, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Chris", "surname": "Rooney", "fullName": "Chris Rooney", "affiliation": "Genetec, EC2V 5AY London, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "William", "surname": "Wong", "fullName": "William Wong", "affiliation": "IDC, Middlesex University, London, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2021-08-01 00:00:00", "pubType": "trans", "pages": "3451-3462", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iciii/2011/4523/3/4523c225", "title": "Discussion on the Application of Visualization Technology in Modeling and Simulation", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523c225/12OmNCfSqTt", "parentPublication": { "id": "proceedings/iciii/2011/4523/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2017/2385/0/2385z014", "title": "[EISIC 2017 panel discussion] Ethical dilemmas in intelligence analysis: Implications for systems and operations", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385z014/12OmNyen1wu", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visap/2017/3490/0/08282370", "title": "Using the interaction geography slicer to visualize New York City Stop &amp; Frisk", "doi": null, "abstractUrl": "/proceedings-article/visap/2017/08282370/12OmNylboy0", "parentPublication": { "id": "proceedings/visap/2017/3490/0", "title": "2017 IEEE VIS Arts Program (VISAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/05/mcg2018050054", "title": "Designing Effective Visual Interactive Systems despite Sparse Availability of Domain Information", "doi": null, "abstractUrl": "/magazine/cg/2018/05/mcg2018050054/13WBGQCAPLm", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875966", "title": "Moving beyond sequential design: Reflections on a rich multi-channel approach to data visualization", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875966/13rRUxASuMD", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440080", "title": "Design Exposition with Literate Visualization", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440080/17D45XoXP4o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/06/09716779", "title": "LegalVis: Exploring and Inferring Precedent Citations in Legal Documents", "doi": null, "abstractUrl": "/journal/tg/2023/06/09716779/1B5WCvEX76E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933751", "title": "Learning Vis Tools: Teaching Data Visualization Tutorials", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933751/1fTgJc2YdMI", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2020/9153/0/915300a036", "title": "Externalizing Transformations of Historical Documents: Opportunities for Provenance-Driven Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2020/915300a036/1pZ0XRm40vu", "parentPublication": { "id": "proceedings/vis4dh/2020/9153/0", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a016", "title": "The Affordance of Law. Sliding Treemaps browsing Hierarchically Structured Data on Touch Devices", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a016/1rSRatvqxRC", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08994048", "articleId": "1hkQPQmKUJa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09405464", "articleId": "1sP1fUOfDLq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBsLPeW", "title": "Jan./Feb.", "year": "2018", "issueNum": "01", "idPrefix": "cg", "pubType": "magazine", "volume": "38", "label": "Jan./Feb.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwcAquE", "doi": "10.1109/MCG.2018.011461525", "abstract": "This article presents ColorMoves, an interactive tool that promotes exploration of scientific data through artist-driven color methods in a unique and transformative way. We discuss the power of contrast in scientific visualization, the design of the ColorMoves tool, and the tools application in several science domains.", "abstracts": [ { "abstractType": "Regular", "content": "This article presents ColorMoves, an interactive tool that promotes exploration of scientific data through artist-driven color methods in a unique and transformative way. We discuss the power of contrast in scientific visualization, the design of the ColorMoves tool, and the tools application in several science domains.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This article presents ColorMoves, an interactive tool that promotes exploration of scientific data through artist-driven color methods in a unique and transformative way. We discuss the power of contrast in scientific visualization, the design of the ColorMoves tool, and the tools application in several science domains.", "title": "ColorMoves: Real-time Interactive Colormap Construction for Scientific Visualization", "normalizedTitle": "ColorMoves: Real-time Interactive Colormap Construction for Scientific Visualization", "fno": "mcg2018010020", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Data Analysis", "Data Visualisation", "Geographic Information Systems", "Oceanographic Techniques", "Oceanography", "Underwater Optics", "Scientific Visualization", "Artist Driven Color Methods", "Color Moves Tool", "Real Time Interactive Colormap Construction", "Image Color Analysis", "Data Visualization", "Encoding", "Task Analysis", "Real Time Systems", "Atmospheric Modeling", "Computer Graphics", "Visualization", "Applications", "Scientific Data", "Color", "Colormoves" ], "authors": [ { "givenName": "Francesca", "surname": "Samsel", "fullName": "Francesca Samsel", "affiliation": "University of Texas at Austin", "__typename": "ArticleAuthorType" }, { "givenName": "Sebastian", "surname": "Klaassen", "fullName": "Sebastian Klaassen", "affiliation": "University of Vienna", "__typename": "ArticleAuthorType" }, { "givenName": "David H.", "surname": "Rogers", "fullName": "David H. Rogers", "affiliation": "Los Alamos National Laboratory", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2018-01-01 00:00:00", "pubType": "mags", "pages": "20-29", "year": "2018", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cw/2015/9403/0/9403a030", "title": "An Interactive Risk Visualization of Snow Sliding from Roof with a Particle-Based Real-Time CG", "doi": null, "abstractUrl": "/proceedings-article/cw/2015/9403a030/12OmNANkoan", "parentPublication": { "id": "proceedings/cw/2015/9403/0", "title": "2015 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1988/0882/0/00044646", "title": "Interactive scientific visualization and parallel display techniques", "doi": null, "abstractUrl": "/proceedings-article/sc/1988/00044646/12OmNAZx8Me", "parentPublication": { "id": "proceedings/sc/1988/0882/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imsccs/2006/2581/1/25810778", "title": "Ontology Construction for Scientific Visualization", "doi": null, "abstractUrl": "/proceedings-article/imsccs/2006/25810778/12OmNAiFI8w", "parentPublication": { "id": "proceedings/imsccs/2006/2581/1", "title": "Computer and Computational Sciences, International Multi-Symposiums on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1997/8262/0/82620261", "title": "VizWiz: a Java applet for interactive 3D scientific visualization on the Web", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1997/82620261/12OmNBqMDi3", "parentPublication": { "id": "proceedings/ieee-vis/1997/8262/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icndc/2010/8382/0/05645433", "title": "Secure Online Scientific Visualization of Atmospheric Nucleation Processes", "doi": null, "abstractUrl": "/proceedings-article/icndc/2010/05645433/12OmNz61dca", "parentPublication": { "id": "proceedings/icndc/2010/8382/0", "title": "2010 First International Conference on Networking and Distributed Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/04/ttg2008040835", "title": "Scientific Sketching for Collaborative VR Visualization Design", "doi": null, "abstractUrl": "/journal/tg/2008/04/ttg2008040835/13rRUwI5UfX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/03/mcg2016030017", "title": "Immersive Visualization to Support Scientific Insight", "doi": null, "abstractUrl": "/magazine/cg/2016/03/mcg2016030017/13rRUxAASN3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visap/2022/6365/0/636500a127", "title": "Affective, Hand-Sculpted Glyph Forms for Engaging and Expressive Scientific Visualization", "doi": null, "abstractUrl": "/proceedings-article/visap/2022/636500a127/1J7WAbXJJe0", "parentPublication": { "id": "proceedings/visap/2022/6365/0", "title": "2022 IEEE VIS Arts Program (VISAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005653", "title": "RAMP: Real-Time Anomaly Detection in Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005653/1hJs4F2LGQU", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222377", "title": "Interactive Visualization of Atmospheric Effects for Celestial Bodies", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222377/1nTrHSFagNy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2018010011", "articleId": "13rRUyYjKcY", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2018010030", "articleId": "13rRUNvPLcq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyQphgV", "title": "May", "year": "2013", "issueNum": "05", "idPrefix": "co", "pubType": "magazine", "volume": "46", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgyOgw", "doi": "10.1109/MC.2013.38", "abstract": "Visualization and visual analytics re-searchers can contribute substantial technological advances to support the reliable, effective, safe, and validated systems required for personal health, clinical healthcare, and public health policymaking. The Web extra at http://youtu.be/KLlStIfGUZQ is a video showing how Oracle Health Sciences Institute is supporting research at the University of Maryland that is helping medical professionals analyze millions of patient records by developing a powerful data visualization tool called EventFlow.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization and visual analytics re-searchers can contribute substantial technological advances to support the reliable, effective, safe, and validated systems required for personal health, clinical healthcare, and public health policymaking. The Web extra at http://youtu.be/KLlStIfGUZQ is a video showing how Oracle Health Sciences Institute is supporting research at the University of Maryland that is helping medical professionals analyze millions of patient records by developing a powerful data visualization tool called EventFlow.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization and visual analytics re-searchers can contribute substantial technological advances to support the reliable, effective, safe, and validated systems required for personal health, clinical healthcare, and public health policymaking. The Web extra at http://youtu.be/KLlStIfGUZQ is a video showing how Oracle Health Sciences Institute is supporting research at the University of Maryland that is helping medical professionals analyze millions of patient records by developing a powerful data visualization tool called EventFlow.", "title": "Improving Healthcare with Interactive Visualization", "normalizedTitle": "Improving Healthcare with Interactive Visualization", "fno": "mco2013050058", "hasPdf": true, "idPrefix": "co", "keywords": [ "Biomedical Imaging", "Visual Databases", "Public Healthcare", "Visual Analytics", "Informatics", "Visualization", "Data Visualization", "EH Rs", "Healthcare", "Medical Informatics", "Biomedical Informatics", "Information Visualization", "Visual Analysis", "Personal Medical Devices", "Electronic Health Records" ], "authors": [ { "givenName": "Ben", "surname": "Shneiderman", "fullName": "Ben Shneiderman", "affiliation": "University of Maryland", "__typename": "ArticleAuthorType" }, { "givenName": "Catherine", "surname": "Plaisant", "fullName": "Catherine Plaisant", "affiliation": "University of Maryland", "__typename": "ArticleAuthorType" }, { "givenName": "Bradford W.", "surname": "Hesse", "fullName": "Bradford W. Hesse", "affiliation": "National Institute of Health", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2013-05-01 00:00:00", "pubType": "mags", "pages": "58-66", "year": "2013", "issn": "0018-9162", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2006/2602/0/01648300", "title": "Multivariate Relational Visualization of Complex Clinical Datasets in a Critical Care Setting: A Data Visualization Interactive Prototype", "doi": null, "abstractUrl": "/proceedings-article/iv/2006/01648300/12OmNrMHOnR", "parentPublication": { "id": "proceedings/iv/2006/2602/0", "title": "Tenth International Conference on Information Visualisation (IV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2017/4042/0/07940217", "title": "Improving Usability through Enhanced Visualization in Healthcare", "doi": null, "abstractUrl": "/proceedings-article/isads/2017/07940217/12OmNvJXeD1", "parentPublication": { "id": "proceedings/isads/2017/4042/0", "title": "2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2015/9942/0/9942a511", "title": "Healthcare Digital Signage Using Gamification Method", "doi": null, "abstractUrl": "/proceedings-article/nbis/2015/9942a511/12OmNwNwzDx", "parentPublication": { "id": "proceedings/nbis/2015/9942/0", "title": "2015 18th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2014/5701/0/5701a206", "title": "Ananya Visual Analytics System: Applications for Strengthening Healthcare Delivery in Bihar, India", "doi": null, "abstractUrl": "/proceedings-article/ichi/2014/5701a206/12OmNx2QULd", "parentPublication": { "id": "proceedings/ichi/2014/5701/0", "title": "2014 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2010/3987/1/3987a598", "title": "Knowledge Visualization: An Effective Way of Improving Learning", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987a598/12OmNxWcHjP", "parentPublication": { "id": "proceedings/etcs/2010/3987/1", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1992/2897/0/00235185", "title": "Improving visualization: theoretical and empirical foundations", "doi": null, "abstractUrl": "/proceedings-article/visual/1992/00235185/12OmNynJMCQ", "parentPublication": { "id": "proceedings/visual/1992/2897/0", "title": "Proceedings Visualization '92", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2017/4881/0/4881a415", "title": "MyHealthToday: Helping Patients with their Healthschedule Using a 24-Hour Clock Visualization", "doi": null, "abstractUrl": "/proceedings-article/ichi/2017/4881a415/12OmNzUgd4C", "parentPublication": { "id": "proceedings/ichi/2017/4881/0", "title": "2017 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/08/07457691", "title": "Interactive Visualization of Large Data Sets", "doi": null, "abstractUrl": "/journal/tk/2016/08/07457691/13rRUwfZC0E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08449328", "title": "A Framework for Externalizing Implicit Error Using Visualization", "doi": null, "abstractUrl": "/journal/tg/2019/01/08449328/17D45Wuc366", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2020/2644/0/264400a001", "title": "Daily Visualization of Statewide COVID-19 Healthcare Data", "doi": null, "abstractUrl": "/proceedings-article/vahc/2020/264400a001/1yhFE04Jzpe", "parentPublication": { "id": "proceedings/vahc/2020/2644/0", "title": "2020 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mco2013050051", "articleId": "13rRUy0ZzW0", "__typename": "AdjacentArticleType" }, "next": { "fno": "mco2013050068", "articleId": "13rRUB6Sq3O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GhRC5fLtjq", "title": "Oct.", "year": "2022", "issueNum": "05", "idPrefix": "bd", "pubType": "journal", "volume": "8", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nJsoF1XIGc", "doi": "10.1109/TBDATA.2020.3029559", "abstract": "Cellular Signal Strength (CSS), defined as the signal power received by mobile phones, is an important aspect of geographic information flow analysis, because the density of such information can reflect the urbanization variables such as population, gross domestic product, built-up area, electric power consumption, etc. Despite the importance, the real-time analysis of global CSS distribution remains a challenging problem due to the large data scale. In this article, a Display-driven Computing (DisDC) technique is designed and applied to provide efficient large scale interactive CSS visualization, generating results by calculating the value of each pixel that directly for display. Specifically, we present an efficient CSS measurement algorithm, which introduces spatial indexes and a corresponding query strategy; besides, an optimized parallel computing architecture is proposed to ensure the ability of real-time visualization. Experiments show that our approach obviously outperforms traditional methods and is capable of handling more than 40 million base stations in real-time. Moreover, an online demonstration is provided at <uri>https://github.com/MemoryMmy/CSSMap</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Cellular Signal Strength (CSS), defined as the signal power received by mobile phones, is an important aspect of geographic information flow analysis, because the density of such information can reflect the urbanization variables such as population, gross domestic product, built-up area, electric power consumption, etc. Despite the importance, the real-time analysis of global CSS distribution remains a challenging problem due to the large data scale. In this article, a Display-driven Computing (DisDC) technique is designed and applied to provide efficient large scale interactive CSS visualization, generating results by calculating the value of each pixel that directly for display. Specifically, we present an efficient CSS measurement algorithm, which introduces spatial indexes and a corresponding query strategy; besides, an optimized parallel computing architecture is proposed to ensure the ability of real-time visualization. Experiments show that our approach obviously outperforms traditional methods and is capable of handling more than 40 million base stations in real-time. Moreover, an online demonstration is provided at <uri>https://github.com/MemoryMmy/CSSMap</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cellular Signal Strength (CSS), defined as the signal power received by mobile phones, is an important aspect of geographic information flow analysis, because the density of such information can reflect the urbanization variables such as population, gross domestic product, built-up area, electric power consumption, etc. Despite the importance, the real-time analysis of global CSS distribution remains a challenging problem due to the large data scale. In this article, a Display-driven Computing (DisDC) technique is designed and applied to provide efficient large scale interactive CSS visualization, generating results by calculating the value of each pixel that directly for display. Specifically, we present an efficient CSS measurement algorithm, which introduces spatial indexes and a corresponding query strategy; besides, an optimized parallel computing architecture is proposed to ensure the ability of real-time visualization. Experiments show that our approach obviously outperforms traditional methods and is capable of handling more than 40 million base stations in real-time. Moreover, an online demonstration is provided at https://github.com/MemoryMmy/CSSMap.", "title": "Efficient Interactive Global Cellular Signal Strength Visualization", "normalizedTitle": "Efficient Interactive Global Cellular Signal Strength Visualization", "fno": "09216594", "hasPdf": true, "idPrefix": "bd", "keywords": [ "Data Visualisation", "Economic Indicators", "Geographic Information Systems", "Mobile Radio", "Optimisation", "Power Consumption", "Query Processing", "Statistical Analysis", "Storage Management", "Signal Power", "Mobile Phones", "Geographic Information Flow Analysis", "Urbanization Variables", "Gross Domestic Product", "Electric Power Consumption", "Real Time Analysis", "Global CSS Distribution", "Data Scale", "Display Driven Computing Technique", "Efficient Large Scale Interactive CSS Visualization", "Efficient CSS Measurement Algorithm", "Optimized Parallel Computing Architecture", "Real Time Visualization", "Efficient Interactive Global Cellular Signal Strength Visualization", "Cascading Style Sheets", "Data Visualization", "Base Stations", "Real Time Systems", "Big Data", "Spatial Databases", "Visualization", "Cellular Signal Strength", "Spatial Analysis", "Real Time", "Big Data", "Parallel Computing" ], "authors": [ { "givenName": "Mengyu", "surname": "Ma", "fullName": "Mengyu Ma", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Luo", "surname": "Chen", "fullName": "Luo Chen", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xue", "surname": "Ouyang", "fullName": "Xue Ouyang", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoran", "surname": "Liu", "fullName": "Xiaoran Liu", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Li", "fullName": "Jun Li", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ning", "surname": "Jing", "fullName": "Ning Jing", "affiliation": "College of Electronic Science and Technology, National University of Defense Technology, Changsha, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "1209-1219", "year": "2022", "issn": "2332-7790", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icse-c/2017/1589/0/07965258", "title": "CSSDev: Refactoring Duplication in Cascading Style Sheets", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/07965258/12OmNCf1Dx6", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2015/0481/0/07394325", "title": "Novel energy efficient strategies for cooperative spectrum sensing in cognitive radio networks", "doi": null, "abstractUrl": "/proceedings-article/isspit/2015/07394325/12OmNqGRGcH", "parentPublication": { "id": "proceedings/isspit/2015/0481/0", "title": "2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2015/7457/0/07356972", "title": "Tutorons: Generating context-relevant, on-demand explanations and demonstrations of online code", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2015/07356972/12OmNvA1hc1", "parentPublication": { "id": "proceedings/vlhcc/2015/7457/0", "title": "2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227174", "title": "Automated analysis of CSS rules to support style maintenance", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227174/12OmNxA3YZT", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2016/3845/0/07582802", "title": "Migrating cascading style sheets to preprocessors by introducing mixins", "doi": null, "abstractUrl": "/proceedings-article/ase/2016/07582802/12OmNxFsmLQ", "parentPublication": { "id": "proceedings/ase/2016/3845/0", "title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2018/03/08344516", "title": "Privacy-Preserving Crowdsourced Spectrum Sensing", "doi": null, "abstractUrl": "/journal/nt/2018/03/08344516/13rRUwjGoDp", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506516", "title": "Expresso: Building Responsive Interfaces with Keyframes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506516/17D45WnnFZ1", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/12/09120172", "title": "Congestion-Balanced and Welfare-Maximized Charging Strategies for Electric Vehicles", "doi": null, "abstractUrl": "/journal/td/2020/12/09120172/1kLe9pZW6s0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/08/09300192", "title": "Federated Learning Meets Contract Theory: Economic-Efficiency Framework for Electric Vehicle Networks", "doi": null, "abstractUrl": "/journal/tm/2022/08/09300192/1pK0FU9PJBu", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/09/09354592", "title": "Scalable Scalable Vector Graphics: Automatic Translation of Interactive SVGs to a Multithread VDOM for Fast Rendering", "doi": null, "abstractUrl": "/journal/tg/2022/09/09354592/1reXwRinuhy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09186351", "articleId": "1mP1NEsI3QY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09241052", "articleId": "1ogEuAyoYYE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zdLz0NqD7O", "title": "Nov.-Dec.", "year": "2021", "issueNum": "06", "idPrefix": "cg", "pubType": "magazine", "volume": "41", "label": "Nov.-Dec.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1x9TPkOzHmU", "doi": "10.1109/MCG.2021.3115387", "abstract": "Peer review is a widely utilized feedback mechanism for engaging students. As a pedagogical method, it has been shown to improve educational outcomes, but we have found limited empirical measurement of peer review in visualization courses. In addition to increasing engagement, peer review provides diverse feedback and reinforces recently learned course concepts through critical evaluation of others’ work. We discuss the construction and application of peer review in two visualization courses from different colleges at the University of South Florida. We then analyze student projects and peer review text via sentiment analysis to infer insights for visualization educators, including the focus of course content, engagement across student groups, student mastery of concepts, course trends over time, and expert intervention effectiveness. Finally, we provide suggestions for adapting peer review to other visualization courses to engage students and increase instructor understanding of the peer review process.", "abstracts": [ { "abstractType": "Regular", "content": "Peer review is a widely utilized feedback mechanism for engaging students. As a pedagogical method, it has been shown to improve educational outcomes, but we have found limited empirical measurement of peer review in visualization courses. In addition to increasing engagement, peer review provides diverse feedback and reinforces recently learned course concepts through critical evaluation of others’ work. We discuss the construction and application of peer review in two visualization courses from different colleges at the University of South Florida. We then analyze student projects and peer review text via sentiment analysis to infer insights for visualization educators, including the focus of course content, engagement across student groups, student mastery of concepts, course trends over time, and expert intervention effectiveness. Finally, we provide suggestions for adapting peer review to other visualization courses to engage students and increase instructor understanding of the peer review process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Peer review is a widely utilized feedback mechanism for engaging students. As a pedagogical method, it has been shown to improve educational outcomes, but we have found limited empirical measurement of peer review in visualization courses. In addition to increasing engagement, peer review provides diverse feedback and reinforces recently learned course concepts through critical evaluation of others’ work. We discuss the construction and application of peer review in two visualization courses from different colleges at the University of South Florida. We then analyze student projects and peer review text via sentiment analysis to infer insights for visualization educators, including the focus of course content, engagement across student groups, student mastery of concepts, course trends over time, and expert intervention effectiveness. Finally, we provide suggestions for adapting peer review to other visualization courses to engage students and increase instructor understanding of the peer review process.", "title": "Through the Looking Glass: Insights Into Visualization Pedagogy Through Sentiment Analysis of Peer Review Text", "normalizedTitle": "Through the Looking Glass: Insights Into Visualization Pedagogy Through Sentiment Analysis of Peer Review Text", "fno": "09547773", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Computer Science Education", "Data Visualisation", "Educational Administrative Data Processing", "Educational Courses", "Educational Institutions", "Further Education", "Human Factors", "Sentiment Analysis", "Visualization Courses", "Student Engagement", "University Of South Florida", "Peer Review Text Analysis", "Data Visualization", "Visualization", "Education", "Sentiment Analysis", "Writing", "Visual Communication", "Encoding" ], "authors": [ { "givenName": "Zachariah J.", "surname": "Beasley", "fullName": "Zachariah J. Beasley", "affiliation": "University of South Florida, Tampa, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Alon", "surname": "Friedman", "fullName": "Alon Friedman", "affiliation": "University of South Florida, Tampa, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Paul", "surname": "Rosen", "fullName": "Paul Rosen", "affiliation": "University of South Florida, Tampa, FL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2021-11-01 00:00:00", "pubType": "mags", "pages": "59-70", "year": "2021", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fie/2005/9077/0/01612043", "title": "Incorporating student peer-review into an introduction to engineering design course", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612043/12OmNxFsmyr", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684901", "title": "Improving student writing through multiple peer feedback", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684901/12OmNxX3uou", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a230", "title": "A Method for Thematic and Structural Visualization of Academic Content", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a230/12OmNyvoXiY", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2010/8485/0/05635258", "title": "A Socio-Psychological Approach to Improve Student Participation and Review Quality in Peer Code Reviews", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635258/12OmNzBOijm", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720638", "title": "Workshop - improving student engagement and intuition with the mobile studio pedagogy", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720638/12OmNzd7bY7", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659050", "title": "Instructor vs Peer Writing Feedback in a Large First-Year Engineering Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659050/18j97JBJB7O", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086245", "title": "Leveraging Peer Feedback to Improve Visualization Education", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086245/1kuHm7YdcOY", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09217931", "title": "A Structured Review of Data Management Technology for Interactive Visualization and Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09217931/1nL7qZXi89O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09492011", "title": "A Survey of Perception-Based Visualization Studies by Task", "doi": null, "abstractUrl": "/journal/tg/2022/12/09492011/1volPuHGMdW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637190", "title": "Developing a Comic-Creation Assignment and Rubric for Teaching and Assessing Algorithmic Concepts", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637190/1zuvX8lWLXW", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09547792", "articleId": "1x9TP3EpwJ2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09556564", "articleId": "1xlw4DK3GXC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xic4qsF8zK", "doi": "10.1109/TVCG.2021.3114857", "abstract": "Graphs are a ubiquitous data structure to model processes and relations in a wide range of domains. Examples include control-flow graphs in programs and semantic scene graphs in images. Identifying subgraph patterns in graphs is an important approach to understand their structural properties. We propose a visual analytics system GraphQ to support human-in-the-loop, example-based, subgraph pattern search in a database containing many individual graphs. To support fast, interactive queries, we use graph neural networks (GNNs) to encode a graph as fixed-length latent vector representation, and perform subgraph matching in the latent space. Due to the complexity of the problem, it is still difficult to obtain accurate one-to-one node correspondences in the matching results that are crucial for visualization and interpretation. We, therefore, propose a novel GNN for node-alignment called NeuroAlign, to facilitate easy validation and interpretation of the query results. GraphQ provides a visual query interface with a query editor and a multi-scale visualization of the results, as well as a user feedback mechanism for refining the results with additional constraints. We demonstrate GraphQ through two example usage scenarios: analyzing reusable subroutines in program workflows and semantic scene graph search in images. Quantitative experiments show that NeuroAlign achieves 19%-29% improvement in node-alignment accuracy compared to baseline GNN and provides up to 100× speedup compared to combinatorial algorithms. Our qualitative study with domain experts confirms the effectiveness for both usage scenarios.", "abstracts": [ { "abstractType": "Regular", "content": "Graphs are a ubiquitous data structure to model processes and relations in a wide range of domains. Examples include control-flow graphs in programs and semantic scene graphs in images. Identifying subgraph patterns in graphs is an important approach to understand their structural properties. We propose a visual analytics system GraphQ to support human-in-the-loop, example-based, subgraph pattern search in a database containing many individual graphs. To support fast, interactive queries, we use graph neural networks (GNNs) to encode a graph as fixed-length latent vector representation, and perform subgraph matching in the latent space. Due to the complexity of the problem, it is still difficult to obtain accurate one-to-one node correspondences in the matching results that are crucial for visualization and interpretation. We, therefore, propose a novel GNN for node-alignment called NeuroAlign, to facilitate easy validation and interpretation of the query results. GraphQ provides a visual query interface with a query editor and a multi-scale visualization of the results, as well as a user feedback mechanism for refining the results with additional constraints. We demonstrate GraphQ through two example usage scenarios: analyzing reusable subroutines in program workflows and semantic scene graph search in images. Quantitative experiments show that NeuroAlign achieves 19%-29% improvement in node-alignment accuracy compared to baseline GNN and provides up to 100× speedup compared to combinatorial algorithms. Our qualitative study with domain experts confirms the effectiveness for both usage scenarios.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graphs are a ubiquitous data structure to model processes and relations in a wide range of domains. Examples include control-flow graphs in programs and semantic scene graphs in images. Identifying subgraph patterns in graphs is an important approach to understand their structural properties. We propose a visual analytics system GraphQ to support human-in-the-loop, example-based, subgraph pattern search in a database containing many individual graphs. To support fast, interactive queries, we use graph neural networks (GNNs) to encode a graph as fixed-length latent vector representation, and perform subgraph matching in the latent space. Due to the complexity of the problem, it is still difficult to obtain accurate one-to-one node correspondences in the matching results that are crucial for visualization and interpretation. We, therefore, propose a novel GNN for node-alignment called NeuroAlign, to facilitate easy validation and interpretation of the query results. GraphQ provides a visual query interface with a query editor and a multi-scale visualization of the results, as well as a user feedback mechanism for refining the results with additional constraints. We demonstrate GraphQ through two example usage scenarios: analyzing reusable subroutines in program workflows and semantic scene graph search in images. Quantitative experiments show that NeuroAlign achieves 19%-29% improvement in node-alignment accuracy compared to baseline GNN and provides up to 100× speedup compared to combinatorial algorithms. Our qualitative study with domain experts confirms the effectiveness for both usage scenarios.", "title": "Interactive Visual Pattern Search on Graph Data via Graph Representation Learning", "normalizedTitle": "Interactive Visual Pattern Search on Graph Data via Graph Representation Learning", "fno": "09552902", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Task Analysis", "Semantics", "Visual Analytics", "Graph Neural Networks", "Computational Modeling", "Visual Databases", "Pattern Matching", "Graph", "Graph Neural Network", "Representation Learning", "Visual Query Interface" ], "authors": [ { "givenName": "Huan", "surname": "Song", "fullName": "Huan Song", "affiliation": "Robert Bosch Research and Technology Center, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zeng", "surname": "Dai", "fullName": "Zeng Dai", "affiliation": "ByteDance Inc., China", "__typename": "ArticleAuthorType" }, { "givenName": "Panpan", "surname": "Xu", "fullName": "Panpan Xu", "affiliation": "Amazon AWS AI, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Liu", "surname": "Ren", "fullName": "Liu Ren", "affiliation": "Robert Bosch Research and Technology Center, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "335-345", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/1996/7258/0/72580239", "title": "Graph matching by graduated assignment", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1996/72580239/12OmNANBZq3", "parentPublication": { "id": "proceedings/cvpr/1996/7258/0", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dta/2015/9849/0/9849a001", "title": "Graph Pattern Matching through Model Checking", "doi": null, "abstractUrl": "/proceedings-article/dta/2015/9849a001/12OmNvBIRPs", "parentPublication": { "id": "proceedings/dta/2015/9849/0", "title": "2015 8th International Conference on Database Theory and Application (DTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113411", "title": "DaVinci: Data-driven visual interface construction for subgraph search in graph databases", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113411/12OmNwHQB6n", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mue/2009/3658/0/3658a353", "title": "A Directed Labeled Graph Frequent Pattern Mining Algorithm Based on Minimum Code", "doi": null, "abstractUrl": "/proceedings-article/mue/2009/3658a353/12OmNxETaaF", "parentPublication": { "id": "proceedings/mue/2009/3658/0", "title": "Multimedia and Ubiquitous Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545a393", "title": "Continuous Subgraph Pattern Search over Graph Streams", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545a393/12OmNyPQ4yV", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a870", "title": "Subgraph Spotting through Explicit Graph Embedding: An Application to Content Spotting in Graphic Document Images", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a870/12OmNzX6cm2", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/08/ttk2010081093", "title": "Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams", "doi": null, "abstractUrl": "/journal/tk/2010/08/ttk2010081093/13rRUxly9el", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d150", "title": "VICS-GNN: A Visual Interactive System for Community Search via Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d150/1FwBCyhqyXK", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900b095", "title": "Improving Graph Representation Learning with Distribution Preserving", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900b095/1KpCwhzN9m0", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a432", "title": "Tree Structure-Aware Graph Representation Learning via Integrated Hierarchical Aggregation and Relational Metric Learning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a432/1r54H2s0tu8", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09556579", "articleId": "1xlw0LJ4OTm", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552925", "articleId": "1xibWnPGM5a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaOx3HDhe", "name": "ttg202201-09552902s1-supp1-3114857.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552902s1-supp1-3114857.pdf", "extension": "pdf", "size": "399 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNyxXloN", "title": "January/February", "year": "2003", "issueNum": "01", "idPrefix": "ex", "pubType": "magazine", "volume": "18", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxCitDN", "doi": "10.1109/MIS.2003.1179191", "abstract": "Automated essay-scoring applications are widely used from the elementary-school through university levels for large-scale assessment and classroom instruction. This goes hand in hand with the increase of essay writing on standardized tests. Writing teachers show growing excitement about the innovative automated-essay-evaluation software that helps students improve their writing. Integration of this software into the curriculum is also consistent with the drive toward individualized assessment and instruction. One kind of application developed for this purpose is an essay-based discourse analysis system. This software shows students the presence and absence of relevant essay-based discourse elements in their essays, including introductory material, thesis statements, main ideas, supporting ideas, and conclusions. This commercial software tool uses a voting algorithm based on decisions from three independent discourse analysis systems. The tool automatically labels discourse elements in student essays written on any topic, and across writing genres. This discourse analysis application is embedded in a larger application, Criterion writing analysis tools, and is a critical complement to other tools that provide feedback related to grammar, usage, mechanics, and style features in student essays.", "abstracts": [ { "abstractType": "Regular", "content": "Automated essay-scoring applications are widely used from the elementary-school through university levels for large-scale assessment and classroom instruction. This goes hand in hand with the increase of essay writing on standardized tests. Writing teachers show growing excitement about the innovative automated-essay-evaluation software that helps students improve their writing. Integration of this software into the curriculum is also consistent with the drive toward individualized assessment and instruction. One kind of application developed for this purpose is an essay-based discourse analysis system. This software shows students the presence and absence of relevant essay-based discourse elements in their essays, including introductory material, thesis statements, main ideas, supporting ideas, and conclusions. This commercial software tool uses a voting algorithm based on decisions from three independent discourse analysis systems. The tool automatically labels discourse elements in student essays written on any topic, and across writing genres. This discourse analysis application is embedded in a larger application, Criterion writing analysis tools, and is a critical complement to other tools that provide feedback related to grammar, usage, mechanics, and style features in student essays.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automated essay-scoring applications are widely used from the elementary-school through university levels for large-scale assessment and classroom instruction. This goes hand in hand with the increase of essay writing on standardized tests. Writing teachers show growing excitement about the innovative automated-essay-evaluation software that helps students improve their writing. Integration of this software into the curriculum is also consistent with the drive toward individualized assessment and instruction. One kind of application developed for this purpose is an essay-based discourse analysis system. This software shows students the presence and absence of relevant essay-based discourse elements in their essays, including introductory material, thesis statements, main ideas, supporting ideas, and conclusions. This commercial software tool uses a voting algorithm based on decisions from three independent discourse analysis systems. The tool automatically labels discourse elements in student essays written on any topic, and across writing genres. This discourse analysis application is embedded in a larger application, Criterion writing analysis tools, and is a critical complement to other tools that provide feedback related to grammar, usage, mechanics, and style features in student essays.", "title": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays", "normalizedTitle": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays", "fno": "x1032", "hasPdf": true, "idPrefix": "ex", "keywords": [ "Discourse Analysis", "Discourse Annotation", "Machine Learning", "Text Classification", "Automated Essay Evaluation", "Educational Technology" ], "authors": [ { "givenName": "Jill", "surname": "Burstein", "fullName": "Jill Burstein", "affiliation": "ETS Technologies", "__typename": "ArticleAuthorType" }, { "givenName": "Daniel", "surname": "Marcu", "fullName": "Daniel Marcu", "affiliation": "Information Sciences Institute, University of Southern California", "__typename": "ArticleAuthorType" }, { "givenName": "Kevin", "surname": "Knight", "fullName": "Kevin Knight", "affiliation": "Information Sciences Institute, University of Southern California", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "01", "pubDate": "2003-01-01 00:00:00", "pubType": "mags", "pages": "32-39", "year": "2003", "issn": "1541-1672", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "x1022", "articleId": "13rRUwhpBzL", "__typename": "AdjacentArticleType" }, "next": { "fno": "x1040", "articleId": "13rRUwbaqPV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvAiSlz", "title": "January/February", "year": "2008", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "14", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxly9dN", "doi": "10.1109/TVCG.2007.70625", "abstract": "This paper presents a sharpness-based method for hole-filling that can repair a 3D model such that its shape conforms to that of the original model. The method involves two processes: interpolation-based hole-filling, which produces an initial repaired model; and post-processing, which adjusts the shape of the initial repaired model to conform to that of the original model. In the interpolation-based hole-filling process, a surface interpolation algorithm based on the radial basis function creates a smooth implicit surface that fills the hole. Then, a regularized marching tetrahedral algorithm is used to triangulate the implicit surface. Finally a stitching and regulating strategy is applied to the surface patch and its neighboring boundary polygon meshes to produce an initial repaired mesh model, which is a regular mesh model suitable for post-processing. During post-processing, a sharpness dependent filtering algorithm is applied to the initial repaired model. This is an iterative procedure whereby each iteration step adjusts the face normal associated with each meshed polygon to recover the sharp features hidden in the repaired model. The experiment results demonstrate that the method is effective in repairing incomplete 3D mesh models.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a sharpness-based method for hole-filling that can repair a 3D model such that its shape conforms to that of the original model. The method involves two processes: interpolation-based hole-filling, which produces an initial repaired model; and post-processing, which adjusts the shape of the initial repaired model to conform to that of the original model. In the interpolation-based hole-filling process, a surface interpolation algorithm based on the radial basis function creates a smooth implicit surface that fills the hole. Then, a regularized marching tetrahedral algorithm is used to triangulate the implicit surface. Finally a stitching and regulating strategy is applied to the surface patch and its neighboring boundary polygon meshes to produce an initial repaired mesh model, which is a regular mesh model suitable for post-processing. During post-processing, a sharpness dependent filtering algorithm is applied to the initial repaired model. This is an iterative procedure whereby each iteration step adjusts the face normal associated with each meshed polygon to recover the sharp features hidden in the repaired model. The experiment results demonstrate that the method is effective in repairing incomplete 3D mesh models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a sharpness-based method for hole-filling that can repair a 3D model such that its shape conforms to that of the original model. The method involves two processes: interpolation-based hole-filling, which produces an initial repaired model; and post-processing, which adjusts the shape of the initial repaired model to conform to that of the original model. In the interpolation-based hole-filling process, a surface interpolation algorithm based on the radial basis function creates a smooth implicit surface that fills the hole. Then, a regularized marching tetrahedral algorithm is used to triangulate the implicit surface. Finally a stitching and regulating strategy is applied to the surface patch and its neighboring boundary polygon meshes to produce an initial repaired mesh model, which is a regular mesh model suitable for post-processing. During post-processing, a sharpness dependent filtering algorithm is applied to the initial repaired model. This is an iterative procedure whereby each iteration step adjusts the face normal associated with each meshed polygon to recover the sharp features hidden in the repaired model. The experiment results demonstrate that the method is effective in repairing incomplete 3D mesh models.", "title": "A Sharpness-Dependent Filter for Recovering Sharp Features in Repaired 3D Mesh Models", "normalizedTitle": "A Sharpness-Dependent Filter for Recovering Sharp Features in Repaired 3D Mesh Models", "fno": "ttg2008010200", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Feature Representation", "Filtering", "Geometric Correction", "Surface Fitting", "Mesh Repair" ], "authors": [ { "givenName": "Chun-Yen", "surname": "Chen", "fullName": "Chun-Yen Chen", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Kuo-Young", "surname": "Cheng", "fullName": "Kuo-Young Cheng", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2008-01-01 00:00:00", "pubType": "trans", "pages": "200-212", "year": "2008", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dpvt/2006/2825/0/04155795", "title": "Automatic Hole-Filling of Triangular Meshes Using Local Radial Basis Function", "doi": null, "abstractUrl": "/proceedings-article/3dpvt/2006/04155795/12OmNApu5sy", "parentPublication": { "id": "proceedings/3dpvt/2006/2825/0", "title": "Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/1/3583a568", "title": "A New Modeling Method on Skull Defect Repair", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583a568/12OmNBBzokm", "parentPublication": { "id": "proceedings/icmtma/2009/3583/3", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/1/01394143", "title": "Regular 3D mesh reconstruction based on cylindrical mapping", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394143/12OmNCeaPSH", "parentPublication": { "id": "proceedings/icme/2004/8603/1", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2010/4225/3/4225c306", "title": "An Integrated Approach to Filling Holes in Meshes", "doi": null, "abstractUrl": "/proceedings-article/aici/2010/4225c306/12OmNvEhg14", "parentPublication": { "id": "proceedings/aici/2010/4225/3", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2005/2392/0/23920447", "title": "Surface Modelling Using Fourth Order Geometric Flows", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2005/23920447/12OmNwswg2T", "parentPublication": { "id": "proceedings/cgiv/2005/2392/0", "title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2000/0868/0/08680202", "title": "Subdivision Surface Fitting Using QEM-Based Mesh Simplification and Reconstruction of Approximated B-Spline Surfaces", "doi": null, "abstractUrl": "/proceedings-article/pg/2000/08680202/12OmNy49sFt", "parentPublication": { "id": "proceedings/pg/2000/0868/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1983/06/01676284", "title": "The Reliability of Periodically Repaired n - I/n Parallel Redundant Systems", "doi": null, "abstractUrl": "/journal/tc/1983/06/01676284/13rRUx0xPuo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/04/v0629", "title": "Bilateral Recovering of Sharp Edges on Feature-Insensitive Sampled Meshes", "doi": null, "abstractUrl": "/journal/tg/2006/04/v0629/13rRUynHuiY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a061", "title": "Point Cloud Hole Filling Based on Feature Lines Extraction", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a061/1ap5xjYpSZa", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a079", "title": "A Repair Method of Point Cloud with Big Hole", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a079/1ap5yUFqLXW", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2008010186", "articleId": "13rRUyY28Yn", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2008010213", "articleId": "13rRUwvBy8P", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1LUpyYLBfeo", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYolEFtr6U", "doi": "10.1109/TVCG.2023.3247070", "abstract": "In this paper, we investigate the use of a motorized bike to support the walk of a self-avatar in virtual reality (VR). While existing walking-in-place (WIP) techniques render compelling walking experiences, they can be judged repetitive and strenuous. Our approach consists in assisting a WIP technique so that the user does not have to actively move in order to reduce effort and fatigue. We chose to assist a technique called walking-by-cycling, which consists in mapping the cycling motion of a bike onto the walking of the user's self-avatar, by using a motorized bike. We expected that our approach could provide participants with a compelling walking experience while reducing the effort required to navigate. We conducted a within-subjects study where we compared “assisted walking-by-cycling” to a traditional active walking-by-cycling implementation, and to a standard condition where the user is static. In the study, we measured embodiment, including ownership and agency, walking sensation, perceived effort and fatigue. Results showed that assisted walking-by-cycling induced more ownership, agency, and walking sensation than the static simulation. Additionally, assisted walking-by-cycling induced levels of ownership and walking sensation similar to that of active walking-by-cycling, but it induced less perceived effort. Taken together, this work promotes the use of assisted walking-by-cycling in situations where users cannot or do not want to exert much effort while walking in embodied VR such as for injured or disabled users, for prolonged uses, medical rehabilitation, or virtual visits.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we investigate the use of a motorized bike to support the walk of a self-avatar in virtual reality (VR). While existing walking-in-place (WIP) techniques render compelling walking experiences, they can be judged repetitive and strenuous. Our approach consists in assisting a WIP technique so that the user does not have to actively move in order to reduce effort and fatigue. We chose to assist a technique called walking-by-cycling, which consists in mapping the cycling motion of a bike onto the walking of the user's self-avatar, by using a motorized bike. We expected that our approach could provide participants with a compelling walking experience while reducing the effort required to navigate. We conducted a within-subjects study where we compared “assisted walking-by-cycling” to a traditional active walking-by-cycling implementation, and to a standard condition where the user is static. In the study, we measured embodiment, including ownership and agency, walking sensation, perceived effort and fatigue. Results showed that assisted walking-by-cycling induced more ownership, agency, and walking sensation than the static simulation. Additionally, assisted walking-by-cycling induced levels of ownership and walking sensation similar to that of active walking-by-cycling, but it induced less perceived effort. Taken together, this work promotes the use of assisted walking-by-cycling in situations where users cannot or do not want to exert much effort while walking in embodied VR such as for injured or disabled users, for prolonged uses, medical rehabilitation, or virtual visits.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we investigate the use of a motorized bike to support the walk of a self-avatar in virtual reality (VR). While existing walking-in-place (WIP) techniques render compelling walking experiences, they can be judged repetitive and strenuous. Our approach consists in assisting a WIP technique so that the user does not have to actively move in order to reduce effort and fatigue. We chose to assist a technique called walking-by-cycling, which consists in mapping the cycling motion of a bike onto the walking of the user's self-avatar, by using a motorized bike. We expected that our approach could provide participants with a compelling walking experience while reducing the effort required to navigate. We conducted a within-subjects study where we compared “assisted walking-by-cycling” to a traditional active walking-by-cycling implementation, and to a standard condition where the user is static. In the study, we measured embodiment, including ownership and agency, walking sensation, perceived effort and fatigue. Results showed that assisted walking-by-cycling induced more ownership, agency, and walking sensation than the static simulation. Additionally, assisted walking-by-cycling induced levels of ownership and walking sensation similar to that of active walking-by-cycling, but it induced less perceived effort. Taken together, this work promotes the use of assisted walking-by-cycling in situations where users cannot or do not want to exert much effort while walking in embodied VR such as for injured or disabled users, for prolonged uses, medical rehabilitation, or virtual visits.", "title": "Assisted walking-in-place: Introducing assisted motion to walking-by-cycling in embodied virtual reality", "normalizedTitle": "Assisted walking-in-place: Introducing assisted motion to walking-by-cycling in embodied virtual reality", "fno": "10049680", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Avatars", "Gait Analysis", "Handicapped Aids", "Human Computer Interaction", "Patient Rehabilitation", "Rendering Computer Graphics", "Virtual Reality", "Compelling Walking Experience", "Motorized Bike", "Walk", "Walking Sensation", "Walking By Cycling Implementation", "Walking In Place Techniques Render Compelling Walking Experiences", "Legged Locomotion", "Fatigue", "Navigation", "Avatars", "Propioception", "Virtual Environments", "User Interfaces", "Embodiment", "Virtual Walk", "Avatar", "Perceived Effort" ], "authors": [ { "givenName": "Yann", "surname": "Moullec", "fullName": "Yann Moullec", "affiliation": "CHU Rennes and Univ Rennes, Inria, CNRS, IRISA, France", "__typename": "ArticleAuthorType" }, { "givenName": "Mélanie", "surname": "Cogné", "fullName": "Mélanie Cogné", "affiliation": "CHU Rennes and Univ Rennes, Inria, CNRS, IRISA, France", "__typename": "ArticleAuthorType" }, { "givenName": "Justine", "surname": "Saint-Aubert", "fullName": "Justine Saint-Aubert", "affiliation": "CHU Rennes and Univ Rennes, Inria, CNRS, IRISA, France", "__typename": "ArticleAuthorType" }, { "givenName": "Anatole", "surname": "Lécuyer", "fullName": "Anatole Lécuyer", "affiliation": "CHU Rennes and Univ Rennes, Inria, CNRS, IRISA, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "2796-2805", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2016/0842/0/07460066", "title": "Rhythmic vibrations to heels and forefeet to produce virtual walking", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460066/12OmNBQkwZJ", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223390", "title": "Third person's footsteps enhanced moving sensation of seated person", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223390/12OmNxFsmDI", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504715", "title": "Vestibulohaptic passive stimulation for a walking sensation", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504715/12OmNxu6p8R", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2008/2047/0/04476598", "title": "LLCM-WIP: Low-Latency, Continuous-Motion Walking-in-Place", "doi": null, "abstractUrl": "/proceedings-article/3dui/2008/04476598/12OmNyQYtvN", "parentPublication": { "id": "proceedings/3dui/2008/2047/0", "title": "2008 IEEE Symposium on 3D User Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/04/08267106", "title": "Force Rendering and its Evaluation of a Friction-Based Walking Sensation Display for a Seated User", "doi": null, "abstractUrl": "/journal/tg/2018/04/08267106/13rRUwIF6dW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/04/07036075", "title": "Cognitive Resource Demands of Redirected Walking", "doi": null, "abstractUrl": "/journal/tg/2015/04/07036075/13rRUxcKzVm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797751", "title": "Improving Walking in Place Methods with Individualization and Deep Networks", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797751/1cJ0WSuJ27e", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798345", "title": "Investigation of Visual Self-Representation for a Walking-in-Place Navigation System in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798345/1cJ1hpkUgHS", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090453", "title": "Perception of Walking Self-body Avatar Enhances Virtual-walking Sensation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090453/1jIxoojmMy4", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a607", "title": "Virtual Walking Generator from Omnidirectional Video with Ground-dependent Foot Vibrations", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a607/1tnWZe0CPwA", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049700", "articleId": "1KYoAxyw5c4", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049695", "articleId": "1KYowtn3pok", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgJw", "title": "July", "year": "2010", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "32", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwIF6eS", "doi": "10.1109/TPAMI.2009.146", "abstract": "Fiducial markers are artificial landmarks added to a scene to facilitate locating point correspondences between images, or between images and a known model. Reliable fiducials solve the interest point detection and matching problems when adding markers is convenient. The proper design of fiducials and the associated computer vision algorithms to detect them can enable accurate pose detection for applications ranging from augmented reality, input devices for HCI, to robot navigation. Marker systems typically have two stages, hypothesis generation from unique image features and verification/identification. A set of criteria for high robustness and practical use are identified and then optimized to produce the ARTag fiducial marker system. An edge-based method robust to lighting and partial occlusion is used for the hypothesis stage, and a reliable digital coding system is used for the identification and verification stage. Using these design criteria large gains in performance are achieved by ARTag over conventional ad hoc designs.", "abstracts": [ { "abstractType": "Regular", "content": "Fiducial markers are artificial landmarks added to a scene to facilitate locating point correspondences between images, or between images and a known model. Reliable fiducials solve the interest point detection and matching problems when adding markers is convenient. The proper design of fiducials and the associated computer vision algorithms to detect them can enable accurate pose detection for applications ranging from augmented reality, input devices for HCI, to robot navigation. Marker systems typically have two stages, hypothesis generation from unique image features and verification/identification. A set of criteria for high robustness and practical use are identified and then optimized to produce the ARTag fiducial marker system. An edge-based method robust to lighting and partial occlusion is used for the hypothesis stage, and a reliable digital coding system is used for the identification and verification stage. Using these design criteria large gains in performance are achieved by ARTag over conventional ad hoc designs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fiducial markers are artificial landmarks added to a scene to facilitate locating point correspondences between images, or between images and a known model. Reliable fiducials solve the interest point detection and matching problems when adding markers is convenient. The proper design of fiducials and the associated computer vision algorithms to detect them can enable accurate pose detection for applications ranging from augmented reality, input devices for HCI, to robot navigation. Marker systems typically have two stages, hypothesis generation from unique image features and verification/identification. A set of criteria for high robustness and practical use are identified and then optimized to produce the ARTag fiducial marker system. An edge-based method robust to lighting and partial occlusion is used for the hypothesis stage, and a reliable digital coding system is used for the identification and verification stage. Using these design criteria large gains in performance are achieved by ARTag over conventional ad hoc designs.", "title": "Designing Highly Reliable Fiducial Markers", "normalizedTitle": "Designing Highly Reliable Fiducial Markers", "fno": "ttp2010071317", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Augmented Reality", "Fiducial Marker Systems", "Computer Vision" ], "authors": [ { "givenName": "Mark", "surname": "Fiala", "fullName": "Mark Fiala", "affiliation": "Ryerson University, Toronto", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2010-07-01 00:00:00", "pubType": "trans", "pages": "1317-1324", "year": "2010", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2011/0039/0/05759433", "title": "Random dot markers", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759433/12OmNAZOJUM", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2008/3381/0/3381a086", "title": "A Distributed Augmented Reality System Using 3D Fiducial Objects", "doi": null, "abstractUrl": "/proceedings-article/cw/2008/3381a086/12OmNAnuTAA", "parentPublication": { "id": "proceedings/cw/2008/3381/0", "title": "2008 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2013/2869/0/06671813", "title": "Further stabilization of a microlens-array-based fiducial marker", "doi": null, "abstractUrl": "/proceedings-article/ismar/2013/06671813/12OmNCfAPL4", "parentPublication": { "id": "proceedings/ismar/2013/2869/0", "title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2013/4932/0/4932a048", "title": "A New Method for Stereo Matching Based on Fiducial Marker", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a048/12OmNqIzgUB", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2010/4286/1/4286a195", "title": "An Improved Camera Calibration Method Using the Fiducial Marker System", "doi": null, "abstractUrl": "/proceedings-article/icdma/2010/4286a195/12OmNwCaCtd", "parentPublication": { "id": "proceedings/icdma/2010/4286/1", "title": "2010 International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2011/4362/0/4362a040", "title": "Fourier Tag: A Smoothly Degradable Fiducial Marker System with Configurable Payload Capacity", "doi": null, "abstractUrl": "/proceedings-article/crv/2011/4362a040/12OmNwlZu4d", "parentPublication": { "id": "proceedings/crv/2011/4362/0", "title": "2011 Canadian Conference on Computer and Robot Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995544", "title": "RUNE-Tag: A high accuracy fiducial marker with strong occlusion resilience", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995544/12OmNynJMMC", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851a562", "title": "Detection and Accurate Localization of Circular Fiducials under Highly Challenging Conditions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851a562/12OmNyxXlju", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2022/7260/0/726000a243", "title": "Autonomous Drone Landing with Fiducial Markers and a Gimbal-Mounted Camera for Active Tracking", "doi": null, "abstractUrl": "/proceedings-article/irc/2022/726000a243/1KcklgXiObK", "parentPublication": { "id": "proceedings/irc/2022/7260/0", "title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150618", "title": "ArUcOmni: detection of highly reliable fiducial markers in panoramic images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150618/1lPH30Y2Fqw", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttp2010071310", "articleId": "13rRUxBJhnP", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttp2010071324", "articleId": "13rRUx0gegr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1I6Nvxq2hxe", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1A4So1C0azu", "doi": "10.1109/TPAMI.2021.3139612", "abstract": "Least-mean-squares (LMS) solvers such as Linear / Ridge-Regression and SVD not only solve fundamental machine learning problems, but are also the building blocks in a variety of other methods, such as matrix factorizations. We suggest an algorithm that gets a finite set of <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula> <inline-formula><tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula>-dimensional real vectors and returns a subset of <inline-formula><tex-math notation=\"LaTeX\">Z_$d+1$_Z</tex-math></inline-formula> vectors with positive weights whose weighted sum is <italic>exactly</italic> the same. The constructive proof in Caratheodory&#x0027;s Theorem computes such a subset in <inline-formula><tex-math notation=\"LaTeX\">Z_$O(n^2d^2)$_Z</tex-math></inline-formula> time and thus not used in practice. Our algorithm computes this subset in <inline-formula><tex-math notation=\"LaTeX\">Z_$O(nd+d^4\\log {n})$_Z</tex-math></inline-formula> time, using <inline-formula><tex-math notation=\"LaTeX\">Z_$O(\\log n)$_Z</tex-math></inline-formula> calls to Caratheodory&#x0027;s construction on small but &#x201C;smart&#x201D; subsets. This is based on a novel paradigm of fusion between different data summarization techniques, known as sketches and coresets. For large values of <inline-formula><tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula>, we suggest a faster construction that takes <inline-formula><tex-math notation=\"LaTeX\">Z_$O(nd)$_Z</tex-math></inline-formula> time and returns a weighted subset of <inline-formula><tex-math notation=\"LaTeX\">Z_$O(d)$_Z</tex-math></inline-formula> sparsified input points. Here, a sparsified point means that some of its entries were set to zero. As an application, we show how to boost the performance of existing LMS solvers, such as those in scikit-learn library, up to x100. Generalization for streaming and distributed data is trivial. Extensive experimental results and open source code are provided.", "abstracts": [ { "abstractType": "Regular", "content": "Least-mean-squares (LMS) solvers such as Linear / Ridge-Regression and SVD not only solve fundamental machine learning problems, but are also the building blocks in a variety of other methods, such as matrix factorizations. We suggest an algorithm that gets a finite set of <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math><alternatives><mml:math><mml:mi>n</mml:mi></mml:math><inline-graphic xlink:href=\"maalouf-ieq1-3139612.gif\"/></alternatives></inline-formula> <inline-formula><tex-math notation=\"LaTeX\">$d$</tex-math><alternatives><mml:math><mml:mi>d</mml:mi></mml:math><inline-graphic xlink:href=\"maalouf-ieq2-3139612.gif\"/></alternatives></inline-formula>-dimensional real vectors and returns a subset of <inline-formula><tex-math notation=\"LaTeX\">$d+1$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq3-3139612.gif\"/></alternatives></inline-formula> vectors with positive weights whose weighted sum is <italic>exactly</italic> the same. The constructive proof in Caratheodory&#x0027;s Theorem computes such a subset in <inline-formula><tex-math notation=\"LaTeX\">$O(n^2d^2)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:msup><mml:mi>d</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq4-3139612.gif\"/></alternatives></inline-formula> time and thus not used in practice. Our algorithm computes this subset in <inline-formula><tex-math notation=\"LaTeX\">$O(nd+d^4\\log {n})$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mn>4</mml:mn></mml:msup><mml:mo form=\"prefix\">log</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq5-3139612.gif\"/></alternatives></inline-formula> time, using <inline-formula><tex-math notation=\"LaTeX\">$O(\\log n)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mo form=\"prefix\">log</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq6-3139612.gif\"/></alternatives></inline-formula> calls to Caratheodory&#x0027;s construction on small but &#x201C;smart&#x201D; subsets. This is based on a novel paradigm of fusion between different data summarization techniques, known as sketches and coresets. For large values of <inline-formula><tex-math notation=\"LaTeX\">$d$</tex-math><alternatives><mml:math><mml:mi>d</mml:mi></mml:math><inline-graphic xlink:href=\"maalouf-ieq7-3139612.gif\"/></alternatives></inline-formula>, we suggest a faster construction that takes <inline-formula><tex-math notation=\"LaTeX\">$O(nd)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq8-3139612.gif\"/></alternatives></inline-formula> time and returns a weighted subset of <inline-formula><tex-math notation=\"LaTeX\">$O(d)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"maalouf-ieq9-3139612.gif\"/></alternatives></inline-formula> sparsified input points. Here, a sparsified point means that some of its entries were set to zero. As an application, we show how to boost the performance of existing LMS solvers, such as those in scikit-learn library, up to x100. Generalization for streaming and distributed data is trivial. Extensive experimental results and open source code are provided.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Least-mean-squares (LMS) solvers such as Linear / Ridge-Regression and SVD not only solve fundamental machine learning problems, but are also the building blocks in a variety of other methods, such as matrix factorizations. We suggest an algorithm that gets a finite set of - --dimensional real vectors and returns a subset of - vectors with positive weights whose weighted sum is exactly the same. The constructive proof in Caratheodory's Theorem computes such a subset in - time and thus not used in practice. Our algorithm computes this subset in - time, using - calls to Caratheodory's construction on small but “smart” subsets. This is based on a novel paradigm of fusion between different data summarization techniques, known as sketches and coresets. For large values of -, we suggest a faster construction that takes - time and returns a weighted subset of - sparsified input points. Here, a sparsified point means that some of its entries were set to zero. As an application, we show how to boost the performance of existing LMS solvers, such as those in scikit-learn library, up to x100. Generalization for streaming and distributed data is trivial. Extensive experimental results and open source code are provided.", "title": "Fast and Accurate Least-Mean-Squares Solvers for High Dimensional Data", "normalizedTitle": "Fast and Accurate Least-Mean-Squares Solvers for High Dimensional Data", "fno": "09677460", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computational Complexity", "Data Fusion", "Distributed Processing", "Learning Artificial Intelligence", "Mean Square Error Methods", "Public Domain Software", "Theorem Proving", "Vectors", "Caratheodory Theorem", "Constructive Proof", "D 1 Vectors", "Data Fusion", "Data Summarization", "Distributed Data Streaming", "High Dimensional Data", "Least Mean Squares Solvers", "LMS Solvers", "Machine Learning", "Nd Dimensional Real Vectors", "O Nd D 4 Logn Time", "Open Source Code", "Approximation Algorithms", "Matrix Decomposition", "Big Data", "Linear Regression", "Codes", "Voltage Control", "Tuning", "Regression", "Least Mean Squares Solvers", "Coresets", "Sketches", "Caratheodorys Theorem", "Big Data" ], "authors": [ { "givenName": "Alaa", "surname": "Maalouf", "fullName": "Alaa Maalouf", "affiliation": "Department of Computer Science, Robotics and Big Data Labs, University of Haifa, Haifa, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Ibrahim", "surname": "Jubran", "fullName": "Ibrahim Jubran", "affiliation": "Department of Computer Science, Robotics and Big Data Labs, University of Haifa, Haifa, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Feldman", "fullName": "Dan Feldman", "affiliation": "Department of Computer Science, Robotics and Big Data Labs, University of Haifa, Haifa, Israel", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "9977-9994", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/ec/2022/03/09827923", "title": "PMNS for Efficient Arithmetic and Small Memory Cost", "doi": null, "abstractUrl": "/journal/ec/2022/03/09827923/1EWSBFUfd6M", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09109708", "title": "Unsupervised Large Graph Embedding Based on Balanced and Hierarchical K-Means", "doi": null, "abstractUrl": "/journal/tk/2022/04/09109708/1kpEsyACWGs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/10/09194366", "title": "A Novel Measurement for Network Reliability", "doi": null, "abstractUrl": "/journal/tc/2021/10/09194366/1n0EqDZV3X2", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09308968", "title": "Fast Extended Inductive Robust Principal Component Analysis With Optimal Mean", "doi": null, "abstractUrl": "/journal/tk/2022/10/09308968/1pQEa2Qipfa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09369083", "title": "Robust Low-Tubal-Rank Tensor Recovery From Binary Measurements", "doi": null, "abstractUrl": "/journal/tp/2022/08/09369083/1rFvS23KDAI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2022/04/09380413", "title": "Efficiency and Fairness in Resource Exchange", "doi": null, "abstractUrl": "/journal/cc/2022/04/09380413/1s2G0g76MVO", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09477007", "title": "Cascaded Algorithm Selection With Extreme-Region UCB Bandit", "doi": null, "abstractUrl": "/journal/tp/2022/10/09477007/1v2M4Z5uWGI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09613774", "articleId": "1yti08VhwXK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09576609", "articleId": "1xIKpil8WkM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1I6NzEmF4LS", "name": "ttp202212-09677460s1-supp1-3139612.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202212-09677460s1-supp1-3139612.pdf", "extension": "pdf", "size": "297 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1FAIkmT8BsQ", "title": "Sept.", "year": "2022", "issueNum": "09", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1oDXxbwvBoQ", "doi": "10.1109/TKDE.2020.3037218", "abstract": "<italic>Heterogeneous information networks (HINs)</italic>, which are typed graphs with labeled nodes and edges, have attracted tremendous interest from academia and industry. Given two HIN nodes <inline-formula><tex-math notation=\"LaTeX\">Z_$s$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>, and a natural number <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>, we study the discovery of the <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> most important meta paths in real time, which can be used to support friend search, product recommendation, anomaly detection, and graph clustering. In this work, we argue that the shortest path between <inline-formula><tex-math notation=\"LaTeX\">Z_$s$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula> may not necessarily be the most important path. As such, we combine several ranking functions, which are based on <italic>frequency</italic> and <italic>rarity</italic>, to redefine the unified importance function of the meta paths between <inline-formula><tex-math notation=\"LaTeX\">Z_$s$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>. Although this importance function can capture more information, it is very time-consuming to find top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> meta paths using this importance function. Therefore, we integrate this importance function into a multi-step framework, which can efficiently filter some impossible meta paths between <inline-formula><tex-math notation=\"LaTeX\">Z_$s$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>. In addition, we combine bidirectional searching algorithm with this framework to further boost the efficiency performance. The experiment on different datasets shows that our proposed method outperforms state-of-the-art algorithms in terms of effectiveness with reasonable response time.", "abstracts": [ { "abstractType": "Regular", "content": "<italic>Heterogeneous information networks (HINs)</italic>, which are typed graphs with labeled nodes and edges, have attracted tremendous interest from academia and industry. Given two HIN nodes <inline-formula><tex-math notation=\"LaTeX\">$s$</tex-math><alternatives><mml:math><mml:mi>s</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq1-3037218.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math><alternatives><mml:math><mml:mi>t</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq2-3037218.gif\"/></alternatives></inline-formula>, and a natural number <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq3-3037218.gif\"/></alternatives></inline-formula>, we study the discovery of the <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq4-3037218.gif\"/></alternatives></inline-formula> most important meta paths in real time, which can be used to support friend search, product recommendation, anomaly detection, and graph clustering. In this work, we argue that the shortest path between <inline-formula><tex-math notation=\"LaTeX\">$s$</tex-math><alternatives><mml:math><mml:mi>s</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq5-3037218.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math><alternatives><mml:math><mml:mi>t</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq6-3037218.gif\"/></alternatives></inline-formula> may not necessarily be the most important path. As such, we combine several ranking functions, which are based on <italic>frequency</italic> and <italic>rarity</italic>, to redefine the unified importance function of the meta paths between <inline-formula><tex-math notation=\"LaTeX\">$s$</tex-math><alternatives><mml:math><mml:mi>s</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq7-3037218.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math><alternatives><mml:math><mml:mi>t</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq8-3037218.gif\"/></alternatives></inline-formula>. Although this importance function can capture more information, it is very time-consuming to find top-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq9-3037218.gif\"/></alternatives></inline-formula> meta paths using this importance function. Therefore, we integrate this importance function into a multi-step framework, which can efficiently filter some impossible meta paths between <inline-formula><tex-math notation=\"LaTeX\">$s$</tex-math><alternatives><mml:math><mml:mi>s</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq10-3037218.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math><alternatives><mml:math><mml:mi>t</mml:mi></mml:math><inline-graphic xlink:href=\"zhu-ieq11-3037218.gif\"/></alternatives></inline-formula>. In addition, we combine bidirectional searching algorithm with this framework to further boost the efficiency performance. The experiment on different datasets shows that our proposed method outperforms state-of-the-art algorithms in terms of effectiveness with reasonable response time.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heterogeneous information networks (HINs), which are typed graphs with labeled nodes and edges, have attracted tremendous interest from academia and industry. Given two HIN nodes - and -, and a natural number -, we study the discovery of the - most important meta paths in real time, which can be used to support friend search, product recommendation, anomaly detection, and graph clustering. In this work, we argue that the shortest path between - and - may not necessarily be the most important path. As such, we combine several ranking functions, which are based on frequency and rarity, to redefine the unified importance function of the meta paths between - and -. Although this importance function can capture more information, it is very time-consuming to find top-- meta paths using this importance function. Therefore, we integrate this importance function into a multi-step framework, which can efficiently filter some impossible meta paths between - and -. In addition, we combine bidirectional searching algorithm with this framework to further boost the efficiency performance. The experiment on different datasets shows that our proposed method outperforms state-of-the-art algorithms in terms of effectiveness with reasonable response time.", "title": "Effective and Efficient Discovery of Top-k Meta Paths in Heterogeneous Information Networks", "normalizedTitle": "Effective and Efficient Discovery of Top-k Meta Paths in Heterogeneous Information Networks", "fno": "09253703", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Data Mining", "Graph Theory", "Information Networks", "Pattern Clustering", "Search Problems", "Heterogeneous Information Networks", "HI Ns", "Labeled Nodes", "HIN Nodes", "Natural Number", "K Most Important Meta Paths", "Friend Search", "Graph Clustering", "Shortest Path", "Important Path", "Ranking Functions", "Unified Importance Function", "K Meta Paths", "Impossible Meta Paths", "Efficiency Performance", "Computer Science", "Directed Graphs", "Image Edge Detection", "Industries", "Real Time Systems", "Anomaly Detection", "Time Factors", "Heterogeneous Information Networks", "top-<named-content xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" content-type=\"kwd\" xlink:type=\"simple\"> <inline-formula> <tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math> </inline-formula> </named-content>", "Meta Path" ], "authors": [ { "givenName": "Zichen", "surname": "Zhu", "fullName": "Zichen Zhu", "affiliation": "Department of Computer Science, University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Tsz Nam", "surname": "Chan", "fullName": "Tsz Nam Chan", "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Reynold", "surname": "Cheng", "fullName": "Reynold Cheng", "affiliation": "Department of Computer Science, University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Loc", "surname": "Do", "fullName": "Loc Do", "affiliation": "Alibaba, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhipeng", "surname": "Huang", "fullName": "Zhipeng Huang", "affiliation": "Department of Computer Science, University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Haoci", "surname": "Zhang", "fullName": "Haoci Zhang", "affiliation": "Facebook Inc., Menlo Park, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "4172-4185", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09712197", "title": "Fast LDP-MST: An Efficient Density-Peak-Based Clustering Method for Large-Size Datasets", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712197/1AUkecqbRok", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09861690", "title": "Optimizing Partial Area Under the Top-k Curve: Theory and Practice", "doi": null, "abstractUrl": "/journal/tp/2023/04/09861690/1FWhV30RnNe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/01/09127807", "title": "Average Top-k Aggregate Loss for Supervised Learning", "doi": null, "abstractUrl": "/journal/tp/2022/01/09127807/1l3uajhdTP2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09599395", "title": "Efficient Top-<italic>k</italic> Matching for Publish/Subscribe Ride Hitching", "doi": null, "abstractUrl": "/journal/tk/2023/04/09599395/1yeC79w0z3q", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09664361", "title": "Efficient Semi-External SCC Computation", "doi": null, "abstractUrl": "/journal/tk/2023/04/09664361/1zHDyTA0MEM", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09665221", "title": "An Efficient Index-Based Approach to Distributed Set Reachability on Small-World Graphs", "doi": null, "abstractUrl": "/journal/td/2022/10/09665221/1zJiQNKABEs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09266749", "articleId": "1oZxqu9nYcg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09269479", "articleId": "1p1c8tla0DK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1FAIoE1Cuf6", "name": "ttk202209-09253703s1-supp1-3037218.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk202209-09253703s1-supp1-3037218.pdf", "extension": "pdf", "size": "182 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1EOzVCQBwyI", "title": "Aug.", "year": "2022", "issueNum": "08", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ojYk1yEY1i", "doi": "10.1109/TKDE.2020.3034611", "abstract": "Density Peaks (DP) Clustering organizes data into clusters by finding peaks in dense regions. This involves computing density (<inline-formula><tex-math notation=\"LaTeX\">Z_$\\rho$_Z</tex-math></inline-formula>) and distance (<inline-formula><tex-math notation=\"LaTeX\">Z_$\\delta$_Z</tex-math></inline-formula>) of every point. As such, though DP has been very effective in producing high quality clusters, their complexity is O(<inline-formula><tex-math notation=\"LaTeX\">Z_$N^2$_Z</tex-math></inline-formula>) where <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> is the number of data points. In this paper, we propose a fast distributed density peaks clustering algorithm, FDDP, based on the z-value index. In FDDP, we first employ the z-value index to map multi-dimensional data points into one dimensional space, and then range-partition the data according to the z-value to balance the load across the processing nodes. We ensure minimal overlapping range to handle computations at the boundary points. We also propose FC, an efficient algorithm that employs a forward computing strategy to calculate <inline-formula><tex-math notation=\"LaTeX\">Z_$\\rho$_Z</tex-math></inline-formula> linearly. Additionally, we propose another algorithm, CB, which uses a caching and efficient searching strategy to compute <inline-formula><tex-math notation=\"LaTeX\">Z_$\\delta$_Z</tex-math></inline-formula>. Moreover, FDDP is able to reduce the time complexity from <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N\\cdot log(N))$_Z</tex-math></inline-formula>. We provide a theoretical analysis of FDDP and evaluated FDDP empirically. Our experimental results show that FDDP outperforms the state-of-the-art algorithms significantly.", "abstracts": [ { "abstractType": "Regular", "content": "Density Peaks (DP) Clustering organizes data into clusters by finding peaks in dense regions. This involves computing density (<inline-formula><tex-math notation=\"LaTeX\">$\\rho$</tex-math><alternatives><mml:math><mml:mi>&#x03C1;</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq1-3034611.gif\"/></alternatives></inline-formula>) and distance (<inline-formula><tex-math notation=\"LaTeX\">$\\delta$</tex-math><alternatives><mml:math><mml:mi>&#x03B4;</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq2-3034611.gif\"/></alternatives></inline-formula>) of every point. As such, though DP has been very effective in producing high quality clusters, their complexity is O(<inline-formula><tex-math notation=\"LaTeX\">$N^2$</tex-math><alternatives><mml:math><mml:msup><mml:mi>N</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"lu-ieq3-3034611.gif\"/></alternatives></inline-formula>) where <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math><alternatives><mml:math><mml:mi>N</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq4-3034611.gif\"/></alternatives></inline-formula> is the number of data points. In this paper, we propose a fast distributed density peaks clustering algorithm, FDDP, based on the z-value index. In FDDP, we first employ the z-value index to map multi-dimensional data points into one dimensional space, and then range-partition the data according to the z-value to balance the load across the processing nodes. We ensure minimal overlapping range to handle computations at the boundary points. We also propose FC, an efficient algorithm that employs a forward computing strategy to calculate <inline-formula><tex-math notation=\"LaTeX\">$\\rho$</tex-math><alternatives><mml:math><mml:mi>&#x03C1;</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq5-3034611.gif\"/></alternatives></inline-formula> linearly. Additionally, we propose another algorithm, CB, which uses a caching and efficient searching strategy to compute <inline-formula><tex-math notation=\"LaTeX\">$\\delta$</tex-math><alternatives><mml:math><mml:mi>&#x03B4;</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq6-3034611.gif\"/></alternatives></inline-formula>. Moreover, FDDP is able to reduce the time complexity from <inline-formula><tex-math notation=\"LaTeX\">$O(N^2)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>N</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"lu-ieq7-3034611.gif\"/></alternatives></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">$O(N\\cdot log(N))$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>N</mml:mi><mml:mo>&#x00B7;</mml:mo><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mi>g</mml:mi><mml:mo>(</mml:mo><mml:mi>N</mml:mi><mml:mo>)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"lu-ieq8-3034611.gif\"/></alternatives></inline-formula>. We provide a theoretical analysis of FDDP and evaluated FDDP empirically. Our experimental results show that FDDP outperforms the state-of-the-art algorithms significantly.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Density Peaks (DP) Clustering organizes data into clusters by finding peaks in dense regions. This involves computing density (-) and distance (-) of every point. As such, though DP has been very effective in producing high quality clusters, their complexity is O(-) where - is the number of data points. In this paper, we propose a fast distributed density peaks clustering algorithm, FDDP, based on the z-value index. In FDDP, we first employ the z-value index to map multi-dimensional data points into one dimensional space, and then range-partition the data according to the z-value to balance the load across the processing nodes. We ensure minimal overlapping range to handle computations at the boundary points. We also propose FC, an efficient algorithm that employs a forward computing strategy to calculate - linearly. Additionally, we propose another algorithm, CB, which uses a caching and efficient searching strategy to compute -. Moreover, FDDP is able to reduce the time complexity from - to -. We provide a theoretical analysis of FDDP and evaluated FDDP empirically. Our experimental results show that FDDP outperforms the state-of-the-art algorithms significantly.", "title": "Distributed Density Peaks Clustering Revisited", "normalizedTitle": "Distributed Density Peaks Clustering Revisited", "fno": "09244575", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Computational Complexity", "Pattern Clustering", "High Quality Clusters", "FDDP", "Z Value Index", "Map Multidimensional Data Points", "Dimensional Space", "Minimal Overlapping Range", "Boundary Points", "Forward Computing Strategy", "Distributed Density Peak Clustering", "Computing Density", "Data Point", "O N Sup 2 Sup Time Complexity", "Clustering Algorithms", "Partitioning Algorithms", "Indexes", "Distributed Databases", "Distance Measurement", "Time Complexity", "Clustering", "Distributed Computing", "Z Order Curve", "Density Peaks Clustering" ], "authors": [ { "givenName": "Jing", "surname": "Lu", "fullName": "Jing Lu", "affiliation": "School of Computer Science and Engineering, Northeastern University, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuhai", "surname": "Zhao", "fullName": "Yuhai Zhao", "affiliation": "School of Computer Science and Engineering, Northeastern University, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kian-Lee", "surname": "Tan", "fullName": "Kian-Lee Tan", "affiliation": "School of Computing, National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Zhengkui", "surname": "Wang", "fullName": "Zhengkui Wang", "affiliation": "InfoComm Technology Cluster, Singapore Institute of Technology, Singapore", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "3714-3726", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2019/06/08371302", "title": "Efficient Algorithms for Finding the Closest <inline-formula><tex-math notation=\"LaTeX\">Z_$l$_Z</tex-math></inline-formula>-Mers in Biological Data", "doi": null, "abstractUrl": "/journal/tb/2019/06/08371302/13rRUxlgyai", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09712197", "title": "Fast LDP-MST: An Efficient Density-Peak-Based Clustering Method for Large-Size Datasets", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712197/1AUkecqbRok", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09712412", "title": "Centerless Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/01/09712412/1AZKZVM8b84", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2020/06/08976264", "title": "Algorithms for Inversion Mod &#x3C;inline-formula&#x3E;&#x3C;tex-math notation=&#x22;LaTeX&#x22;&#x3E;Z_$p^k$_Z&#x3C;/tex-math&#x3E;&#x3C;/inline-formula&#x3E;", "doi": null, "abstractUrl": "/journal/tc/2020/06/08976264/1h0W7qmGRHO", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09452800", "title": "Core Decomposition on Uncertain Graphs Revisited", "doi": null, "abstractUrl": "/journal/tk/2023/01/09452800/1ulCu0Hdqs8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/06/09511805", "title": "Distributed Graph Realizations", "doi": null, "abstractUrl": "/journal/td/2022/06/09511805/1vYRJ00nBTi", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09531369", "title": "Deletion Propagation Revisited for Multiple Key Preserving Views", "doi": null, "abstractUrl": "/journal/tk/2023/03/09531369/1wJkZcWVIE8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09546728", "title": "Skyline Group Queries in Large Road-Social Networks Revisited", "doi": null, "abstractUrl": "/journal/tk/2023/03/09546728/1x6zArmoz72", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09665221", "title": "An Efficient Index-Based Approach to Distributed Set Reachability on Small-World Graphs", "doi": null, "abstractUrl": "/journal/td/2022/10/09665221/1zJiQNKABEs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09217989", "articleId": "1nL7kE5IL7y", "__typename": "AdjacentArticleType" }, "next": { "fno": "09239885", "articleId": "1oeZB1lIe52", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1E0NhqDj0zK", "title": "April-June", "year": "2022", "issueNum": "02", "idPrefix": "ec", "pubType": "journal", "volume": "10", "label": "April-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1uFxptYevFC", "doi": "10.1109/TETC.2021.3091982", "abstract": "Post-quantum cryptography (PQC) has gained significant attention from the community recently as it is proven that the existing public-key cryptosystems are vulnerable to the attacks launched from the well-developed quantum computers. The finite field arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">Z_$A$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula> are integer polynomials and <inline-formula><tex-math notation=\"LaTeX\">Z_$B$_Z</tex-math></inline-formula> is a binary polynomial, is the key component for the binary Ring-learning-with-errors (BRLWE)-based encryption scheme (a low-complexity PQC suitable for emerging lightweight applications). In this paper, we propose a novel hardware implementation of the finite field arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> through three stages of interdependent efforts: (i) a rigorous mathematical formulation process is presented first; (ii) an efficient hardware architecture is then presented with detailed description; (iii) a thorough implementation has also been given along with the comparison. Overall, (i) the proposed basic structure (<inline-formula><tex-math notation=\"LaTeX\">Z_$u=1$_Z</tex-math></inline-formula>) outperforms the existing designs, e.g., it involves 55.9&#x0025; less area-delay product (ADP) than [13] for <inline-formula><tex-math notation=\"LaTeX\">Z_$n=512$_Z</tex-math></inline-formula>; (ii) the proposed design also offers very efficient performance in time-complexity and can be used in many future applications.", "abstracts": [ { "abstractType": "Regular", "content": "Post-quantum cryptography (PQC) has gained significant attention from the community recently as it is proven that the existing public-key cryptosystems are vulnerable to the attacks launched from the well-developed quantum computers. The finite field arithmetic <inline-formula><tex-math notation=\"LaTeX\">$AB+C$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>A</mml:mi><mml:mi>B</mml:mi><mml:mo>+</mml:mo><mml:mi>C</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"xie-ieq3-3091982.gif\"/></alternatives></inline-formula>, where <inline-formula><tex-math notation=\"LaTeX\">$A$</tex-math><alternatives><mml:math><mml:mi>A</mml:mi></mml:math><inline-graphic xlink:href=\"xie-ieq4-3091982.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$C$</tex-math><alternatives><mml:math><mml:mi>C</mml:mi></mml:math><inline-graphic xlink:href=\"xie-ieq5-3091982.gif\"/></alternatives></inline-formula> are integer polynomials and <inline-formula><tex-math notation=\"LaTeX\">$B$</tex-math><alternatives><mml:math><mml:mi>B</mml:mi></mml:math><inline-graphic xlink:href=\"xie-ieq6-3091982.gif\"/></alternatives></inline-formula> is a binary polynomial, is the key component for the binary Ring-learning-with-errors (BRLWE)-based encryption scheme (a low-complexity PQC suitable for emerging lightweight applications). In this paper, we propose a novel hardware implementation of the finite field arithmetic <inline-formula><tex-math notation=\"LaTeX\">$AB+C$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>A</mml:mi><mml:mi>B</mml:mi><mml:mo>+</mml:mo><mml:mi>C</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"xie-ieq7-3091982.gif\"/></alternatives></inline-formula> through three stages of interdependent efforts: (i) a rigorous mathematical formulation process is presented first; (ii) an efficient hardware architecture is then presented with detailed description; (iii) a thorough implementation has also been given along with the comparison. Overall, (i) the proposed basic structure (<inline-formula><tex-math notation=\"LaTeX\">$u=1$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>u</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"xie-ieq8-3091982.gif\"/></alternatives></inline-formula>) outperforms the existing designs, e.g., it involves 55.9&#x0025; less area-delay product (ADP) than [13] for <inline-formula><tex-math notation=\"LaTeX\">$n=512$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>n</mml:mi><mml:mo>=</mml:mo><mml:mn>512</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"xie-ieq9-3091982.gif\"/></alternatives></inline-formula>; (ii) the proposed design also offers very efficient performance in time-complexity and can be used in many future applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Post-quantum cryptography (PQC) has gained significant attention from the community recently as it is proven that the existing public-key cryptosystems are vulnerable to the attacks launched from the well-developed quantum computers. The finite field arithmetic -, where - and - are integer polynomials and - is a binary polynomial, is the key component for the binary Ring-learning-with-errors (BRLWE)-based encryption scheme (a low-complexity PQC suitable for emerging lightweight applications). In this paper, we propose a novel hardware implementation of the finite field arithmetic - through three stages of interdependent efforts: (i) a rigorous mathematical formulation process is presented first; (ii) an efficient hardware architecture is then presented with detailed description; (iii) a thorough implementation has also been given along with the comparison. Overall, (i) the proposed basic structure (-) outperforms the existing designs, e.g., it involves 55.9% less area-delay product (ADP) than [13] for -; (ii) the proposed design also offers very efficient performance in time-complexity and can be used in many future applications.", "title": "Efficient Hardware Implementation of Finite Field Arithmetic <inline-formula><tex-math notation=\"LaTeX\">Z_$AB+C$_Z</tex-math></inline-formula> for Binary Ring-LWE Based Post-Quantum Cryptography", "normalizedTitle": "Efficient Hardware Implementation of Finite Field Arithmetic - for Binary Ring-LWE Based Post-Quantum Cryptography", "fno": "09463675", "hasPdf": true, "idPrefix": "ec", "keywords": [ "Polynomials", "Public Key Cryptography", "Quantum Computing", "Quantum Cryptography", "Finite Field Arithmetic", "Binary Ring LWE", "Post Quantum Cryptography", "Public Key Cryptosystems", "Quantum Computers", "Integer Polynomials", "Binary Polynomial", "Low Complexity PQC", "Hardware Implementation", "Hardware Architecture", "Binary Ring Learning With Errors Based Encryption Scheme", "Encryption", "Hardware", "Computer Architecture", "Complexity Theory", "Lead", "Computers", "Time Complexity", "Binary Ring Learning With Errors", "Finite Field Arithmetic", "FPGA Platform", "Hardware Design", "Post Quantum Cryptography" ], "authors": [ { "givenName": "Jiafeng", "surname": "Xie", "fullName": "Jiafeng Xie", "affiliation": "Department of Electrical and Computer Engineering, Villanova University, Villanova, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Pengzhou", "surname": "He", "fullName": "Pengzhou He", "affiliation": "Department of Electrical and Computer Engineering, Villanova University, Villanova, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaofang", "surname": "Wang", "fullName": "Xiaofang Wang", "affiliation": "Department of Electrical and Computer Engineering, Villanova University, Villanova, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "José L.", "surname": "Imaña", "fullName": "José L. Imaña", "affiliation": "Department of Computer Architecture and Systems Engineering, Faculty of Physics, Complutense University, Madrid, Spain", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2022-04-01 00:00:00", "pubType": "trans", "pages": "1222-1228", "year": "2022", "issn": "2168-6750", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/bd/2021/05/07979612", "title": "Leakage Resilient Leveled <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf {FHE}$_Z</tex-math></inline-formula> on Multiple Bits Message", "doi": null, "abstractUrl": "/journal/bd/2021/05/07979612/13rRUxC0SJC", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09186333", "title": "<italic>LShape</italic> Partitioning: Parallel Skyline Query Processing Using <inline-formula><tex-math notation=\"LaTeX\">Z_$MapReduce$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tk/2022/07/09186333/1mP21G1r2QE", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09373914", "title": "A Practical <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N^2)$_Z</tex-math></inline-formula> Outlier Removal Method for Correspondence-Based Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2022/08/09373914/1rPt9ICFlCw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09464733", "title": "Support Vector Machine Classifier via <inline-formula><tex-math notation=\"LaTeX\">Z_$L_{0/1}$_Z</tex-math></inline-formula> Soft-Margin Loss", "doi": null, "abstractUrl": "/journal/tp/2022/10/09464733/1uHcfwcwOju", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09585362", "title": "A Fast <inline-formula><tex-math notation=\"LaTeX\">Z_$f(r,k+1)/k$_Z</tex-math></inline-formula>-Diagnosis for Interconnection Networks Under MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09585362/1y11LlQdiGk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/01/09616383", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$xAFCL$_Z</tex-math></inline-formula>: Run Scalable Function Choreographies Across Multiple FaaS Systems", "doi": null, "abstractUrl": "/journal/sc/2023/01/09616383/1yA74qnPV4c", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09650723", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$TC-Stream$_Z</tex-math></inline-formula>: Large-Scale Graph Triangle Counting on a Single Machine Using GPUs", "doi": null, "abstractUrl": "/journal/td/2022/11/09650723/1zkp1OCIUHS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09424961", "articleId": "1tnRZ6HwGaY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09483645", "articleId": "1vcJuuLs9eE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GF6jMpqNjy", "title": "Oct.", "year": "2022", "issueNum": "10", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1veojcOSicw", "doi": "10.1109/TPAMI.2021.3096880", "abstract": "By employing time-varying proximal functions, adaptive subgradient methods (ADAGRAD) have improved the regret bound and been widely used in online learning and optimization. However, ADAGRAD with full matrix proximal functions (ADA-FULL) cannot handle large-scale problems due to the impractical <inline-formula><tex-math notation=\"LaTeX\">Z_$O(d^3)$_Z</tex-math></inline-formula> time and <inline-formula><tex-math notation=\"LaTeX\">Z_$O(d^2)$_Z</tex-math></inline-formula> space complexities, though it has better performance when gradients are correlated. In this paper, we propose two efficient variants of ADA-FULL via a matrix sketching technique called frequent directions (FD). The first variant named as ADA-FD directly utilizes FD to maintain and manipulate low-rank matrices, which reduces the space and time complexities to <inline-formula><tex-math notation=\"LaTeX\">Z_$O(\\tau d)$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$O(\\tau ^2d)$_Z</tex-math></inline-formula> respectively, where <inline-formula><tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula> is the dimensionality and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\tau \\ll d$_Z</tex-math></inline-formula> is the sketching size. The second variant named as ADA-FFD further adopts a doubling trick to accelerate FD used in ADA-FD, which reduces the average time complexity to <inline-formula><tex-math notation=\"LaTeX\">Z_$O(\\tau d)$_Z</tex-math></inline-formula> while only doubles the space complexity of ADA-FD. Theoretical analysis reveals that the regret of ADA-FD and ADA-FFD is close to that of ADA-FULL as long as the outer product matrix of gradients is approximately low-rank. Experimental results demonstrate the efficiency and effectiveness of our algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "By employing time-varying proximal functions, adaptive subgradient methods (ADAGRAD) have improved the regret bound and been widely used in online learning and optimization. However, ADAGRAD with full matrix proximal functions (ADA-FULL) cannot handle large-scale problems due to the impractical <inline-formula><tex-math notation=\"LaTeX\">$O(d^3)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mn>3</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq1-3096880.gif\"/></alternatives></inline-formula> time and <inline-formula><tex-math notation=\"LaTeX\">$O(d^2)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq2-3096880.gif\"/></alternatives></inline-formula> space complexities, though it has better performance when gradients are correlated. In this paper, we propose two efficient variants of ADA-FULL via a matrix sketching technique called frequent directions (FD). The first variant named as ADA-FD directly utilizes FD to maintain and manipulate low-rank matrices, which reduces the space and time complexities to <inline-formula><tex-math notation=\"LaTeX\">$O(\\tau d)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>&#x03C4;</mml:mi><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq3-3096880.gif\"/></alternatives></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$O(\\tau ^2d)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:msup><mml:mi>&#x03C4;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq4-3096880.gif\"/></alternatives></inline-formula> respectively, where <inline-formula><tex-math notation=\"LaTeX\">$d$</tex-math><alternatives><mml:math><mml:mi>d</mml:mi></mml:math><inline-graphic xlink:href=\"wan-ieq5-3096880.gif\"/></alternatives></inline-formula> is the dimensionality and <inline-formula><tex-math notation=\"LaTeX\">$\\tau \\ll d$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>&#x03C4;</mml:mi><mml:mo>&#x226A;</mml:mo><mml:mi>d</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq6-3096880.gif\"/></alternatives></inline-formula> is the sketching size. The second variant named as ADA-FFD further adopts a doubling trick to accelerate FD used in ADA-FD, which reduces the average time complexity to <inline-formula><tex-math notation=\"LaTeX\">$O(\\tau d)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi>&#x03C4;</mml:mi><mml:mi>d</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"wan-ieq7-3096880.gif\"/></alternatives></inline-formula> while only doubles the space complexity of ADA-FD. Theoretical analysis reveals that the regret of ADA-FD and ADA-FFD is close to that of ADA-FULL as long as the outer product matrix of gradients is approximately low-rank. Experimental results demonstrate the efficiency and effectiveness of our algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "By employing time-varying proximal functions, adaptive subgradient methods (ADAGRAD) have improved the regret bound and been widely used in online learning and optimization. However, ADAGRAD with full matrix proximal functions (ADA-FULL) cannot handle large-scale problems due to the impractical - time and - space complexities, though it has better performance when gradients are correlated. In this paper, we propose two efficient variants of ADA-FULL via a matrix sketching technique called frequent directions (FD). The first variant named as ADA-FD directly utilizes FD to maintain and manipulate low-rank matrices, which reduces the space and time complexities to - and - respectively, where - is the dimensionality and - is the sketching size. The second variant named as ADA-FFD further adopts a doubling trick to accelerate FD used in ADA-FD, which reduces the average time complexity to - while only doubles the space complexity of ADA-FD. Theoretical analysis reveals that the regret of ADA-FD and ADA-FFD is close to that of ADA-FULL as long as the outer product matrix of gradients is approximately low-rank. Experimental results demonstrate the efficiency and effectiveness of our algorithms.", "title": "Efficient Adaptive Online Learning via Frequent Directions", "normalizedTitle": "Efficient Adaptive Online Learning via Frequent Directions", "fno": "09485048", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computational Complexity", "Gradient Methods", "Learning Artificial Intelligence", "Matrix Algebra", "Optimisation", "ADA FD", "ADA FFD", "ADA FULL", "Adaptive Online Learning", "Frequent Directions", "Time Varying Proximal Functions", "ADAGRAD", "Optimization", "Matrix Proximal Functions", "Matrix Sketching Technique", "Time Complexities", "Space Complexity", "Complexity Theory", "Time Complexity", "Optimization", "Mirrors", "Approximation Algorithms", "Symmetric Matrices", "Transforms", "Online Learning", "Frequent Directions", "Adaptive Subgradient Methods" ], "authors": [ { "givenName": "Yuanyu", "surname": "Wan", "fullName": "Yuanyu Wan", "affiliation": "National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lijun", "surname": "Zhang", "fullName": "Lijun Zhang", "affiliation": "National Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "6910-6923", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tc/2019/04/08494787", "title": "Better Circuits for Binary Polynomial Multiplication", "doi": null, "abstractUrl": "/journal/tc/2019/04/08494787/14s8M4Sn2IE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/04/08468118", "title": "Online Job Scheduling with Redundancy and Opportunistic Checkpointing: A Speedup-Function-Based Analysis", "doi": null, "abstractUrl": "/journal/td/2019/04/08468118/18l6N8lHxpS", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09681162", "title": "Point Cloud Sampling via Graph Balancing and Gershgorin Disc Alignment", "doi": null, "abstractUrl": "/journal/tp/2023/01/09681162/1A8c6sY0Afe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09121771", "title": "Continuous Monitoring of Maximum Clique Over Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/04/09121771/1kMT4CxqinC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09109708", "title": "Unsupervised Large Graph Embedding Based on Balanced and Hierarchical K-Means", "doi": null, "abstractUrl": "/journal/tk/2022/04/09109708/1kpEsyACWGs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09463735", "title": "Signed Graph Metric Learning via Gershgorin Disc Perfect Alignment", "doi": null, "abstractUrl": "/journal/tp/2022/10/09463735/1uFxm1okYhO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/06/09511805", "title": "Distributed Graph Realizations", "doi": null, "abstractUrl": "/journal/td/2022/06/09511805/1vYRJ00nBTi", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09525250", "title": "Fast Reachability Queries Answering Based on <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathsf{RCN}$_Z</tex-math></inline-formula> Reduction", "doi": null, "abstractUrl": "/journal/tk/2023/03/09525250/1wuoOp439OU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09573484", "title": "Adaptive Temporal Difference Learning With Linear Function Approximation", "doi": null, "abstractUrl": "/journal/tp/2022/12/09573484/1xH5DVmWYP6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/04/09650532", "title": "A Variational Framework for Curve Shortening in Various Geometric Domains", "doi": null, "abstractUrl": "/journal/tg/2023/04/09650532/1zkoVsoJeow", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09454332", "articleId": "1uqBeWKifba", "__typename": "AdjacentArticleType" }, "next": { "fno": "09459486", "articleId": "1uvzUUBxnVe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Lk1YwwbiHC", "title": "Jan.-March", "year": "2023", "issueNum": "01", "idPrefix": "cc", "pubType": "journal", "volume": "11", "label": "Jan.-March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xR2SrQJAXK", "doi": "10.1109/TCC.2021.3121481", "abstract": "With the rapid surge in cloud services, cloud load balancing has become a paramount research issue. The major part of a cloud computing system&#x0027;s operational costs is attributed to energy consumption. Therefore, to provide better QoS, considering the energy minimization factor in load balancing is essential. This paper addresses the latency and energy-aware load balancing problem in a cloud computing system. Specifically, two fundamental performance criteria&#x2013;response time and energy&#x2013;for the load balancing problem are considered. To solve this problem, first, the load balancing problem is formulated as an optimization problem. Then it is modeled as a cooperative game so that the solution of the game, called the Nash bargaining solution (NBS), can simultaneously optimize both criteria. The existence and computation of NBS are analyzed theoretically, and an efficient algorithm, called <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf L}}$_Z</tex-math></inline-formula>atency and <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf E}}$_Z</tex-math></inline-formula>nergy a<inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf W}}$_Z</tex-math></inline-formula>are load balancIng <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf S}}$_Z</tex-math></inline-formula>cheme (<inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf LEWIS}}$_Z</tex-math></inline-formula>), is proposed to compute the NBS. Further, to assess the efficacy of <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf LEWIS}}$_Z</tex-math></inline-formula>, it is compared with three other approaches, i.e., <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {Coop\\_{RT}}}$_Z</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {Coop\\_{EN}}}$_Z</tex-math></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {NCG}}$_Z</tex-math></inline-formula>, on problem instances of various settings. The experimental results show that <inline-formula><tex-math notation=\"LaTeX\">Z_${{\\sf LEWIS}}$_Z</tex-math></inline-formula> not only provides less response time while consuming less energy but also gauntness fairness to the end-users.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid surge in cloud services, cloud load balancing has become a paramount research issue. The major part of a cloud computing system&#x0027;s operational costs is attributed to energy consumption. Therefore, to provide better QoS, considering the energy minimization factor in load balancing is essential. This paper addresses the latency and energy-aware load balancing problem in a cloud computing system. Specifically, two fundamental performance criteria&#x2013;response time and energy&#x2013;for the load balancing problem are considered. To solve this problem, first, the load balancing problem is formulated as an optimization problem. Then it is modeled as a cooperative game so that the solution of the game, called the Nash bargaining solution (NBS), can simultaneously optimize both criteria. The existence and computation of NBS are analyzed theoretically, and an efficient algorithm, called <inline-formula><tex-math notation=\"LaTeX\">${{\\sf L}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">L</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq1-3121481.gif\"/></alternatives></inline-formula>atency and <inline-formula><tex-math notation=\"LaTeX\">${{\\sf E}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">E</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq2-3121481.gif\"/></alternatives></inline-formula>nergy a<inline-formula><tex-math notation=\"LaTeX\">${{\\sf W}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">W</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq3-3121481.gif\"/></alternatives></inline-formula>are load balancIng <inline-formula><tex-math notation=\"LaTeX\">${{\\sf S}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">S</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq4-3121481.gif\"/></alternatives></inline-formula>cheme (<inline-formula><tex-math notation=\"LaTeX\">${{\\sf LEWIS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">LEWIS</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq5-3121481.gif\"/></alternatives></inline-formula>), is proposed to compute the NBS. Further, to assess the efficacy of <inline-formula><tex-math notation=\"LaTeX\">${{\\sf LEWIS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">LEWIS</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq6-3121481.gif\"/></alternatives></inline-formula>, it is compared with three other approaches, i.e., <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {Coop\\_{RT}}}$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"sans-serif\">Coop</mml:mi><mml:mo>_</mml:mo><mml:mi mathvariant=\"sans-serif\">RT</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"kishor-ieq7-3121481.gif\"/></alternatives></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {Coop\\_{EN}}}$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"sans-serif\">Coop</mml:mi><mml:mo>_</mml:mo><mml:mi mathvariant=\"sans-serif\">EN</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"kishor-ieq8-3121481.gif\"/></alternatives></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {NCG}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">NCG</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq9-3121481.gif\"/></alternatives></inline-formula>, on problem instances of various settings. The experimental results show that <inline-formula><tex-math notation=\"LaTeX\">${{\\sf LEWIS}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">LEWIS</mml:mi></mml:math><inline-graphic xlink:href=\"kishor-ieq10-3121481.gif\"/></alternatives></inline-formula> not only provides less response time while consuming less energy but also gauntness fairness to the end-users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid surge in cloud services, cloud load balancing has become a paramount research issue. The major part of a cloud computing system's operational costs is attributed to energy consumption. Therefore, to provide better QoS, considering the energy minimization factor in load balancing is essential. This paper addresses the latency and energy-aware load balancing problem in a cloud computing system. Specifically, two fundamental performance criteria–response time and energy–for the load balancing problem are considered. To solve this problem, first, the load balancing problem is formulated as an optimization problem. Then it is modeled as a cooperative game so that the solution of the game, called the Nash bargaining solution (NBS), can simultaneously optimize both criteria. The existence and computation of NBS are analyzed theoretically, and an efficient algorithm, called -atency and -nergy a-are load balancIng -cheme (-), is proposed to compute the NBS. Further, to assess the efficacy of -, it is compared with three other approaches, i.e., -, -, and -, on problem instances of various settings. The experimental results show that - not only provides less response time while consuming less energy but also gauntness fairness to the end-users.", "title": "Latency and Energy-Aware Load Balancing in Cloud Data Centers: A Bargaining Game Based Approach", "normalizedTitle": "Latency and Energy-Aware Load Balancing in Cloud Data Centers: A Bargaining Game Based Approach", "fno": "09582834", "hasPdf": true, "idPrefix": "cc", "keywords": [ "Cloud Computing", "Computer Centres", "Energy Consumption", "Game Theory", "Quality Of Service", "Resource Allocation", "Bargaining Game", "Cloud Computing System", "Cloud Data Centers", "Cloud Load Balancing", "Cloud Services", "Energy But Also Gauntness Fairness", "Energy Consumption", "Energy Minimization Factor", "Energy Aware Load Balancing Problem", "Fundamental Performance Criteria Response Time", "Nash Bargaining Solution", "NBS", "Optimization Problem", "Paramount Research Issue", "Load Management", "Cloud Computing", "Games", "Energy Consumption", "Time Factors", "NIST", "Costs", "Cloud Computing", "Load Balancing", "Bargaining Problem", "Cooperative Game", "Nash Bargaining Solution", "Energy Minimization" ], "authors": [ { "givenName": "Avadh", "surname": "Kishor", "fullName": "Avadh Kishor", "affiliation": "Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India", "__typename": "ArticleAuthorType" }, { "givenName": "Rajdeep", "surname": "Niyogi", "fullName": "Rajdeep Niyogi", "affiliation": "Department of Computer Science and Engineering, Indian Institute of Technology, Roorkee, UK, India", "__typename": "ArticleAuthorType" }, { "givenName": "Anthony Theodore", "surname": "Chronopoulos", "fullName": "Anthony Theodore Chronopoulos", "affiliation": "Department of Computer Science, The University of Texas at San Antonio, San Antonio, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Albert Y.", "surname": "Zomaya", "fullName": "Albert Y. Zomaya", "affiliation": "School of Information Technologies, University of Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "927-941", "year": "2023", "issn": "2168-7161", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2023/01/09681162", "title": "Point Cloud Sampling via Graph Balancing and Gershgorin Disc Alignment", "doi": null, "abstractUrl": "/journal/tp/2023/01/09681162/1A8c6sY0Afe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/06/09920009", "title": "A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange", "doi": null, "abstractUrl": "/journal/tc/2023/06/09920009/1HxSozW28Qo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/05/09201042", "title": "Supremo: Cloud-Assisted Low-Latency Super-Resolution in Mobile Devices", "doi": null, "abstractUrl": "/journal/tm/2022/05/09201042/1niUjLjJZqo", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09253703", "title": "Effective and Efficient Discovery of Top-k Meta Paths in Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09253703/1oDXxbwvBoQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/12/09259210", "title": "Circuit-Based Quantum Random Access Memory for Classical Data With Continuous Amplitudes", "doi": null, "abstractUrl": "/journal/tc/2021/12/09259210/1oIWvw5TOZq", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/01/09289016", "title": "Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation", "doi": null, "abstractUrl": "/journal/tc/2022/01/09289016/1pq6fF6YRoY", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/02/09328560", "title": "High-Radix Design of a Scalable Montgomery Modular Multiplier With Low Latency", "doi": null, "abstractUrl": "/journal/tc/2022/02/09328560/1qw8PWGHmEM", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09546728", "title": "Skyline Group Queries in Large Road-Social Networks Revisited", "doi": null, "abstractUrl": "/journal/tk/2023/03/09546728/1x6zArmoz72", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09609686", "title": "Fault-Tolerant Routing With Load Balancing in LeTQ Networks", "doi": null, "abstractUrl": "/journal/tq/2023/01/09609686/1yoxM7sfDDa", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09574634", "articleId": "1xIKmUGk7e0", "__typename": "AdjacentArticleType" }, "next": { "fno": "09583904", "articleId": "1xSHLS3WaoE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Lk28iERYHe", "name": "tcc202301-09582834s1-supp1-3121481.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tcc202301-09582834s1-supp1-3121481.pdf", "extension": "pdf", "size": "312 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1J9y2mtpt3a", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1HeiTxRhh9C", "doi": "10.1109/TVCG.2022.3209347", "abstract": "Horizontal federated learning (HFL) enables distributed clients to train a shared model and keep their data privacy. In training high-quality HFL models, the data heterogeneity among clients is one of the major concerns. However, due to the security issue and the complexity of deep learning models, it is challenging to investigate data heterogeneity across different clients. To address this issue, based on a requirement analysis we developed a visual analytics tool, HetVis, for participating clients to explore data heterogeneity. We identify data heterogeneity through comparing prediction behaviors of the global federated model and the stand-alone model trained with local data. Then, a context-aware clustering of the inconsistent records is done, to provide a summary of data heterogeneity. Combining with the proposed comparison techniques, we develop a novel set of visualizations to identify heterogeneity issues in HFL. We designed three case studies to introduce how HetVis can assist client analysts in understanding different types of heterogeneity issues. Expert reviews and a comparative study demonstrate the effectiveness of HetVis.", "abstracts": [ { "abstractType": "Regular", "content": "Horizontal federated learning (HFL) enables distributed clients to train a shared model and keep their data privacy. In training high-quality HFL models, the data heterogeneity among clients is one of the major concerns. However, due to the security issue and the complexity of deep learning models, it is challenging to investigate data heterogeneity across different clients. To address this issue, based on a requirement analysis we developed a visual analytics tool, HetVis, for participating clients to explore data heterogeneity. We identify data heterogeneity through comparing prediction behaviors of the global federated model and the stand-alone model trained with local data. Then, a context-aware clustering of the inconsistent records is done, to provide a summary of data heterogeneity. Combining with the proposed comparison techniques, we develop a novel set of visualizations to identify heterogeneity issues in HFL. We designed three case studies to introduce how HetVis can assist client analysts in understanding different types of heterogeneity issues. Expert reviews and a comparative study demonstrate the effectiveness of HetVis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Horizontal federated learning (HFL) enables distributed clients to train a shared model and keep their data privacy. In training high-quality HFL models, the data heterogeneity among clients is one of the major concerns. However, due to the security issue and the complexity of deep learning models, it is challenging to investigate data heterogeneity across different clients. To address this issue, based on a requirement analysis we developed a visual analytics tool, HetVis, for participating clients to explore data heterogeneity. We identify data heterogeneity through comparing prediction behaviors of the global federated model and the stand-alone model trained with local data. Then, a context-aware clustering of the inconsistent records is done, to provide a summary of data heterogeneity. Combining with the proposed comparison techniques, we develop a novel set of visualizations to identify heterogeneity issues in HFL. We designed three case studies to introduce how HetVis can assist client analysts in understanding different types of heterogeneity issues. Expert reviews and a comparative study demonstrate the effectiveness of HetVis.", "title": "HetVis: A Visual Analysis Approach for Identifying Data Heterogeneity in Horizontal Federated Learning", "normalizedTitle": "HetVis: A Visual Analysis Approach for Identifying Data Heterogeneity in Horizontal Federated Learning", "fno": "09912364", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Privacy", "Data Visualisation", "Internet", "Learning Artificial Intelligence", "Data Privacy", "Deep Learning Models", "Global Federated Model", "Heterogeneity Issues", "Het Vis", "Horizontal Federated Learning", "Identifying Data Heterogeneity", "Training High Quality HFL Models", "Data Models", "Analytical Models", "Distributed Databases", "Training", "Federated Learning", "Data Visualization", "Convergence", "Federated Learning", "Data Heterogeneity", "Cluster Analysis", "Visual Analysis" ], "authors": [ { "givenName": "Xumeng", "surname": "Wang", "fullName": "Xumeng Wang", "affiliation": "TMCC, CS, Nankai University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Chen", "fullName": "Wei Chen", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiazhi", "surname": "Xia", "fullName": "Jiazhi Xia", "affiliation": "School of Computer Science and Engineering, Central South University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhen", "surname": "Wen", "fullName": "Zhen Wen", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Rongchen", "surname": "Zhu", "fullName": "Rongchen Zhu", "affiliation": "State Key Lab of CAD&CG, Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Schreck", "fullName": "Tobias Schreck", "affiliation": "Graz University of Technology, Austria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "310-319", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2022/6946/0/694600i387", "title": "Local Learning Matters: Rethinking Data Heterogeneity in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i387/1H0NmGZzXzy", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2023/6268/0/10048907", "title": "Abnormal Client Detection Federated Learning Using Image Vectors", "doi": null, "abstractUrl": "/proceedings-article/icoin/2023/10048907/1KYsGx6L4vC", "parentPublication": { "id": "proceedings/icoin/2023/6268/0", "title": "2023 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020721", "title": "Heterogeneity-Aware Adaptive Federated Learning Scheduling", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020721/1KfRKmlwsoM", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020518", "title": "Personalized Federated Contrastive Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020518/1KfS3cUFMs0", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020554", "title": "Robust Personalized Federated Learning under Demographic Fairness Heterogeneity", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020554/1KfSRvnzxUQ", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/04/10032710", "title": "Auction-Based Cluster Federated Learning in Mobile Edge Computing Systems", "doi": null, "abstractUrl": "/journal/td/2023/04/10032710/1KnSuhIoNAA", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a131", "title": "FedSkip: Combatting Statistical Heterogeneity with Federated Skip Aggregation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a131/1KpCFvSwyYM", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a656", "title": "Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a656/1LFM1LJDFPa", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b208", "title": "FedACL: Federated Multi-Distillation with Auxiliary Classification Layers in IoT", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b208/1LSPvaN4OCk", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09408377", "title": "Inspecting the Running Process of Horizontal Federated Learning via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2022/12/09408377/1sVEP6R17eU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09904460", "articleId": "1H0GhkBIepa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09904448", "articleId": "1H1gmbVShUI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1J9ytgqmY3C", "name": "ttg202301-09912364s1-tvcg-3209347-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202301-09912364s1-tvcg-3209347-mm.zip", "extension": "zip", "size": "34.2 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1JTZWjUXApq", "title": null, "year": "2023", "issueNum": "01", "idPrefix": "oj", "pubType": "journal", "volume": "4", "label": null, "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1LR5HC3J9iU", "doi": "10.1109/OJCS.2023.3262203", "abstract": "Conventional federated learning (FL) approaches are ineffective in scenarios where clients have significant differences in the distributions of their local data. The Non-IID data distribution in the client data causes a drift in the local model updates from the global optima, which significantly impacts the performance of the trained models. In this article, we present a new algorithm called FLIS that aims to address this problem by grouping clients into clusters that have jointly trainable data distributions. This is achieved by comparing the <italic>inference similarity</italic> of client models. Our proposed framework captures settings where different groups of users may have their own objectives (learning tasks), but by aggregating their data with others in the same cluster (same learning task), superior models can be derived via more efficient and personalized federated learning. We present experimental results to demonstrate the benefits of FLIS over the state-of-the-art approaches on the CIFAR-100/10, SVHN, and FMNIST datasets. Our code is available at <uri>https://github.com/MMorafah/FLIS</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Conventional federated learning (FL) approaches are ineffective in scenarios where clients have significant differences in the distributions of their local data. The Non-IID data distribution in the client data causes a drift in the local model updates from the global optima, which significantly impacts the performance of the trained models. In this article, we present a new algorithm called FLIS that aims to address this problem by grouping clients into clusters that have jointly trainable data distributions. This is achieved by comparing the <italic>inference similarity</italic> of client models. Our proposed framework captures settings where different groups of users may have their own objectives (learning tasks), but by aggregating their data with others in the same cluster (same learning task), superior models can be derived via more efficient and personalized federated learning. We present experimental results to demonstrate the benefits of FLIS over the state-of-the-art approaches on the CIFAR-100/10, SVHN, and FMNIST datasets. Our code is available at <uri>https://github.com/MMorafah/FLIS</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Conventional federated learning (FL) approaches are ineffective in scenarios where clients have significant differences in the distributions of their local data. The Non-IID data distribution in the client data causes a drift in the local model updates from the global optima, which significantly impacts the performance of the trained models. In this article, we present a new algorithm called FLIS that aims to address this problem by grouping clients into clusters that have jointly trainable data distributions. This is achieved by comparing the inference similarity of client models. Our proposed framework captures settings where different groups of users may have their own objectives (learning tasks), but by aggregating their data with others in the same cluster (same learning task), superior models can be derived via more efficient and personalized federated learning. We present experimental results to demonstrate the benefits of FLIS over the state-of-the-art approaches on the CIFAR-100/10, SVHN, and FMNIST datasets. Our code is available at https://github.com/MMorafah/FLIS.", "title": "FLIS: Clustered Federated Learning Via Inference Similarity for Non-IID Data Distribution", "normalizedTitle": "FLIS: Clustered Federated Learning Via Inference Similarity for Non-IID Data Distribution", "fno": "10081485", "hasPdf": true, "idPrefix": "oj", "keywords": [ "Data Privacy", "Learning Artificial Intelligence", "Pattern Clustering", "Client Data", "Cluster", "Conventional Federated Learning Approaches", "Efficient Learning", "Federated Learning Via Inference Similarity", "FLIS", "Jointly Trainable Data Distributions", "Learning Tasks", "Local Model Updates", "Non IID Data Distribution", "Objectives", "Personalized Federated Learning", "Same Learning Task", "Superior Models", "Theinference Similarityof Client Models", "Trained Models", "Servers", "Data Models", "Clustering Algorithms", "Training", "Federated Learning", "Inference Algorithms", "Computational Modeling", "Clustering", "Data Heterogeneity", "Federated Learning", "Inference Similarity", "Non IID Data Distribution", "Personalization" ], "authors": [ { "givenName": "Mahdi", "surname": "Morafah", "fullName": "Mahdi Morafah", "affiliation": "Department of Electrical and Computer Engineering, University of California San Diego, San Diego, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Saeed", "surname": "Vahidian", "fullName": "Saeed Vahidian", "affiliation": "Department of Electrical and Computer Engineering, University of California San Diego, San Diego, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Weijia", "surname": "Wang", "fullName": "Weijia Wang", "affiliation": "Department of Electrical and Computer Engineering, University of California San Diego, San Diego, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Bill", "surname": "Lin", "fullName": "Bill Lin", "affiliation": "Department of Electrical and Computer Engineering, University of California San Diego, San Diego, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "109-120", "year": "2023", "issn": "2644-1268", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2022/6946/0/694600k0102", "title": "FedDC: Federated Learning with Non-IID Data via Local Drift Decoupling and Correction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600k0102/1H1naht91iU", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/02/09964434", "title": "Personalized Edge Intelligence via Federated Self-Knowledge Distillation", "doi": null, "abstractUrl": "/journal/td/2023/02/09964434/1IFEOa1yXAs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/10018536", "title": "FedMDS: An Efficient Model Discrepancy-Aware Semi-Asynchronous Clustered Federated Learning Framework", "doi": null, "abstractUrl": "/journal/td/2023/03/10018536/1K0DHUawdkk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2023/6268/0/10048999", "title": "A Framework for Multi-Prototype Based Federated Learning: Towards the Edge Intelligence", "doi": null, "abstractUrl": "/proceedings-article/icoin/2023/10048999/1KYsLwu6Rbi", "parentPublication": { "id": "proceedings/icoin/2023/6268/0", "title": "2023 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a061", "title": "Contractible Regularization for Federated Learning on Non-IID Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a061/1KpCmxJjvwI", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a444", "title": "Learning Across Domains and Devices: Style-Driven Source-Free Domain Adaptation in Clustered Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a444/1L6LzIO1FHq", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/10054499", "title": "Coalitional Federated Learning: Improving Communication and Training on Non-IID Data with Selfish Clients", "doi": null, "abstractUrl": "/journal/sc/5555/01/10054499/1L8lL7goB7q", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0/649700a040", "title": "A Comprehensive Study on Personalized Federated Learning with Non-IID Data", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2022/649700a040/1LKwtwL0bzG", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0", "title": "2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2022/6457/0/645700a171", "title": "CFedPer: Clustered Federated Learning with Two-Stages Optimization for Personalization", "doi": null, "abstractUrl": "/proceedings-article/msn/2022/645700a171/1LUtTPSzcUo", "parentPublication": { "id": "proceedings/msn/2022/6457/0", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09647969", "title": "Flexible Clustered Federated Learning for Client-Level Data Distribution Shift", "doi": null, "abstractUrl": "/journal/td/2022/11/09647969/1ziKk2OmMkU", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10064090", "articleId": "1LlCLigUXCw", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1BBtOiyOKgo", "title": "Oct.", "year": "2022", "issueNum": "10", "idPrefix": "td", "pubType": "journal", "volume": "33", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1zzlgOMDmaQ", "doi": "10.1109/TPDS.2021.3137321", "abstract": "Federated learning allows large amounts of mobile clients to jointly construct a global model without sending their private data to a central server. A fundamental issue in this framework is the susceptibility to the erroneous training data. This problem is especially challenging due to the invisibility of clients&#x2019; local training data and training process, as well as the resource constraints. In this paper, we aim to solve this issue by introducing the first FL debugging framework, <italic>FLDebugger</italic>, for mitigating test error caused by erroneous training data. The proposed solution traces the global model&#x2019;s bugs (test errors), jointly through the training log and the underlying learning algorithm, back to first identify the clients and subsequently their training samples that are most responsible for the errors. In addition, we devise an influence-based participant selection strategy to fix bugs as well as to accelerate the convergence of model retraining. The performance of the identification algorithm is evaluated via extensive experiments on a real AIoT system (50 clients, including 20 edge computers, 20 laptops and 10 desktops) and in larger-scale simulated environments. The evaluation results attest to that our framework achieves accurate, privacy-preserving and efficient identification of negatively influential clients and samples, and significantly improves the model performance by fixing bugs.", "abstracts": [ { "abstractType": "Regular", "content": "Federated learning allows large amounts of mobile clients to jointly construct a global model without sending their private data to a central server. A fundamental issue in this framework is the susceptibility to the erroneous training data. This problem is especially challenging due to the invisibility of clients&#x2019; local training data and training process, as well as the resource constraints. In this paper, we aim to solve this issue by introducing the first FL debugging framework, <italic>FLDebugger</italic>, for mitigating test error caused by erroneous training data. The proposed solution traces the global model&#x2019;s bugs (test errors), jointly through the training log and the underlying learning algorithm, back to first identify the clients and subsequently their training samples that are most responsible for the errors. In addition, we devise an influence-based participant selection strategy to fix bugs as well as to accelerate the convergence of model retraining. The performance of the identification algorithm is evaluated via extensive experiments on a real AIoT system (50 clients, including 20 edge computers, 20 laptops and 10 desktops) and in larger-scale simulated environments. The evaluation results attest to that our framework achieves accurate, privacy-preserving and efficient identification of negatively influential clients and samples, and significantly improves the model performance by fixing bugs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated learning allows large amounts of mobile clients to jointly construct a global model without sending their private data to a central server. A fundamental issue in this framework is the susceptibility to the erroneous training data. This problem is especially challenging due to the invisibility of clients’ local training data and training process, as well as the resource constraints. In this paper, we aim to solve this issue by introducing the first FL debugging framework, FLDebugger, for mitigating test error caused by erroneous training data. The proposed solution traces the global model’s bugs (test errors), jointly through the training log and the underlying learning algorithm, back to first identify the clients and subsequently their training samples that are most responsible for the errors. In addition, we devise an influence-based participant selection strategy to fix bugs as well as to accelerate the convergence of model retraining. The performance of the identification algorithm is evaluated via extensive experiments on a real AIoT system (50 clients, including 20 edge computers, 20 laptops and 10 desktops) and in larger-scale simulated environments. The evaluation results attest to that our framework achieves accurate, privacy-preserving and efficient identification of negatively influential clients and samples, and significantly improves the model performance by fixing bugs.", "title": "Privacy-Preserving Efficient Federated-Learning Model Debugging", "normalizedTitle": "Privacy-Preserving Efficient Federated-Learning Model Debugging", "fno": "09661312", "hasPdf": true, "idPrefix": "td", "keywords": [ "Data Privacy", "Learning Artificial Intelligence", "Program Debugging", "Training Log", "Underlying Learning Algorithm", "Subsequently Their Training Samples", "Influence Based Participant Selection Strategy", "Model Retraining", "Negatively Influential Clients", "Privacy Preserving Efficient Federated Learning Model Debugging", "Federated Learning", "Mobile Clients", "Global Model", "Private Data", "Central Server", "Erroneous Training Data", "Training Process", "FL Debugging Framework", "Test Error", "Training", "Data Models", "Adaptation Models", "Debugging", "Computational Modeling", "Training Data", "Predictive Models", "Federated Learning", "Influence Function", "Data Quality Assessment" ], "authors": [ { "givenName": "Anran", "surname": "Li", "fullName": "Anran Li", "affiliation": "School of Computer Science, University of Science and Technology of China, Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Lan", "surname": "Zhang", "fullName": "Lan Zhang", "affiliation": "School of Computer Science, University of Science and Technology of China, Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junhao", "surname": "Wang", "fullName": "Junhao Wang", "affiliation": "School of Computer Science, University of Science and Technology of China, Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Feng", "surname": "Han", "fullName": "Feng Han", "affiliation": "School of Computer Science, University of Science and Technology of China, Hefei, Anhui, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiang-Yang", "surname": "Li", "fullName": "Xiang-Yang Li", "affiliation": "School of Computer Science, University of Science and Technology of China, Hefei, Anhui, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "2291-2303", "year": "2022", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icei/2021/0734/0/073400a143", "title": "Efficient Privacy-Preserving Federated Learning For Electricity Data", "doi": null, "abstractUrl": "/proceedings-article/icei/2021/073400a143/1APqgrpgPHq", "parentPublication": { "id": "proceedings/icei/2021/0734/0", "title": "2021 IEEE International Conference on Energy Internet (ICEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09809924", "title": "Adaptive Control of Local Updating and Model Compression for Efficient Federated Learning", "doi": null, "abstractUrl": "/journal/tm/5555/01/09809924/1EzDPIlNqgM", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2022/9747/0/974700b074", "title": "APPFL: Open-Source Software Framework for Privacy-Preserving Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2022/974700b074/1Fu96JLf6cE", "parentPublication": { "id": "proceedings/ipdpsw/2022/9747/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10024795", "title": "PILE: Robust Privacy-Preserving Federated Learning via Verifiable Perturbations", "doi": null, "abstractUrl": "/journal/tq/5555/01/10024795/1KaBpoEUnK0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a680", "title": "Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a680/1LFLSLUrTuo", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a598", "title": "Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a598/1LFLWEmoEUM", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/10056968", "title": "Privacy-Preserving and Reliable Decentralized Federated Learning", "doi": null, "abstractUrl": "/journal/sc/5555/01/10056968/1La0vfztryM", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2022/4627/0/462700a399", "title": "Adaptive asynchronous federated learning for heterogeneous clients", "doi": null, "abstractUrl": "/proceedings-article/cis/2022/462700a399/1M9pY5lPTaw", "parentPublication": { "id": "proceedings/cis/2022/4627/0", "title": "2022 18th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005992", "title": "Privacy-preserving Heterogeneous Federated Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005992/1hJrNyyOxyM", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400a372", "title": "Efficient Federated-Learning Model Debugging", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400a372/1uGXI3WKbew", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09658202", "articleId": "1zw1rCHauUo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09662259", "articleId": "1zzlhhawmCQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DqhtC4CtDa", "title": "May", "year": "2022", "issueNum": "05", "idPrefix": "ts", "pubType": "journal", "volume": "48", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1n7i1bAZXfW", "doi": "10.1109/TSE.2020.3023735", "abstract": "Cyber security requirements are influenced by the priorities and decisions of a range of stakeholders. Board members and Chief Information Security Officers (CISOs) determine strategic priorities. Managers have responsibility for resource allocation and project management. Legal professionals concern themselves with regulatory compliance. Little is understood about how the security decision-making approaches of these different stakeholders contrast, and if particular groups of stakeholders have a better appreciation of security requirements during decision-making. Are risk analysts better decision makers than CISOs? Do security experts exhibit more effective strategies than board members? This paper explores the effect that different experience and diversity of expertise has on the quality of a team&#x0027;s cyber security decision-making and whether teams with members from more varied backgrounds perform better than those with more focused, homogeneous skill sets. Using data from 208 sessions and 948 players of a tabletop game run <italic>in the wild</italic> by a major national organization over 16 months, we explore how choices are affected by player background (e.g., cyber security experts versus risk analysts, board-level decision makers versus technical experts) and different team make-ups (homogeneous teams of security experts versus various mixes). We find that no group of experts makes significantly better game decisions than anyone else, and that their biases lead them to not fully comprehend what they are defending or how the defenses work.", "abstracts": [ { "abstractType": "Regular", "content": "Cyber security requirements are influenced by the priorities and decisions of a range of stakeholders. Board members and Chief Information Security Officers (CISOs) determine strategic priorities. Managers have responsibility for resource allocation and project management. Legal professionals concern themselves with regulatory compliance. Little is understood about how the security decision-making approaches of these different stakeholders contrast, and if particular groups of stakeholders have a better appreciation of security requirements during decision-making. Are risk analysts better decision makers than CISOs? Do security experts exhibit more effective strategies than board members? This paper explores the effect that different experience and diversity of expertise has on the quality of a team&#x0027;s cyber security decision-making and whether teams with members from more varied backgrounds perform better than those with more focused, homogeneous skill sets. Using data from 208 sessions and 948 players of a tabletop game run <italic>in the wild</italic> by a major national organization over 16 months, we explore how choices are affected by player background (e.g., cyber security experts versus risk analysts, board-level decision makers versus technical experts) and different team make-ups (homogeneous teams of security experts versus various mixes). We find that no group of experts makes significantly better game decisions than anyone else, and that their biases lead them to not fully comprehend what they are defending or how the defenses work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cyber security requirements are influenced by the priorities and decisions of a range of stakeholders. Board members and Chief Information Security Officers (CISOs) determine strategic priorities. Managers have responsibility for resource allocation and project management. Legal professionals concern themselves with regulatory compliance. Little is understood about how the security decision-making approaches of these different stakeholders contrast, and if particular groups of stakeholders have a better appreciation of security requirements during decision-making. Are risk analysts better decision makers than CISOs? Do security experts exhibit more effective strategies than board members? This paper explores the effect that different experience and diversity of expertise has on the quality of a team's cyber security decision-making and whether teams with members from more varied backgrounds perform better than those with more focused, homogeneous skill sets. Using data from 208 sessions and 948 players of a tabletop game run in the wild by a major national organization over 16 months, we explore how choices are affected by player background (e.g., cyber security experts versus risk analysts, board-level decision makers versus technical experts) and different team make-ups (homogeneous teams of security experts versus various mixes). We find that no group of experts makes significantly better game decisions than anyone else, and that their biases lead them to not fully comprehend what they are defending or how the defenses work.", "title": "The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups", "normalizedTitle": "The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups", "fno": "09195777", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Decision Making", "Resource Allocation", "Risk Management", "Security Of Data", "Strategic Planning", "Project Management", "Legal Professionals", "Security Decision Making", "Risk Analysts", "CIS Os", "Board Members", "Homogeneous Skill Sets", "Cyber Security Experts", "Board Level Decision Makers", "Homogeneous Teams", "Game Decisions", "Stakeholder Groups", "Cyber Security Requirements", "Chief Information Security Officers", "Strategic Priorities", "Resource Allocation", "Tabletop Game", "Games", "Stakeholders", "Computer Security", "Decision Making", "Organizations", "Investment", "Social And Professional Topics Computational Thinking", "Applied Computing Enterprise Computing Infrastructures" ], "authors": [ { "givenName": "Benjamin", "surname": "Shreeve", "fullName": "Benjamin Shreeve", "affiliation": "Bristol Cyber Security Group, University of Bristol, Bristol, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Joseph", "surname": "Hallett", "fullName": "Joseph Hallett", "affiliation": "Bristol Cyber Security Group, University of Bristol, Bristol, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Matthew", "surname": "Edwards", "fullName": "Matthew Edwards", "affiliation": "Bristol Cyber Security Group, University of Bristol, Bristol, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Kopo M.", "surname": "Ramokapane", "fullName": "Kopo M. Ramokapane", "affiliation": "Bristol Cyber Security Group, University of Bristol, Bristol, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Richard", "surname": "Atkins", "fullName": "Richard Atkins", "affiliation": "City of London Police, London, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Awais", "surname": "Rashid", "fullName": "Awais Rashid", "affiliation": "Bristol Cyber Security Group, University of Bristol, Bristol, U.K.", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-05-01 00:00:00", "pubType": "trans", "pages": "1515-1528", "year": "2022", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sera/2016/0809/0/07516152", "title": "Stakeholder's expected value of Enterprise Architecture: An Enterprise Architecture solution based on stakeholder perspective", "doi": null, "abstractUrl": "/proceedings-article/sera/2016/07516152/12OmNApLGtb", "parentPublication": { "id": "proceedings/sera/2016/0809/0", "title": "2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2017/1568/0/1568a050", "title": "A Case Study of Stakeholder Concerns on EAM", "doi": null, "abstractUrl": "/proceedings-article/edocw/2017/1568a050/12OmNrJ11DU", "parentPublication": { "id": "proceedings/edocw/2017/1568/0", "title": "2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2016/3694/0/3694a289", "title": "A Stakeholder Contribution Pattern in Requirements Decision-Making: An Empirical Study in Enterprise Development", "doi": null, "abstractUrl": "/proceedings-article/rew/2016/3694a289/12OmNroij3y", "parentPublication": { "id": "proceedings/rew/2016/3694/0", "title": "2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cedem/2017/6718/0/08046281", "title": "[X]Changing Perspectives: Enriching Multi-stakeholder Deliberation with Embodiment in Participatory Society", "doi": null, "abstractUrl": "/proceedings-article/cedem/2017/08046281/12OmNzTH0P5", "parentPublication": { "id": "proceedings/cedem/2017/6718/0", "title": "2017 Conference for E-Democracy and Open Government (CeDEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2017/3191/0/3191a468", "title": "DMGame: A Gamified Collaborative Requirements Prioritisation Tool", "doi": null, "abstractUrl": "/proceedings-article/re/2017/3191a468/12OmNzwHvsH", "parentPublication": { "id": "proceedings/re/2017/3191/0", "title": "2017 IEEE 25th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2019/05/08194898", "title": "The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game", "doi": null, "abstractUrl": "/journal/ts/2019/05/08194898/13rRUIJcWfi", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2018/9502/0/950200a472", "title": "Multi-Stakeholder Consensus Decision-Making Framework Based on Trust: A Generic Framework", "doi": null, "abstractUrl": "/proceedings-article/cic/2018/950200a472/17D45WZZ7BL", "parentPublication": { "id": "proceedings/cic/2018/9502/0", "title": "2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2021/3784/0/378400a401", "title": "Understanding Metrics Team-Stakeholder Communication in Agile Metrics Service Delivery", "doi": null, "abstractUrl": "/proceedings-article/apsec/2021/378400a401/1B4m5TBdudq", "parentPublication": { "id": "proceedings/apsec/2021/3784/0", "title": "2021 28th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2020/01/08887440", "title": "Governance Challenges for European Cybersecurity Policies: Stakeholder Views", "doi": null, "abstractUrl": "/magazine/sp/2020/01/08887440/1eyatMaMMEM", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sges/2020/8550/0/855000a837", "title": "Decision-making under uncertainty regarding the integration of Renewable Technologies", "doi": null, "abstractUrl": "/proceedings-article/sges/2020/855000a837/1rITOZYCweI", "parentPublication": { "id": "proceedings/sges/2020/8550/0", "title": "2020 International Conference on Smart Grids and Energy Systems (SGES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09195034", "articleId": "1n2joCAjgT6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09197704", "articleId": "1n8WPv2qyWY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1HCR53o96dG", "name": "tts202205-09195777s1-supp1-3023735.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tts202205-09195777s1-supp1-3023735.pdf", "extension": "pdf", "size": "1.52 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1JU07Ms3Kk8", "title": "Jan.-Feb.", "year": "2023", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": "20", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Agmqc7ZKEg", "doi": "10.1109/TDSC.2022.3143566", "abstract": "While Deep Reinforcement Learning (DRL) has achieved outstanding performance in extensive applications, exploiting its vulnerability with adversarial attacks is essential towards building robust DRL systems. In this work, we aim to propose a novel Decoupled Adversarial Policy (DAP) for attacking the DRL mechanism, whereas the adversarial agent can decompose the adversarial policy into two separate sub-policies: 1) the switch policy which determines if an attacker should launch the attack, and 2) the lure policy which determines the action an attacker induces the victim to take. If the adversarial agent samples an injection action from the switch policy, the attacker can query the pre-constructed database for universal perturbation in the real-time manner, misleading the victim to take the induced action sampled from the lure policy. To train the adversarial agent to learn DAP, we utilize those samples wherein both of the sub-actions from DAP are not restricted by each other or by the external constraint, but can actually affect the attacker&#x2019;s behaviors. Therefore, we propose trajectory clipping and padding in data pruning, and Decoupled Proximal Policy Optimization (DPPO) in optimizing. Extensive experiments on different Atari games demonstrate the effectiveness of our proposed method. In addition, it can simultaneously implement the real-time and few-steps attack, which outperforms the existing counterparts.", "abstracts": [ { "abstractType": "Regular", "content": "While Deep Reinforcement Learning (DRL) has achieved outstanding performance in extensive applications, exploiting its vulnerability with adversarial attacks is essential towards building robust DRL systems. In this work, we aim to propose a novel Decoupled Adversarial Policy (DAP) for attacking the DRL mechanism, whereas the adversarial agent can decompose the adversarial policy into two separate sub-policies: 1) the switch policy which determines if an attacker should launch the attack, and 2) the lure policy which determines the action an attacker induces the victim to take. If the adversarial agent samples an injection action from the switch policy, the attacker can query the pre-constructed database for universal perturbation in the real-time manner, misleading the victim to take the induced action sampled from the lure policy. To train the adversarial agent to learn DAP, we utilize those samples wherein both of the sub-actions from DAP are not restricted by each other or by the external constraint, but can actually affect the attacker&#x2019;s behaviors. Therefore, we propose trajectory clipping and padding in data pruning, and Decoupled Proximal Policy Optimization (DPPO) in optimizing. Extensive experiments on different Atari games demonstrate the effectiveness of our proposed method. In addition, it can simultaneously implement the real-time and few-steps attack, which outperforms the existing counterparts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While Deep Reinforcement Learning (DRL) has achieved outstanding performance in extensive applications, exploiting its vulnerability with adversarial attacks is essential towards building robust DRL systems. In this work, we aim to propose a novel Decoupled Adversarial Policy (DAP) for attacking the DRL mechanism, whereas the adversarial agent can decompose the adversarial policy into two separate sub-policies: 1) the switch policy which determines if an attacker should launch the attack, and 2) the lure policy which determines the action an attacker induces the victim to take. If the adversarial agent samples an injection action from the switch policy, the attacker can query the pre-constructed database for universal perturbation in the real-time manner, misleading the victim to take the induced action sampled from the lure policy. To train the adversarial agent to learn DAP, we utilize those samples wherein both of the sub-actions from DAP are not restricted by each other or by the external constraint, but can actually affect the attacker’s behaviors. Therefore, we propose trajectory clipping and padding in data pruning, and Decoupled Proximal Policy Optimization (DPPO) in optimizing. Extensive experiments on different Atari games demonstrate the effectiveness of our proposed method. In addition, it can simultaneously implement the real-time and few-steps attack, which outperforms the existing counterparts.", "title": "Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy", "normalizedTitle": "Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy", "fno": "09684689", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Computer Crime", "Data Compression", "Deep Learning Artificial Intelligence", "Optimisation", "Query Languages", "Query Processing", "Reinforcement Learning", "Adversarial Agent", "Adversarial Attacks", "DAP", "Data Pruning", "Database Query", "Decoupled Adversarial Policy", "Decoupled Proximal Policy Optimization", "Deep Reinforcement Learning", "DPPO", "DRL", "Injection Action", "Lure Policy", "Switch Policy", "Trajectory Clipping", "Trajectory Padding", "Perturbation Methods", "Switches", "Reinforcement Learning", "Real Time Systems", "Databases", "Trajectory", "Games", "Deep Reinforcement Learning", "Adversarial Decoupled Policy", "Adversarial Attack" ], "authors": [ { "givenName": "Kanghua", "surname": "Mo", "fullName": "Kanghua Mo", "affiliation": "Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, Guangdong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weixuan", "surname": "Tang", "fullName": "Weixuan Tang", "affiliation": "Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, Guangdong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jin", "surname": "Li", "fullName": "Jin Li", "affiliation": "Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, Guangdong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xu", "surname": "Yuan", "fullName": "Xu Yuan", "affiliation": "School of Computing and Informatics, University of Louisiana at Lafayette, Lafayette, LA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "758-768", "year": "2023", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/isorc/2022/0627/0/09812837", "title": "LRP-based Policy Pruning and Distillation of Reinforcement Learning Agents for Embedded Systems", "doi": null, "abstractUrl": "/proceedings-article/isorc/2022/09812837/1EMZhguJ17i", "parentPublication": { "id": "proceedings/isorc/2022/0627/0", "title": "2022 IEEE 25th International Symposium On Real-Time Distributed Computing (ISORC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000a272", "title": "Escaping Filter-based Adversarial Example Defense: A Reinforcement Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000a272/1JeEkZNINSo", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10018434", "title": "Robotic Control in Adversarial and Sparse Reward Environments: A Robust Goal-Conditioned Reinforcement Learning Approach", "doi": null, "abstractUrl": "/journal/ai/5555/01/10018434/1K0DHGuEnNC", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a567", "title": "An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a567/1KBr8qkYjBu", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047383", "title": "A Robust Adversarial Reinforcement Framework for Reading Comprehension", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047383/1iC6uwN4cXm", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2020/9238/0/09285955", "title": "Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler", "doi": null, "abstractUrl": "/proceedings-article/mascots/2020/09285955/1pK4XKdZM9G", "parentPublication": { "id": "proceedings/mascots/2020/9238/0", "title": "2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/09399819", "title": "AUV Surfacing Control with Adversarial Attack against DLaaS Framework", "doi": null, "abstractUrl": "/journal/tc/5555/01/09399819/1sF3IV0IM5a", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412011", "title": "Deep Reinforcement Learning for Autonomous Driving by Transferring Visual Features", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412011/1tmhDhqIHcc", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/02/09536399", "title": "Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/ai/2022/02/09536399/1wREia2HBi8", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09684707", "articleId": "1AgmqxdZm1y", "__typename": "AdjacentArticleType" }, "next": { "fno": "09684978", "articleId": "1Ai9zGHz6X6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1M2Ido7rZde", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1BocHcl67qU", "doi": "10.1109/TKDE.2022.3155196", "abstract": "Data processing and analytics are fundamental and pervasive. Algorithms play a vital role in data processing and analytics where many algorithm designs have incorporated heuristics and general rules from human knowledge and experience to improve their effectiveness. Recently, reinforcement learning, deep reinforcement learning (DRL) in particular, is increasingly explored and exploited in many areas because it can learn better strategies in complicated environments it is interacting with than statically designed algorithms. Motivated by this trend, we provide a comprehensive review of recent works focusing on utilizing DRL to improve data processing and analytics. First, we present an introduction to key concepts, theories, and methods in DRL. Next, we discuss DRL deployment on database systems, facilitating data processing and analytics in various aspects, including data organization, scheduling, tuning, and indexing. Then, we survey the application of DRL in data processing and analytics, ranging from data preparation, natural language processing to healthcare, fintech, etc. Finally, we discuss important open challenges and future research directions of using DRL in data processing and analytics.", "abstracts": [ { "abstractType": "Regular", "content": "Data processing and analytics are fundamental and pervasive. Algorithms play a vital role in data processing and analytics where many algorithm designs have incorporated heuristics and general rules from human knowledge and experience to improve their effectiveness. Recently, reinforcement learning, deep reinforcement learning (DRL) in particular, is increasingly explored and exploited in many areas because it can learn better strategies in complicated environments it is interacting with than statically designed algorithms. Motivated by this trend, we provide a comprehensive review of recent works focusing on utilizing DRL to improve data processing and analytics. First, we present an introduction to key concepts, theories, and methods in DRL. Next, we discuss DRL deployment on database systems, facilitating data processing and analytics in various aspects, including data organization, scheduling, tuning, and indexing. Then, we survey the application of DRL in data processing and analytics, ranging from data preparation, natural language processing to healthcare, fintech, etc. Finally, we discuss important open challenges and future research directions of using DRL in data processing and analytics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data processing and analytics are fundamental and pervasive. Algorithms play a vital role in data processing and analytics where many algorithm designs have incorporated heuristics and general rules from human knowledge and experience to improve their effectiveness. Recently, reinforcement learning, deep reinforcement learning (DRL) in particular, is increasingly explored and exploited in many areas because it can learn better strategies in complicated environments it is interacting with than statically designed algorithms. Motivated by this trend, we provide a comprehensive review of recent works focusing on utilizing DRL to improve data processing and analytics. First, we present an introduction to key concepts, theories, and methods in DRL. Next, we discuss DRL deployment on database systems, facilitating data processing and analytics in various aspects, including data organization, scheduling, tuning, and indexing. Then, we survey the application of DRL in data processing and analytics, ranging from data preparation, natural language processing to healthcare, fintech, etc. Finally, we discuss important open challenges and future research directions of using DRL in data processing and analytics.", "title": "A Survey on Deep Reinforcement Learning for Data Processing and Analytics", "normalizedTitle": "A Survey on Deep Reinforcement Learning for Data Processing and Analytics", "fno": "09723570", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Deep Learning Artificial Intelligence", "Learning Artificial Intelligence", "Natural Language Processing", "Reinforcement Learning", "Telecommunication Computing", "Data Processing", "Deep Reinforcement Learning", "DRL", "Data Processing", "Reinforcement Learning", "Query Processing", "Optimization", "Costs", "Tuning", "Medical Services", "Deep Reinforcement Learning", "Data Processing And Analytics", "Database", "System Optimization" ], "authors": [ { "givenName": "Qingpeng", "surname": "Cai", "fullName": "Qingpeng Cai", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Can", "surname": "Cui", "fullName": "Can Cui", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Yiyuan", "surname": "Xiong", "fullName": "Yiyuan Xiong", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Wang", "fullName": "Wei Wang", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Zhongle", "surname": "Xie", "fullName": "Zhongle Xie", "affiliation": "Zhejiang University and Institute of Computing Innovation, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Meihui", "surname": "Zhang", "fullName": "Meihui Zhang", "affiliation": "Beijing Institute of Techonology, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "4446-4465", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/mipr/2022/9548/0/954800a366", "title": "ADAPTIVE ACQUISITION OF AIRBORNE LIDAR POINT CLOUD BASED ON DEEP REINFORCEMENT LEARNING", "doi": null, "abstractUrl": "/proceedings-article/mipr/2022/954800a366/1GvdduhsaUo", "parentPublication": { "id": "proceedings/mipr/2022/9548/0", "title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2019/8350/0/08718108", "title": "Deep Reinforcement Learning Based Sensor Data Management for Vehicles", "doi": null, "abstractUrl": "/proceedings-article/icoin/2019/08718108/1aIS0yrfDLa", "parentPublication": { "id": "proceedings/icoin/2019/8350/0", "title": "2019 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2019/0912/0/091200a600", "title": "Deep Reinforcement Learning for IoT Network Dynamic Clustering in Edge Computing", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2019/091200a600/1bomDUKhpmM", "parentPublication": { "id": "proceedings/ccgrid/2019/0912/0", "title": "2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ai4i/2020/8701/0/870100a032", "title": "Deep Reinforcement Learning using Cyclical Learning Rates", "doi": null, "abstractUrl": "/proceedings-article/ai4i/2020/870100a032/1oJ0qcw4JyM", "parentPublication": { "id": "proceedings/ai4i/2020/8701/0", "title": "2020 Third International Conference on Artificial Intelligence for Industries (AI4I)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2021/9101/0/09333903", "title": "On Performance of Deep Reinforcement Learning-based Listen-Before-Talk (LBT) Scheme", "doi": null, "abstractUrl": "/proceedings-article/icoin/2021/09333903/1qTrOnfS2DC", "parentPublication": { "id": "proceedings/icoin/2021/9101/0", "title": "2021 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412011", "title": "Deep Reinforcement Learning for Autonomous Driving by Transferring Visual Features", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412011/1tmhDhqIHcc", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiam/2021/3260/0/326000a146", "title": "A Comprehensive Review of Deep Reinforcement Learning for Object Detection", "doi": null, "abstractUrl": "/proceedings-article/isaiam/2021/326000a146/1wiQW5y1JCw", "parentPublication": { "id": "proceedings/isaiam/2021/3260/0", "title": "2021 International Symposium on Artificial Intelligence and its Application on Media (ISAIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hcs/2021/1397/0/09567123", "title": "OmniDRL: An Energy-Efficient Mobile Deep Reinforcement Learning Accelerators with Dual-mode Weight Compression and Direct Processing of Compressed Data", "doi": null, "abstractUrl": "/proceedings-article/hcs/2021/09567123/1xR7aDcOolW", "parentPublication": { "id": "proceedings/hcs/2021/1397/0", "title": "2021 IEEE Hot Chips 33 Symposium (HCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a044", "title": "TATA: Throughput-Aware TAsk Placement in Heterogeneous Stream Processing with Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a044/1zxKXOSwzvi", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09693280", "articleId": "1As6RRtlbcA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09697345", "articleId": "1AC4tIwFqO4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zdLtQJQFZC", "title": "Dec.", "year": "2021", "issueNum": "12", "idPrefix": "ts", "pubType": "journal", "volume": "47", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1gPjBwdGq5y", "doi": "10.1109/TSE.2020.2969178", "abstract": "A <italic>Cyber-Physical System</italic> (CPS) is a system which consists of software components and physical components. Traditional system verification techniques such as model checking or theorem proving are difficult to apply to CPS because the physical components have infinite number of states. To solve this problem, robustness guided falsification of CPS is introduced. Robustness measures how robustly the given specification is satisfied. Robustness guided falsification tries to minimize the robustness by changing inputs and parameters of the system. The input with a minimal robustness (counterexample) is a good candidate to violate the specification. Existing methods use several optimization techniques to minimize robustness. However, those methods do not use temporal structures in a system input and often require a large number of simulation runs to minimize the robustness. In this paper, we explore state-of-the-art <italic>Deep Reinforcement Learning</italic> (DRL) techniques, i.e., <italic>Asynchronous Advantage Actor-Critic</italic> (A3C) and <italic>Double Deep Q Network</italic> (DDQN), to reduce the number of simulation runs required to find such counterexamples. We theoretically show how robustness guided falsification of a safety property is formatted as a reinforcement learning problem. Then, we experimentally compare the effectiveness of our methods with three baseline methods, i.e., random sampling, cross entropy and simulated annealing, on three well known CPS systems. We thoroughly analyse the experiment results and identify two factors of CPS which make DRL based methods better than existing methods. The most important factor is the availability of the system internal dynamics to the reinforcement learning algorithm. The other factor is the existence of learnable structure in the counterexample.", "abstracts": [ { "abstractType": "Regular", "content": "A <italic>Cyber-Physical System</italic> (CPS) is a system which consists of software components and physical components. Traditional system verification techniques such as model checking or theorem proving are difficult to apply to CPS because the physical components have infinite number of states. To solve this problem, robustness guided falsification of CPS is introduced. Robustness measures how robustly the given specification is satisfied. Robustness guided falsification tries to minimize the robustness by changing inputs and parameters of the system. The input with a minimal robustness (counterexample) is a good candidate to violate the specification. Existing methods use several optimization techniques to minimize robustness. However, those methods do not use temporal structures in a system input and often require a large number of simulation runs to minimize the robustness. In this paper, we explore state-of-the-art <italic>Deep Reinforcement Learning</italic> (DRL) techniques, i.e., <italic>Asynchronous Advantage Actor-Critic</italic> (A3C) and <italic>Double Deep Q Network</italic> (DDQN), to reduce the number of simulation runs required to find such counterexamples. We theoretically show how robustness guided falsification of a safety property is formatted as a reinforcement learning problem. Then, we experimentally compare the effectiveness of our methods with three baseline methods, i.e., random sampling, cross entropy and simulated annealing, on three well known CPS systems. We thoroughly analyse the experiment results and identify two factors of CPS which make DRL based methods better than existing methods. The most important factor is the availability of the system internal dynamics to the reinforcement learning algorithm. The other factor is the existence of learnable structure in the counterexample.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A Cyber-Physical System (CPS) is a system which consists of software components and physical components. Traditional system verification techniques such as model checking or theorem proving are difficult to apply to CPS because the physical components have infinite number of states. To solve this problem, robustness guided falsification of CPS is introduced. Robustness measures how robustly the given specification is satisfied. Robustness guided falsification tries to minimize the robustness by changing inputs and parameters of the system. The input with a minimal robustness (counterexample) is a good candidate to violate the specification. Existing methods use several optimization techniques to minimize robustness. However, those methods do not use temporal structures in a system input and often require a large number of simulation runs to minimize the robustness. In this paper, we explore state-of-the-art Deep Reinforcement Learning (DRL) techniques, i.e., Asynchronous Advantage Actor-Critic (A3C) and Double Deep Q Network (DDQN), to reduce the number of simulation runs required to find such counterexamples. We theoretically show how robustness guided falsification of a safety property is formatted as a reinforcement learning problem. Then, we experimentally compare the effectiveness of our methods with three baseline methods, i.e., random sampling, cross entropy and simulated annealing, on three well known CPS systems. We thoroughly analyse the experiment results and identify two factors of CPS which make DRL based methods better than existing methods. The most important factor is the availability of the system internal dynamics to the reinforcement learning algorithm. The other factor is the existence of learnable structure in the counterexample.", "title": "Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning", "normalizedTitle": "Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning", "fno": "08967146", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Cyber Physical Systems", "Deep Learning Artificial Intelligence", "Formal Specification", "Optimisation", "Reinforcement Learning", "Optimization Techniques", "Double Deep Q Network", "CPS Systems", "DRL Based Methods", "System Internal Dynamics", "Cyber Physical System", "Software Components", "Physical Components", "Minimal Robustness", "Deep Reinforcement Learning", "Specification", "Asynchronous Advantage Actor Critic", "Robustness", "Reinforcement Learning", "Model Checking", "Software", "Optimization", "Robustness Guided Falsification", "CPS", "Reinforcement Learning" ], "authors": [ { "givenName": "Yoriyuki", "surname": "Yamagata", "fullName": "Yoriyuki Yamagata", "affiliation": "National Institute of Advanced Industrial Science and Technology (AIST), Ikeda, Osaka, Japan", "__typename": "ArticleAuthorType" }, { "givenName": "Shuang", "surname": "Liu", "fullName": "Shuang Liu", "affiliation": "College of Intelligence and Computing, Tianjin University, Nankai, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Takumi", "surname": "Akazaki", "fullName": "Takumi Akazaki", "affiliation": "Fujitsu Laboratories, Kawasaki, Kanagawa, Japan", "__typename": "ArticleAuthorType" }, { "givenName": "Yihai", "surname": "Duan", "fullName": "Yihai Duan", "affiliation": "College of Intelligence and Computing, Tianjin University, Nankai, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianye", "surname": "Hao", "fullName": "Jianye Hao", "affiliation": "College of Intelligence and Computing, Tianjin University, Nankai, Tianjin, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2021-12-01 00:00:00", "pubType": "trans", "pages": "2823-2840", "year": "2021", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icstw/2018/6352/0/635201a214", "title": "Temporal Logic Falsification of Cyber-Physical Systems: An Input-Signal-Space Optimization Approach", "doi": null, "abstractUrl": "/proceedings-article/icstw/2018/635201a214/12OmNx4gUpg", "parentPublication": { "id": "proceedings/icstw/2018/6352/0", "title": "2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mt-cps/2018/6748/0/674801a005", "title": "Falsification of Cyber-Physical Systems with Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/mt-cps/2018/674801a005/12OmNyRg4as", "parentPublication": { "id": "proceedings/mt-cps/2018/6748/0", "title": "2018 IEEE Workshop on Monitoring and Testing of Cyber-Physical Systems (MT-CPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a345", "title": "Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a345/1AUp2h7ZW6Y", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2021/0337/0/033700a555", "title": "FIGCPS: Effective Failure-inducing Input Generation for Cyber-Physical Systems with Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ase/2021/033700a555/1AjSZtQVov6", "parentPublication": { "id": "proceedings/ase/2021/0337/0", "title": "2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seip/2022/9590/0/959000a343", "title": "When Cyber-Physical Systems Meet AI: A Benchmark, an Evaluation, and a Way Forward", "doi": null, "abstractUrl": "/proceedings-article/icse-seip/2022/959000a343/1Ehs94ZJWZG", "parentPublication": { "id": "proceedings/icse-seip/2022/9590/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccps/2022/0967/0/096700a290", "title": "AlphaSOC: Reinforcement Learning-based Cybersecurity Automation for Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/iccps/2022/096700a290/1Et6hgNf4NW", "parentPublication": { "id": "proceedings/iccps/2022/0967/0", "title": "2022 ACM/IEEE 13th International Conference on Cyber-Physical Systems (ICCPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09844247", "title": "FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria", "doi": null, "abstractUrl": "/journal/ts/2023/04/09844247/1FnqZXUtyx2", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prdc/2019/4961/0/496100a236", "title": "Learning-Based Falsification for Model Families of Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/prdc/2019/496100a236/1gysqnk7DA4", "parentPublication": { "id": "proceedings/prdc/2019/4961/0", "title": "2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2019/2977/0/297700a318", "title": "Reinforcement Learning for Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/icii/2019/297700a318/1jXvle4daVO", "parentPublication": { "id": "proceedings/icii/2019/2977/0", "title": "2019 IEEE International Conference on Industrial Internet (ICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/07/09292655", "title": "ReCARL: Resource Allocation in Cloud RANs With Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tm/2022/07/09292655/1pyojUEUFEI", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08964460", "articleId": "1gM07Ds7fKU", "__typename": "AdjacentArticleType" }, "next": { "fno": "08972483", "articleId": "1gXC1GbhZ7O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Ciz7jJQnU4", "title": "May", "year": "2022", "issueNum": "05", "idPrefix": "tm", "pubType": "journal", "volume": "21", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nMMjnnpsNG", "doi": "10.1109/TMC.2020.3029844", "abstract": "Long propagation delay that causes throughput degradation of underwater acoustic networks (UWANs) is a critical issue in the medium access control (MAC) protocol design in UWANs. This paper develops a deep reinforcement learning (DRL) based MAC protocol for UWANs, referred to as delayed-reward deep-reinforcement learning multiple access (DR-DLMA), to maximize the network throughput by judiciously utilizing the available time slots resulted from propagation delays or not used by other nodes. In the DR-DLMA design, we first put forth a new DRL algorithm, termed as <italic>delayed-reward deep Q-network (DR-DQN)</italic>. Then we formulate the multiple access problem in UWANs as a reinforcement learning (RL) problem by defining state, action, and reward in the parlance of RL, and thereby realizing the DR-DLMA protocol. In traditional DRL algorithms, e.g., the original DQN algorithm, the agent can get access to the &#x201C;reward&#x201D; from the environment immediately after taking an action. In contrast, in our design, the &#x201C;reward&#x201D; (i.e., the ACK packet) is only available after twice the one-way propagation delay after the agent takes an action (i.e., to transmit a data packet). The essence of DR-DQN is to incorporate the propagation delay into the DRL framework and modify the DRL algorithm accordingly. In addition, in order to reduce the cost of online training deep neural network (DNN), we provide a nimble training mechanism for DR-DQN. The optimal network throughputs in various cases are given as a benchmark. Simulation results show that our DR-DLMA protocol with nimble training mechanism can: (i) find the optimal transmission strategy when coexisting with other protocols in a heterogeneous environment; (ii) outperform state-of-the-art MAC protocols (e.g., slotted FAMA and DOTS) in a homogeneous environment; and (iii) greatly reduce energy consumption and run-time compared with DR-DLMA with traditional DNN training mechanism.", "abstracts": [ { "abstractType": "Regular", "content": "Long propagation delay that causes throughput degradation of underwater acoustic networks (UWANs) is a critical issue in the medium access control (MAC) protocol design in UWANs. This paper develops a deep reinforcement learning (DRL) based MAC protocol for UWANs, referred to as delayed-reward deep-reinforcement learning multiple access (DR-DLMA), to maximize the network throughput by judiciously utilizing the available time slots resulted from propagation delays or not used by other nodes. In the DR-DLMA design, we first put forth a new DRL algorithm, termed as <italic>delayed-reward deep Q-network (DR-DQN)</italic>. Then we formulate the multiple access problem in UWANs as a reinforcement learning (RL) problem by defining state, action, and reward in the parlance of RL, and thereby realizing the DR-DLMA protocol. In traditional DRL algorithms, e.g., the original DQN algorithm, the agent can get access to the &#x201C;reward&#x201D; from the environment immediately after taking an action. In contrast, in our design, the &#x201C;reward&#x201D; (i.e., the ACK packet) is only available after twice the one-way propagation delay after the agent takes an action (i.e., to transmit a data packet). The essence of DR-DQN is to incorporate the propagation delay into the DRL framework and modify the DRL algorithm accordingly. In addition, in order to reduce the cost of online training deep neural network (DNN), we provide a nimble training mechanism for DR-DQN. The optimal network throughputs in various cases are given as a benchmark. Simulation results show that our DR-DLMA protocol with nimble training mechanism can: (i) find the optimal transmission strategy when coexisting with other protocols in a heterogeneous environment; (ii) outperform state-of-the-art MAC protocols (e.g., slotted FAMA and DOTS) in a homogeneous environment; and (iii) greatly reduce energy consumption and run-time compared with DR-DLMA with traditional DNN training mechanism.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Long propagation delay that causes throughput degradation of underwater acoustic networks (UWANs) is a critical issue in the medium access control (MAC) protocol design in UWANs. This paper develops a deep reinforcement learning (DRL) based MAC protocol for UWANs, referred to as delayed-reward deep-reinforcement learning multiple access (DR-DLMA), to maximize the network throughput by judiciously utilizing the available time slots resulted from propagation delays or not used by other nodes. In the DR-DLMA design, we first put forth a new DRL algorithm, termed as delayed-reward deep Q-network (DR-DQN). Then we formulate the multiple access problem in UWANs as a reinforcement learning (RL) problem by defining state, action, and reward in the parlance of RL, and thereby realizing the DR-DLMA protocol. In traditional DRL algorithms, e.g., the original DQN algorithm, the agent can get access to the “reward” from the environment immediately after taking an action. In contrast, in our design, the “reward” (i.e., the ACK packet) is only available after twice the one-way propagation delay after the agent takes an action (i.e., to transmit a data packet). The essence of DR-DQN is to incorporate the propagation delay into the DRL framework and modify the DRL algorithm accordingly. In addition, in order to reduce the cost of online training deep neural network (DNN), we provide a nimble training mechanism for DR-DQN. The optimal network throughputs in various cases are given as a benchmark. Simulation results show that our DR-DLMA protocol with nimble training mechanism can: (i) find the optimal transmission strategy when coexisting with other protocols in a heterogeneous environment; (ii) outperform state-of-the-art MAC protocols (e.g., slotted FAMA and DOTS) in a homogeneous environment; and (iii) greatly reduce energy consumption and run-time compared with DR-DLMA with traditional DNN training mechanism.", "title": "Deep Reinforcement Learning Based MAC Protocol for Underwater Acoustic Networks", "normalizedTitle": "Deep Reinforcement Learning Based MAC Protocol for Underwater Acoustic Networks", "fno": "09219231", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Propagation Delay", "Media Access Protocol", "Throughput", "Training", "Reinforcement Learning", "Underwater Acoustics", "Long Propagation Delay", "Medium Access Control", "Underwater Acoustic Networks", "Deep Reinforcement Learning" ], "authors": [ { "givenName": "Xiaowen", "surname": "Ye", "fullName": "Xiaowen Ye", "affiliation": "Key laboratory of Underwater Acoustic Communication and Marine Information Technology Ministry of Education, School of Informatics, Xiamen University, Xiamen, Fujian, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yiding", "surname": "Yu", "fullName": "Yiding Yu", "affiliation": "Theory Lab, 2012 Labs, Huawei Technologies Company, Ltd., Shatin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Liqun", "surname": "Fu", "fullName": "Liqun Fu", "affiliation": "Key laboratory of Underwater Acoustic Communication and Marine Information Technology Ministry of Education, School of Informatics, Xiamen University, Xiamen, Fujian, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-05-01 00:00:00", "pubType": "trans", "pages": "1625-1638", "year": "2022", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cyberc/2009/5218/0/05342162", "title": "A novel MAC protocol for underwater acoustic, sensor networks", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2009/05342162/12OmNAHEpDV", "parentPublication": { "id": "proceedings/cyberc/2009/5218/0", "title": "2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euc/2011/4552/0/4552a452", "title": "Sync MAC Protocol to Control Underwater Vehicle Based on Underwater Acoustic Communication", "doi": null, "abstractUrl": "/proceedings-article/euc/2011/4552a452/12OmNAgGwff", "parentPublication": { "id": "proceedings/euc/2011/4552/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/1/3865a096", "title": "AMS: A New MAC Protocol for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865a096/12OmNwG90ft", "parentPublication": { "id": "proceedings/iscid/2009/3865/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2011/0680/0/05983885", "title": "DC-MAC: A data-centric multi-hop MAC protocol for underwater acoustic sensor networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2011/05983885/12OmNwqft4R", "parentPublication": { "id": "proceedings/iscc/2011/0680/0", "title": "2011 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a346", "title": "The Protocol of Physical Layer for Underwater Acoustic Network", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a346/12OmNz3bdBA", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2015/04/06834831", "title": "Toward Practical MAC Design for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/journal/tm/2015/04/06834831/13rRUyfbwrl", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2022/5478/0/547800a257", "title": "Autonomous underwater vehicles (AUVs) path planning based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icdh/2022/547800a257/1JeDuGUQ5yg", "parentPublication": { "id": "proceedings/icdh/2022/5478/0", "title": "2022 9th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2019/10/08470137", "title": "Collision Avoidance Energy Efficient Multi-Channel MAC Protocol for UnderWater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/journal/tm/2019/10/08470137/1cUVlrR83Hq", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/09/09328336", "title": "UW-SEEDEX: A Pseudorandom-Based MAC Protocol for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/journal/tm/2022/09/09328336/1qutUQL5Wyk", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2020/9916/0/991600a671", "title": "A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2020/991600a671/1sBOczZeraE", "parentPublication": { "id": "proceedings/msn/2020/9916/0", "title": "2020 16th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09215047", "articleId": "1nHNG3FqhGM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09205651", "articleId": "1nnSJCUAEz6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DU9VjL0v96", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tm", "pubType": "journal", "volume": "21", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1pyojUEUFEI", "doi": "10.1109/TMC.2020.3044282", "abstract": "Cloud radio access networks (CRANs) have become a key enabling technique for the next generation wireless communications. Resource allocation in CRANs still needs to be further improved to reach the objective of minimizing power consumption and meeting demands of wireless users over a long period. Inspired by the success of Deep Reinforcement Learning (DRL) on solving complicated control problems, we present a novel framework, <italic>ReCARL</italic>, for power-efficient resource allocation in CRANs with deep reinforcement learning. Specifically, we define the state space, action space and reward function for the DRL agent, apply a deep neural network (DNN) to approximating the action-value function, and formally formulate the resource allocation problem (in each decision epoch) as a convex optimization problem. Under ReCARL, we propose two different DRL agents: one has a regular DNN structure trained with the basic deep Q-learning method (<italic>ReCARL-Basic</italic>); while the other has a context-aware DNN structure trained with a hybrid deep Q-learning method (<italic>ReCARL-Hybrid</italic>). We evaluated the performance of ReCARL along with the two DRL agents by comparing them with two widely-used baselines via extensive simulation. The simulation results show that ReCARL achieves significant power savings while meeting user demands, and it can well handle highly dynamic cases.", "abstracts": [ { "abstractType": "Regular", "content": "Cloud radio access networks (CRANs) have become a key enabling technique for the next generation wireless communications. Resource allocation in CRANs still needs to be further improved to reach the objective of minimizing power consumption and meeting demands of wireless users over a long period. Inspired by the success of Deep Reinforcement Learning (DRL) on solving complicated control problems, we present a novel framework, <italic>ReCARL</italic>, for power-efficient resource allocation in CRANs with deep reinforcement learning. Specifically, we define the state space, action space and reward function for the DRL agent, apply a deep neural network (DNN) to approximating the action-value function, and formally formulate the resource allocation problem (in each decision epoch) as a convex optimization problem. Under ReCARL, we propose two different DRL agents: one has a regular DNN structure trained with the basic deep Q-learning method (<italic>ReCARL-Basic</italic>); while the other has a context-aware DNN structure trained with a hybrid deep Q-learning method (<italic>ReCARL-Hybrid</italic>). We evaluated the performance of ReCARL along with the two DRL agents by comparing them with two widely-used baselines via extensive simulation. The simulation results show that ReCARL achieves significant power savings while meeting user demands, and it can well handle highly dynamic cases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cloud radio access networks (CRANs) have become a key enabling technique for the next generation wireless communications. Resource allocation in CRANs still needs to be further improved to reach the objective of minimizing power consumption and meeting demands of wireless users over a long period. Inspired by the success of Deep Reinforcement Learning (DRL) on solving complicated control problems, we present a novel framework, ReCARL, for power-efficient resource allocation in CRANs with deep reinforcement learning. Specifically, we define the state space, action space and reward function for the DRL agent, apply a deep neural network (DNN) to approximating the action-value function, and formally formulate the resource allocation problem (in each decision epoch) as a convex optimization problem. Under ReCARL, we propose two different DRL agents: one has a regular DNN structure trained with the basic deep Q-learning method (ReCARL-Basic); while the other has a context-aware DNN structure trained with a hybrid deep Q-learning method (ReCARL-Hybrid). We evaluated the performance of ReCARL along with the two DRL agents by comparing them with two widely-used baselines via extensive simulation. The simulation results show that ReCARL achieves significant power savings while meeting user demands, and it can well handle highly dynamic cases.", "title": "ReCARL: Resource Allocation in Cloud RANs With Deep Reinforcement Learning", "normalizedTitle": "ReCARL: Resource Allocation in Cloud RANs With Deep Reinforcement Learning", "fno": "09292655", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Deep Learning Artificial Intelligence", "Neural Nets", "Next Generation Networks", "Optimisation", "Radio Access Networks", "Deep Reinforcement Learning", "Cloud Radio Access Networks", "CRAN", "Power Efficient Resource Allocation", "Reward Function", "DRL Agent", "Deep Neural Network", "Resource Allocation Problem", "Re CARL Basic", "Hybrid Deep Q Learning Method", "Re CARL Hybrid", "Resource Management", "Wireless Communication", "Reinforcement Learning", "Power Demand", "Array Signal Processing", "Optimization", "Aerospace Electronics", "Deep Reinforcement Learning", "Resource Allocation", "Cloud Radio Access Network", "Green Communications" ], "authors": [ { "givenName": "Zhiyuan", "surname": "Xu", "fullName": "Zhiyuan Xu", "affiliation": "Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jian", "surname": "Tang", "fullName": "Jian Tang", "affiliation": "Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Chengxiang", "surname": "Yin", "fullName": "Chengxiang Yin", "affiliation": "Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yanzhi", "surname": "Wang", "fullName": "Yanzhi Wang", "affiliation": "Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Guoliang", "surname": "Xue", "fullName": "Guoliang Xue", "affiliation": "School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jing", "surname": "Wang", "fullName": "Jing Wang", "affiliation": "Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "M. Cenk", "surname": "Gursoy", "fullName": "M. Cenk Gursoy", "affiliation": "Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "2533-2545", "year": "2022", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdcs/2017/1792/0/1792a372", "title": "A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792a372/12OmNxYbSXm", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nca/2022/9730/21/10013505", "title": "Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell Networks", "doi": null, "abstractUrl": "/proceedings-article/nca/2022/10013505/1JZ43HLDua4", "parentPublication": { "id": "proceedings/nca/2022/9730/21", "title": "2022 IEEE 21st International Symposium on Network Computing and Applications (NCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2023/5719/0/10074102", "title": "Deep Reinforcement Learning Based Resource Allocation for 5G V2V Groupcast Communications", "doi": null, "abstractUrl": "/proceedings-article/icnc/2023/10074102/1LKwDZTV4li", "parentPublication": { "id": "proceedings/icnc/2023/5719/0", "title": "2023 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2022/3197/0/319700a048", "title": "An Alternative Curriculum Learning Approach with Macro Actions for Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/cecit/2022/319700a048/1M66DRWR4k0", "parentPublication": { "id": "proceedings/cecit/2022/3197/0", "title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/12/08967146", "title": "Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/ts/2021/12/08967146/1gPjBwdGq5y", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047375", "title": "Mobility-Aware Resource Allocation in Multi-Access Edge Computing Using Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047375/1iC6tbsWJDa", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/oj/2020/01/09109671", "title": "Network Resource Allocation Strategy Based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/oj/2020/01/09109671/1kpEki7zbYQ", "parentPublication": { "id": "trans/oj", "title": "IEEE Open Journal of the Computer Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/05/09219231", "title": "Deep Reinforcement Learning Based MAC Protocol for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/journal/tm/2022/05/09219231/1nMMjnnpsNG", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/08/09635652", "title": "Adaptive and Efficient Resource Allocation in Cloud Datacenters Using Actor-Critic Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/td/2022/08/09635652/1z29dhHgJ68", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09268064", "articleId": "1p1cdeje8Yo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09266063", "articleId": "1oZxu5GMv8k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzA6GUv", "title": "May", "year": "2019", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17QjJf0qqr2", "doi": "10.1109/TVCG.2019.2898748", "abstract": "Creating metrically accurate avatars is important for many applications such as virtual clothing try-on, ergonomics, medicine, immersive social media, telepresence, and gaming. Creating avatars that precisely represent a particular individual is challenging however, due to the need for expensive 3D scanners, privacy issues with photographs or videos, and difficulty in making accurate tailoring measurements. We overcome these challenges by creating &#x201C;The Virtual Caliper&#x201D;, which uses VR game controllers to make simple measurements. First, we establish what body measurements users can reliably make on their own body. We find several distance measurements to be good candidates and then verify that these are linearly related to 3D body shape as represented by the SMPL body model. The Virtual Caliper enables novice users to accurately measure themselves and create an avatar with their own body shape. We evaluate the metric accuracy relative to ground truth 3D body scan data, compare the method quantitatively to other avatar creation tools, and perform extensive perceptual studies. We also provide a software application to the community that enables novices to rapidly create avatars in fewer than five minutes. Not only is our approach more rapid than existing methods, it exports a metrically accurate 3D avatar model that is rigged and skinned.", "abstracts": [ { "abstractType": "Regular", "content": "Creating metrically accurate avatars is important for many applications such as virtual clothing try-on, ergonomics, medicine, immersive social media, telepresence, and gaming. Creating avatars that precisely represent a particular individual is challenging however, due to the need for expensive 3D scanners, privacy issues with photographs or videos, and difficulty in making accurate tailoring measurements. We overcome these challenges by creating &#x201C;The Virtual Caliper&#x201D;, which uses VR game controllers to make simple measurements. First, we establish what body measurements users can reliably make on their own body. We find several distance measurements to be good candidates and then verify that these are linearly related to 3D body shape as represented by the SMPL body model. The Virtual Caliper enables novice users to accurately measure themselves and create an avatar with their own body shape. We evaluate the metric accuracy relative to ground truth 3D body scan data, compare the method quantitatively to other avatar creation tools, and perform extensive perceptual studies. We also provide a software application to the community that enables novices to rapidly create avatars in fewer than five minutes. Not only is our approach more rapid than existing methods, it exports a metrically accurate 3D avatar model that is rigged and skinned.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Creating metrically accurate avatars is important for many applications such as virtual clothing try-on, ergonomics, medicine, immersive social media, telepresence, and gaming. Creating avatars that precisely represent a particular individual is challenging however, due to the need for expensive 3D scanners, privacy issues with photographs or videos, and difficulty in making accurate tailoring measurements. We overcome these challenges by creating “The Virtual Caliper”, which uses VR game controllers to make simple measurements. First, we establish what body measurements users can reliably make on their own body. We find several distance measurements to be good candidates and then verify that these are linearly related to 3D body shape as represented by the SMPL body model. The Virtual Caliper enables novice users to accurately measure themselves and create an avatar with their own body shape. We evaluate the metric accuracy relative to ground truth 3D body scan data, compare the method quantitatively to other avatar creation tools, and perform extensive perceptual studies. We also provide a software application to the community that enables novices to rapidly create avatars in fewer than five minutes. Not only is our approach more rapid than existing methods, it exports a metrically accurate 3D avatar model that is rigged and skinned.", "title": "The Virtual Caliper: Rapid Creation of Metrically Accurate Avatars from 3D Measurements", "normalizedTitle": "The Virtual Caliper: Rapid Creation of Metrically Accurate Avatars from 3D Measurements", "fno": "08648222", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Avatars", "Clothing", "Computer Games", "Ergonomics", "Solid Modelling", "Virtual Caliper", "VR Game Controllers", "Body Measurements Users", "Distance Measurements", "SMPL Body Model", "3 D Measurements", "3 D Body Shape", "Avatars Creation", "Avatars", "Shape", "Three Dimensional Displays", "Shape Measurement", "Solid Modeling", "Tools", "Distance Measurement", "Full Body Avatars", "Metric Accuracy", "Rapid Creation" ], "authors": [ { "givenName": "Sergi", "surname": "Pujades", "fullName": "Sergi Pujades", "affiliation": "LJK, Univ. Grenoble Alpes, Inria, CNRS, Grenoble INP, Grenoble, France", "__typename": "ArticleAuthorType" }, { "givenName": "Betty", "surname": "Mohler", "fullName": "Betty Mohler", "affiliation": "Amazon", "__typename": "ArticleAuthorType" }, { "givenName": "Anne", "surname": "Thaler", "fullName": "Anne Thaler", "affiliation": "Max Planck Institute for Biological Cybernetics", "__typename": "ArticleAuthorType" }, { "givenName": "Joachim", "surname": "Tesch", "fullName": "Joachim Tesch", "affiliation": "Max Planck Institute for Intelligent Systems", "__typename": "ArticleAuthorType" }, { "givenName": "Naureen", "surname": "Mahmood", "fullName": "Naureen Mahmood", "affiliation": "Meshcapade", "__typename": "ArticleAuthorType" }, { "givenName": "Nikolas", "surname": "Hesse", "fullName": "Nikolas Hesse", "affiliation": "Fraunhofer Institute of Optronics, System Technologies and Image Exploitation", "__typename": "ArticleAuthorType" }, { "givenName": "Heinrich H.", "surname": "Bülthoff", "fullName": "Heinrich H. Bülthoff", "affiliation": "Max Planck Institute for Biological Cybernetics", "__typename": "ArticleAuthorType" }, { "givenName": "Michael J.", "surname": "Black", "fullName": "Michael J. Black", "affiliation": "Max Planck Institute for Intelligent Systems", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "05", "pubDate": "2019-05-01 00:00:00", "pubType": "trans", "pages": "1887-1897", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2015/1727/0/07223377", "title": "Avatar embodiment realism and virtual fitness training", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223377/12OmNCcKQFn", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504706", "title": "Animated self-avatars for motor rehabilitation applications that are biomechanically accurate, low-latency and easy to use", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504706/12OmNqBKTPQ", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892240", "title": "Rapid one-shot acquisition of dynamic VR avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892240/12OmNwGZNLp", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549424", "title": "Rapid generation of personalized avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549424/12OmNyQGShm", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892372", "title": "Demonstration: Rapid one-shot acquisition of dynamic VR avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892372/12OmNz2C1zq", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a098", "title": "Detailed Human Avatars from Monocular Video", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a098/17D45Vw15t7", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a666", "title": "Investigating User Embodiment of Inverse-Kinematic Avatars in Smartphone Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a666/1JrR5i5jDhe", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798353", "title": "Rapid 3D Avatar Creation System Using a Single Depth Camera", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798353/1cJ11TRykmY", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798152", "title": "The Influence of Size in Augmented Reality Telepresence Avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798152/1cJ1djEUmv6", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300c382", "title": "Textured Neural Avatars", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300c382/1gyrdPZ8U92", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08643846", "articleId": "17PYEjJvAVJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08651471", "articleId": "17WX58zhpC0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1LUpyYLBfeo", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYoySw7RM4", "doi": "10.1109/TVCG.2023.3247067", "abstract": "With the popularity of Virtual Reality (VR) on the rise, creators from a variety of fields are building increasingly complex experiences that allow users to express themselves more naturally. Self-avatars and object interaction in virtual worlds are at the heart of these experiences. However, these give rise to several perception based challenges that have been the focus of research in recent years. One area that garners most interest is understanding the effects of self-avatars and object interaction on action capabilities or affordances in VR. Affordances have been shown to be influenced by the anthropometric and anthropomorphic properties of the self-avatar embodied. However, self-avatars cannot fully represent real world interaction and fail to provide information about the dynamic properties of surfaces in the environment. For example, pressing against a board to feel its rigidity. This lack of accurate dynamic information can be further amplified when interacting with virtual handheld objects as the weight and inertial feedback associated with them is often mismatched. To investigate this phenomenon, we looked at how the absence of dynamic surface properties affect lateral passability judgments when carrying virtual handheld objects in the presence or absence of gender matched body-scaled self-avatars. Results suggest that participants can calibrate to the missing dynamic information in the presence of self-avatars to make lateral passability judgments, but rely on their internal body schema of a compressed physical body depth in the absence of self-avatars.", "abstracts": [ { "abstractType": "Regular", "content": "With the popularity of Virtual Reality (VR) on the rise, creators from a variety of fields are building increasingly complex experiences that allow users to express themselves more naturally. Self-avatars and object interaction in virtual worlds are at the heart of these experiences. However, these give rise to several perception based challenges that have been the focus of research in recent years. One area that garners most interest is understanding the effects of self-avatars and object interaction on action capabilities or affordances in VR. Affordances have been shown to be influenced by the anthropometric and anthropomorphic properties of the self-avatar embodied. However, self-avatars cannot fully represent real world interaction and fail to provide information about the dynamic properties of surfaces in the environment. For example, pressing against a board to feel its rigidity. This lack of accurate dynamic information can be further amplified when interacting with virtual handheld objects as the weight and inertial feedback associated with them is often mismatched. To investigate this phenomenon, we looked at how the absence of dynamic surface properties affect lateral passability judgments when carrying virtual handheld objects in the presence or absence of gender matched body-scaled self-avatars. Results suggest that participants can calibrate to the missing dynamic information in the presence of self-avatars to make lateral passability judgments, but rely on their internal body schema of a compressed physical body depth in the absence of self-avatars.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the popularity of Virtual Reality (VR) on the rise, creators from a variety of fields are building increasingly complex experiences that allow users to express themselves more naturally. Self-avatars and object interaction in virtual worlds are at the heart of these experiences. However, these give rise to several perception based challenges that have been the focus of research in recent years. One area that garners most interest is understanding the effects of self-avatars and object interaction on action capabilities or affordances in VR. Affordances have been shown to be influenced by the anthropometric and anthropomorphic properties of the self-avatar embodied. However, self-avatars cannot fully represent real world interaction and fail to provide information about the dynamic properties of surfaces in the environment. For example, pressing against a board to feel its rigidity. This lack of accurate dynamic information can be further amplified when interacting with virtual handheld objects as the weight and inertial feedback associated with them is often mismatched. To investigate this phenomenon, we looked at how the absence of dynamic surface properties affect lateral passability judgments when carrying virtual handheld objects in the presence or absence of gender matched body-scaled self-avatars. Results suggest that participants can calibrate to the missing dynamic information in the presence of self-avatars to make lateral passability judgments, but rely on their internal body schema of a compressed physical body depth in the absence of self-avatars.", "title": "Can I Squeeze Through? Effects of Self-Avatars and Calibration in a Person-Plus-Virtual-Object System on Perceived Lateral Passability in VR", "normalizedTitle": "Can I Squeeze Through? Effects of Self-Avatars and Calibration in a Person-Plus-Virtual-Object System on Perceived Lateral Passability in VR", "fno": "10049626", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Avatars", "Human Factors", "Affordances", "Anthropometric Properties", "Anthropomorphic Properties", "Dynamic Information", "Dynamic Surface Properties", "Gender Matched Body Scaled Self Avatars", "Lateral Passability Judgments", "Object Interaction", "Perceived Lateral Passability", "Person Plus Virtual Object System", "Virtual Handheld Objects", "Virtual Reality", "Virtual Worlds", "VR", "Affordances", "Apertures", "Calibration", "Visualization", "Training", "Task Analysis", "Propioception", "Affordance", "Passability", "Self Avatar", "Virtual Reality" ], "authors": [ { "givenName": "Ayush", "surname": "Bhargava", "fullName": "Ayush Bhargava", "affiliation": "School of Computing at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Rohith", "surname": "Venkatakrishnan", "fullName": "Rohith Venkatakrishnan", "affiliation": "School of Computing at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Roshan", "surname": "Venkatakrishnan", "fullName": "Roshan Venkatakrishnan", "affiliation": "School of Computing at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Kathryn", "surname": "Lucaites", "fullName": "Kathryn Lucaites", "affiliation": "Department of Psychology at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Hannah", "surname": "Solini", "fullName": "Hannah Solini", "affiliation": "Department of Psychology at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Andrew C.", "surname": "Robb", "fullName": "Andrew C. Robb", "affiliation": "faculty in the School of Computing at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Christopher C.", "surname": "Pagano", "fullName": "Christopher C. Pagano", "affiliation": "Department of Psychology at Clemson University, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Sabarish V.", "surname": "Babu", "fullName": "Sabarish V. Babu", "affiliation": "faculty in the School of Computing at Clemson University, United States", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "2348-2357", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504706", "title": "Animated self-avatars for motor rehabilitation applications that are biomechanically accurate, low-latency and easy to use", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504706/12OmNqBKTPQ", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a051", "title": "Introducing Avatarification: An Experimental Examination of How Avatars Influence Student Motivation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a051/12OmNvDqsPL", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446539", "title": "Investigating the Effects of Anthropomorphic Fidelity of Self-Avatars on Near Field Depth Perception in Immersive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446539/13bd1h03qOe", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/05/07118232", "title": "The Effects of Avatars, Stereo Vision and Display Size on Reaching and Motion Reproduction", "doi": null, "abstractUrl": "/journal/tg/2016/05/07118232/13rRUwdIOUQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2022/5478/0/547800a283", "title": "A Visual Affordance Reasoning Network Based on Graph Attention", "doi": null, "abstractUrl": "/proceedings-article/icdh/2022/547800a283/1JeDm0PCE5G", "parentPublication": { "id": "proceedings/icdh/2022/5478/0", "title": "2022 9th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a450", "title": "What Can I Do There? Controlling AR Self-Avatars to Better Perceive Affordances of the Real World", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a450/1JrQVmURYMo", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a308", "title": "Empirically Evaluating the Effects of Eye Height and Self-Avatars on Dynamic Passability Affordances in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a308/1MNgWLowz1m", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089645", "title": "Comparative Evaluation of Viewing and Self-Representation on Passability Affordances to a Realistic Sliding Doorway in Real and Immersive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089645/1jIx9zwn7SE", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09440766", "title": "Did I Hit the Door? Effects of Self-Avatars and Calibration in a Person-Plus-Virtual-Object System on Perceived Frontal Passability in VR", "doi": null, "abstractUrl": "/journal/tg/2022/12/09440766/1tTpcuKN5jW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600z023", "title": "Self-Avatars in Immersive Technology", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600z023/1tuAsCE62Tm", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049734", "articleId": "1KYop88r9Je", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049676", "articleId": "1KYosbnM8q4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxGAL9e", "title": "Aug.", "year": "2020", "issueNum": "08", "idPrefix": "tk", "pubType": "journal", "volume": "32", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "18wJ1EmMMrm", "doi": "10.1109/TKDE.2019.2906190", "abstract": "Most previous work on outfit recommendation focuses on designing visual features to enhance recommendations. Existing work neglects user comments of fashion items, which have been proven to be effective in generating explanations along with better recommendation results. We propose a novel neural network framework, neural outfit recommendation (NOR), that simultaneously provides outfit recommendations and generates abstractive comments. Neural outfit recommendation (NOR) consists of two parts: outfit matching and comment generation. For outfit matching, we propose a convolutional neural network with a mutual attention mechanism to extract visual features. The visual features are then decoded into a rating score for the matching prediction. For abstractive comment generation, we propose a gated recurrent neural network with a cross-modality attention mechanism to transform visual features into a concise sentence. The two parts are jointly trained based on a multi-task learning framework in an end-to-end back-propagation paradigm. Extensive experiments conducted on an existing dataset and a collected real-world dataset show NOR achieves significant improvements over state-of-the-art baselines for outfit recommendation. Meanwhile, our generated comments achieve impressive ROUGE and BLEU scores in comparison to human-written comments. The generated comments can be regarded as explanations for the recommendation results. We release the dataset and code to facilitate future research.", "abstracts": [ { "abstractType": "Regular", "content": "Most previous work on outfit recommendation focuses on designing visual features to enhance recommendations. Existing work neglects user comments of fashion items, which have been proven to be effective in generating explanations along with better recommendation results. We propose a novel neural network framework, neural outfit recommendation (NOR), that simultaneously provides outfit recommendations and generates abstractive comments. Neural outfit recommendation (NOR) consists of two parts: outfit matching and comment generation. For outfit matching, we propose a convolutional neural network with a mutual attention mechanism to extract visual features. The visual features are then decoded into a rating score for the matching prediction. For abstractive comment generation, we propose a gated recurrent neural network with a cross-modality attention mechanism to transform visual features into a concise sentence. The two parts are jointly trained based on a multi-task learning framework in an end-to-end back-propagation paradigm. Extensive experiments conducted on an existing dataset and a collected real-world dataset show NOR achieves significant improvements over state-of-the-art baselines for outfit recommendation. Meanwhile, our generated comments achieve impressive ROUGE and BLEU scores in comparison to human-written comments. The generated comments can be regarded as explanations for the recommendation results. We release the dataset and code to facilitate future research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most previous work on outfit recommendation focuses on designing visual features to enhance recommendations. Existing work neglects user comments of fashion items, which have been proven to be effective in generating explanations along with better recommendation results. We propose a novel neural network framework, neural outfit recommendation (NOR), that simultaneously provides outfit recommendations and generates abstractive comments. Neural outfit recommendation (NOR) consists of two parts: outfit matching and comment generation. For outfit matching, we propose a convolutional neural network with a mutual attention mechanism to extract visual features. The visual features are then decoded into a rating score for the matching prediction. For abstractive comment generation, we propose a gated recurrent neural network with a cross-modality attention mechanism to transform visual features into a concise sentence. The two parts are jointly trained based on a multi-task learning framework in an end-to-end back-propagation paradigm. Extensive experiments conducted on an existing dataset and a collected real-world dataset show NOR achieves significant improvements over state-of-the-art baselines for outfit recommendation. Meanwhile, our generated comments achieve impressive ROUGE and BLEU scores in comparison to human-written comments. The generated comments can be regarded as explanations for the recommendation results. We release the dataset and code to facilitate future research.", "title": "Explainable Outfit Recommendation with Joint Outfit Matching and Comment Generation", "normalizedTitle": "Explainable Outfit Recommendation with Joint Outfit Matching and Comment Generation", "fno": "08669792", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Feature Extraction", "Image Representation", "Language Translation", "Learning Artificial Intelligence", "Recurrent Neural Nets", "Visual Features", "User Comments", "Neural Network Framework", "Neural Outfit Recommendation", "Abstractive Comments", "Convolutional Neural Network", "Abstractive Comment Generation", "Gated Recurrent Neural Network", "Generated Comments", "Human Written Comments", "Explainable Outfit Recommendation", "Joint Outfit Matching", "Visualization", "Feature Extraction", "Task Analysis", "Clothing", "Computer Science", "Recurrent Neural Networks", "Recommender Systems", "Outfit Recommendation", "Explainable Recommendation" ], "authors": [ { "givenName": "Yujie", "surname": "Lin", "fullName": "Yujie Lin", "affiliation": "School of Computer Science and Technology, Shandong University, Qingdao, Shandong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Pengjie", "surname": "Ren", "fullName": "Pengjie Ren", "affiliation": "Informatics Institute, University of Amsterdam, Amsterdam, GG, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Zhumin", "surname": "Chen", "fullName": "Zhumin Chen", "affiliation": "School of Computer Science and Technology, Shandong University, Qingdao, Shandong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhaochun", "surname": "Ren", "fullName": "Zhaochun Ren", "affiliation": "School of Computer Science and Technology, Shandong University, Qingdao, Shandong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Ma", "fullName": "Jun Ma", "affiliation": "School of Computer Science and Technology, Shandong University, Qingdao, Shandong, China", "__typename": "ArticleAuthorType" }, { "givenName": "Maarten", "surname": "de Rijke", "fullName": "Maarten de Rijke", "affiliation": "Informatics Institute, University of Amsterdam, Amsterdam, GG, The Netherlands", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2020-08-01 00:00:00", "pubType": "trans", "pages": "1502-1516", "year": "2020", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09695275", "title": "Joint Reason Generation and Rating Prediction for Explainable Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/05/09695275/1AvqGUeSJDG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900c262", "title": "OutfitTransformer: Outfit Representations for Fashion Recommendation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900c262/1G56SrKv2Ja", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09920173", "title": "Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study", "doi": null, "abstractUrl": "/journal/ts/2023/04/09920173/1HxSpR5z2FO", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d590", "title": "OutfitTransformer: Learning Outfit Representations for Fashion Recommendation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d590/1L8qxRsToNq", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093367", "title": "Toward Explainable Fashion Recommendation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093367/1jPbeSpFm8M", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800d308", "title": "Fashion Outfit Complementary Item Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800d308/1m3ohcROz3W", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232532", "title": "Addressing the Cold-Start Problem in Outfit Recommendation Using Visual Preference Modelling", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232532/1o56B2bCTni", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232589", "title": "PAI-BPR: Personalized Outfit Recommendation Scheme with Attribute-wise Interpretability", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232589/1o56zn86hr2", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d926", "title": "Scalable and Explainable Outfit Generation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d926/1yJYvZBFV3W", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2717", "title": "Personalized Outfit Recommendation with Learnable Anchors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2717/1yeHMXS2hX2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08668563", "articleId": "1lgLl62SdTa", "__typename": "AdjacentArticleType" }, "next": { "fno": "08668550", "articleId": "1lgLieNNufu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1IiLdId5MdO", "doi": "10.1109/TKDE.2022.3221949", "abstract": "Multimedia contents are of predominance in the modern Web era. Recent years have witnessed growing research interests in multimedia recommendation, which aims to predict whether a user will interact with an item with multimodal contents. Most previous studies focus on modeling user-item interactions with multimodal features included as side information. However, this scheme is not well-designed for multimedia recommendation. Firstly, only <italic>collaborative</italic> item-item relationships are implicitly modeled through high-order item-user-item co-occurrences. Considering that items are associated with rich contents in multiple modalities, we argue that the latent <italic>semantic</italic> item-item structures underlying these multimodal contents could be beneficial for learning better item representations and assist the recommender models to comprehensively discover candidate items. Secondly, although previous studies consider multiple modalities, their ways of fusing multiple modalities by linear combination or concatenation is insufficient to fully capture content information of items and item relationships. To address these deficiencies, we propose a latent structure <underline>MI</underline>ning with <underline>C</underline>ont<underline>R</underline>astive m<underline>O</underline>dality fusion model, which we term MICRO for brevity. To be specific, we devise a novel modality-aware structure learning module, which learns item-item relationships for each modality. Based on the learned modality-aware latent item relationships, we perform graph convolutions to explicitly inject item affinities into modality-aware item representations. Additionally, we design a novel multimodal contrastive framework to facilitate item-level multimodal fusion by mining both modality-shared and modality-specific information. Finally, the item representations are plugged into existing collaborative filtering methods to make accurate recommendation. Extensive experiments on three real-world datasets demonstrate the superiority of our method over state-of-arts and rationalize the design choice of our work.", "abstracts": [ { "abstractType": "Regular", "content": "Multimedia contents are of predominance in the modern Web era. Recent years have witnessed growing research interests in multimedia recommendation, which aims to predict whether a user will interact with an item with multimodal contents. Most previous studies focus on modeling user-item interactions with multimodal features included as side information. However, this scheme is not well-designed for multimedia recommendation. Firstly, only <italic>collaborative</italic> item-item relationships are implicitly modeled through high-order item-user-item co-occurrences. Considering that items are associated with rich contents in multiple modalities, we argue that the latent <italic>semantic</italic> item-item structures underlying these multimodal contents could be beneficial for learning better item representations and assist the recommender models to comprehensively discover candidate items. Secondly, although previous studies consider multiple modalities, their ways of fusing multiple modalities by linear combination or concatenation is insufficient to fully capture content information of items and item relationships. To address these deficiencies, we propose a latent structure <underline>MI</underline>ning with <underline>C</underline>ont<underline>R</underline>astive m<underline>O</underline>dality fusion model, which we term MICRO for brevity. To be specific, we devise a novel modality-aware structure learning module, which learns item-item relationships for each modality. Based on the learned modality-aware latent item relationships, we perform graph convolutions to explicitly inject item affinities into modality-aware item representations. Additionally, we design a novel multimodal contrastive framework to facilitate item-level multimodal fusion by mining both modality-shared and modality-specific information. Finally, the item representations are plugged into existing collaborative filtering methods to make accurate recommendation. Extensive experiments on three real-world datasets demonstrate the superiority of our method over state-of-arts and rationalize the design choice of our work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multimedia contents are of predominance in the modern Web era. Recent years have witnessed growing research interests in multimedia recommendation, which aims to predict whether a user will interact with an item with multimodal contents. Most previous studies focus on modeling user-item interactions with multimodal features included as side information. However, this scheme is not well-designed for multimedia recommendation. Firstly, only collaborative item-item relationships are implicitly modeled through high-order item-user-item co-occurrences. Considering that items are associated with rich contents in multiple modalities, we argue that the latent semantic item-item structures underlying these multimodal contents could be beneficial for learning better item representations and assist the recommender models to comprehensively discover candidate items. Secondly, although previous studies consider multiple modalities, their ways of fusing multiple modalities by linear combination or concatenation is insufficient to fully capture content information of items and item relationships. To address these deficiencies, we propose a latent structure MIning with ContRastive mOdality fusion model, which we term MICRO for brevity. To be specific, we devise a novel modality-aware structure learning module, which learns item-item relationships for each modality. Based on the learned modality-aware latent item relationships, we perform graph convolutions to explicitly inject item affinities into modality-aware item representations. Additionally, we design a novel multimodal contrastive framework to facilitate item-level multimodal fusion by mining both modality-shared and modality-specific information. Finally, the item representations are plugged into existing collaborative filtering methods to make accurate recommendation. Extensive experiments on three real-world datasets demonstrate the superiority of our method over state-of-arts and rationalize the design choice of our work.", "title": "Latent Structure Mining With Contrastive Modality Fusion for Multimedia Recommendation", "normalizedTitle": "Latent Structure Mining With Contrastive Modality Fusion for Multimedia Recommendation", "fno": "09950351", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Visualization", "Semantics", "Collaboration", "Videos", "Recommender Systems", "Sports", "Pediatrics", "Contrastive Learning", "Graph Structure Learning", "Multimedia Recommendation" ], "authors": [ { "givenName": "Jinghao", "surname": "Zhang", "fullName": "Jinghao Zhang", "affiliation": "Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yanqiao", "surname": "Zhu", "fullName": "Yanqiao Zhu", "affiliation": "Department of Computer Science, University of California, Los Angeles,, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Qiang", "surname": "Liu", "fullName": "Qiang Liu", "affiliation": "Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Mengqi", "surname": "Zhang", "fullName": "Mengqi Zhang", "affiliation": "Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shu", "surname": "Wu", "fullName": "Shu Wu", "affiliation": "Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Liang", "surname": "Wang", "fullName": "Liang Wang", "affiliation": "Center for Research on Intelligent Perception and Computing, Institute of Automation, Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09714053", "title": "Dynamic Graph Neural Networks for Sequential Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/05/09714053/1B0XPB9Fgk0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09933729", "title": "Sylvester Equation Induced Collaborative Representation Learning for Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/09933729/1HVsg5x40E0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09947331", "title": "Aspect-guided Syntax Graph Learning for Explainable Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/09947331/1IiLdisq7yU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10005854", "title": "Contrastive Proxy Kernel Stein Path Alignment for Cross-Domain Cold-Start Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10005854/1JF3QJLStig", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10018538", "title": "Reinforcement Learning based Path Exploration for Sequential Explainable Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10018538/1K0DzwmJ4fm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10053625", "title": "Personalized Latent Structure Learning for Recommendation", "doi": null, "abstractUrl": "/journal/tp/5555/01/10053625/1L1HWDsHp0k", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09195784", "title": "Overcoming Data Sparsity in Group Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/07/09195784/1n7hEZcV1O8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09311623", "title": "DiffNet++: A Neural Influence and Interest Diffusion Network for Social Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/10/09311623/1q0BylPc0Ew", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2021/04/09354572", "title": "Exploring Cross-Modality Utilization in Recommender Systems", "doi": null, "abstractUrl": "/magazine/ic/2021/04/09354572/1reXlxUHtnO", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09429954", "title": "Multi-Modal Discrete Collaborative Filtering for Efficient Cold-Start Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/01/09429954/1txPlt3bBio", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09947331", "articleId": "1IiLdisq7yU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09950330", "articleId": "1IiLdUwEK7m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1JSl2YaejFm", "doi": "10.1109/TKDE.2023.3236370", "abstract": "While recommendation systems have been widely deployed, most existing approaches only capture user preferences in the <italic>macro-view</italic>, i.e., the user&#x0027;s general interest across all kinds of items. However, in real-world scenarios, user preferences could vary with items of different natures, which we call the <italic>micro-view</italic>. Both views are crucial for fully personalized recommendation, where an underpinning macro-view governs a multitude of finer-grained preferences in the micro-view. To model the dual views, in this paper, we propose a novel model called Dual-View Adaptive Recommendation (DVAR). In DVAR, we formulate the micro-view based on item categories, and further integrate it with the macro-view. Moreover, DVAR is designed to be adaptive, which is capable of automatically adapting to the dual-view preferences in response to different input users and item categories. To the best of our knowledge, this is the first attempt to integrate user preferences in macro- and micro- views in an adaptive way, without relying on additional side information such as text reviews. Finally, we conducted extensive quantitative and qualitative evaluations on several real-world datasets. Empirical results not only show that DVAR can significantly outperform other state-of-the-art recommendation systems, but also demonstrate the benefit and interpretability of the dual views.", "abstracts": [ { "abstractType": "Regular", "content": "While recommendation systems have been widely deployed, most existing approaches only capture user preferences in the <italic>macro-view</italic>, i.e., the user&#x0027;s general interest across all kinds of items. However, in real-world scenarios, user preferences could vary with items of different natures, which we call the <italic>micro-view</italic>. Both views are crucial for fully personalized recommendation, where an underpinning macro-view governs a multitude of finer-grained preferences in the micro-view. To model the dual views, in this paper, we propose a novel model called Dual-View Adaptive Recommendation (DVAR). In DVAR, we formulate the micro-view based on item categories, and further integrate it with the macro-view. Moreover, DVAR is designed to be adaptive, which is capable of automatically adapting to the dual-view preferences in response to different input users and item categories. To the best of our knowledge, this is the first attempt to integrate user preferences in macro- and micro- views in an adaptive way, without relying on additional side information such as text reviews. Finally, we conducted extensive quantitative and qualitative evaluations on several real-world datasets. Empirical results not only show that DVAR can significantly outperform other state-of-the-art recommendation systems, but also demonstrate the benefit and interpretability of the dual views.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While recommendation systems have been widely deployed, most existing approaches only capture user preferences in the macro-view, i.e., the user's general interest across all kinds of items. However, in real-world scenarios, user preferences could vary with items of different natures, which we call the micro-view. Both views are crucial for fully personalized recommendation, where an underpinning macro-view governs a multitude of finer-grained preferences in the micro-view. To model the dual views, in this paper, we propose a novel model called Dual-View Adaptive Recommendation (DVAR). In DVAR, we formulate the micro-view based on item categories, and further integrate it with the macro-view. Moreover, DVAR is designed to be adaptive, which is capable of automatically adapting to the dual-view preferences in response to different input users and item categories. To the best of our knowledge, this is the first attempt to integrate user preferences in macro- and micro- views in an adaptive way, without relying on additional side information such as text reviews. Finally, we conducted extensive quantitative and qualitative evaluations on several real-world datasets. Empirical results not only show that DVAR can significantly outperform other state-of-the-art recommendation systems, but also demonstrate the benefit and interpretability of the dual views.", "title": "Dual-View Preference Learning for Adaptive Recommendation", "normalizedTitle": "Dual-View Preference Learning for Adaptive Recommendation", "fno": "10015846", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Adaptation Models", "Recommender Systems", "Data Models", "Motion Pictures", "Electronic Commerce", "Semantics", "Noise Measurement", "Adaptive Models", "Dual View User Preferences", "Personalized Recommendation Systems" ], "authors": [ { "givenName": "Zhongzhou", "surname": "Liu", "fullName": "Zhongzhou Liu", "affiliation": "School of Computing and Information Systems, Singapore Management University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Yuan", "surname": "Fang", "fullName": "Yuan Fang", "affiliation": "School of Computing and Information Systems, Singapore Management University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Min", "surname": "Wu", "fullName": "Min Wu", "affiliation": "Institute for Infocomm Research, A*STAR, Singapore", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/smartcity/2015/1893/0/1893a844", "title": "User Preference Quantity versus Recommendation Performance: A Preliminary Study", "doi": null, "abstractUrl": "/proceedings-article/smartcity/2015/1893a844/12OmNwHz09b", "parentPublication": { "id": "proceedings/smartcity/2015/1893/0", "title": "2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a240", "title": "A Social Curiosity Inspired Recommendation Model to Improve Precision, Coverage and Diversity", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a240/12OmNz5s0Gm", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2016/3578/0/07733805", "title": "E-Commerce Product Recommendation Method Based on Collaborative Filtering Technology", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2016/07733805/12OmNzwHvaT", "parentPublication": { "id": "proceedings/icsgea/2016/3578/0", "title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/09/07470266", "title": "User Preference Learning for Online Social Recommendation", "doi": null, "abstractUrl": "/journal/tk/2016/09/07470266/13rRUIJuxq2", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/09/07468552", "title": "Improving Collaborative Recommendation via User-Item Subgroups", "doi": null, "abstractUrl": "/journal/tk/2016/09/07468552/13rRUwghd9v", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a832", "title": "A Dual-View Knowledge Enhancing Self-Attention Network for Sequential Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a832/1MrFYgrnn4Q", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005951", "title": "Quantifying the Effects of Recommendation Systems", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005951/1hJrYftyPAs", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09253707", "title": "Generating Knowledge-Based Attentive User Representations for Sparse Interaction Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/09/09253707/1oDXxrJlBRe", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/11/09319527", "title": "Modeling Dynamic User Preference via Dictionary Learning for Sequential Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/11/09319527/1qiRCkKQc0g", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaa/2021/3730/0/373000a190", "title": "Multi-preference Social Recommendation of Users Based on Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icaa/2021/373000a190/1zL1FcjfFTi", "parentPublication": { "id": "proceedings/icaa/2021/3730/0", "title": "2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10015860", "articleId": "1JSl2LsP2Qo", "__typename": "AdjacentArticleType" }, "next": { "fno": "10015790", "articleId": "1JSl37AXZCg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1z29dCBUngQ", "title": "Oct.-Dec.", "year": "2021", "issueNum": "04", "idPrefix": "ec", "pubType": "journal", "volume": "9", "label": "Oct.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1aCbIvm1djW", "doi": "10.1109/TETC.2019.2920484", "abstract": "Traveling is part of many people leisure activities and an increasing fraction of the economy comes from the tourism. Given a destination, the information about the different attractions, or <italic>points of interest</italic> (POIs), can be found on many sources. Among these attractions, finding the ones that could be of interest for a specific user, who may have different constraints&#x2014;such as the available time or budget&#x2014;represents a challenging task. Travel recommendation systems deal with this type of problems. Despite the vast literature on this topic, most of the solution does not take into account the impact of the suggestions on the level of crowding of POIs. This paper considers the trip planning problem focusing on user balancing among the different POIs. To this aim, we consider the effects of the previous recommendations, as well as estimates based on historical data, while devising a new recommendation. The problem is formulated as a multi-objective optimization problem, and a recommendation engine has been designed and implemented for exploring the solution space in near real-time, through a distributed version of the Simulated Annealing approach. We test our solution using a real dataset of users visiting the POIs of a touristic city, and we show that we are able to provide high quality recommendations, yet maintaining the attractions not overcrowded.", "abstracts": [ { "abstractType": "Regular", "content": "Traveling is part of many people leisure activities and an increasing fraction of the economy comes from the tourism. Given a destination, the information about the different attractions, or <italic>points of interest</italic> (POIs), can be found on many sources. Among these attractions, finding the ones that could be of interest for a specific user, who may have different constraints&#x2014;such as the available time or budget&#x2014;represents a challenging task. Travel recommendation systems deal with this type of problems. Despite the vast literature on this topic, most of the solution does not take into account the impact of the suggestions on the level of crowding of POIs. This paper considers the trip planning problem focusing on user balancing among the different POIs. To this aim, we consider the effects of the previous recommendations, as well as estimates based on historical data, while devising a new recommendation. The problem is formulated as a multi-objective optimization problem, and a recommendation engine has been designed and implemented for exploring the solution space in near real-time, through a distributed version of the Simulated Annealing approach. We test our solution using a real dataset of users visiting the POIs of a touristic city, and we show that we are able to provide high quality recommendations, yet maintaining the attractions not overcrowded.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traveling is part of many people leisure activities and an increasing fraction of the economy comes from the tourism. Given a destination, the information about the different attractions, or points of interest (POIs), can be found on many sources. Among these attractions, finding the ones that could be of interest for a specific user, who may have different constraints—such as the available time or budget—represents a challenging task. Travel recommendation systems deal with this type of problems. Despite the vast literature on this topic, most of the solution does not take into account the impact of the suggestions on the level of crowding of POIs. This paper considers the trip planning problem focusing on user balancing among the different POIs. To this aim, we consider the effects of the previous recommendations, as well as estimates based on historical data, while devising a new recommendation. The problem is formulated as a multi-objective optimization problem, and a recommendation engine has been designed and implemented for exploring the solution space in near real-time, through a distributed version of the Simulated Annealing approach. We test our solution using a real dataset of users visiting the POIs of a touristic city, and we show that we are able to provide high quality recommendations, yet maintaining the attractions not overcrowded.", "title": "Distributing Tourists among POIs with an Adaptive Trip Recommendation System", "normalizedTitle": "Distributing Tourists among POIs with an Adaptive Trip Recommendation System", "fno": "08731725", "hasPdf": true, "idPrefix": "ec", "keywords": [ "Mobile Computing", "Optimisation", "Recommender Systems", "Simulated Annealing", "Travel Industry", "Distributing Tourists", "Adaptive Trip Recommendation System", "Traveling", "People Leisure Activities", "Increasing Fraction", "Different Attractions", "Specific User", "Available Time", "Budget Represents", "Travel Recommendation Systems", "Vast Literature", "User Balancing", "Different PO Is", "Previous Recommendations", "Multiobjective Optimization Problem", "Recommendation Engine", "Distributed Version", "Touristic City", "High Quality Recommendations", "Urban Areas", "Planning", "Real Time Systems", "Simulated Annealing", "Tourism Industry", "Recommender Systems", "Trip Recommendation", "Tourist Balancing", "Simulated Annealing", "Map Reduce", "Spatial Hadoop" ], "authors": [ { "givenName": "Sara", "surname": "Migliorini", "fullName": "Sara Migliorini", "affiliation": "Computer Science Department, University of Verona, Verona, VR, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Damiano", "surname": "Carra", "fullName": "Damiano Carra", "affiliation": "Computer Science Department, University of Verona, Verona, VR, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Alberto", "surname": "Belussi", "fullName": "Alberto Belussi", "affiliation": "Computer Science Department, University of Verona, Verona, VR, Italy", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2021-10-01 00:00:00", "pubType": "trans", "pages": "1765-1779", "year": "2021", "issn": "2168-6750", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wi/2016/4470/0/4470a626", "title": "A Composite Recommendation System for Planning Tourist Visits", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a626/12OmNqFa5m7", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcat/2016/4617/0/6005a287", "title": "A Hybrid Method of Recommending POIs Based on Context and Personal Preference Confidence", "doi": null, "abstractUrl": "/proceedings-article/bdcat/2016/6005a287/12OmNvDqsHv", "parentPublication": { "id": "proceedings/bdcat/2016/4617/0", "title": "2016 IEEE/ACM 3rd International Conference on Big Data Computing Applications and Technologies (BDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2016/0679/0/07543892", "title": "Scenic Athens: A personalized scenic route planner for tourists", "doi": null, "abstractUrl": "/proceedings-article/iscc/2016/07543892/12OmNwwMf25", "parentPublication": { "id": "proceedings/iscc/2016/0679/0", "title": "2016 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2012/4880/3/4880c097", "title": "Applicability of Demographic Recommender System to Tourist Attractions: A Case Study on Trip Advisor", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2012/4880c097/12OmNx4Q6y6", "parentPublication": { "id": "proceedings/wi-iat/2012/4880/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2014/5705/1/5705a033", "title": "Trip Recommendation with Multiple User Constraints by Integrating Point-of-Interests and Travel Packages", "doi": null, "abstractUrl": "/proceedings-article/mdm/2014/5705a033/12OmNzVXO0g", "parentPublication": { "id": "proceedings/mdm/2014/5705/2", "title": "2014 15th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candar/2016/2655/0/2655a676", "title": "Automatic Generation of Temporal Feature Vectors with Application to Tourism Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/candar/2016/2655a676/12OmNzlUKA7", "parentPublication": { "id": "proceedings/candar/2016/2655/0", "title": "2016 Fourth International Symposium on Computing and Networking (CANDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2018/7232/0/723201a255", "title": "Adaptive Trip Recommendation System: Balancing Travelers among POIs with MapReduce", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2018/723201a255/17D45VsBTUl", "parentPublication": { "id": "proceedings/bigdata-congress/2018/7232/0", "title": "2018 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09947308", "title": "Disentangling Geographical Effect for Point-of-Interest Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/09947308/1IiLcwhrbO0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10040753", "title": "Zone-Enhanced Spatio-Temporal Representation Learning for Urban POI Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10040753/1KB9uhnOKTS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10032113", "title": "DeepAltTrip: Top-k Alternative Itineraries for Trip Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10032113/1KmyikVfdny", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08731758", "articleId": "1aCbIgIxCtG", "__typename": "AdjacentArticleType" }, "next": { "fno": "08732411", "articleId": "1aDQw8eKHRe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxI0KAL", "title": "Dec.", "year": "2013", "issueNum": "02", "idPrefix": "ec", "pubType": "journal", "volume": "1", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwwslAW", "doi": "10.1109/TETC.2013.2273358", "abstract": "Cyber-physical systems (CPSs), featuring a tight combination of computational and physical elements as well as communication networks, attracted intensive attention recently because of their wide applications in various areas. In many applications, especially those aggregating or processing a large amount of data over large spatial regions or long spans of time or both, the workload would be too heavy for any CPS element (or node) to finish on its own. How to enable the CPS nodes to efficiently collaborate with each other to accommodate more CPS services is a very challenging problem and deserves systematic research. In this paper, we present a cross-layer optimization framework for hybrid crowdsourcing in the CPSs to facilitate heavy-duty computation. Particularly, by joint computing resource management, routing, and link scheduling, we formulate an offline finite-queue-aware CPS service maximization problem to crowdsource nodes' computing tasks in a CPS. We then find both lower and upper bounds on the optimal result of the problem. In addition, the lower bound result is proved to be a feasible result that guarantees all queues in the network are finite, i.e., network strong stability. Extensive simulations have been conducted to validate the proposed algorithms' performance.", "abstracts": [ { "abstractType": "Regular", "content": "Cyber-physical systems (CPSs), featuring a tight combination of computational and physical elements as well as communication networks, attracted intensive attention recently because of their wide applications in various areas. In many applications, especially those aggregating or processing a large amount of data over large spatial regions or long spans of time or both, the workload would be too heavy for any CPS element (or node) to finish on its own. How to enable the CPS nodes to efficiently collaborate with each other to accommodate more CPS services is a very challenging problem and deserves systematic research. In this paper, we present a cross-layer optimization framework for hybrid crowdsourcing in the CPSs to facilitate heavy-duty computation. Particularly, by joint computing resource management, routing, and link scheduling, we formulate an offline finite-queue-aware CPS service maximization problem to crowdsource nodes' computing tasks in a CPS. We then find both lower and upper bounds on the optimal result of the problem. In addition, the lower bound result is proved to be a feasible result that guarantees all queues in the network are finite, i.e., network strong stability. Extensive simulations have been conducted to validate the proposed algorithms' performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cyber-physical systems (CPSs), featuring a tight combination of computational and physical elements as well as communication networks, attracted intensive attention recently because of their wide applications in various areas. In many applications, especially those aggregating or processing a large amount of data over large spatial regions or long spans of time or both, the workload would be too heavy for any CPS element (or node) to finish on its own. How to enable the CPS nodes to efficiently collaborate with each other to accommodate more CPS services is a very challenging problem and deserves systematic research. In this paper, we present a cross-layer optimization framework for hybrid crowdsourcing in the CPSs to facilitate heavy-duty computation. Particularly, by joint computing resource management, routing, and link scheduling, we formulate an offline finite-queue-aware CPS service maximization problem to crowdsource nodes' computing tasks in a CPS. We then find both lower and upper bounds on the optimal result of the problem. In addition, the lower bound result is proved to be a feasible result that guarantees all queues in the network are finite, i.e., network strong stability. Extensive simulations have been conducted to validate the proposed algorithms' performance.", "title": "Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization With Strong Stability", "normalizedTitle": "Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization With Strong Stability", "fno": "06558766", "hasPdf": true, "idPrefix": "ec", "keywords": [ "Crowdsourcing", "Base Stations", "Resource Management", "Processor Scheduling", "Interference", "Heuristic Algorithms", "Computational Modeling", "Stochastic Systems", "Network Strong Stability", "Cyber Physical Systems", "Crowdsourcing", "Stochastic Optimization" ], "authors": [ { "givenName": "Ming", "surname": "Li", "fullName": "Ming Li", "affiliation": "Department of Electrical and Computer Engineering, Mississippi State University, Mississippi State, MS, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Pan", "surname": "Li", "fullName": "Pan Li", "affiliation": "Department of Electrical and Computer Engineering, Mississippi State University, Mississippi State, MS, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "02", "pubDate": "2013-07-01 00:00:00", "pubType": "trans", "pages": "218-231", "year": "2013", "issn": "2168-6750", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdcsw/2009/3660/0/3660a044", "title": "Spatio-Temporal Event Model for Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2009/3660a044/12OmNyY4rnY", "parentPublication": { "id": "proceedings/icdcsw/2009/3660/0", "title": "2009 29th IEEE International Conference on Distributed Computing Systems Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/mc/2017/04/07959602", "title": "DISASTER: Dedicated Intelligent Security Attacks on Sensor-Triggered Emergency Responses", "doi": null, "abstractUrl": "/journal/mc/2017/04/07959602/13rRUwInvbv", "parentPublication": { "id": "trans/mc", "title": "IEEE Transactions on Multi-Scale Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2020/04/07843655", "title": "Control of Large-Scale Cyber-Physical Systems with Agents Having Various Dynamics", "doi": null, "abstractUrl": "/journal/bd/2020/04/07843655/13rRUxASu5H", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2019/9223/0/08685498", "title": "Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry", "doi": null, "abstractUrl": "/proceedings-article/icnc/2019/08685498/19RRT6frnNK", "parentPublication": { "id": "proceedings/icnc/2019/9223/0", "title": "2019 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a208", "title": "Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a208/1ehBFbQcpqg", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2019/3421/0/342100a121", "title": "Exploring Virtual Reality as an Integrated Development Environment for Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/seaa/2019/342100a121/1f8MH3RnhjG", "parentPublication": { "id": "proceedings/seaa/2019/3421/0", "title": "2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2019/5506/0/09091401", "title": "An Inter-migration Scheduling Algorithm to Support Remote Telemetry for Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2019/09091401/1jPb8Yr2Inu", "parentPublication": { "id": "proceedings/smartcloud/2019/5506/0", "title": "2019 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccps/2020/5501/0/09096007", "title": "Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks", "doi": null, "abstractUrl": "/proceedings-article/iccps/2020/09096007/1jXvu6ktCo0", "parentPublication": { "id": "proceedings/iccps/2020/5501/0", "title": "2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ds-rt/2020/7343/0/09213663", "title": "Pitfalls and Remedies in Modeling and Simulation of Cyber Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/ds-rt/2020/09213663/1nHRNIpZrYA", "parentPublication": { "id": "proceedings/ds-rt/2020/7343/0", "title": "2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300a874", "title": "Uncertainty Modeling and Quantitative Evaluation of Cyber-physical Systems", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300a874/1wLcGA6A7zG", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06685858", "articleId": "13rRUxCitDB", "__typename": "AdjacentArticleType" }, "next": { "fno": "06603288", "articleId": "13rRUxBa5qM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgzL", "name": "tec201302-06558766s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/tec201302-06558766s1.zip", "extension": "zip", "size": "64.9 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNx1qV7z", "title": "March-April", "year": "2012", "issueNum": "02", "idPrefix": "cg", "pubType": "magazine", "volume": "32", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxbCblc", "doi": "10.1109/MCG.2011.110", "abstract": "Researchers have introduced many bidirectional reflectance distribution function (BRDF) models for computer graphics. Some are purely appearance-based heuristics, whereas others are physically plausible. To achieve plausibility, researchers have measured the reflectance of a range of material surfaces and then fit the BRDF models to these measurements. The proposed systematic approach verifies predictions of basic analytical BRDF models on the basis of measurements of real-world samples. It employs ellipsometry to verify both the actual polarizing effect and the overall reflectance behavior of metallic surfaces.", "abstracts": [ { "abstractType": "Regular", "content": "Researchers have introduced many bidirectional reflectance distribution function (BRDF) models for computer graphics. Some are purely appearance-based heuristics, whereas others are physically plausible. To achieve plausibility, researchers have measured the reflectance of a range of material surfaces and then fit the BRDF models to these measurements. The proposed systematic approach verifies predictions of basic analytical BRDF models on the basis of measurements of real-world samples. It employs ellipsometry to verify both the actual polarizing effect and the overall reflectance behavior of metallic surfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Researchers have introduced many bidirectional reflectance distribution function (BRDF) models for computer graphics. Some are purely appearance-based heuristics, whereas others are physically plausible. To achieve plausibility, researchers have measured the reflectance of a range of material surfaces and then fit the BRDF models to these measurements. The proposed systematic approach verifies predictions of basic analytical BRDF models on the basis of measurements of real-world samples. It employs ellipsometry to verify both the actual polarizing effect and the overall reflectance behavior of metallic surfaces.", "title": "Modeling and Verifying the Polarizing Reflectance of Real-World Metallic Surfaces", "normalizedTitle": "Modeling and Verifying the Polarizing Reflectance of Real-World Metallic Surfaces", "fno": "mcg2012020024", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Computational Modeling", "Mathematical Model", "Ellipsometry", "Wavelength Measurement", "Refractive Index", "Bidirectional Control", "Analytical Models", "Computer Graphics", "Bidirectional Reflectance Distribution Function", "BRDF", "Ellipsometer", "Ellipsometry", "Metallic Surfaces", "Reflectance" ], "authors": [ { "givenName": "Kai", "surname": "Berger", "fullName": "Kai Berger", "affiliation": "Technische Universität Braunschweig", "__typename": "ArticleAuthorType" }, { "givenName": "Andrea", "surname": "Weidlich", "fullName": "Andrea Weidlich", "affiliation": "Realtime Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Alexander", "surname": "Wilkie", "fullName": "Alexander Wilkie", "affiliation": "Charles University", "__typename": "ArticleAuthorType" }, { "givenName": "Marcus", "surname": "Magnor", "fullName": "Marcus Magnor", "affiliation": "Technische Universität Braunschweig", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2012-03-01 00:00:00", "pubType": "mags", "pages": "24-33", "year": "2012", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/pg/2002/1784/0/17840483", "title": "Single-Image Reflectance Estimation for Relighting by Iterative Soft Grouping", "doi": null, "abstractUrl": "/proceedings-article/pg/2002/17840483/12OmNAolGMG", "parentPublication": { "id": "proceedings/pg/2002/1784/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204321", "title": "Transparent watermarking using bidirectional imaging", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204321/12OmNApcuF1", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206498", "title": "A unified model of specular and diffuse reflectance for rough, glossy surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206498/12OmNvAiShy", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/1/252110543", "title": "Reflectance from Surfaces with Layers of Variable Roughness", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252110543/12OmNvCRgjv", "parentPublication": { "id": "proceedings/icpr/2006/2521/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78220151", "title": "Reflectance and Texture of Real-World Surfaces Authors:", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78220151/12OmNyQ7FDj", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dpvt/2004/2223/0/22230010", "title": "Helmholtz Stereopsis on Rough and Strongly Textured Surfaces", "doi": null, "abstractUrl": "/proceedings-article/3dpvt/2004/22230010/12OmNzahccN", "parentPublication": { "id": "proceedings/3dpvt/2004/2223/0", "title": "3D Data Processing Visualization and Transmission, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2007/1630/0/04408881", "title": "Toward Reconstructing Surfaces With Arbitrary Isotropic Reflectance : A Stratified Photometric Stereo Approach", "doi": null, "abstractUrl": "/proceedings-article/iccv/2007/04408881/12OmNzcPAFm", "parentPublication": { "id": "proceedings/iccv/2007/1630/0", "title": "2007 11th IEEE International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1993/3880/0/00341163", "title": "Diffuse reflectance from rough surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1993/00341163/12OmNzwpU3S", "parentPublication": { "id": "proceedings/cvpr/1993/3880/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/05/v0519", "title": "Decorating Surfaces with Bidirectional Texture Functions", "doi": null, "abstractUrl": "/journal/tg/2005/05/v0519/13rRUwbJD4E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1997/04/v0329", "title": "A Wavelet Representation of Reflectance Functions", "doi": null, "abstractUrl": "/journal/tg/1997/04/v0329/13rRUxBJhmG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2012020022", "articleId": "13rRUxZ0o40", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2012020034", "articleId": "13rRUwgyOfn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IRhD73QTpC", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1AII6wed0Bi", "doi": "10.1109/TPAMI.2022.3148308", "abstract": "Partial point cloud registration aims to transform partial scans into a common coordinate system. It is an important preprocessing step to generate complete 3D shapes. Although previous registration methods have made great progress in recent decades, traditional registration methods, such as Iterative Closest Point (ICP) and its variants, all these methods highly depend on the sufficient overlaps between two point clouds, because they cannot distinguish outlier correspondences. Note that the overlap between point clouds could always be small, which limits the application of these methods. To tackle this problem, we present a StrucTure-based OveRlap Matching (STORM) method for partial point cloud registration. In our method, an overlap prediction module with differentiable sampling is designed to detect points in overlap utilizing structure information, and facilitates exact partial correspondence generation, which is based on discriminative pointwise feature similarity. The pointwise features which contain effective structural information are extracted by graph-based methods. Experimental results and comparison with state-of-the-art methods demonstrate that STORM can achieve better performance. Moreover, most registration methods perform worse when the overlap ratio decreases, while STORM can still achieve satisfactory performance when the overlap ratio is small.", "abstracts": [ { "abstractType": "Regular", "content": "Partial point cloud registration aims to transform partial scans into a common coordinate system. It is an important preprocessing step to generate complete 3D shapes. Although previous registration methods have made great progress in recent decades, traditional registration methods, such as Iterative Closest Point (ICP) and its variants, all these methods highly depend on the sufficient overlaps between two point clouds, because they cannot distinguish outlier correspondences. Note that the overlap between point clouds could always be small, which limits the application of these methods. To tackle this problem, we present a StrucTure-based OveRlap Matching (STORM) method for partial point cloud registration. In our method, an overlap prediction module with differentiable sampling is designed to detect points in overlap utilizing structure information, and facilitates exact partial correspondence generation, which is based on discriminative pointwise feature similarity. The pointwise features which contain effective structural information are extracted by graph-based methods. Experimental results and comparison with state-of-the-art methods demonstrate that STORM can achieve better performance. Moreover, most registration methods perform worse when the overlap ratio decreases, while STORM can still achieve satisfactory performance when the overlap ratio is small.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Partial point cloud registration aims to transform partial scans into a common coordinate system. It is an important preprocessing step to generate complete 3D shapes. Although previous registration methods have made great progress in recent decades, traditional registration methods, such as Iterative Closest Point (ICP) and its variants, all these methods highly depend on the sufficient overlaps between two point clouds, because they cannot distinguish outlier correspondences. Note that the overlap between point clouds could always be small, which limits the application of these methods. To tackle this problem, we present a StrucTure-based OveRlap Matching (STORM) method for partial point cloud registration. In our method, an overlap prediction module with differentiable sampling is designed to detect points in overlap utilizing structure information, and facilitates exact partial correspondence generation, which is based on discriminative pointwise feature similarity. The pointwise features which contain effective structural information are extracted by graph-based methods. Experimental results and comparison with state-of-the-art methods demonstrate that STORM can achieve better performance. Moreover, most registration methods perform worse when the overlap ratio decreases, while STORM can still achieve satisfactory performance when the overlap ratio is small.", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "normalizedTitle": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "fno": "09705149", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Graph Theory", "Image Registration", "Iterative Methods", "Exact Partial Correspondence Generation", "Graph Based Methods", "Iterative Closest Point", "Overlap Ratio", "Overlap Utilizing Structure Information", "Partial Point Cloud Registration", "Point Clouds", "Previous Registration Methods", "STORM", "Struc Ture Based Ove Rlap Matching Method", "Traditional Registration Methods", "Point Cloud Compression", "Feature Extraction", "Storms", "Three Dimensional Displays", "Prediction Algorithms", "Shape", "Pipelines", "Point Cloud Registration", "Partial Registration", "Overlap Matching", "Point Cloud Sampling" ], "authors": [ { "givenName": "Yujie", "surname": "Wang", "fullName": "Yujie Wang", "affiliation": "School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chenggang", "surname": "Yan", "fullName": "Chenggang Yan", "affiliation": "School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yutong", "surname": "Feng", "fullName": "Yutong Feng", "affiliation": "BNRist, THUIBCS, BLBCI, KLISS, School of Software, Tsinghua Universitty, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shaoyi", "surname": "Du", "fullName": "Shaoyi Du", "affiliation": "Institute of Artificial Intelligence and Robotics, Xi'an Jiaotong University, Xi'an, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qionghai", "surname": "Dai", "fullName": "Qionghai Dai", "affiliation": "BNRist, THUIBCS, BLBCI, Tsinghua Universitty, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yue", "surname": "Gao", "fullName": "Yue Gao", "affiliation": "BNRist, THUIBCS, BLBCI, KLISS, School of Software, Tsinghua Universitty, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1135-1149", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dv/2018/8425/0/842500a747", "title": "EOE: Expected Overlap Estimation over Unstructured Point Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a747/17D45VN31gv", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f663", "title": "DeepPRO: Deep Partial Point Cloud Registration of Objects", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f663/1BmGoTRdyCY", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d112", "title": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d112/1BmH817i3jq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09729524", "title": "Unsupervised Category-Specific Partial Point Set Registration via Joint Shape Completion and Registration", "doi": null, "abstractUrl": "/journal/tg/5555/01/09729524/1Bya8dlokw0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/insai/2021/0859/0/085900a136", "title": "Registration of Point Clouds: A Survey", "doi": null, "abstractUrl": "/proceedings-article/insai/2021/085900a136/1CHwMbhCNQA", "parentPublication": { "id": "proceedings/insai/2021/0859/0", "title": "2021 International Conference on Networking Systems of AI (INSAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09860002", "title": "Partial-to-Partial Point Cloud Registration Based on Multi-Level Semantic-Structural Cognition", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09860002/1G9EKd6az6g", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1133", "title": "Geometric Transformer for Fast and Robust Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e500", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09445585", "title": "Consistent Two-Flow Network for Tele-Registration of Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09445585/1u8lzpSvnxu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09705105", "articleId": "1AII66PG45q", "__typename": "AdjacentArticleType" }, "next": { "fno": "09720972", "articleId": "1BfU5oJtVNm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1BN1Ujkoysg", "doi": "10.1109/TVCG.2022.3160005", "abstract": "In this work, we present a novel method called WSDesc to learn 3D local descriptors in a weakly supervised manner for robust point cloud registration. Our work builds upon recent 3D CNN-based descriptor extractors, which leverage a voxel-based representation to parameterize local geometry of 3D points. Instead of using a predefined fixed-size local support in voxelization, we propose to learn the optimal support in a data-driven manner. To this end, we design a novel differentiable voxelization layer that can back-propagate the gradient to the support size optimization. To train the extracted descriptors, we propose a novel registration loss based on the deviation from rigidity of 3D transformations, and the loss is weakly supervised by the prior knowledge that the input point clouds have partial overlap, without requiring ground-truth alignment information. Through extensive experiments, we show that our learned descriptors yield superior performance on existing geometric registration benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we present a novel method called WSDesc to learn 3D local descriptors in a weakly supervised manner for robust point cloud registration. Our work builds upon recent 3D CNN-based descriptor extractors, which leverage a voxel-based representation to parameterize local geometry of 3D points. Instead of using a predefined fixed-size local support in voxelization, we propose to learn the optimal support in a data-driven manner. To this end, we design a novel differentiable voxelization layer that can back-propagate the gradient to the support size optimization. To train the extracted descriptors, we propose a novel registration loss based on the deviation from rigidity of 3D transformations, and the loss is weakly supervised by the prior knowledge that the input point clouds have partial overlap, without requiring ground-truth alignment information. Through extensive experiments, we show that our learned descriptors yield superior performance on existing geometric registration benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we present a novel method called WSDesc to learn 3D local descriptors in a weakly supervised manner for robust point cloud registration. Our work builds upon recent 3D CNN-based descriptor extractors, which leverage a voxel-based representation to parameterize local geometry of 3D points. Instead of using a predefined fixed-size local support in voxelization, we propose to learn the optimal support in a data-driven manner. To this end, we design a novel differentiable voxelization layer that can back-propagate the gradient to the support size optimization. To train the extracted descriptors, we propose a novel registration loss based on the deviation from rigidity of 3D transformations, and the loss is weakly supervised by the prior knowledge that the input point clouds have partial overlap, without requiring ground-truth alignment information. Through extensive experiments, we show that our learned descriptors yield superior performance on existing geometric registration benchmarks.", "title": "WSDesc: Weakly Supervised 3D Local Descriptor Learning for Point Cloud Registration", "normalizedTitle": "WSDesc: Weakly Supervised 3D Local Descriptor Learning for Point Cloud Registration", "fno": "09736452", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Three Dimensional Displays", "Point Cloud Compression", "Training", "Geometry", "Feature Extraction", "Rigidity", "Data Mining", "Point Cloud", "3 D Local Descriptor", "Geometric Registration", "Differentiable Voxelization", "3 D CNN", "Weak Supervision" ], "authors": [ { "givenName": "Lei", "surname": "Li", "fullName": "Lei Li", "affiliation": "LIX, Ecole Polytechnique, 52830 Palaiseau, Essonne, France, 91128", "__typename": "ArticleAuthorType" }, { "givenName": "Hongbo", "surname": "Fu", "fullName": "Hongbo Fu", "affiliation": "School of Creative Media, City University of Hong Kong, 53025 Kowloon, Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Maks", "surname": "Ovsjanikov", "fullName": "Maks Ovsjanikov", "affiliation": "Computer Science, Ecole Polytechnique, Paris, Ile de France, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-03-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08546214", "title": "Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546214/17D45WcjjPY", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5994", "title": "HRegNet: A Hierarchical Network for Large-scale Outdoor LiDAR Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5994/1BmFeO4ChZC", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09775606", "title": "Learning General and Distinctive 3D Local Deep Descriptors for Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/03/09775606/1Dqh2yvQWBi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4910", "title": "HybridCR: Weakly-Supervised 3D Point Cloud Semantic Segmentation via Hybrid Contrastive Regularization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4910/1H1k2YPLPTG", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1830", "title": "Weakly Supervised Segmentation on Outdoor 4D point clouds with Temporal Matching and Spatial Graph Propagation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1830/1H1kfGGzKtW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10044259", "title": "RoReg: Pairwise Point Cloud Registration with Oriented Descriptors and Local Rotations", "doi": null, "abstractUrl": "/journal/tp/5555/01/10044259/1KL6SJ4jOzS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/9.346E265", "title": "Weakly-supervised Point Cloud Instance Segmentation with Geometric Priors", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/9.346E265/1KxVbnA0Z5S", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a582", "title": "GaIA: Graphical Information Gain based Attention Network for Weakly Supervised Point Cloud Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a582/1KxVfZiYZOg", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900l1748", "title": "SpinNet: Learning a General Surface Descriptor for 3D Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900l1748/1yeMfLYgNS8", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b351", "title": "3D Point Cloud Registration with Multi-Scale Architecture and Unsupervised Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b351/1zWEfYNkrg4", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09735308", "articleId": "1BLn9j3xNQs", "__typename": "AdjacentArticleType" }, "next": { "fno": "09736631", "articleId": "1BN1UtLinTi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1BQie2k2zJu", "name": "ttg555501-09736452s1-supp1-3160005.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-09736452s1-supp1-3160005.pdf", "extension": "pdf", "size": "3.59 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1sP18ke9Y64", "title": "May", "year": "2021", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1saZrRoiA3C", "doi": "10.1109/TVCG.2021.3067761", "abstract": "Learning an advanced skill in sports requires a huge amount of practice and players also have to overcome both physical difficulties and the dullness of repetitive training. Returning a fast spin shot in table tennis could be taken as an example, as athletes need to judge the spin type and decide the racket pose within a second, which is difficult for beginners. Therefore, in this paper, we show how to design an intuitive training system to acquire this specific skill using different cues in Virtual Reality (VR). Using VR, we can easily provide visual information, attach haptic devices, and distort the speed of time, however, it is difficult to decide which types of information could benefit the training. In an initial study, by comparing real world training with VR training, we showed the effect of VR training and obtained some insights about augmentation for training spin shots. The training system was then improved by adding three new conditions using different visualizations and temporal distortions, as well as a haptic racket for creating realistic feedback. Finally, we performed a detailed experiment, which suggest a significant improvement of skill for each condition compared to the baseline, while a qualitative evaluation indicates that both users' motivation and their understanding of spin are increased by using our system.", "abstracts": [ { "abstractType": "Regular", "content": "Learning an advanced skill in sports requires a huge amount of practice and players also have to overcome both physical difficulties and the dullness of repetitive training. Returning a fast spin shot in table tennis could be taken as an example, as athletes need to judge the spin type and decide the racket pose within a second, which is difficult for beginners. Therefore, in this paper, we show how to design an intuitive training system to acquire this specific skill using different cues in Virtual Reality (VR). Using VR, we can easily provide visual information, attach haptic devices, and distort the speed of time, however, it is difficult to decide which types of information could benefit the training. In an initial study, by comparing real world training with VR training, we showed the effect of VR training and obtained some insights about augmentation for training spin shots. The training system was then improved by adding three new conditions using different visualizations and temporal distortions, as well as a haptic racket for creating realistic feedback. Finally, we performed a detailed experiment, which suggest a significant improvement of skill for each condition compared to the baseline, while a qualitative evaluation indicates that both users' motivation and their understanding of spin are increased by using our system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Learning an advanced skill in sports requires a huge amount of practice and players also have to overcome both physical difficulties and the dullness of repetitive training. Returning a fast spin shot in table tennis could be taken as an example, as athletes need to judge the spin type and decide the racket pose within a second, which is difficult for beginners. Therefore, in this paper, we show how to design an intuitive training system to acquire this specific skill using different cues in Virtual Reality (VR). Using VR, we can easily provide visual information, attach haptic devices, and distort the speed of time, however, it is difficult to decide which types of information could benefit the training. In an initial study, by comparing real world training with VR training, we showed the effect of VR training and obtained some insights about augmentation for training spin shots. The training system was then improved by adding three new conditions using different visualizations and temporal distortions, as well as a haptic racket for creating realistic feedback. Finally, we performed a detailed experiment, which suggest a significant improvement of skill for each condition compared to the baseline, while a qualitative evaluation indicates that both users' motivation and their understanding of spin are increased by using our system.", "title": "SPinPong - Virtual Reality Table Tennis Skill Acquisition using Visual, Haptic and Temporal Cues", "normalizedTitle": "SPinPong - Virtual Reality Table Tennis Skill Acquisition using Visual, Haptic and Temporal Cues", "fno": "09382892", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computer Based Training", "Data Visualisation", "Haptic Interfaces", "Sport", "Virtual Reality", "Virtual Reality Table Tennis Skill Acquisition", "Advanced Skill", "Physical Difficulties", "Repetitive Training", "Fast Spin Shot", "Spin Type", "Intuitive Training System", "Specific Skill", "Different Cues", "Visual Information", "Haptic Devices", "World Training", "VR Training", "Training Spin Shots", "Different Visualizations", "Temporal Distortions", "Haptic Racket", "Training", "Sports", "Visualization", "Haptic Interfaces", "Distortion", "Trajectory", "Robots", "Table Tennis Training", "Virtual Visualization", "Haptic Feedback", "Spin Shot", "Temporal Distortion", "Skill Acquisition", "VR Sports" ], "authors": [ { "givenName": "Erwin", "surname": "Wu", "fullName": "Erwin Wu", "affiliation": "Tokyo Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Mitski", "surname": "Piekenbrock", "fullName": "Mitski Piekenbrock", "affiliation": "Tokyo Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Takuto", "surname": "Nakumura", "fullName": "Takuto Nakumura", "affiliation": "Tokyo Institute of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Hideki", "surname": "Koike", "fullName": "Hideki Koike", "affiliation": "Tokyo Institute of Technology", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2021-05-01 00:00:00", "pubType": "trans", "pages": "2566-2576", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/whc/2007/2738/0/04145145", "title": "Haptic Feedback Enhances Force Skill Learning", "doi": null, "abstractUrl": "/proceedings-article/whc/2007/04145145/12OmNrNh0Ci", "parentPublication": { "id": "proceedings/whc/2007/2738/0", "title": "2007 2nd Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environments and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479929", "title": "Validating the Performance of Haptic Motor Skill Training", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479929/12OmNz5apNY", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/02/06701132", "title": "Motor Learning Perspectives on Haptic Training for the Upper Extremities", "doi": null, "abstractUrl": "/journal/th/2014/02/06701132/13rRUNvyaf8", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2015/02/06967807", "title": "The Effect of Haptic Guidance on Learning a Hybrid Rhythmic-Discrete Motor Task", "doi": null, "abstractUrl": "/journal/th/2015/02/06967807/13rRUxcKzVq", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/03/07542122", "title": "Impact of Using a Robot Patient for Nursing Skill Training in Patient Transfer", "doi": null, "abstractUrl": "/journal/lt/2017/03/07542122/13rRUyY2919", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2019/9245/0/924500a189", "title": "Markerless Racket Pose Detection and Stroke Classification Based on Stereo Vision for Table Tennis Robots", "doi": null, "abstractUrl": "/proceedings-article/irc/2019/924500a189/18M7ddCK7o4", "parentPublication": { "id": "proceedings/irc/2019/9245/0", "title": "2019 Third IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a804", "title": "Assist Home Training Table Tennis Skill Acquisition via Immersive Learning and Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a804/1CJd0JOwO9a", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a845", "title": "Virtual Reality Sonification Training System Can Improve a Novice&#x0027;s Forehand Return of Serve in Tennis", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a845/1J7Wlv8mvKM", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a275", "title": "Table Tennis Skill Learning in VR with Step by Step Guides using Forehand Drive as a Case Study", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a275/1KmFgOCBg1a", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09446582", "title": "Performance Improvement and Skill Transfer in Table Tennis Through Training in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09446582/1u8lz4qWghi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09384477", "articleId": "1scDuWhBPY4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09389490", "articleId": "1smZT5W55V6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GF6i7X5DpK", "doi": "10.1109/TKDE.2022.3206441", "abstract": "Indexing is an effective way to support efficient query processing in large databases. Recently the concept of <italic>learned index</italic>, which replaces or complements traditional index structures with machine learning models, has been actively explored to reduce storage and search costs. However, accurate and efficient similarity query processing in high-dimensional metric spaces remains to be an open challenge. In this paper, we propose a novel indexing approach called LIMS that uses data clustering, pivot-based data transformation techniques and learned indexes to support efficient similarity query processing in metric spaces. In LIMS, the underlying data is partitioned into clusters such that each cluster follows a relatively uniform data distribution. Data redistribution is achieved by utilizing a small number of pivots for each cluster. Similar data are mapped into compact regions and the mapped values are totally ordinal. Machine learning models are developed to approximate the position of each data record on disk. Efficient algorithms are designed for processing range queries and nearest neighbor queries based on LIMS, and for index maintenance with dynamic updates. Extensive experiments on real-world and synthetic datasets demonstrate the superiority of LIMS compared with traditional indexes and state-of-the-art learned indexes.", "abstracts": [ { "abstractType": "Regular", "content": "Indexing is an effective way to support efficient query processing in large databases. Recently the concept of <italic>learned index</italic>, which replaces or complements traditional index structures with machine learning models, has been actively explored to reduce storage and search costs. However, accurate and efficient similarity query processing in high-dimensional metric spaces remains to be an open challenge. In this paper, we propose a novel indexing approach called LIMS that uses data clustering, pivot-based data transformation techniques and learned indexes to support efficient similarity query processing in metric spaces. In LIMS, the underlying data is partitioned into clusters such that each cluster follows a relatively uniform data distribution. Data redistribution is achieved by utilizing a small number of pivots for each cluster. Similar data are mapped into compact regions and the mapped values are totally ordinal. Machine learning models are developed to approximate the position of each data record on disk. Efficient algorithms are designed for processing range queries and nearest neighbor queries based on LIMS, and for index maintenance with dynamic updates. Extensive experiments on real-world and synthetic datasets demonstrate the superiority of LIMS compared with traditional indexes and state-of-the-art learned indexes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Indexing is an effective way to support efficient query processing in large databases. Recently the concept of learned index, which replaces or complements traditional index structures with machine learning models, has been actively explored to reduce storage and search costs. However, accurate and efficient similarity query processing in high-dimensional metric spaces remains to be an open challenge. In this paper, we propose a novel indexing approach called LIMS that uses data clustering, pivot-based data transformation techniques and learned indexes to support efficient similarity query processing in metric spaces. In LIMS, the underlying data is partitioned into clusters such that each cluster follows a relatively uniform data distribution. Data redistribution is achieved by utilizing a small number of pivots for each cluster. Similar data are mapped into compact regions and the mapped values are totally ordinal. Machine learning models are developed to approximate the position of each data record on disk. Efficient algorithms are designed for processing range queries and nearest neighbor queries based on LIMS, and for index maintenance with dynamic updates. Extensive experiments on real-world and synthetic datasets demonstrate the superiority of LIMS compared with traditional indexes and state-of-the-art learned indexes.", "title": "A Learned Index for Exact Similarity Search in Metric Spaces", "normalizedTitle": "A Learned Index for Exact Similarity Search in Metric Spaces", "fno": "09891778", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Indexes", "Measurement", "Extraterrestrial Measurements", "Machine Learning", "Query Processing", "Indexing", "Data Models", "Learned Index", "Multi Dimension", "Metric Space" ], "authors": [ { "givenName": "Yao", "surname": "Tian", "fullName": "Yao Tian", "affiliation": "Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Tingyun", "surname": "Yan", "fullName": "Tingyun Yan", "affiliation": "Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xi", "surname": "Zhao", "fullName": "Xi Zhao", "affiliation": "Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Kai", "surname": "Huang", "fullName": "Kai Huang", "affiliation": "Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaofang", "surname": "Zhou", "fullName": "Xiaofang Zhou", "affiliation": "Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icde/2016/2020/0/07498318", "title": "Indexing multi-metric data", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498318/12OmNvDI3PU", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2016/8796/0/07425915", "title": "An eigenvalue-based pivot selection strategy for improving search efficiency in metric spaces", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2016/07425915/12OmNx4gUlZ", "parentPublication": { "id": "proceedings/bigcomp/2016/8796/0", "title": "2016 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113317", "title": "Efficient metric indexing for similarity search", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113317/12OmNx6g6n9", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2018/6306/0/630601a078", "title": "Towards Artificial Priority Queues for Similarity Query Execution", "doi": null, "abstractUrl": "/proceedings-article/icdew/2018/630601a078/12OmNxG1yJh", "parentPublication": { "id": "proceedings/icdew/2018/6306/0", "title": "2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2014/3845/0/3845a215", "title": "Speed Up Distance-Based Similarity Query Using Multiple Threads", "doi": null, "abstractUrl": "/proceedings-article/paap/2014/3845a215/12OmNyFCvTf", "parentPublication": { "id": "proceedings/paap/2014/3845/0", "title": "2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/03/07349200", "title": "Efficient Metric Indexing for Similarity Search and Similarity Joins", "doi": null, "abstractUrl": "/journal/tk/2017/03/07349200/13rRUIM2VHy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2023/02/09816118", "title": "Efficient Learned Spatial Index With Interpolation Function Based Learned Model", "doi": null, "abstractUrl": "/journal/bd/2023/02/09816118/1EMV3AejsY0", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2022/8104/0/810400a117", "title": "Learned Index on GPU", "doi": null, "abstractUrl": "/proceedings-article/icdew/2022/810400a117/1EQj5tVI1b2", "parentPublication": { "id": "proceedings/icdew/2022/8104/0", "title": "2022 IEEE 38th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2018/0437/0/043700a472", "title": "Standard SQL Approaches for Similarity Searching", "doi": null, "abstractUrl": "/proceedings-article/clei/2018/043700a472/1cdOZZ3hxG8", "parentPublication": { "id": "proceedings/clei/2018/0437/0", "title": "2018 XLIV Latin American Computer Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2020/8954/0/895400a355", "title": "A Study of Learned KD Tree Based on Learned Index", "doi": null, "abstractUrl": "/proceedings-article/nana/2020/895400a355/1rlF990f4fC", "parentPublication": { "id": "proceedings/nana/2020/8954/0", "title": "2020 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09891783", "articleId": "1GF6hYEiJ6E", "__typename": "AdjacentArticleType" }, "next": { "fno": "09891823", "articleId": "1GF6ih2fNtK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNrFBPWx", "title": "September", "year": "2011", "issueNum": "09", "idPrefix": "tg", "pubType": "journal", "volume": "17", "label": "September", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxbTMyN", "doi": "10.1109/TVCG.2010.228", "abstract": "The Unified Early Z-Test (U-EZT) is proposed to examine the visibility of pixels during tile-based rasterization in a mobile 3D graphics processor. U-EZT combines the advantages of the Z-max and Z-min EZT algorithms: the Z-max algorithm is improved by the independently updatable z-max tiles and the use of mask bits; and the Z-min algorithm is improved by reusing the mask bits from the z-max test to update the z-min tiles after tile rasterizing. As a result, storage requirements are reduced to 3 bits per pixel, and simulations suggest that U-EZT requires 20 percent to 57 percent less memory bandwidth than previous EZT algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "The Unified Early Z-Test (U-EZT) is proposed to examine the visibility of pixels during tile-based rasterization in a mobile 3D graphics processor. U-EZT combines the advantages of the Z-max and Z-min EZT algorithms: the Z-max algorithm is improved by the independently updatable z-max tiles and the use of mask bits; and the Z-min algorithm is improved by reusing the mask bits from the z-max test to update the z-min tiles after tile rasterizing. As a result, storage requirements are reduced to 3 bits per pixel, and simulations suggest that U-EZT requires 20 percent to 57 percent less memory bandwidth than previous EZT algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Unified Early Z-Test (U-EZT) is proposed to examine the visibility of pixels during tile-based rasterization in a mobile 3D graphics processor. U-EZT combines the advantages of the Z-max and Z-min EZT algorithms: the Z-max algorithm is improved by the independently updatable z-max tiles and the use of mask bits; and the Z-min algorithm is improved by reusing the mask bits from the z-max test to update the z-min tiles after tile rasterizing. As a result, storage requirements are reduced to 3 bits per pixel, and simulations suggest that U-EZT requires 20 percent to 57 percent less memory bandwidth than previous EZT algorithms.", "title": "A Memory-Efficient Unified Early Z-Test", "normalizedTitle": "A Memory-Efficient Unified Early Z-Test", "fno": "ttg2011091286", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Classification Algorithms", "Memory Management", "System On A Chip", "Rendering Computer Graphics", "Z Test", "Computer Graphics", "Graphics Processors", "Visible Line Surface Algorithms" ], "authors": [ { "givenName": null, "surname": "Hong-Yun Kim", "fullName": "Hong-Yun Kim", "affiliation": "Dept. of Electr. & Comput. Sci. Eng., Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Chang-Hyo Yu", "fullName": "Chang-Hyo Yu", "affiliation": "Syst. LSI Div., Samsung Electron. Co. Ltd., Yongin, South Korea", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Lee-Sup Kim", "fullName": "Lee-Sup Kim", "affiliation": "Dept. of Electr. & Comput. Sci. Eng., Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2011-09-01 00:00:00", "pubType": "trans", "pages": "1286-1294", "year": "2011", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hcs/2006/8867/0/07477748", "title": "Z-RAM® ultra-dense memory for 90nm and below", "doi": null, "abstractUrl": "/proceedings-article/hcs/2006/07477748/12OmNApu5FV", "parentPublication": { "id": "proceedings/hcs/2006/8867/0", "title": "2006 IEEE Hot Chips 18 Symposium (HCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itc/2010/7206/0/05699305", "title": "Methodology for early and accurate test power estimation at RTL", "doi": null, "abstractUrl": "/proceedings-article/itc/2010/05699305/12OmNBSjJ6S", "parentPublication": { "id": "proceedings/itc/2010/7206/0", "title": "2010 IEEE International Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iolts/2006/2620/0/26200043", "title": "Efficient Deterministic Test Generation for BIST Schemes with LFSR Reseeding", "doi": null, "abstractUrl": "/proceedings-article/iolts/2006/26200043/12OmNs5rkSk", "parentPublication": { "id": "proceedings/iolts/2006/2620/0", "title": "12th IEEE International On-Line Testing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ets/2008/3150/0/3150a021", "title": "Bandwidth Analysis for Reusing Functional Interconnect as Test Access Mechanism", "doi": null, "abstractUrl": "/proceedings-article/ets/2008/3150a021/12OmNx38vW7", "parentPublication": { "id": "proceedings/ets/2008/3150/0", "title": "2008 13th European Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/2010/8841/0/05692288", "title": "Test Time Analysis for IEEE P1687", "doi": null, "abstractUrl": "/proceedings-article/ats/2010/05692288/12OmNxA3Z5y", "parentPublication": { "id": "proceedings/ats/2010/8841/0", "title": "2010 19th IEEE Asian Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2001/2410/0/24100341", "title": "Min/Max On-Chip Inductance Models and Delay Metrics", "doi": null, "abstractUrl": "/proceedings-article/dac/2001/24100341/12OmNyQ7FYQ", "parentPublication": { "id": "proceedings/dac/2001/2410/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2010/7054/0/05457240", "title": "Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller", "doi": null, "abstractUrl": "/proceedings-article/date/2010/05457240/12OmNylboGI", "parentPublication": { "id": "proceedings/date/2010/7054/0", "title": "2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mtdt/2005/2313/0/04655409", "title": "Zero capacitor embedded memory technology for system on chip", "doi": null, "abstractUrl": "/proceedings-article/mtdt/2005/04655409/12OmNzFMFmr", "parentPublication": { "id": "proceedings/mtdt/2005/2313/0", "title": "2005 IEEE International Workshop on Memory Technology, Design and Testing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/codes-isss/2005/161/0/04076316", "title": "A unified approach to constrained mapping and routing on network-on-chip architectures", "doi": null, "abstractUrl": "/proceedings-article/codes-isss/2005/04076316/12OmNzuZUAA", "parentPublication": { "id": "proceedings/codes-isss/2005/161/0", "title": "2005 Third IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09449973", "title": "Omega-Test: A Predictive Early-Z Culling to Improve the Graphics Pipeline Energy-Efficiency", "doi": null, "abstractUrl": "/journal/tg/2022/12/09449973/1uiiQsEsi6A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2011091295", "articleId": "13rRUxASu0G", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2011091325", "articleId": "13rRUNvgz9G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNC3Xhdt", "title": "July", "year": "2015", "issueNum": "07", "idPrefix": "tg", "pubType": "journal", "volume": "21", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwIF6dU", "doi": "10.1109/TVCG.2015.2398432", "abstract": "Mesh surface denoising is a fundamental problem in geometry processing. The main challenge is to remove noise while preserving sharp features (such as edges and corners) and preventing generating false edges. We propose in this paper to combine total variation (TV) and piecewise constant function space for variational mesh denoising. We first give definitions of piecewise constant function spaces and associated operators. A variational mesh denoising method will then be presented by combining TV and piecewise constant function space. It is proved that, the solution of the variational problem (the key part of the method) is in some sense continuously dependent on its parameter, indicating that the solution is robust to small perturbations of this parameter. To solve the variational problem, we propose an efficient iterative algorithm (with an additional algorithmic parameter) based on variable splitting and augmented Lagrangian method, each step of which has closed form solution. Our denoising method is discussed and compared to several typical existing methods in various aspects. Experimental results show that our method outperforms all the compared methods for both CAD and non-CAD meshes at reasonable costs. It can preserve different levels of features well, and prevent generating false edges in most cases, even with the parameters evaluated by our estimation formulae.", "abstracts": [ { "abstractType": "Regular", "content": "Mesh surface denoising is a fundamental problem in geometry processing. The main challenge is to remove noise while preserving sharp features (such as edges and corners) and preventing generating false edges. We propose in this paper to combine total variation (TV) and piecewise constant function space for variational mesh denoising. We first give definitions of piecewise constant function spaces and associated operators. A variational mesh denoising method will then be presented by combining TV and piecewise constant function space. It is proved that, the solution of the variational problem (the key part of the method) is in some sense continuously dependent on its parameter, indicating that the solution is robust to small perturbations of this parameter. To solve the variational problem, we propose an efficient iterative algorithm (with an additional algorithmic parameter) based on variable splitting and augmented Lagrangian method, each step of which has closed form solution. Our denoising method is discussed and compared to several typical existing methods in various aspects. Experimental results show that our method outperforms all the compared methods for both CAD and non-CAD meshes at reasonable costs. It can preserve different levels of features well, and prevent generating false edges in most cases, even with the parameters evaluated by our estimation formulae.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mesh surface denoising is a fundamental problem in geometry processing. The main challenge is to remove noise while preserving sharp features (such as edges and corners) and preventing generating false edges. We propose in this paper to combine total variation (TV) and piecewise constant function space for variational mesh denoising. We first give definitions of piecewise constant function spaces and associated operators. A variational mesh denoising method will then be presented by combining TV and piecewise constant function space. It is proved that, the solution of the variational problem (the key part of the method) is in some sense continuously dependent on its parameter, indicating that the solution is robust to small perturbations of this parameter. To solve the variational problem, we propose an efficient iterative algorithm (with an additional algorithmic parameter) based on variable splitting and augmented Lagrangian method, each step of which has closed form solution. Our denoising method is discussed and compared to several typical existing methods in various aspects. Experimental results show that our method outperforms all the compared methods for both CAD and non-CAD meshes at reasonable costs. It can preserve different levels of features well, and prevent generating false edges in most cases, even with the parameters evaluated by our estimation formulae.", "title": "Variational Mesh Denoising Using Total Variation and Piecewise Constant Function Space", "normalizedTitle": "Variational Mesh Denoising Using Total Variation and Piecewise Constant Function Space", "fno": "07029103", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Noise Reduction", "Face", "TV", "Image Edge Detection", "Noise", "Noise Measurement", "Iterative Methods", "Sharp Feature", "Mesh Denoising", "Piecewise Constant Function Space", "Total Variation", "Sharp Feature", "Mesh Denoising", "Piecewise Constant Function Space", "Total Variation" ], "authors": [ { "givenName": "Huayan", "surname": "Zhang", "fullName": "Huayan Zhang", "affiliation": "School of Mathematical Sciences, University of Science and Technology of China, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chunlin", "surname": "Wu", "fullName": "Chunlin Wu", "affiliation": "School of Mathematical Sciences, University of NanKai, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Juyong", "surname": "Zhang", "fullName": "Juyong Zhang", "affiliation": "School of Mathematical Sciences, University of Science and Technology of China, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiansong", "surname": "Deng", "fullName": "Jiansong Deng", "affiliation": "School of Mathematical Sciences, University of Science and Technology of China, Hefei, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2015-07-01 00:00:00", "pubType": "trans", "pages": "873-886", "year": "2015", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icvisp/2017/0612/0/0612a055", "title": "Image Denoising Based on the Wavelet Semi-soft Threshold and Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2017/0612a055/12OmNwekjvI", "parentPublication": { "id": "proceedings/icvisp/2017/0612/0", "title": "2017 International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candar/2017/2087/0/2087a395", "title": "Discrete Periodic Radon Transform Based Weighted Nuclear Norm Minimization for Image Denoising", "doi": null, "abstractUrl": "/proceedings-article/candar/2017/2087a395/12OmNwnYG31", "parentPublication": { "id": "proceedings/candar/2017/2087/0", "title": "2017 Fifth International Symposium on Computing and Networking (CANDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2010/8420/0/05720332", "title": "Mesh Denoising Using Quadric Error Metric", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2010/05720332/12OmNxecRQw", "parentPublication": { "id": "proceedings/sibgrapi/2010/8420/0", "title": "2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2013/6463/0/06528298", "title": "Combining the power of Internal and External denoising", "doi": null, "abstractUrl": "/proceedings-article/iccp/2013/06528298/12OmNzWOBfJ", "parentPublication": { "id": "proceedings/iccp/2013/6463/0", "title": "2013 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/03/07328329", "title": "A Robust Scheme for Feature-Preserving Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2016/03/07328329/13rRUwIF69l", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/05/04276075", "title": "Fast and Effective Feature-Preserving Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2007/05/04276075/13rRUwkxc5j", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/01/06822598", "title": "Bi-Normal Filtering for Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2015/01/06822598/13rRUxYINff", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08344461", "title": "Robust and High Fidelity Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2019/06/08344461/13rRUxcbnHm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icenit/2022/6307/0/630700a339", "title": "An anisotropic denoising algorithm for mesh models", "doi": null, "abstractUrl": "/proceedings-article/icenit/2022/630700a339/1KCSM6W9PUc", "parentPublication": { "id": "proceedings/icenit/2022/6307/0", "title": "2022 International Conference on Education, Network and Information Technology (ICENIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453151", "title": "Mesh Total Generalized Variation for Denoising", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453151/1ulCADl6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07018970", "articleId": "13rRUILLkvu", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgHs", "name": "ttg201507-07029103s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201507-07029103s1.zip", "extension": "zip", "size": "2.38 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1I6Nvxq2hxe", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1yeC8CaRqKY", "doi": "10.1109/TPAMI.2021.3124086", "abstract": "Various problems in computer vision and medical imaging can be cast as inverse problems. A frequent method for solving inverse problems is the variational approach, which amounts to minimizing an energy composed of a data fidelity term and a regularizer. Classically, handcrafted regularizers are used, which are commonly outperformed by state-of-the-art deep learning approaches. In this work, we combine the variational formulation of inverse problems with deep learning by introducing the data-driven general-purpose total deep variation regularizer. In its core, a convolutional neural network extracts local features on multiple scales and in successive blocks. This combination allows for a rigorous mathematical analysis including an optimal control formulation of the training problem in a mean-field setting and a stability analysis with respect to the initial values and the parameters of the regularizer. In addition, we experimentally verify the robustness against adversarial attacks and numerically derive upper bounds for the generalization error. Finally, we achieve state-of-the-art results for several imaging tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Various problems in computer vision and medical imaging can be cast as inverse problems. A frequent method for solving inverse problems is the variational approach, which amounts to minimizing an energy composed of a data fidelity term and a regularizer. Classically, handcrafted regularizers are used, which are commonly outperformed by state-of-the-art deep learning approaches. In this work, we combine the variational formulation of inverse problems with deep learning by introducing the data-driven general-purpose total deep variation regularizer. In its core, a convolutional neural network extracts local features on multiple scales and in successive blocks. This combination allows for a rigorous mathematical analysis including an optimal control formulation of the training problem in a mean-field setting and a stability analysis with respect to the initial values and the parameters of the regularizer. In addition, we experimentally verify the robustness against adversarial attacks and numerically derive upper bounds for the generalization error. Finally, we achieve state-of-the-art results for several imaging tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Various problems in computer vision and medical imaging can be cast as inverse problems. A frequent method for solving inverse problems is the variational approach, which amounts to minimizing an energy composed of a data fidelity term and a regularizer. Classically, handcrafted regularizers are used, which are commonly outperformed by state-of-the-art deep learning approaches. In this work, we combine the variational formulation of inverse problems with deep learning by introducing the data-driven general-purpose total deep variation regularizer. In its core, a convolutional neural network extracts local features on multiple scales and in successive blocks. This combination allows for a rigorous mathematical analysis including an optimal control formulation of the training problem in a mean-field setting and a stability analysis with respect to the initial values and the parameters of the regularizer. In addition, we experimentally verify the robustness against adversarial attacks and numerically derive upper bounds for the generalization error. Finally, we achieve state-of-the-art results for several imaging tasks.", "title": "Total Deep Variation: A Stable Regularization Method for Inverse Problems", "normalizedTitle": "Total Deep Variation: A Stable Regularization Method for Inverse Problems", "fno": "09599362", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computer Vision", "Feature Extraction", "Inverse Problems", "Learning Artificial Intelligence", "Mathematical Analysis", "Minimisation", "Neural Nets", "Optimal Control", "Variational Techniques", "Data Driven General Purpose Total Deep Variation Regularizer", "Handcrafted Regularizers", "Inverse Problems", "Stable Regularization Method", "State Of The Art Deep Learning Approaches", "Training Problem", "Variational Approach", "Variational Formulation", "Inverse Problems", "Optimal Control", "Training", "Noise Reduction", "Task Analysis", "Stability Analysis", "Trajectory", "Convolutional Neural Networks", "Gradient Flow", "Image Restoration", "Inverse Problems", "Mean Field Optimal Control Problem", "Medical Imaging", "Variational Methods" ], "authors": [ { "givenName": "Erich", "surname": "Kobler", "fullName": "Erich Kobler", "affiliation": "Institute of Computer Graphics, University of Linz, Linz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Alexander", "surname": "Effland", "fullName": "Alexander Effland", "affiliation": "Institute of Applied Mathematics, University of Bonn, Bonn, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Karl", "surname": "Kunisch", "fullName": "Karl Kunisch", "affiliation": "Institute of Mathematics and Scientific Computing, University of Graz, Graz, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Thomas", "surname": "Pock", "fullName": "Thomas Pock", "affiliation": "Institute of Computer Graphics and Vision, Graz University of Technology, Graz, Austria", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "9163-9180", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icig/2009/3883/0/3883a119", "title": "A Nonlinear Inverse Scale Space Method for Multiplicative Noise Removal Based on Weberized Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a119/12OmNynJMSg", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298819", "title": "Total variation regularization of shape signals", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298819/12OmNyuy9Sp", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545232", "title": "Cascade Deep Networks for Sparse Linear Inverse Problems", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545232/17D45WwsQ78", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b489", "title": "Generative Flows as a General Purpose Solution for Inverse Problems", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b489/1G56EZ12Gcg", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09878048", "title": "Untrained Neural Network Priors for Inverse Imaging Problems: A Survey", "doi": null, "abstractUrl": "/journal/tp/2023/05/09878048/1GqajMOAj3W", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9281", "title": "HLRTF: Hierarchical Low-Rank Tensor Factorization for Inverse Problems in Multi-Dimensional Imaging", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9281/1H0NPK47RHW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a722", "title": "Recurrent Variational Network: A Deep Learning Inverse Problem Solver applied to the task of Accelerated MRI Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a722/1H1iT2yJqqk", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b324", "title": "InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b324/1cdOOfQFTaw", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h546", "title": "Total Deep Variation for Linear Inverse Problems", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h546/1m3nYsqK8b6", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453151", "title": "Mesh Total Generalized Variation for Denoising", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453151/1ulCADl6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09628041", "articleId": "1yXvHRI3JRK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09609696", "articleId": "1yoxG62W1La", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1I6NH3Tftjq", "name": "ttp202212-09599362s1-supp1-3124086.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202212-09599362s1-supp1-3124086.pdf", "extension": "pdf", "size": "3.3 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1tHMVfCKHFm", "title": "March-April", "year": "2021", "issueNum": "02", "idPrefix": "ex", "pubType": "magazine", "volume": "36", "label": "March-April", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tHMWwhCVrO", "doi": "10.1109/MIS.2021.3062437", "abstract": "Smart manufacturing or Industry 4.0, a trend initiated a decade ago, aims to revolutionize traditional manufacturing using technology driven approaches. Modern digital technologies such as the Industrial Internet of Things (IIoT), Big Data analytics, augmented/virtual reality, and artificial intelligence (AI) are the key enablers of new smart manufacturing approaches. The digital twin is an emerging concept whereby a digital replica can be built of any physical object. Digital twins are becoming mainstream; many organizations have started to rely on digital twins to monitor, analyze, and simulate physical assets and processes.", "abstracts": [ { "abstractType": "Regular", "content": "Smart manufacturing or Industry 4.0, a trend initiated a decade ago, aims to revolutionize traditional manufacturing using technology driven approaches. Modern digital technologies such as the Industrial Internet of Things (IIoT), Big Data analytics, augmented/virtual reality, and artificial intelligence (AI) are the key enablers of new smart manufacturing approaches. The digital twin is an emerging concept whereby a digital replica can be built of any physical object. Digital twins are becoming mainstream; many organizations have started to rely on digital twins to monitor, analyze, and simulate physical assets and processes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Smart manufacturing or Industry 4.0, a trend initiated a decade ago, aims to revolutionize traditional manufacturing using technology driven approaches. Modern digital technologies such as the Industrial Internet of Things (IIoT), Big Data analytics, augmented/virtual reality, and artificial intelligence (AI) are the key enablers of new smart manufacturing approaches. The digital twin is an emerging concept whereby a digital replica can be built of any physical object. Digital twins are becoming mainstream; many organizations have started to rely on digital twins to monitor, analyze, and simulate physical assets and processes.", "title": "Cognitive Digital Twins for Smart Manufacturing", "normalizedTitle": "Cognitive Digital Twins for Smart Manufacturing", "fno": "09434454", "hasPdf": true, "idPrefix": "ex", "keywords": [ "Digital Twin", "Intelligent Systems", "Smart Manufacturing", "Fourth Industrial Revolution" ], "authors": [ { "givenName": "Muhammad", "surname": "Intizar Ali", "fullName": "Muhammad Intizar Ali", "affiliation": "Dublin City University Glasnevin, Dublin 9, Ireland", "__typename": "ArticleAuthorType" }, { "givenName": "Pankesh", "surname": "Patel", "fullName": "Pankesh Patel", "affiliation": "University of South Carolina, Columbia, SC, USA", "__typename": "ArticleAuthorType" }, { "givenName": "John", "surname": "G. Breslin", "fullName": "John G. Breslin", "affiliation": "NUI Galway, Galway, Ireland", "__typename": "ArticleAuthorType" }, { "givenName": "Ramy", "surname": "Harik", "fullName": "Ramy Harik", "affiliation": "University of South Carolina, Columbia, SC, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Amit", "surname": "Sheth", "fullName": "Amit Sheth", "affiliation": "University of South Carolina, Columbia, SC, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-03-01 00:00:00", "pubType": "mags", "pages": "96-100", "year": "2021", "issn": "1541-1672", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/edocw/2018/4141/0/414100a069", "title": "Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems", "doi": null, "abstractUrl": "/proceedings-article/edocw/2018/414100a069/17D45WcjjR9", "parentPublication": { "id": "proceedings/edocw/2018/4141/0", "title": "2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscloud-edgecom/2018/5850/0/585001a046", "title": "MTComm Based Virtualization and Integration of Physical Machine Operations with Digital-Twins in Cyber-Physical Manufacturing Cloud", "doi": null, "abstractUrl": "/proceedings-article/cscloud-edgecom/2018/585001a046/17D45Wda7g6", "parentPublication": { "id": "proceedings/cscloud-edgecom/2018/5850/0", "title": "2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2021/1625/0/162500a087", "title": "Digital Twins-based Application Development for Digital Manufacturing", "doi": null, "abstractUrl": "/proceedings-article/cic/2021/162500a087/1AZOLOghAac", "parentPublication": { "id": "proceedings/cic/2021/1625/0", "title": "2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/01/09726694", "title": "Guest Editorial: Thematic Section on Applications of Emerging Computing Technologies in Smart Manufacturing and Industry 4.0", "doi": null, "abstractUrl": "/journal/ec/2022/01/09726694/1BrwyBKJ9ew", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2021/1623/0/162300a070", "title": "Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2021/162300a070/1CzeqNtBtPG", "parentPublication": { "id": "proceedings/tps-isa/2021/1623/0", "title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700c166", "title": "DIKW Upward Enabling Manufacturing from Digitalization in Industry 3.0 to Wisdom in Industry 4.0", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700c166/1DNCw01xafK", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2022/04/09897150", "title": "Active Behavior Mining for Digital Twins Extraction", "doi": null, "abstractUrl": "/magazine/it/2022/04/09897150/1GQIUGVFzXy", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2019/2717/0/271700a229", "title": "A Conceptual Architecture and Model for Smart Manufacturing Relying on Service-Based Digital Twins", "doi": null, "abstractUrl": "/proceedings-article/icws/2019/271700a229/1cTJsZ2RVIs", "parentPublication": { "id": "proceedings/icws/2019/2717/0", "title": "2019 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seams/2021/0289/0/028900a156", "title": "Self-Adaptive Manufacturing with Digital Twins", "doi": null, "abstractUrl": "/proceedings-article/seams/2021/028900a156/1tB9bEeFpnO", "parentPublication": { "id": "proceedings/seams/2021/0289/0/", "title": "2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/01/09642429", "title": "Graph Learning for Cognitive Digital Twins in Manufacturing Systems", "doi": null, "abstractUrl": "/journal/ec/2022/01/09642429/1zas7XDBoZO", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09434455", "articleId": "1tHMY6i3YUU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09434451", "articleId": "1tHMYD7zuFy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNqJZgIg", "title": "May/June", "year": "2006", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "12", "label": "May/June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUx0xPhZ", "doi": "10.1109/TVCG.2006.42", "abstract": "Abstract—We present the results from a qualitative and quantitative user study comparing fishtank virtual-reality (VR) and CAVE displays. The results of the qualitative study show that users preferred the fishtank VR display to the CAVE system for our scientific visualization application because of perceived higher resolution, brightness and crispness of imagery, and comfort of use. The results of the quantitative study show that users performed an abstract visual search task significantly more quickly and more accurately on the fishtank VR display system than in the CAVE. The same study also showed that visual context had no significant effect on task performance for either of the platforms. We suggest that fishtank VR displays are more effective than CAVEs for applications in which the task occurs outside the user's reference frame, the user views and manipulates the virtual world from the outside in, and the size of the virtual object that the user interacts with is smaller than the user's body and fits into the fishtank VR display. The results of both studies support this proposition.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—We present the results from a qualitative and quantitative user study comparing fishtank virtual-reality (VR) and CAVE displays. The results of the qualitative study show that users preferred the fishtank VR display to the CAVE system for our scientific visualization application because of perceived higher resolution, brightness and crispness of imagery, and comfort of use. The results of the quantitative study show that users performed an abstract visual search task significantly more quickly and more accurately on the fishtank VR display system than in the CAVE. The same study also showed that visual context had no significant effect on task performance for either of the platforms. We suggest that fishtank VR displays are more effective than CAVEs for applications in which the task occurs outside the user's reference frame, the user views and manipulates the virtual world from the outside in, and the size of the virtual object that the user interacts with is smaller than the user's body and fits into the fishtank VR display. The results of both studies support this proposition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—We present the results from a qualitative and quantitative user study comparing fishtank virtual-reality (VR) and CAVE displays. The results of the qualitative study show that users preferred the fishtank VR display to the CAVE system for our scientific visualization application because of perceived higher resolution, brightness and crispness of imagery, and comfort of use. The results of the quantitative study show that users performed an abstract visual search task significantly more quickly and more accurately on the fishtank VR display system than in the CAVE. The same study also showed that visual context had no significant effect on task performance for either of the platforms. We suggest that fishtank VR displays are more effective than CAVEs for applications in which the task occurs outside the user's reference frame, the user views and manipulates the virtual world from the outside in, and the size of the virtual object that the user interacts with is smaller than the user's body and fits into the fishtank VR display. The results of both studies support this proposition.", "title": "CAVE and Fishtank Virtual-Reality Displays: A Qualitative and Quantitative Comparison", "normalizedTitle": "CAVE and Fishtank Virtual-Reality Displays: A Qualitative and Quantitative Comparison", "fno": "v0323", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Displays", "Virtual Reality", "Visualization", "Image Resolution", "Object Detection", "Brightness", "Diffusion Tensor Imaging", "Head", "Mice", "DT MRI Visualization", "User Study", "Virtual Reality", "Display", "CAVE", "Fishtank VR" ], "authors": [ { "givenName": "?agatay", "surname": "Demiralp", "fullName": "?agatay Demiralp", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI", "__typename": "ArticleAuthorType" }, { "givenName": "Cullen D.", "surname": "Jackson", "fullName": "Cullen D. Jackson", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI", "__typename": "ArticleAuthorType" }, { "givenName": "David B.", "surname": "Karelitz", "fullName": "David B. Karelitz", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI", "__typename": "ArticleAuthorType" }, { "givenName": "Song", "surname": "Zhang", "fullName": "Song Zhang", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI", "__typename": "ArticleAuthorType" }, { "givenName": "David H.", "surname": "Laidlaw", "fullName": "David H. Laidlaw", "affiliation": "Dept. of Comput. Sci., Brown Univ., Providence, RI", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2006-05-01 00:00:00", "pubType": "trans", "pages": "323-330", "year": "2006", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2008/1971/0/04480783", "title": "An initial study into augmented inward looking exploration and navigation in CAVE-like IPT systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2008/04480783/12OmNAoDijV", "parentPublication": { "id": "proceedings/vr/2008/1971/0", "title": "IEEE Virtual Reality 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2004/2171/0/21710420", "title": "Comparing CAVE, Wall, and Desktop Displays for Navigation and Wayfinding in Complex 3D Models", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710420/12OmNB8CiWt", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892342", "title": "Uni-CAVE: A Unity3D plugin for non-head mounted VR display systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892342/12OmNs5rkSv", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811007", "title": "Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811007/12OmNyeWdKg", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504767", "title": "Supporting multiple immersive configurations using a shape-changing display", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504767/12OmNylKAKr", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/05/mcg2014050014", "title": "Quo Vadis CAVE: Does Immersive Visualization Still Matter?", "doi": null, "abstractUrl": "/magazine/cg/2014/05/mcg2014050014/13rRUNvgzcu", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/04/07384536", "title": "Examining Rotation Gain in CAVE-like Virtual Environments", "doi": null, "abstractUrl": "/journal/tg/2016/04/07384536/13rRUxOdD2H", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2020/01/08821384", "title": "A Compelling Virtual Tour of the Dunhuang Cave With an Immersive Head-Mounted Display", "doi": null, "abstractUrl": "/magazine/cg/2020/01/08821384/1eTOS0wFeY8", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a301", "title": "Dual-Model Approach for Engineering Collision Detection in the CAVE Environment", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a301/1gysjoCD28w", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cds/2020/7106/0/710600a377", "title": "A virtual environment making method for CAVE system", "doi": null, "abstractUrl": "/proceedings-article/cds/2020/710600a377/1pqa4RCdUAg", "parentPublication": { "id": "proceedings/cds/2020/7106/0", "title": "2020 International Conference on Computing and Data Science (CDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "v0311", "articleId": "13rRUEgs2tj", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0331", "articleId": "13rRUx0xPmR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwdL7lK", "title": "Nov.-Dec.", "year": "2017", "issueNum": "06", "idPrefix": "tb", "pubType": "journal", "volume": "14", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBJhtK", "doi": "10.1109/TCBB.2016.2591521", "abstract": "Human diseases involve a sequence of complex interactions between multiple biological processes. In particular, multiple genomic data such as Single Nucleotide Polymorphism (SNP), Copy Number Variation (CNV), DNA Methylation (DM), and their interactions simultaneously play an important role in human diseases. However, despite the widely known complex multi-layer biological processes and increased availability of the heterogeneous genomic data, most research has considered only a single type of genomic data. Furthermore, recent integrative genomic studies for the multiple genomic data have also been facing difficulties due to the high-dimensionality and complexity, especially when considering their intra- and inter-block interactions. In this paper, we introduce a novel multi-block bipartite graph and its inference methods, MB2I and sMB2I, for the integrative genomic study. The proposed methods not only integrate multiple genomic data but also incorporate intra/inter-block interactions by using a multi-block bipartite graph. In addition, the methods can be used to predict quantitative traits (e.g., gene expression, survival time) from the multi-block genomic data. The performance was assessed by simulation experiments that implement practical situations. We also applied the method to the human brain data of psychiatric disorders. The experimental results were analyzed by maximum edge biclique and biclustering, and biological findings were discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Human diseases involve a sequence of complex interactions between multiple biological processes. In particular, multiple genomic data such as Single Nucleotide Polymorphism (SNP), Copy Number Variation (CNV), DNA Methylation (DM), and their interactions simultaneously play an important role in human diseases. However, despite the widely known complex multi-layer biological processes and increased availability of the heterogeneous genomic data, most research has considered only a single type of genomic data. Furthermore, recent integrative genomic studies for the multiple genomic data have also been facing difficulties due to the high-dimensionality and complexity, especially when considering their intra- and inter-block interactions. In this paper, we introduce a novel multi-block bipartite graph and its inference methods, MB2I and sMB2I, for the integrative genomic study. The proposed methods not only integrate multiple genomic data but also incorporate intra/inter-block interactions by using a multi-block bipartite graph. In addition, the methods can be used to predict quantitative traits (e.g., gene expression, survival time) from the multi-block genomic data. The performance was assessed by simulation experiments that implement practical situations. We also applied the method to the human brain data of psychiatric disorders. The experimental results were analyzed by maximum edge biclique and biclustering, and biological findings were discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human diseases involve a sequence of complex interactions between multiple biological processes. In particular, multiple genomic data such as Single Nucleotide Polymorphism (SNP), Copy Number Variation (CNV), DNA Methylation (DM), and their interactions simultaneously play an important role in human diseases. However, despite the widely known complex multi-layer biological processes and increased availability of the heterogeneous genomic data, most research has considered only a single type of genomic data. Furthermore, recent integrative genomic studies for the multiple genomic data have also been facing difficulties due to the high-dimensionality and complexity, especially when considering their intra- and inter-block interactions. In this paper, we introduce a novel multi-block bipartite graph and its inference methods, MB2I and sMB2I, for the integrative genomic study. The proposed methods not only integrate multiple genomic data but also incorporate intra/inter-block interactions by using a multi-block bipartite graph. In addition, the methods can be used to predict quantitative traits (e.g., gene expression, survival time) from the multi-block genomic data. The performance was assessed by simulation experiments that implement practical situations. We also applied the method to the human brain data of psychiatric disorders. The experimental results were analyzed by maximum edge biclique and biclustering, and biological findings were discussed.", "title": "Multi-Block Bipartite Graph for Integrative Genomic Analysis", "normalizedTitle": "Multi-Block Bipartite Graph for Integrative Genomic Analysis", "fno": "07513454", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Bioinformatics", "Genomics", "Bipartite Graph", "DNA", "Gene Expression", "Computational Modeling", "Biological System Modeling", "Integrative Genomic Study", "Multimodal Genomic Data", "Multi Block Bipartite Graph" ], "authors": [ { "givenName": "Mingon", "surname": "Kang", "fullName": "Mingon Kang", "affiliation": "Department of Computer Science, Kennesaw State University, Marietta, GA", "__typename": "ArticleAuthorType" }, { "givenName": "Juyoung", "surname": "Park", "fullName": "Juyoung Park", "affiliation": "Department of Computer Science & Engineering, Hanyang University, Seoul, Republic of Korea", "__typename": "ArticleAuthorType" }, { "givenName": "Dong-Chul", "surname": "Kim", "fullName": "Dong-Chul Kim", "affiliation": "Department of Computer Science, University of Texas Rio Grande Valley, Edinburg, TX", "__typename": "ArticleAuthorType" }, { "givenName": "Ashis K.", "surname": "Biswas", "fullName": "Ashis K. Biswas", "affiliation": "Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX", "__typename": "ArticleAuthorType" }, { "givenName": "Chunyu", "surname": "Liu", "fullName": "Chunyu Liu", "affiliation": "Department of Psychiatry, Univerity of Illinois at Chicago, Chicago, IL", "__typename": "ArticleAuthorType" }, { "givenName": "Jean", "surname": "Gao", "fullName": "Jean Gao", "affiliation": "Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2017-11-01 00:00:00", "pubType": "trans", "pages": "1350-1358", "year": "2017", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460831", "title": "Accurate genomic signal recovery using compressed sensing", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460831/12OmNAIvd2I", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375621", "title": "Biostatistical Considerations of the Use of Genomic DNA Reference in Microarrays", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375621/12OmNBf94XE", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2014/4435/0/4435a247", "title": "miXGENE Tool for Learning from Heterogeneous Gene Expression Data Using Prior Knowledge", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a247/12OmNCcbEhW", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359744", "title": "An integrative genomic study for multimodal genomic data using multi-block bipartite graph", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359744/12OmNqH9hnX", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822711", "title": "Integrative Gene Regulatory Network inference using multi-omics data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822711/12OmNwlZu6l", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706543", "title": "A new perspective of integrative genome-wide association analysis considering trans eSNP effect", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706543/12OmNwudQPG", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2014/7502/0/7502a038", "title": "Multi-block and Multi-task Learning for Integrative Genomic Study", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a038/12OmNzt0IG0", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07737047", "title": "Extracting Stage-Specific and Dynamic Modules Through Analyzing Multiple Networks Associated with Cancer Progression", "doi": null, "abstractUrl": "/journal/tb/2018/02/07737047/13rRUyeCk8B", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/06/06818425", "title": "Latent Feature Decompositions for Integrative Analysis of Multi-Platform Genomic Data", "doi": null, "abstractUrl": "/journal/tb/2014/06/06818425/13rRUygT7wN", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09991081", "title": "Multi-view Clustering for Integration of Gene Expression and Methylation Data with Tensor Decomposition and Self-representation Learning", "doi": null, "abstractUrl": "/journal/tb/5555/01/09991081/1J9xSbDkSju", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07530933", "articleId": "13rRUwI5Ujp", "__typename": "AdjacentArticleType" }, "next": { "fno": "07467520", "articleId": "13rRUwInvdA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1JH4dDVaLvy", "title": "Oct.-Dec.", "year": "2022", "issueNum": "04", "idPrefix": "mu", "pubType": "magazine", "volume": "29", "label": "Oct.-Dec.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1B2CYdfkBnG", "doi": "10.1109/MMUL.2022.3151906", "abstract": "Various studies have been undertaken to learn point cloud representations that are both discriminative and robust. However, most of them suffer from rotation disturbance and insufficient labeled data. To solve the problem of rotation disturbance, we propose a novel rotation-invariant network called ELGANet that is equipped with the following two core modules: enhanced local representation learning module and global alignment module. The enhanced local representation learning module captures the geometric relationship among the neighbors defined in both 3-D Cartesian space and a latent space to exploit the local context and long-distance context. The global alignment module is devised to address the lack of global information and supplement the absolute locations of points by adaptively generating the rotation-invariant coordinates. For the issue of label dependence, we further propose an unsupervised learning network ELGANet-U that can still generate a discriminative and rotation-invariant representation without human supervision. Extensive experiments on both ModelNet and ScanObjectNN have demonstrated that our ELGANet is superior to other state-of-the-art methods on the premise of ensuring rotation invariance. Furthermore, the representation generated by our ELGANet-U also achieves a comparable performance to that of supervised learning.", "abstracts": [ { "abstractType": "Regular", "content": "Various studies have been undertaken to learn point cloud representations that are both discriminative and robust. However, most of them suffer from rotation disturbance and insufficient labeled data. To solve the problem of rotation disturbance, we propose a novel rotation-invariant network called ELGANet that is equipped with the following two core modules: enhanced local representation learning module and global alignment module. The enhanced local representation learning module captures the geometric relationship among the neighbors defined in both 3-D Cartesian space and a latent space to exploit the local context and long-distance context. The global alignment module is devised to address the lack of global information and supplement the absolute locations of points by adaptively generating the rotation-invariant coordinates. For the issue of label dependence, we further propose an unsupervised learning network ELGANet-U that can still generate a discriminative and rotation-invariant representation without human supervision. Extensive experiments on both ModelNet and ScanObjectNN have demonstrated that our ELGANet is superior to other state-of-the-art methods on the premise of ensuring rotation invariance. Furthermore, the representation generated by our ELGANet-U also achieves a comparable performance to that of supervised learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Various studies have been undertaken to learn point cloud representations that are both discriminative and robust. However, most of them suffer from rotation disturbance and insufficient labeled data. To solve the problem of rotation disturbance, we propose a novel rotation-invariant network called ELGANet that is equipped with the following two core modules: enhanced local representation learning module and global alignment module. The enhanced local representation learning module captures the geometric relationship among the neighbors defined in both 3-D Cartesian space and a latent space to exploit the local context and long-distance context. The global alignment module is devised to address the lack of global information and supplement the absolute locations of points by adaptively generating the rotation-invariant coordinates. For the issue of label dependence, we further propose an unsupervised learning network ELGANet-U that can still generate a discriminative and rotation-invariant representation without human supervision. Extensive experiments on both ModelNet and ScanObjectNN have demonstrated that our ELGANet is superior to other state-of-the-art methods on the premise of ensuring rotation invariance. Furthermore, the representation generated by our ELGANet-U also achieves a comparable performance to that of supervised learning.", "title": "Enhanced Local and Global Learning for Rotation-Invariant Point Cloud Representation", "normalizedTitle": "Enhanced Local and Global Learning for Rotation-Invariant Point Cloud Representation", "fno": "09714847", "hasPdf": true, "idPrefix": "mu", "keywords": [ "Feature Extraction", "Image Representation", "Unsupervised Learning", "3 D Cartesian Space", "Core Modules", "Discriminative Rotation Invariant Representation", "ELGA Net U Unsupervised Learning Network", "Enhanced Local Representation Learning Module", "Global Alignment Module", "Global Information", "Global Learning", "Insufficient Labeled Data", "Latent Space", "Local Context", "Long Distance Context", "Module Captures", "Novel Rotation Invariant Network", "Point Cloud Representations", "Rotation Disturbance", "Rotation Invariance", "Rotation Invariant Coordinates", "Rotation Invariant Point Cloud Representation", "Point Cloud Compression", "Three Dimensional Displays", "Representation Learning", "Supervised Learning", "Perturbation Methods", "Unsupervised Learning", "Task Analysis" ], "authors": [ { "givenName": "Ruibin", "surname": "Gu", "fullName": "Ruibin Gu", "affiliation": "South China University of Technology, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qiuxia", "surname": "Wu", "fullName": "Qiuxia Wu", "affiliation": "South China University of Technology, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuqiong", "surname": "Li", "fullName": "Yuqiong Li", "affiliation": "Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenxiong", "surname": "Kang", "fullName": "Wenxiong Kang", "affiliation": "South China University of Technology, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wing W. Y.", "surname": "Ng", "fullName": "Wing W. Y. Ng", "affiliation": "South China University of Technology, Guangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiyong", "surname": "Wang", "fullName": "Zhiyong Wang", "affiliation": "The University of Sydney, Sydney, NSW, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "04", "pubDate": "2022-10-01 00:00:00", "pubType": "mags", "pages": "24-37", "year": "2022", "issn": "1070-986X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sitis/2017/4283/0/4283a237", "title": "Texture Representation Using Galois Field for Rotation Invariant Classification", "doi": null, "abstractUrl": "/proceedings-article/sitis/2017/4283a237/12OmNAolGV4", "parentPublication": { "id": "proceedings/sitis/2017/4283/0", "title": "2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2021/0764/0/076400a156", "title": "Spherical-GMM: A Rotation and Scale Invariant Method for Point Cloud Classification", "doi": null, "abstractUrl": "/proceedings-article/ichci/2021/076400a156/1Bb0QtExgAM", "parentPublication": { "id": "proceedings/ichci/2021/0764/0", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0448", "title": "SGMNet: Learning Rotation-Invariant Point Cloud Representations via Sorted Gram Matrix", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0448/1BmI7U4COL6", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200q6198", "title": "A Closer Look at Rotation-invariant Deep Point Cloud Analysis", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200q6198/1BmLbJ94HOE", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4351", "title": "ART-Point: Improving Rotation Robustness of Point Cloud Classifiers via Adversarial Rotation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4351/1H1jQ4lODrq", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a616", "title": "RITNet: A Rotation Invariant Transformer based Network for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a616/1MrFMu2m6E8", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300e989", "title": "ClusterNet: Deep Hierarchical Cluster Network With Rigorously Rotation-Invariant Representation for Point Cloud Analysis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300e989/1gyr7NN0hTW", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a504", "title": "Rotation-Invariant Point Convolution With Multiple Equivariant Alignments", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a504/1qyxodIpW9i", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09465688", "title": "A Rotation-Invariant Framework for Deep Point Cloud Analysis", "doi": null, "abstractUrl": "/journal/tg/2022/12/09465688/1uIReC9hVQY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428170", "title": "Learning Efficient Rotation Representation for Point Cloud via Local-Global Aggregation", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428170/1uilStoifHa", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09772370", "articleId": "1DgjziT45aM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09849000", "articleId": "1Fxol2YEObe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1I6Nvxq2hxe", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1yORKbr1kCQ", "doi": "10.1109/TPAMI.2021.3130590", "abstract": "Point cloud analysis without pose priors is very challenging in real applications, as the orientations of point clouds are often unknown. In this paper, we propose a brand new point-set learning framework PRIN, namely, <bold>P</bold>oint-wise <bold>R</bold>otation <bold>I</bold>nvariant <bold>N</bold>etwork, focusing on rotation invariant feature extraction in point clouds analysis. We construct spherical signals by Density Aware Adaptive Sampling to deal with distorted point distributions in spherical space. Spherical Voxel Convolution and Point Re-sampling are proposed to extract rotation invariant features for each point. In addition, we extend PRIN to a sparse version called SPRIN, which directly operates on sparse point clouds. Both PRIN and SPRIN can be applied to tasks ranging from object classification, part segmentation, to 3D feature matching and label alignment. Results show that, on the dataset with randomly rotated point clouds, SPRIN demonstrates better performance than state-of-the-art methods without any data augmentation. We also provide thorough theoretical proof and analysis for point-wise rotation invariance achieved by our methods. The code to reproduce our results will be made publicly available.", "abstracts": [ { "abstractType": "Regular", "content": "Point cloud analysis without pose priors is very challenging in real applications, as the orientations of point clouds are often unknown. In this paper, we propose a brand new point-set learning framework PRIN, namely, <bold>P</bold>oint-wise <bold>R</bold>otation <bold>I</bold>nvariant <bold>N</bold>etwork, focusing on rotation invariant feature extraction in point clouds analysis. We construct spherical signals by Density Aware Adaptive Sampling to deal with distorted point distributions in spherical space. Spherical Voxel Convolution and Point Re-sampling are proposed to extract rotation invariant features for each point. In addition, we extend PRIN to a sparse version called SPRIN, which directly operates on sparse point clouds. Both PRIN and SPRIN can be applied to tasks ranging from object classification, part segmentation, to 3D feature matching and label alignment. Results show that, on the dataset with randomly rotated point clouds, SPRIN demonstrates better performance than state-of-the-art methods without any data augmentation. We also provide thorough theoretical proof and analysis for point-wise rotation invariance achieved by our methods. The code to reproduce our results will be made publicly available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point cloud analysis without pose priors is very challenging in real applications, as the orientations of point clouds are often unknown. In this paper, we propose a brand new point-set learning framework PRIN, namely, Point-wise Rotation Invariant Network, focusing on rotation invariant feature extraction in point clouds analysis. We construct spherical signals by Density Aware Adaptive Sampling to deal with distorted point distributions in spherical space. Spherical Voxel Convolution and Point Re-sampling are proposed to extract rotation invariant features for each point. In addition, we extend PRIN to a sparse version called SPRIN, which directly operates on sparse point clouds. Both PRIN and SPRIN can be applied to tasks ranging from object classification, part segmentation, to 3D feature matching and label alignment. Results show that, on the dataset with randomly rotated point clouds, SPRIN demonstrates better performance than state-of-the-art methods without any data augmentation. We also provide thorough theoretical proof and analysis for point-wise rotation invariance achieved by our methods. The code to reproduce our results will be made publicly available.", "title": "PRIN/SPRIN: On Extracting Point-Wise Rotation Invariant Features", "normalizedTitle": "PRIN/SPRIN: On Extracting Point-Wise Rotation Invariant Features", "fno": "09627565", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Feature Extraction", "Image Classification", "Image Matching", "Image Segmentation", "Learning Artificial Intelligence", "Object Detection", "Stereo Image Processing", "3 D Feature Matching", "Density Aware Adaptive Sampling", "Distorted Point Distributions", "Object Classification", "Part Segmentation", "Point Clouds Analysis", "Point Set Learning Framework", "Point Wise Rotation Invariant Feature Extraction", "Point Wise Rotation Invariant Network", "PRIN SPRIN", "Randomly Rotated Point Clouds", "Sparse Point Clouds", "Spherical Signals", "Spherical Voxel Convolution", "Feature Extraction", "Three Dimensional Displays", "Convolution", "Shape", "Recurrent Neural Networks", "Task Analysis", "Solid Modeling", "Point Cloud", "Object Analysis", "Rotation Invariance", "Feature Learning" ], "authors": [ { "givenName": "Yang", "surname": "You", "fullName": "Yang You", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yujing", "surname": "Lou", "fullName": "Yujing Lou", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ruoxi", "surname": "Shi", "fullName": "Ruoxi Shi", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qi", "surname": "Liu", "fullName": "Qi Liu", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu-Wing", "surname": "Tai", "fullName": "Yu-Wing Tai", "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Lizhuang", "surname": "Ma", "fullName": "Lizhuang Ma", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weiming", "surname": "Wang", "fullName": "Weiming Wang", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Cewu", "surname": "Lu", "fullName": "Cewu Lu", "affiliation": "Shanghai Jiao Tong University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "9489-9502", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2023/9346/0/934600a572", "title": "SGPCR: Spherical Gaussian Point Cloud Representation and its Application to Object Registration and Retrieval", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a572/1L8qEq48PHa", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b606", "title": "A New Rotation-Invariant Deep Network for 3D Object Recognition", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b606/1cdOJHWrkVW", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a204", "title": "Rotation Invariant Convolutions for 3D Point Clouds Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a204/1ezRCX27dCg", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a047", "title": "Effective Rotation-Invariant Point CNN with Spherical Harmonics Kernels", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a047/1ezREpXIpZC", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/7.168E307", "title": "Rotation Equivariant Graph Convolutional Network for Spherical Image Classification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/7.168E307/1m3o1y1YVJ6", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a200", "title": "Learning Rotation-Invariant Representations of Point Clouds Using Aligned Edge Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a200/1qyxkUAXFuM", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a504", "title": "Rotation-Invariant Point Convolution With Multiple Equivariant Alignments", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a504/1qyxodIpW9i", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412978", "title": "PointSpherical: Deep Shape Context for Point Cloud Learning in Spherical Coordinates", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412978/1tmjEEGI9xu", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09465688", "title": "A Rotation-Invariant Framework for Deep Point Cloud Analysis", "doi": null, "abstractUrl": "/journal/tg/2022/12/09465688/1uIReC9hVQY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800b480", "title": "Geometric Invariant Representation Learning for 3D Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800b480/1zw6hJOIDcs", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09576609", "articleId": "1xIKpil8WkM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09627800", "articleId": "1yQwE0hV26Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xibX4wTR8Q", "doi": "10.1109/TVCG.2021.3114693", "abstract": "In this paper, we report on a study of visual representations for cyclical data and the effect of interactively <italic>wrapping</italic> a bar chart &#x2018;around its boundaries&#x2019;. Compared to linear bar chart, polar (or radial) visualisations have the advantage that cyclical data can be presented continuously without mentally bridging the visual &#x2018;cut&#x2019; across the left-and-right boundaries. To investigate this hypothesis and to assess the effect the cut has on analysis performance, this paper presents results from a crowdsourced, controlled experiment with 72 participants comparing new continuous panning technique to linear bar charts (<italic>interactive wrapping</italic>). Our results show that bar charts with interactive wrapping lead to less errors compared to standard bar charts or polar charts. Inspired by these results, we generalise the concept of interactive wrapping to other visualisations for cyclical or relational data. We describe a design space based on the concept of one-dimensional wrapping and two-dimensional wrapping, linked to two common 3D topologies; cylinder and torus that can be used to metaphorically explain one- and two-dimensional wrapping. This design space suggests that interactive wrapping is widely applicable to many different data types.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we report on a study of visual representations for cyclical data and the effect of interactively <italic>wrapping</italic> a bar chart &#x2018;around its boundaries&#x2019;. Compared to linear bar chart, polar (or radial) visualisations have the advantage that cyclical data can be presented continuously without mentally bridging the visual &#x2018;cut&#x2019; across the left-and-right boundaries. To investigate this hypothesis and to assess the effect the cut has on analysis performance, this paper presents results from a crowdsourced, controlled experiment with 72 participants comparing new continuous panning technique to linear bar charts (<italic>interactive wrapping</italic>). Our results show that bar charts with interactive wrapping lead to less errors compared to standard bar charts or polar charts. Inspired by these results, we generalise the concept of interactive wrapping to other visualisations for cyclical or relational data. We describe a design space based on the concept of one-dimensional wrapping and two-dimensional wrapping, linked to two common 3D topologies; cylinder and torus that can be used to metaphorically explain one- and two-dimensional wrapping. This design space suggests that interactive wrapping is widely applicable to many different data types.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we report on a study of visual representations for cyclical data and the effect of interactively wrapping a bar chart ‘around its boundaries’. Compared to linear bar chart, polar (or radial) visualisations have the advantage that cyclical data can be presented continuously without mentally bridging the visual ‘cut’ across the left-and-right boundaries. To investigate this hypothesis and to assess the effect the cut has on analysis performance, this paper presents results from a crowdsourced, controlled experiment with 72 participants comparing new continuous panning technique to linear bar charts (interactive wrapping). Our results show that bar charts with interactive wrapping lead to less errors compared to standard bar charts or polar charts. Inspired by these results, we generalise the concept of interactive wrapping to other visualisations for cyclical or relational data. We describe a design space based on the concept of one-dimensional wrapping and two-dimensional wrapping, linked to two common 3D topologies; cylinder and torus that can be used to metaphorically explain one- and two-dimensional wrapping. This design space suggests that interactive wrapping is widely applicable to many different data types.", "title": "Rotate or Wrap? Interactive Visualisations of Cyclical Data on Cylindrical or Toroidal Topologies", "normalizedTitle": "Rotate or Wrap? Interactive Visualisations of Cyclical Data on Cylindrical or Toroidal Topologies", "fno": "09552227", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Bars", "Data Visualization", "Wrapping", "Task Analysis", "Topology", "Time Series Analysis", "Market Research", "Cyclic Temporal Data", "Cylindrical Topologies", "Toroidal Topologies", "Interaction Techniques", "Bar Charts", "Polar Charts", "Crowdsourced Experiment" ], "authors": [ { "givenName": "Kun-Ting", "surname": "Chen", "fullName": "Kun-Ting Chen", "affiliation": "Monash University, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Tim", "surname": "Dwyer", "fullName": "Tim Dwyer", "affiliation": "Monash University, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Benjamin", "surname": "Bach", "fullName": "Benjamin Bach", "affiliation": "University of Edinburgh, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Kim", "surname": "Marriott", "fullName": "Kim Marriott", "affiliation": "Monash University, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "727-736", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000f648", "title": "DVQA: Understanding Data Visualizations via Question Answering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000f648/17D45WZZ7EU", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443125", "title": "Glanceable Visualization: Studies of Data Comparison Performance on Smartwatches", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443125/17D45XDIXRv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904487", "title": "Studying Early Decision Making with Progressive Bar Charts", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904487/1H1geE4olvG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904433", "title": "Evaluating the Use of Uncertainty Visualisations for Imputations of Data Missing At Random in Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904433/1H1gkkbe0hy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a073", "title": "A Flexible Pipeline to Create Different Types of Data Physicalizations", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a073/1KaH4gYfBzG", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807238", "title": "A Comparison of Radial and Linear Charts for Visualizing Daily Patterns", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807238/1cG66qf6MKs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a163", "title": "Proposal and Evaluation of Textual Description Templates for Bar Charts Vocalization", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a163/1cMFc4aDtWo", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a151", "title": "The Cost of Pie Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a151/1cMFcqwGM5q", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222047", "title": "Truth or Square: Aspect Ratio Biases Recall of Position Encodings", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222047/1nTqj3fbFXq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552881", "title": "Modeling Just Noticeable Differences in Charts", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552881/1xibXzMLm9i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09552881", "articleId": "1xibXzMLm9i", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552893", "articleId": "1xic1S53KPS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaq4GfZAI", "name": "ttg202201-09552227s1-tvcg-3114693-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552227s1-tvcg-3114693-mm.zip", "extension": "zip", "size": "11.5 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNCxL9VA", "title": "May", "year": "2012", "issueNum": "05", "idPrefix": "tk", "pubType": "journal", "volume": "24", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwIF6lu", "doi": "10.1109/TKDE.2010.235", "abstract": "This survey attempts to provide a comprehensive and structured overview of the existing research for the problem of detecting anomalies in discrete/symbolic sequences. The objective is to provide a global understanding of the sequence anomaly detection problem and how existing techniques relate to each other. The key contribution of this survey is the classification of the existing research into three distinct categories, based on the problem formulation that they are trying to solve. These problem formulations are: 1) identifying anomalous sequences with respect to a database of normal sequences; 2) identifying an anomalous subsequence within a long sequence; and 3) identifying a pattern in a sequence whose frequency of occurrence is anomalous. We show how each of these problem formulations is characteristically distinct from each other and discuss their relevance in various application domains. We review techniques from many disparate and disconnected application domains that address each of these formulations. Within each problem formulation, we group techniques into categories based on the nature of the underlying algorithm. For each category, we provide a basic anomaly detection technique, and show how the existing techniques are variants of the basic technique. This approach shows how different techniques within a category are related or different from each other. Our categorization reveals new variants and combinations that have not been investigated before for anomaly detection. We also provide a discussion of relative strengths and weaknesses of different techniques. We show how techniques developed for one problem formulation can be adapted to solve a different formulation, thereby providing several novel adaptations to solve the different problem formulations. We also highlight the applicability of the techniques that handle discrete sequences to other related areas such as online anomaly detection and time series anomaly detection.", "abstracts": [ { "abstractType": "Regular", "content": "This survey attempts to provide a comprehensive and structured overview of the existing research for the problem of detecting anomalies in discrete/symbolic sequences. The objective is to provide a global understanding of the sequence anomaly detection problem and how existing techniques relate to each other. The key contribution of this survey is the classification of the existing research into three distinct categories, based on the problem formulation that they are trying to solve. These problem formulations are: 1) identifying anomalous sequences with respect to a database of normal sequences; 2) identifying an anomalous subsequence within a long sequence; and 3) identifying a pattern in a sequence whose frequency of occurrence is anomalous. We show how each of these problem formulations is characteristically distinct from each other and discuss their relevance in various application domains. We review techniques from many disparate and disconnected application domains that address each of these formulations. Within each problem formulation, we group techniques into categories based on the nature of the underlying algorithm. For each category, we provide a basic anomaly detection technique, and show how the existing techniques are variants of the basic technique. This approach shows how different techniques within a category are related or different from each other. Our categorization reveals new variants and combinations that have not been investigated before for anomaly detection. We also provide a discussion of relative strengths and weaknesses of different techniques. We show how techniques developed for one problem formulation can be adapted to solve a different formulation, thereby providing several novel adaptations to solve the different problem formulations. We also highlight the applicability of the techniques that handle discrete sequences to other related areas such as online anomaly detection and time series anomaly detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This survey attempts to provide a comprehensive and structured overview of the existing research for the problem of detecting anomalies in discrete/symbolic sequences. The objective is to provide a global understanding of the sequence anomaly detection problem and how existing techniques relate to each other. The key contribution of this survey is the classification of the existing research into three distinct categories, based on the problem formulation that they are trying to solve. These problem formulations are: 1) identifying anomalous sequences with respect to a database of normal sequences; 2) identifying an anomalous subsequence within a long sequence; and 3) identifying a pattern in a sequence whose frequency of occurrence is anomalous. We show how each of these problem formulations is characteristically distinct from each other and discuss their relevance in various application domains. We review techniques from many disparate and disconnected application domains that address each of these formulations. Within each problem formulation, we group techniques into categories based on the nature of the underlying algorithm. For each category, we provide a basic anomaly detection technique, and show how the existing techniques are variants of the basic technique. This approach shows how different techniques within a category are related or different from each other. Our categorization reveals new variants and combinations that have not been investigated before for anomaly detection. We also provide a discussion of relative strengths and weaknesses of different techniques. We show how techniques developed for one problem formulation can be adapted to solve a different formulation, thereby providing several novel adaptations to solve the different problem formulations. We also highlight the applicability of the techniques that handle discrete sequences to other related areas such as online anomaly detection and time series anomaly detection.", "title": "Anomaly Detection for Discrete Sequences: A Survey", "normalizedTitle": "Anomaly Detection for Discrete Sequences: A Survey", "fno": "ttk2012050823", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Discrete Sequences", "Anomaly Detection" ], "authors": [ { "givenName": "Varun", "surname": "Chandola", "fullName": "Varun Chandola", "affiliation": "Oakridge National Laboratory, Oak Ridge", "__typename": "ArticleAuthorType" }, { "givenName": "Arindam", "surname": "Banerjee", "fullName": "Arindam Banerjee", "affiliation": "University of Minnesota, Minneapolis", "__typename": "ArticleAuthorType" }, { "givenName": "Vipin", "surname": "Kumar", "fullName": "Vipin Kumar", "affiliation": "University of Minnesota, Minneapolis", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2012-05-01 00:00:00", "pubType": "trans", "pages": "823-839", "year": "2012", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2008/3502/0/3502a743", "title": "Comparative Evaluation of Anomaly Detection Techniques for Sequence Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a743/12OmNAKM00D", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ec2nd/2009/3983/0/3983a029", "title": "Visualization and Explanation of Payload-Based Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/ec2nd/2009/3983a029/12OmNyL0TuG", "parentPublication": { "id": "proceedings/ec2nd/2009/3983/0", "title": "2009 European Conference on Computer Network Defense", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2002/02/t0108", "title": "Anomaly Detection in Embedded Systems", "doi": null, "abstractUrl": "/journal/tc/2002/02/t0108/13rRUwI5TQ9", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000g479", "title": "Real-World Anomaly Detection in Surveillance Videos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000g479/17D45Wuc32Y", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800o4360", "title": "Learning Memory-Guided Normality for Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800o4360/1m3niU0APGE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn-s/2020/7260/0/726000a081", "title": "Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/dsn-s/2020/726000a081/1m3ouSqlmVy", "parentPublication": { "id": "proceedings/dsn-s/2020/7260/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09271895", "title": "A Survey of Single-Scene Video Anomaly Detection", "doi": null, "abstractUrl": "/journal/tp/2022/05/09271895/1p2RfRIKNGw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378080", "title": "Adaptive Anomaly Detection for Dynamic Clinical Event Sequences", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378080/1s64B9wjetW", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09468958", "title": "Interpretable Anomaly Detection in Event Sequences via Sequence Matching and Visual Comparison", "doi": null, "abstractUrl": "/journal/tg/2022/12/09468958/1uR9IWtyEi4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09565320", "title": "A Comprehensive Survey on Graph Anomaly Detection with Deep Learning", "doi": null, "abstractUrl": "/journal/tk/5555/01/09565320/1xx849OoPks", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttk2012050813", "articleId": "13rRUwdIOVe", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttk2012050840", "articleId": "13rRUIIVld8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1uSOWwsk8Ks", "title": "May-June", "year": "2021", "issueNum": "03", "idPrefix": "ex", "pubType": "magazine", "volume": "36", "label": "May-June", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1p6aQYYP55e", "doi": "10.1109/MIS.2020.3041174", "abstract": "Anomaly detection has been widely applied in modern data-driven security applications to detect abnormal events/entities that deviate from the majority. However, less work has been done in terms of detecting suspicious event sequences/paths, which are better discriminators than single events/entities for distinguishing normal and abnormal behaviors in complex systems such as cyber-physical systems. A key and challenging step in this endeavor is how to discover those abnormal event sequences from millions of system event records in an efficient and accurate way. To address this issue, we propose NINA, a network diffusion based algorithm for identifying anomalous event sequences. Experimental results on both static and streaming data show that NINA is efficient (processes about 2 million records per minute) and accurate.", "abstracts": [ { "abstractType": "Regular", "content": "Anomaly detection has been widely applied in modern data-driven security applications to detect abnormal events/entities that deviate from the majority. However, less work has been done in terms of detecting suspicious event sequences/paths, which are better discriminators than single events/entities for distinguishing normal and abnormal behaviors in complex systems such as cyber-physical systems. A key and challenging step in this endeavor is how to discover those abnormal event sequences from millions of system event records in an efficient and accurate way. To address this issue, we propose NINA, a network diffusion based algorithm for identifying anomalous event sequences. Experimental results on both static and streaming data show that NINA is efficient (processes about 2 million records per minute) and accurate.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Anomaly detection has been widely applied in modern data-driven security applications to detect abnormal events/entities that deviate from the majority. However, less work has been done in terms of detecting suspicious event sequences/paths, which are better discriminators than single events/entities for distinguishing normal and abnormal behaviors in complex systems such as cyber-physical systems. A key and challenging step in this endeavor is how to discover those abnormal event sequences from millions of system event records in an efficient and accurate way. To address this issue, we propose NINA, a network diffusion based algorithm for identifying anomalous event sequences. Experimental results on both static and streaming data show that NINA is efficient (processes about 2 million records per minute) and accurate.", "title": "Anomalous Event Sequence Detection", "normalizedTitle": "Anomalous Event Sequence Detection", "fno": "09272840", "hasPdf": true, "idPrefix": "ex", "keywords": [ "Cyber Physical Systems", "Security Of Data", "Anomalous Event Sequence Detection", "Anomaly Detection", "Abnormal Behaviors", "Complex Systems", "Cyber Physical Systems", "Abnormal Event Sequences", "System Event Records", "Static Streaming Data", "Data Driven Security Applications", "NINA", "Network Diffusion Based Algorithm", "Convergence", "Receivers", "Anomaly Detection", "Surveillance", "Mathematical Model", "Intelligent Systems", "Complex Systems", "Anomaly Detection", "Intrusion Detection", "Graph Mining", "Sequence Discovery" ], "authors": [ { "givenName": "Boxiang", "surname": "Dong", "fullName": "Boxiang Dong", "affiliation": "Montclair State University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zhengzhang", "surname": "Chen", "fullName": "Zhengzhang Chen", "affiliation": "NEC Labs America, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Lu-An", "surname": "Tang", "fullName": "Lu-An Tang", "affiliation": "NEC Labs America, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Haifeng", "surname": "Chen", "fullName": "Haifeng Chen", "affiliation": "NEC Labs America, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Hui", "surname": "Wang", "fullName": "Hui Wang", "affiliation": "Stevens Institute of Technology, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kai", "surname": "Zhang", "fullName": "Kai Zhang", "affiliation": "Temple University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ying", "surname": "Lin", "fullName": "Ying Lin", "affiliation": "University of Houston, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zhichun", "surname": "Li", "fullName": "Zhichun Li", "affiliation": "Stellar Cyber, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2021-05-01 00:00:00", "pubType": "mags", "pages": "5-13", "year": "2021", "issn": "1541-1672", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vast/2016/5661/0/07883512", "title": "EventAction: Visual analytics for temporal event sequence recommendation", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883512/12OmNBDQbnR", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cinc/2009/3645/2/3645b307", "title": "Real-time Detection for Anomaly Data in Microseismic Monitoring System", "doi": null, "abstractUrl": "/proceedings-article/cinc/2009/3645b307/12OmNCctfp8", "parentPublication": { "id": "cinc/2009/3645/2", "title": "Computational Intelligence and Natural Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/3/3336f043", "title": "Sequence Analysis and Anomaly Detection of Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336f043/12OmNvk7JLu", "parentPublication": { "id": "proceedings/csse/2008/3336/3", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017612", "title": "EventThread: Visual Summarization and Stage Analysis of Event Sequence Data", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017612/13rRUwkxc5r", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005687", "title": "Visual Anomaly Detection in Event Sequence Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005687/1hJs7AGCWuA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2019/3798/0/379800a947", "title": "Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection", "doi": null, "abstractUrl": "/proceedings-article/ictai/2019/379800a947/1hrM2sT2Ufu", "parentPublication": { "id": "proceedings/ictai/2019/3798/0", "title": "2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2020/5809/0/580900a552", "title": "Mining Multivariate Discrete Event Sequences for Knowledge Discovery and Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/dsn/2020/580900a552/1lUFiDGaVYA", "parentPublication": { "id": "proceedings/dsn/2020/5809/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378080", "title": "Adaptive Anomaly Detection for Dynamic Clinical Event Sequences", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378080/1s64B9wjetW", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09410375", "title": "A Background-Agnostic Framework With Adversarial Training for Abnormal Event Detection in Video", "doi": null, "abstractUrl": "/journal/tp/2022/09/09410375/1sYYrP4z1a8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09468958", "title": "Interpretable Anomaly Detection in Event Sequences via Sequence Matching and Visual Comparison", "doi": null, "abstractUrl": "/journal/tg/2022/12/09468958/1uR9IWtyEi4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09470961", "articleId": "1uSOXlie14Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "09318992", "articleId": "1qiRSnb5dtu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1zJitswJVIs", "doi": "10.1109/TKDE.2021.3139086", "abstract": "Analyzing sequence data usually leads to the discovery of interesting patterns and then detect anomalies. In recent years, numerous frameworks and methods have been proposed to discover interesting patterns in sequence data as well as detect anomalous behavior. However, these existing algorithms mainly focus on frequency-driven analytic, and they are challenging to be applied in real-world settings. In this work, we present a new anomaly detection framework called DUOS that enables Discovery of Utility-aware Outlier Sequential rules from a set of sequences. In this pattern-based anomaly detection algorithm, we incorporate both the anomalousness and utility of a group, and then introduce the concept of utility-aware outlier sequential rule (UOSR). We show that this is a more meaningful way of detecting anomalies. Besides, we propose some efficient pruning strategies and method for mining UOSR, as well as the outlier detection. An extensive experimental study conducted on several real-world datasets shows that the proposed DUOS algorithm has a better effectiveness and efficiency. Finally, DUOS outperforms the baseline and has a suitable scalability.", "abstracts": [ { "abstractType": "Regular", "content": "Analyzing sequence data usually leads to the discovery of interesting patterns and then detect anomalies. In recent years, numerous frameworks and methods have been proposed to discover interesting patterns in sequence data as well as detect anomalous behavior. However, these existing algorithms mainly focus on frequency-driven analytic, and they are challenging to be applied in real-world settings. In this work, we present a new anomaly detection framework called DUOS that enables Discovery of Utility-aware Outlier Sequential rules from a set of sequences. In this pattern-based anomaly detection algorithm, we incorporate both the anomalousness and utility of a group, and then introduce the concept of utility-aware outlier sequential rule (UOSR). We show that this is a more meaningful way of detecting anomalies. Besides, we propose some efficient pruning strategies and method for mining UOSR, as well as the outlier detection. An extensive experimental study conducted on several real-world datasets shows that the proposed DUOS algorithm has a better effectiveness and efficiency. Finally, DUOS outperforms the baseline and has a suitable scalability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Analyzing sequence data usually leads to the discovery of interesting patterns and then detect anomalies. In recent years, numerous frameworks and methods have been proposed to discover interesting patterns in sequence data as well as detect anomalous behavior. However, these existing algorithms mainly focus on frequency-driven analytic, and they are challenging to be applied in real-world settings. In this work, we present a new anomaly detection framework called DUOS that enables Discovery of Utility-aware Outlier Sequential rules from a set of sequences. In this pattern-based anomaly detection algorithm, we incorporate both the anomalousness and utility of a group, and then introduce the concept of utility-aware outlier sequential rule (UOSR). We show that this is a more meaningful way of detecting anomalies. Besides, we propose some efficient pruning strategies and method for mining UOSR, as well as the outlier detection. An extensive experimental study conducted on several real-world datasets shows that the proposed DUOS algorithm has a better effectiveness and efficiency. Finally, DUOS outperforms the baseline and has a suitable scalability.", "title": "Anomaly Rule Detection in Sequence Data", "normalizedTitle": "Anomaly Rule Detection in Sequence Data", "fno": "09665277", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Anomaly Detection", "Upper Bound", "Itemsets", "Task Analysis", "Databases", "Standards", "Security", "Anomaly Detection", "Sequence", "Utility Mining", "Sequential Rule", "Upper Bound" ], "authors": [ { "givenName": "Wensheng", "surname": "Gan", "fullName": "Wensheng Gan", "affiliation": "College of Cyber Security, Jinan University, 47885 Guangzhou, Guangdong, China, 510632 (e-mail: wsgan001@gmail.com)", "__typename": "ArticleAuthorType" }, { "givenName": "Lili", "surname": "Chen", "fullName": "Lili Chen", "affiliation": "Department of Computer Science and Technology, Shandong University of Science and Technology, 74789 Qingdao, Shandong, China, (e-mail: lilichien3@gmail.com)", "__typename": "ArticleAuthorType" }, { "givenName": "Shicheng", "surname": "Wan", "fullName": "Shicheng Wan", "affiliation": "Department of Computer Sciences, Guangdong University of Technology, 47870 Guangzhou, Guangdong, China, (e-mail: scwan1998@gmail.com)", "__typename": "ArticleAuthorType" }, { "givenName": "Jiahui", "surname": "Chen", "fullName": "Jiahui Chen", "affiliation": "School of Computers, Guangdong University of Technology, 47870 Guangzhou, Guangdong, China, (e-mail: csjhchen@gmail.com)", "__typename": "ArticleAuthorType" }, { "givenName": "Chien-Ming", "surname": "Chen", "fullName": "Chien-Ming Chen", "affiliation": "College of Computer Science and Engineering, Shandong University of Science and Technology, 74789 Qingdao, Shandong, China, (e-mail: chienming.taiwan@gmail.com)", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2021-12-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2008/3502/0/3502a743", "title": "Comparative Evaluation of Anomaly Detection Techniques for Sequence Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a743/12OmNAKM00D", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2018/3649/0/364901a689", "title": "Anomaly Pattern Detection on Data Streams", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2018/364901a689/12OmNx5piWa", "parentPublication": { "id": "proceedings/bigcomp/2018/3649/0", "title": "2018 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2007/05/k0631", "title": "Conditional Anomaly Detection", "doi": null, "abstractUrl": "/journal/tk/2007/05/k0631/13rRUxC0SEt", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258192", "title": "Online mining for association rules and collective anomalies in data streams", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258192/17D45W2WyyI", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005687", "title": "Visual Anomaly Detection in Event Sequence Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005687/1hJs7AGCWuA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069140", "title": "Anomaly Detection on Big Data in Financial Markets", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069140/1j9xXiZ8kla", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101523", "title": "Automated Anomaly Detection in Large Sequences", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101523/1kaMHzwaWBi", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101752", "title": "SAD: An Unsupervised System for Subsequence Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101752/1kaMO56VV2E", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09468958", "title": "Interpretable Anomaly Detection in Event Sequences via Sequence Matching and Visual Comparison", "doi": null, "abstractUrl": "/journal/tg/2022/12/09468958/1uR9IWtyEi4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccns/2021/2711/0/271100a098", "title": "Anomaly Detection with Partially Observed Anomaly Types", "doi": null, "abstractUrl": "/proceedings-article/ccns/2021/271100a098/1xIOHzCf4Uo", "parentPublication": { "id": "proceedings/ccns/2021/2711/0", "title": "2021 2nd International Conference on Computer Communication and Network Security (CCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09652050", "articleId": "1zmuQ1CVk9a", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669068", "articleId": "1zTfUkpjAyY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvAiSlz", "title": "January/February", "year": "2008", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "14", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUIJuxvf", "doi": "10.1109/TVCG.2007.70405", "abstract": "We propose an acceleration scheme for manybody dynamic collision detection at interactive rates. We use the VADOP, a tight bounding volume representation that offers fast update rates and which is particularly suitable for applications with many fast-moving objects. The axes selection that determines the shape of our bounding volumes is based on spherical coverings. We demonstrate that we can robustly detect collisions that are missed by pseudo-dynamic collision detection schemes, with even greater performance due to substantial collision pruning by our bounding volumes.", "abstracts": [ { "abstractType": "Regular", "content": "We propose an acceleration scheme for manybody dynamic collision detection at interactive rates. We use the VADOP, a tight bounding volume representation that offers fast update rates and which is particularly suitable for applications with many fast-moving objects. The axes selection that determines the shape of our bounding volumes is based on spherical coverings. We demonstrate that we can robustly detect collisions that are missed by pseudo-dynamic collision detection schemes, with even greater performance due to substantial collision pruning by our bounding volumes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose an acceleration scheme for manybody dynamic collision detection at interactive rates. We use the VADOP, a tight bounding volume representation that offers fast update rates and which is particularly suitable for applications with many fast-moving objects. The axes selection that determines the shape of our bounding volumes is based on spherical coverings. We demonstrate that we can robustly detect collisions that are missed by pseudo-dynamic collision detection schemes, with even greater performance due to substantial collision pruning by our bounding volumes.", "title": "Velocity-Aligned Discrete Oriented Polytopes for Dynamic Collision Detection", "normalizedTitle": "Velocity-Aligned Discrete Oriented Polytopes for Dynamic Collision Detection", "fno": "ttg2008010001", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Collision Detection", "Continuous Collision Detection", "Dynamic Collision Detection", "Physically Based Modeling", "Boundary Representations", "Virtual Reality" ], "authors": [ { "givenName": "Daniel S.", "surname": "Coming", "fullName": "Daniel S. Coming", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Oliver G.", "surname": "Staadt", "fullName": "Oliver G. Staadt", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2008-01-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "2008", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccsee/2012/4647/3/4647c557", "title": "Collision Detection Research for Deformable Objects", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c557/12OmNAXxWYc", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c547", "title": "The Algorithm of Fast Collision Detection Based on Hybrid Bounding Box", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c547/12OmNro0HX1", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2010/4297/0/4297a109", "title": "An Algorithm of Collision Detection Based on Hybrid Model", "doi": null, "abstractUrl": "/proceedings-article/cis/2010/4297a109/12OmNwbLVqf", "parentPublication": { "id": "proceedings/cis/2010/4297/0", "title": "2010 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2001/1227/0/12270124", "title": "Dual Brep-CSG Collision Detection for General Polyhedra", "doi": null, "abstractUrl": "/proceedings-article/pg/2001/12270124/12OmNwtn3uG", "parentPublication": { "id": "proceedings/pg/2001/1227/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1999/0167/0/01670082", "title": "Real-time Collision Detection for Virtual Surgery", "doi": null, "abstractUrl": "/proceedings-article/ca/1999/01670082/12OmNzV70Or", "parentPublication": { "id": "proceedings/ca/1999/0167/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/3/3930c410", "title": "A Collision Detection Method Based on the Virtual Occluders", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930c410/12OmNzVGcNi", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c538", "title": "The Collision Detection Algorithm in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c538/12OmNzWx0b7", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/06/v0649", "title": "Image-Based Collision Detection for Deformable Cloth Models", "doi": null, "abstractUrl": "/journal/tg/2004/06/v0649/13rRUNvgz9z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/02/v0254", "title": "Image-Based Techniques in a Hybrid Collision Detector", "doi": null, "abstractUrl": "/journal/tg/2003/02/v0254/13rRUwh80H0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/01/mcg2006010064", "title": "Hierarchical Spherical Distance Fields for Collision Detection", "doi": null, "abstractUrl": "/magazine/cg/2006/01/mcg2006010064/13rRUxBJhoR", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "ttg2008010013", "articleId": "13rRUxly95v", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNrIrPnD", "title": "May", "year": "1993", "issueNum": "05", "idPrefix": "td", "pubType": "journal", "volume": "4", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgQpqm", "doi": "10.1109/71.224218", "abstract": "Multiple-instruction multiple-data (MIMD) algorithms that use multiple processors to domedian splitting, k-splitting and parallel splitting into t equal sections are presented. Bothconcurrent read, exclusive write (CREW) and exclusive read, exclusive write (EREW)versions of the algorithms are given. It is shown that a k-splitting problem can be easilyconverted into a median-splitting problem. Methods for finding multiple split points quickly and application of k-splitting to merging and sorting are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Multiple-instruction multiple-data (MIMD) algorithms that use multiple processors to domedian splitting, k-splitting and parallel splitting into t equal sections are presented. Bothconcurrent read, exclusive write (CREW) and exclusive read, exclusive write (EREW)versions of the algorithms are given. It is shown that a k-splitting problem can be easilyconverted into a median-splitting problem. Methods for finding multiple split points quickly and application of k-splitting to merging and sorting are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multiple-instruction multiple-data (MIMD) algorithms that use multiple processors to domedian splitting, k-splitting and parallel splitting into t equal sections are presented. Bothconcurrent read, exclusive write (CREW) and exclusive read, exclusive write (EREW)versions of the algorithms are given. It is shown that a k-splitting problem can be easilyconverted into a median-splitting problem. Methods for finding multiple split points quickly and application of k-splitting to merging and sorting are discussed.", "title": "Parallel Median Splitting and k-Splitting with Application to Merging and Sorting", "normalizedTitle": "Parallel Median Splitting and k-Splitting with Application to Merging and Sorting", "fno": "l0559", "hasPdf": true, "idPrefix": "td", "keywords": [ "Index Termsk Splitting Merging Sorting Median Splitting Parallel Splitting Parallel Algorithms Sorting" ], "authors": [ { "givenName": "R.", "surname": "Xiong", "fullName": "R. Xiong", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "T.", "surname": "Brown", "fullName": "T. Brown", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "05", "pubDate": "1993-05-01 00:00:00", "pubType": "trans", "pages": "559-565", "year": "1993", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "l0547", "articleId": "13rRUxcKzUP", "__typename": "AdjacentArticleType" }, "next": { "fno": "l0566", "articleId": "13rRUxZ0o0R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNqBKUfO", "title": "January/February", "year": "2008", "issueNum": "01", "idPrefix": "cg", "pubType": "magazine", "volume": "28", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwgQpkV", "doi": "10.1109/MCG.2008.19", "abstract": "Key requirements of effective distance learning are interactivity among participants and the student's sense of presence in the classroom. This system meets those requirements, letting the instructor perceive remote students' body language and facial expressions as they listen and speak, and letting remote students participate in the on-campus classroom.", "abstracts": [ { "abstractType": "Regular", "content": "Key requirements of effective distance learning are interactivity among participants and the student's sense of presence in the classroom. This system meets those requirements, letting the instructor perceive remote students' body language and facial expressions as they listen and speak, and letting remote students participate in the on-campus classroom.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Key requirements of effective distance learning are interactivity among participants and the student's sense of presence in the classroom. This system meets those requirements, letting the instructor perceive remote students' body language and facial expressions as they listen and speak, and letting remote students participate in the on-campus classroom.", "title": "Virtual Classroom Extension for Effective Distance Education", "normalizedTitle": "Virtual Classroom Extension for Effective Distance Education", "fno": "mcg2008010064", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Interaction Techniques", "Virtual Reality", "Distributed Network Graphics", "Applications" ], "authors": [ { "givenName": "Radu", "surname": "Dondera", "fullName": "Radu Dondera", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Chun", "surname": "Jia", "fullName": "Chun Jia", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Voicu", "surname": "Popescu", "fullName": "Voicu Popescu", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Cristina", "surname": "Nita-Rotaru", "fullName": "Cristina Nita-Rotaru", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Melissa", "surname": "Dark", "fullName": "Melissa Dark", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" }, { "givenName": "Cynthia S.", "surname": "York", "fullName": "Cynthia S. York", "affiliation": "Purdue University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2008-01-01 00:00:00", "pubType": "mags", "pages": "64-74", "year": "2008", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/etcs/2009/3557/2/3557c878", "title": "Classroom Education Management and Extension for Colleges and Universities", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557c878/12OmNBJw9RW", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380722", "title": "Multimedia enabled virtual classroom for distance education", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380722/12OmNBfZSmG", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/1997/8114/0/81140231", "title": "Advanced database functions for distance education system: VIEW Classroom", "doi": null, "abstractUrl": "/proceedings-article/ideas/1997/81140231/12OmNBoNrok", "parentPublication": { "id": "proceedings/ideas/1997/8114/0", "title": "Database Engineering and Applications Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417854", "title": "Evaluating interactivity and presence in an online distance learning system", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417854/12OmNroija9", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/2/7961f3f", "title": "Construction of a Web-based virtual classroom and its effective analysis", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/7961f3f/12OmNwEJ0I0", "parentPublication": { "id": "proceedings/fie/2003/7961/2", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a689", "title": "Network Architecture Design of Interactive Distance Education Platform", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a689/12OmNzAFSXd", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2010/7362/0/05550098", "title": "Clicking away the distance from education", "doi": null, "abstractUrl": "/proceedings-article/t4e/2010/05550098/12OmNzWfoS4", "parentPublication": { "id": "proceedings/t4e/2010/7362/0", "title": "2010 International Conference on Technology for Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic4e/2010/5680/0/05432391", "title": "Virtual Classroom with Intelligent Virtual Tutor", "doi": null, "abstractUrl": "/proceedings-article/ic4e/2010/05432391/12OmNzWfoYZ", "parentPublication": { "id": "proceedings/ic4e/2010/5680/0", "title": "2010 International Conference on e-Education, e-Business, e-Management, and e-Learning, (IC4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2003/02/b2047", "title": "The Smart Classroom: Merging Technologies for Seamless Tele-Education", "doi": null, "abstractUrl": "/magazine/pc/2003/02/b2047/13rRUxBrGdy", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a283", "title": "TeachInVR: A virtual reality classroom for remote education", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a283/1CJerjEZuve", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2008010056", "articleId": "13rRUx0xQ1T", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2008010075", "articleId": "13rRUwvT9lE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNrJRP28", "title": "Nov.-Dec.", "year": "2012", "issueNum": "06", "idPrefix": "cg", "pubType": "magazine", "volume": "32", "label": "Nov.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygBw23", "doi": "10.1109/MCG.2012.121", "abstract": "Does realistic lighting in an immersive VR application enhance presence - that is, the participants' feeling that they're actually in the scene and behaving accordingly? Part 1 of this study indicated that presence is more likely with real-time ray tracing than with ray casting. However, that research couldn't separate the effects of overall illumination quality from the dynamic effects of real-time shadows and reflections. In a new experiment, 20 people experienced a scene rendered with either global or local illumination. Both conditions included dynamically changing shadows and reflections. Illumination quality didn't affect presence, so the earlier result must have been caused by dynamic shadows and reflections. Nevertheless, global illumination did result in greater plausibility - that is, participants were more likely to respond as if the virtual events were real. These results indicate that global illumination does affect participant responses and is worth the effort.", "abstracts": [ { "abstractType": "Regular", "content": "Does realistic lighting in an immersive VR application enhance presence - that is, the participants' feeling that they're actually in the scene and behaving accordingly? Part 1 of this study indicated that presence is more likely with real-time ray tracing than with ray casting. However, that research couldn't separate the effects of overall illumination quality from the dynamic effects of real-time shadows and reflections. In a new experiment, 20 people experienced a scene rendered with either global or local illumination. Both conditions included dynamically changing shadows and reflections. Illumination quality didn't affect presence, so the earlier result must have been caused by dynamic shadows and reflections. Nevertheless, global illumination did result in greater plausibility - that is, participants were more likely to respond as if the virtual events were real. These results indicate that global illumination does affect participant responses and is worth the effort.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Does realistic lighting in an immersive VR application enhance presence - that is, the participants' feeling that they're actually in the scene and behaving accordingly? Part 1 of this study indicated that presence is more likely with real-time ray tracing than with ray casting. However, that research couldn't separate the effects of overall illumination quality from the dynamic effects of real-time shadows and reflections. In a new experiment, 20 people experienced a scene rendered with either global or local illumination. Both conditions included dynamically changing shadows and reflections. Illumination quality didn't affect presence, so the earlier result must have been caused by dynamic shadows and reflections. Nevertheless, global illumination did result in greater plausibility - that is, participants were more likely to respond as if the virtual events were real. These results indicate that global illumination does affect participant responses and is worth the effort.", "title": "Visual Realism Enhances Realistic Response in an Immersive Virtual Environment - Part 2", "normalizedTitle": "Visual Realism Enhances Realistic Response in an Immersive Virtual Environment - Part 2", "fno": "mcg2012060036", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Virtual Environments", "Lighting", "Multimedia Communication", "Illumination", "Avatars", "Computer Graphics", "Virtual Environments", "Lighting", "Multimedia Communication", "Illumination", "Avatars", "Graphics And Multimedia", "Virtual Environments", "Presence", "Visual Realism", "Real Time Global Illumination", "Shadows", "Reflections", "Virtual Body", "Avatar", "Virtual Reality" ], "authors": [ { "givenName": null, "surname": "Insu Yu", "fullName": "Insu Yu", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "J.", "surname": "Mortensen", "fullName": "J. Mortensen", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "P.", "surname": "Khanna", "fullName": "P. Khanna", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "B.", "surname": "Spanlang", "fullName": "B. Spanlang", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "M.", "surname": "Slater", "fullName": "M. Slater", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2012-11-01 00:00:00", "pubType": "mags", "pages": "36-45", "year": "2012", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iwar/1999/0359/0/03590115", "title": "Photometric Image-Based Rendering for Virtual Lighting Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/iwar/1999/03590115/12OmNqNG3km", "parentPublication": { "id": "proceedings/iwar/1999/0359/0", "title": "Augmented Reality, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175805", "title": "Realistic volume imaging", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175805/12OmNwErpQj", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011856", "title": "Real-time rendering with complex natural illumination", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011856/12OmNweTvQm", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948407", "title": "Delta Voxel Cone Tracing", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948407/12OmNxG1yH8", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2008/2741/0/04634627", "title": "Interactive volumetric shadows in participating media with single-scattering", "doi": null, "abstractUrl": "/proceedings-article/rt/2008/04634627/12OmNyjtNIF", "parentPublication": { "id": "proceedings/rt/2008/2741/0", "title": "Symposium on Interactive Ray Tracing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2010/4080/1/05571039", "title": "Illumination Component Separation Method Based on Independent Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/icie/2010/05571039/13bd1h03qO3", "parentPublication": { "id": "proceedings/icie/2010/4080/1", "title": "Information Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2003/03/mcg2003030054", "title": "Fast, Realistic Lighting for Video Games", "doi": null, "abstractUrl": "/magazine/cg/2003/03/mcg2003030054/13rRUwwslvK", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/06/mcg2008060056", "title": "Real-Time Global Illumination for VR Applications", "doi": null, "abstractUrl": "/magazine/cg/2008/06/mcg2008060056/13rRUxAASMT", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/03/mcg2009030076", "title": "Visual Realism Enhances Realistic Response in an Immersive Virtual Environment", "doi": null, "abstractUrl": "/magazine/cg/2009/03/mcg2009030076/13rRUyfKIKz", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a222", "title": "Avatars rendering and its effect on perceived realism in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a222/1qpzCeSHOsE", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2012060026", "articleId": "13rRUwwJWBj", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2012060046", "articleId": "13rRUEgarDK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1GjwQktLcB2", "title": "Oct.", "year": "2022", "issueNum": "10", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1EYxoEPe9eU", "doi": "10.1109/TVCG.2022.3190623", "abstract": "In social networks, individuals&#x2019; decisions are strongly influenced by recommendations from their friends, acquaintances, and favorite renowned personalities. The popularity of online social networking platforms makes them the prime venues to advertise products and promote opinions. The <italic>Influence Maximization</italic> (IM) problem entails selecting a <italic>seed set</italic> of users that maximizes the influence spread, i.e., the expected number of users positively influenced by a stochastic diffusion process triggered by the seeds. Engineering and analyzing IM algorithms remains a difficult and demanding task due to the NP-hardness of the problem and the stochastic nature of the diffusion processes. Despite several heuristics being introduced, they often fail in providing enough information on how the network topology affects the diffusion process, precious insights that could help researchers improve their seed set selection. In this paper, we present VAIM, a visual analytics system that supports users in analyzing, evaluating, and comparing information diffusion processes determined by different IM algorithms. Furthermore, VAIM provides useful insights that the analyst can use to modify the seed set of an IM algorithm, so to improve its influence spread. We assess our system by: <inline-formula><tex-math notation=\"LaTeX\">Z_$(i)$_Z</tex-math></inline-formula> a qualitative evaluation based on a guided experiment with two domain experts on two different data sets; <inline-formula><tex-math notation=\"LaTeX\">Z_$(ii)$_Z</tex-math></inline-formula> a quantitative estimation of the value of the proposed visualization through the ICE-T methodology by Wall <italic>et al.</italic> (IEEE TVCG - 2018). The twofold assessment indicates that VAIM effectively supports our target users in the visual analysis of the performance of IM algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "In social networks, individuals&#x2019; decisions are strongly influenced by recommendations from their friends, acquaintances, and favorite renowned personalities. The popularity of online social networking platforms makes them the prime venues to advertise products and promote opinions. The <italic>Influence Maximization</italic> (IM) problem entails selecting a <italic>seed set</italic> of users that maximizes the influence spread, i.e., the expected number of users positively influenced by a stochastic diffusion process triggered by the seeds. Engineering and analyzing IM algorithms remains a difficult and demanding task due to the NP-hardness of the problem and the stochastic nature of the diffusion processes. Despite several heuristics being introduced, they often fail in providing enough information on how the network topology affects the diffusion process, precious insights that could help researchers improve their seed set selection. In this paper, we present VAIM, a visual analytics system that supports users in analyzing, evaluating, and comparing information diffusion processes determined by different IM algorithms. Furthermore, VAIM provides useful insights that the analyst can use to modify the seed set of an IM algorithm, so to improve its influence spread. We assess our system by: <inline-formula><tex-math notation=\"LaTeX\">$(i)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>i</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"arleo-ieq1-3190623.gif\"/></alternatives></inline-formula> a qualitative evaluation based on a guided experiment with two domain experts on two different data sets; <inline-formula><tex-math notation=\"LaTeX\">$(ii)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>i</mml:mi><mml:mi>i</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"arleo-ieq2-3190623.gif\"/></alternatives></inline-formula> a quantitative estimation of the value of the proposed visualization through the ICE-T methodology by Wall <italic>et al.</italic> (IEEE TVCG - 2018). The twofold assessment indicates that VAIM effectively supports our target users in the visual analysis of the performance of IM algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In social networks, individuals’ decisions are strongly influenced by recommendations from their friends, acquaintances, and favorite renowned personalities. The popularity of online social networking platforms makes them the prime venues to advertise products and promote opinions. The Influence Maximization (IM) problem entails selecting a seed set of users that maximizes the influence spread, i.e., the expected number of users positively influenced by a stochastic diffusion process triggered by the seeds. Engineering and analyzing IM algorithms remains a difficult and demanding task due to the NP-hardness of the problem and the stochastic nature of the diffusion processes. Despite several heuristics being introduced, they often fail in providing enough information on how the network topology affects the diffusion process, precious insights that could help researchers improve their seed set selection. In this paper, we present VAIM, a visual analytics system that supports users in analyzing, evaluating, and comparing information diffusion processes determined by different IM algorithms. Furthermore, VAIM provides useful insights that the analyst can use to modify the seed set of an IM algorithm, so to improve its influence spread. We assess our system by: - a qualitative evaluation based on a guided experiment with two domain experts on two different data sets; - a quantitative estimation of the value of the proposed visualization through the ICE-T methodology by Wall et al. (IEEE TVCG - 2018). The twofold assessment indicates that VAIM effectively supports our target users in the visual analysis of the performance of IM algorithms.", "title": "Influence Maximization With Visual Analytics", "normalizedTitle": "Influence Maximization With Visual Analytics", "fno": "09829321", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Diffusion Processes", "Social Networking Online", "Data Visualization", "Analytical Models", "Visual Analytics", "Stochastic Processes", "Computational Modeling", "Information Visualization", "Visualization Systems And Software", "Influence Maximization", "Visual Analytics", "Information Diffusion" ], "authors": [ { "givenName": "Alessio", "surname": "Arleo", "fullName": "Alessio Arleo", "affiliation": "Centre for Visual Analytics Science and Technology, TU Wien, Vienna, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Walter", "surname": "Didimo", "fullName": "Walter Didimo", "affiliation": "Engineering Department, University of Perugia, Perugia, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Giuseppe", "surname": "Liotta", "fullName": "Giuseppe Liotta", "affiliation": "Engineering Department, University of Perugia, Perugia, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Silvia", "surname": "Miksch", "fullName": "Silvia Miksch", "affiliation": "Centre for Visual Analytics Science and Technology, TU Wien, Vienna, Austria", "__typename": "ArticleAuthorType" }, { "givenName": "Fabrizio", "surname": "Montecchiani", "fullName": "Fabrizio Montecchiani", "affiliation": "Engineering Department, University of Perugia, Perugia, Italy", "__typename": "ArticleAuthorType" } ], "replicability": { "isEnabled": true, "codeDownloadUrl": "https://github.com/EngAAlex/VAIM.git", "codeRepositoryUrl": "https://github.com/EngAAlex/VAIM", "__typename": "ArticleReplicabilityType" }, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "10", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "3428-3440", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/06/09774007", "title": "Graph Stream Sketch: Summarizing Graph Streams With High Speed and Accuracy", "doi": null, "abstractUrl": "/journal/tk/2023/06/09774007/1DjDnjq9sGI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/05/08910380", "title": "Alignment-Free Sequence Comparison With Multiple k Values", "doi": null, "abstractUrl": "/journal/tb/2021/05/08910380/1faprrA6gAo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09040652", "title": "Fastest Path Query Answering using Time-Dependent Hop-Labeling in Road Network", "doi": null, "abstractUrl": "/journal/tk/2022/01/09040652/1iiwVUuWSVa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09121771", "title": "Continuous Monitoring of Maximum Clique Over Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/04/09121771/1kMT4CxqinC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/03/09126219", "title": "Efficient Encrypted Data Search With Expressive Queries and Flexible Update", "doi": null, "abstractUrl": "/journal/sc/2022/03/09126219/1kWQqX0HGaA", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09110776", "title": "Accelerated Variance Reduction Stochastic ADMM for Large-Scale Machine Learning", "doi": null, "abstractUrl": "/journal/tp/2021/12/09110776/1kuDlRSAfuw", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/03/09200544", "title": "Large-Scale Nonlinear AUC Maximization via Triply Stochastic Gradients", "doi": null, "abstractUrl": "/journal/tp/2022/03/09200544/1ndVgSbeYRW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09266749", "title": "Easy-But-Effective Domain Sub-Similarity Learning for Transfer Regression", "doi": null, "abstractUrl": "/journal/tk/2022/09/09266749/1oZxqu9nYcg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09470928", "title": "2-hop+ Sampling: Efficient and Effective Influence Estimation", "doi": null, "abstractUrl": "/journal/tk/2023/02/09470928/1uSOz4qFxwA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09477007", "title": "Cascaded Algorithm Selection With Extreme-Region UCB Bandit", "doi": null, "abstractUrl": "/journal/tp/2022/10/09477007/1v2M4Z5uWGI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09366379", "articleId": "1rCc9A58Mec", "__typename": "AdjacentArticleType" }, "next": { "fno": "09382844", "articleId": "1saZr0JHX5C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Gjx2Updt1C", "name": "ttg202210-09829321s1-supp1-3190623.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202210-09829321s1-supp1-3190623.mp4", "extension": "mp4", "size": "70.2 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xjR3LSQrLi", "doi": "10.1109/TVCG.2021.3114789", "abstract": "What makes speeches effective has long been a subject for debate, and until today there is broad controversy among public speaking experts about what factors make a speech effective as well as the roles of these factors in speeches. Moreover, there is a lack of quantitative analysis methods to help understand effective speaking strategies. In this paper, we propose E-ffective, a visual analytic system allowing speaking experts and novices to analyze both the role of speech factors and their contribution in effective speeches. From interviews with domain experts and investigating existing literature, we identified important factors to consider in inspirational speeches. We obtained the generated factors from multi-modal data that were then related to effectiveness data. Our system supports rapid understanding of critical factors in inspirational speeches, including the influence of emotions by means of novel visualization methods and interaction. Two novel visualizations include E-spiral (that shows the emotional shifts in speeches in a visually compact way) and E-script (that connects speech content with key speech delivery information). In our evaluation we studied the influence of our system on experts&#x0027; domain knowledge about speech factors. We further studied the usability of the system by speaking novices and experts on assisting analysis of inspirational speech effectiveness.", "abstracts": [ { "abstractType": "Regular", "content": "What makes speeches effective has long been a subject for debate, and until today there is broad controversy among public speaking experts about what factors make a speech effective as well as the roles of these factors in speeches. Moreover, there is a lack of quantitative analysis methods to help understand effective speaking strategies. In this paper, we propose E-ffective, a visual analytic system allowing speaking experts and novices to analyze both the role of speech factors and their contribution in effective speeches. From interviews with domain experts and investigating existing literature, we identified important factors to consider in inspirational speeches. We obtained the generated factors from multi-modal data that were then related to effectiveness data. Our system supports rapid understanding of critical factors in inspirational speeches, including the influence of emotions by means of novel visualization methods and interaction. Two novel visualizations include E-spiral (that shows the emotional shifts in speeches in a visually compact way) and E-script (that connects speech content with key speech delivery information). In our evaluation we studied the influence of our system on experts&#x0027; domain knowledge about speech factors. We further studied the usability of the system by speaking novices and experts on assisting analysis of inspirational speech effectiveness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "What makes speeches effective has long been a subject for debate, and until today there is broad controversy among public speaking experts about what factors make a speech effective as well as the roles of these factors in speeches. Moreover, there is a lack of quantitative analysis methods to help understand effective speaking strategies. In this paper, we propose E-ffective, a visual analytic system allowing speaking experts and novices to analyze both the role of speech factors and their contribution in effective speeches. From interviews with domain experts and investigating existing literature, we identified important factors to consider in inspirational speeches. We obtained the generated factors from multi-modal data that were then related to effectiveness data. Our system supports rapid understanding of critical factors in inspirational speeches, including the influence of emotions by means of novel visualization methods and interaction. Two novel visualizations include E-spiral (that shows the emotional shifts in speeches in a visually compact way) and E-script (that connects speech content with key speech delivery information). In our evaluation we studied the influence of our system on experts' domain knowledge about speech factors. We further studied the usability of the system by speaking novices and experts on assisting analysis of inspirational speech effectiveness.", "title": "E-ffective: A Visual Analytic System for Exploring the Emotion and Effectiveness of Inspirational Speeches", "normalizedTitle": "E-ffective: A Visual Analytic System for Exploring the Emotion and Effectiveness of Inspirational Speeches", "fno": "09555490", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Speech Recognition", "Speech Content", "Key Speech Delivery Information", "Speech Factors", "Inspirational Speech Effectiveness", "Visual Analytic System", "Inspirational Speeches", "Public Speaking Experts", "Speech Effective", "Quantitative Analysis Methods", "Effective Speaking Strategies", "Effective Speeches", "Domain Experts", "Investigating Existing Literature", "Generated Factors", "Effectiveness Data", "Novel Visualization Methods", "Speech", "Public Speaking", "Interviews", "Measurement", "Data Visualization", "Visual Analytics", "Task Analysis", "Affective Visualization", "Multimodal Analysis", "Speech Effectiveness" ], "authors": [ { "givenName": "Kevin", "surname": "Maher", "fullName": "Kevin Maher", "affiliation": "Institute of Software, Chinese Academy of Sciences, Tsinghua University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zeyuan", "surname": "Huang", "fullName": "Zeyuan Huang", "affiliation": "State Key Laboratory of Computer Science, Beijing Key Lab of Human-Computer Interaction, Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiancheng", "surname": "Song", "fullName": "Jiancheng Song", "affiliation": "State Key Laboratory of Computer Science, Beijing Key Lab of Human-Computer Interaction, Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoming", "surname": "Deng", "fullName": "Xiaoming Deng", "affiliation": "State Key Laboratory of Computer Science, Beijing Key Lab of Human-Computer Interaction, Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu-Kun", "surname": "Lai", "fullName": "Yu-Kun Lai", "affiliation": "Cardiff University, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Cuixia", "surname": "Ma", "fullName": "Cuixia Ma", "affiliation": "State Key Laboratory of Computer Science, Beijing Key Lab of Human-Computer Interaction, Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hao", "surname": "Wang", "fullName": "Hao Wang", "affiliation": "State Key Laboratory of Computer Science, Beijing Key Lab of Human-Computer Interaction, Institute of Software, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong-Jin", "surname": "Liu", "fullName": "Yong-Jin Liu", "affiliation": "Tsinghua University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hongan", "surname": "Wang", "fullName": "Hongan Wang", "affiliation": "Alibaba Group, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "508-517", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fg/2018/2335/0/233501a607", "title": "Analyzing the Impact of Gender on the Automation of Feedback for Public Speaking", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a607/12OmNBt3qna", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550793", "title": "Head pose estimation and movement analysis for speech scene", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550793/12OmNrH1PFd", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci/2006/0475/1/04216400", "title": "GA-Based Speaking Mouth Correlative Speech Feature Abstraction", "doi": null, "abstractUrl": "/proceedings-article/icci/2006/04216400/12OmNwDACBQ", "parentPublication": { "id": "proceedings/icci/2006/0475/1", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2019/7789/0/08679261", "title": "SpeechLens: A Visual Analytics Approach for Exploring Speech Strategies with Textural and Acoustic Features", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2019/08679261/18XknOkGKbK", "parentPublication": { "id": "proceedings/bigcomp/2019/7789/0", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09761750", "title": "GestureLens: Visual Analysis of Gestures in Presentation Videos", "doi": null, "abstractUrl": "/journal/tg/5555/01/09761750/1CKMkYw5fa0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a855", "title": "Public Speaking Simulator with Speech and Audience Feedback", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a855/1J7WcXvZnNu", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/01/08818609", "title": "Affective Audio Annotation of Public Speeches with Convolutional Clustering Neural Network", "doi": null, "abstractUrl": "/journal/ta/2022/01/08818609/1cRBn0C8oCc", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090563", "title": "Virtualized Speech Practice for the College Classroom", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090563/1jIxutrshaw", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2020/1924/0/192400a724", "title": "An Analysis of Interpersonal Function in TED Educational Speeches", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2020/192400a724/1uHhsnJt5CM", "parentPublication": { "id": "proceedings/wi-iat/2020/1924/0", "title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09488285", "title": "DeHumor: Visual Analytics for Decomposing Humor", "doi": null, "abstractUrl": "/journal/tg/2022/12/09488285/1vhIcg5WCZy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09552840", "articleId": "1xic2GL1FC0", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552910", "articleId": "1xicaDADRqU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaYJznOus", "name": "ttg202201-09555490s1-supp1-3114789.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09555490s1-supp1-3114789.mp4", "extension": "mp4", "size": "119 MB", "__typename": "WebExtraType" }, { "id": "1zBaYxqTcFq", "name": "ttg202201-09555490s1-supp2-3114789.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09555490s1-supp2-3114789.pdf", "extension": "pdf", "size": "991 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1Lk2bbwqInK", "title": "April", "year": "2023", "issueNum": "04", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1A8c5TwZjtS", "doi": "10.1109/TKDE.2022.3142773", "abstract": "Next-basket recommendation considers the problem of recommending a set of items into the next basket that users will purchase as a whole. In this paper, we develop a novel mixed model with preferences, popularities and transitions (<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {M^2}}\\limits$_Z</tex-math></inline-formula>) for the next-basket recommendation. This method models three important factors in next-basket generation process: 1) users&#x2019; general preferences, 2) items&#x2019; global popularities and 3) transition patterns among items. Unlike existing recurrent neural network-based approaches, <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {M^2}}\\limits$_Z</tex-math></inline-formula> does not use the complicated networks to model the transitions among items, or generate embeddings for users. Instead, it has a simple encoder-decoder based approach (<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {ed\\text{-}Trans}}\\limits$_Z</tex-math></inline-formula>) to better model the transition patterns among items. We compared <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {M^2}}\\limits$_Z</tex-math></inline-formula> with different combinations of the factors with 5 state-of-the-art next-basket recommendation methods on 4 public benchmark datasets in recommending the first, second and third next basket. Our experimental results demonstrate that <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {M^2}}\\limits$_Z</tex-math></inline-formula> significantly outperforms the state-of-the-art methods on all the datasets in all the tasks, with an improvement of up to 22.1&#x0025;. In addition, our ablation study demonstrates that the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {ed\\text{-}Trans}}\\limits$_Z</tex-math></inline-formula> is more effective than recurrent neural networks in terms of the recommendation performance. We also have a thorough discussion on various experimental protocols and evaluation metrics for next-basket recommendation evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "Next-basket recommendation considers the problem of recommending a set of items into the next basket that users will purchase as a whole. In this paper, we develop a novel mixed model with preferences, popularities and transitions (<inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {M^2}}\\limits$</tex-math><alternatives><mml:math><mml:msup><mml:mi mathvariant=\"monospace\">M</mml:mi><mml:mn mathvariant=\"monospace\">2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"ning-ieq1-3142773.gif\"/></alternatives></inline-formula>) for the next-basket recommendation. This method models three important factors in next-basket generation process: 1) users&#x2019; general preferences, 2) items&#x2019; global popularities and 3) transition patterns among items. Unlike existing recurrent neural network-based approaches, <inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {M^2}}\\limits$</tex-math><alternatives><mml:math><mml:msup><mml:mi mathvariant=\"monospace\">M</mml:mi><mml:mn mathvariant=\"monospace\">2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"ning-ieq2-3142773.gif\"/></alternatives></inline-formula> does not use the complicated networks to model the transitions among items, or generate embeddings for users. Instead, it has a simple encoder-decoder based approach (<inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {ed\\text{-}Trans}}\\limits$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"monospace\">ed</mml:mi><mml:mtext mathvariant=\"monospace\">-</mml:mtext><mml:mi mathvariant=\"monospace\">Trans</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq3-3142773.gif\"/></alternatives></inline-formula>) to better model the transition patterns among items. We compared <inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {M^2}}\\limits$</tex-math><alternatives><mml:math><mml:msup><mml:mi mathvariant=\"monospace\">M</mml:mi><mml:mn mathvariant=\"monospace\">2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"ning-ieq4-3142773.gif\"/></alternatives></inline-formula> with different combinations of the factors with 5 state-of-the-art next-basket recommendation methods on 4 public benchmark datasets in recommending the first, second and third next basket. Our experimental results demonstrate that <inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {M^2}}\\limits$</tex-math><alternatives><mml:math><mml:msup><mml:mi mathvariant=\"monospace\">M</mml:mi><mml:mn mathvariant=\"monospace\">2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"ning-ieq5-3142773.gif\"/></alternatives></inline-formula> significantly outperforms the state-of-the-art methods on all the datasets in all the tasks, with an improvement of up to 22.1&#x0025;. In addition, our ablation study demonstrates that the <inline-formula><tex-math notation=\"LaTeX\">$\\mathop {\\mathtt {ed\\text{-}Trans}}\\limits$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"monospace\">ed</mml:mi><mml:mtext mathvariant=\"monospace\">-</mml:mtext><mml:mi mathvariant=\"monospace\">Trans</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq6-3142773.gif\"/></alternatives></inline-formula> is more effective than recurrent neural networks in terms of the recommendation performance. We also have a thorough discussion on various experimental protocols and evaluation metrics for next-basket recommendation evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Next-basket recommendation considers the problem of recommending a set of items into the next basket that users will purchase as a whole. In this paper, we develop a novel mixed model with preferences, popularities and transitions (-) for the next-basket recommendation. This method models three important factors in next-basket generation process: 1) users’ general preferences, 2) items’ global popularities and 3) transition patterns among items. Unlike existing recurrent neural network-based approaches, - does not use the complicated networks to model the transitions among items, or generate embeddings for users. Instead, it has a simple encoder-decoder based approach (-) to better model the transition patterns among items. We compared - with different combinations of the factors with 5 state-of-the-art next-basket recommendation methods on 4 public benchmark datasets in recommending the first, second and third next basket. Our experimental results demonstrate that - significantly outperforms the state-of-the-art methods on all the datasets in all the tasks, with an improvement of up to 22.1%. In addition, our ablation study demonstrates that the - is more effective than recurrent neural networks in terms of the recommendation performance. We also have a thorough discussion on various experimental protocols and evaluation metrics for next-basket recommendation evaluation.", "title": "M<sup>2</sup>: Mixed Models With Preferences, Popularities and Transitions for Next-Basket Recommendation", "normalizedTitle": "M2: Mixed Models With Preferences, Popularities and Transitions for Next-Basket Recommendation", "fno": "09681238", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Decoding", "Neural Nets", "Recommender Systems", "Encoder Decoder Based Approach", "Item Global Popularities", "Method Models", "Mixed Models", "Next Basket Generation Process", "Next Basket Recommendation Evaluation", "Next Basket Recommendation Methods", "Transition Patterns", "User General Preferences", "Recurrent Neural Networks", "Task Analysis", "Benchmark Testing", "Adaptation Models", "Decoding", "Protocols", "Markov Processes", "Recommender Systems", "Next Basket Recommendation", "Encoder Decoder Architecture", "Mixed Models" ], "authors": [ { "givenName": "Bo", "surname": "Peng", "fullName": "Bo Peng", "affiliation": "Department of Computer Science and Engineering, The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Zhiyun", "surname": "Ren", "fullName": "Zhiyun Ren", "affiliation": "Department of Biomedical Informatics, The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Srinivasan", "surname": "Parthasarathy", "fullName": "Srinivasan Parthasarathy", "affiliation": "Department of Biomedical Informatics, Department of Computer Science and Engineering, Translational Data Analytics Institute, The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xia", "surname": "Ning", "fullName": "Xia Ning", "affiliation": "Department of Biomedical Informatics, Department of Computer Science and Engineering, Translational Data Analytics Institute, The Ohio State University, Columbus, OH, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "04", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "4033-4046", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09720081", "title": "Accelerating Graph Similarity Search via Efficient GED Computation", "doi": null, "abstractUrl": "/journal/tk/2023/05/09720081/1Bef4rodeLK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/03/09827923", "title": "PMNS for Efficient Arithmetic and Small Memory Cost", "doi": null, "abstractUrl": "/journal/ec/2022/03/09827923/1EWSBFUfd6M", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/01/08762164", "title": "Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices", "doi": null, "abstractUrl": "/journal/sc/2022/01/08762164/1bIeA35thIc", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/03/08684321", "title": "DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans", "doi": null, "abstractUrl": "/journal/tq/2021/03/08684321/1bmESe47dgA", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/03/09078874", "title": "Evaluating Public Anxiety for Topic-Based Communities in Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/03/09078874/1kepTZLjNlK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09187550", "title": "Towards More Secure Constructions of Adjustable Join Schemes", "doi": null, "abstractUrl": "/journal/tq/2022/02/09187550/1mVFLWkSEQU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09279262", "title": "Auto-Encoding and Distilling Scene Graphs for Image Captioning", "doi": null, "abstractUrl": "/journal/tp/2022/05/09279262/1pg8vG979cs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09316235", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathop {\\mathtt {HAM}}$_Z</tex-math></inline-formula>: Hybrid Associations Models for Sequential Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/10/09316235/1qaz7C1V5pm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/04/09366363", "title": "Security of Multi-Adjustable Join Schemes: Separations and Implications", "doi": null, "abstractUrl": "/journal/tq/2022/04/09366363/1twaRGe1SOQ", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09527143", "title": "Kernelized Multitask Learning Method for Personalized Signaling Adverse Drug Reactions", "doi": null, "abstractUrl": "/journal/tk/2023/02/09527143/1wznIJtLI4w", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09661309", "articleId": "1zzl2OrpFMk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09672709", "articleId": "1zWzFOqTwxq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Lk2do43tFS", "name": "ttk202304-09681238s1-supp1-3142773.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk202304-09681238s1-supp1-3142773.pdf", "extension": "pdf", "size": "188 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1KsRWKKVV7i", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Dlifb1d2c8", "doi": "10.1109/TPAMI.2022.3174895", "abstract": "Micro-expression (ME) is a significant non-verbal communication clue that reveals one person&#x0027;s genuine emotional state. The development of micro-expression analysis (MEA) has just gained attention in the last decade. However, the small sample size problem constrains the use of deep learning on MEA. Besides, ME samples distribute in six different databases, leading to database bias. Moreover, the ME database development is complicated. In this article, we introduce a large-scale spontaneous ME database: CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula>. The contribution of this article is summarized as follows: (1) CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula> offers around 80 hours of videos with over 8,000,000 frames, including manually labeled 1,109 MEs and 3,490 macro-expressions. Such a large sample size allows effective MEA method validation while avoiding database bias. (2) Inspired by psychological experiments, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula> provides the depth information as an additional modality unprecedentedly, contributing to multi-modal MEA. (3) For the first time, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula> elicits ME with high ecological validity using the mock crime paradigm, along with physiological and voice signals, contributing to practical MEA. (4) Besides, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula> provides 1,508 unlabeled videos with more than 4,000,000 frames, i.e., a data platform for unsupervised MEA methods. (5) Finally, we demonstrate the effectiveness of depth information by the proposed depth flow algorithm and RGB-D information.", "abstracts": [ { "abstractType": "Regular", "content": "Micro-expression (ME) is a significant non-verbal communication clue that reveals one person&#x0027;s genuine emotional state. The development of micro-expression analysis (MEA) has just gained attention in the last decade. However, the small sample size problem constrains the use of deep learning on MEA. Besides, ME samples distribute in six different databases, leading to database bias. Moreover, the ME database development is complicated. In this article, we introduce a large-scale spontaneous ME database: CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">$^{3}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"wang-ieq1-3174895.gif\"/></alternatives></inline-formula>. The contribution of this article is summarized as follows: (1) CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">$^{3}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"wang-ieq2-3174895.gif\"/></alternatives></inline-formula> offers around 80 hours of videos with over 8,000,000 frames, including manually labeled 1,109 MEs and 3,490 macro-expressions. Such a large sample size allows effective MEA method validation while avoiding database bias. (2) Inspired by psychological experiments, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">$^{3}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"wang-ieq3-3174895.gif\"/></alternatives></inline-formula> provides the depth information as an additional modality unprecedentedly, contributing to multi-modal MEA. (3) For the first time, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">$^{3}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"wang-ieq4-3174895.gif\"/></alternatives></inline-formula> elicits ME with high ecological validity using the mock crime paradigm, along with physiological and voice signals, contributing to practical MEA. (4) Besides, CAS(ME)<inline-formula><tex-math notation=\"LaTeX\">$^{3}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"wang-ieq5-3174895.gif\"/></alternatives></inline-formula> provides 1,508 unlabeled videos with more than 4,000,000 frames, i.e., a data platform for unsupervised MEA methods. (5) Finally, we demonstrate the effectiveness of depth information by the proposed depth flow algorithm and RGB-D information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Micro-expression (ME) is a significant non-verbal communication clue that reveals one person's genuine emotional state. The development of micro-expression analysis (MEA) has just gained attention in the last decade. However, the small sample size problem constrains the use of deep learning on MEA. Besides, ME samples distribute in six different databases, leading to database bias. Moreover, the ME database development is complicated. In this article, we introduce a large-scale spontaneous ME database: CAS(ME)-. The contribution of this article is summarized as follows: (1) CAS(ME)- offers around 80 hours of videos with over 8,000,000 frames, including manually labeled 1,109 MEs and 3,490 macro-expressions. Such a large sample size allows effective MEA method validation while avoiding database bias. (2) Inspired by psychological experiments, CAS(ME)- provides the depth information as an additional modality unprecedentedly, contributing to multi-modal MEA. (3) For the first time, CAS(ME)- elicits ME with high ecological validity using the mock crime paradigm, along with physiological and voice signals, contributing to practical MEA. (4) Besides, CAS(ME)- provides 1,508 unlabeled videos with more than 4,000,000 frames, i.e., a data platform for unsupervised MEA methods. (5) Finally, we demonstrate the effectiveness of depth information by the proposed depth flow algorithm and RGB-D information.", "title": "CAS(ME)<sup>3</sup>: A Third Generation Facial Spontaneous Micro-Expression Database With Depth Information and High Ecological Validity", "normalizedTitle": "CAS(ME)3: A Third Generation Facial Spontaneous Micro-Expression Database With Depth Information and High Ecological Validity", "fno": "09774929", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Deep Learning Artificial Intelligence", "Emotion Recognition", "Face Recognition", "Feature Extraction", "Video Signal Processing", "Database Bias", "Depth Flow Algorithm", "Depth Information", "Generation Facial Spontaneous Microexpression Database", "High Ecological Validity", "Large Scale Spontaneous ME Database", "Macro Expression", "ME Database Development", "ME Samples", "MEA Method Validation", "Microexpression Analysis", "Mock Crime Paradigm", "Multimodal MEA", "Nonverbal Communication Clue", "RGB D Information", "Sample Size Problem", "Unsupervised MEA Methods", "Databases", "Psychology", "Face Recognition", "Videos", "Iron", "Emotion Recognition", "Trajectory", "Micro Expression", "Micro Expression Databases", "CASME", "Depth Information", "Ecological Validity", "Multi Modality" ], "authors": [ { "givenName": "Jingting", "surname": "Li", "fullName": "Jingting Li", "affiliation": "Key Laboratory of Behavior Sciences, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zizhao", "surname": "Dong", "fullName": "Zizhao Dong", "affiliation": "Key Laboratory of Behavior Sciences, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shaoyuan", "surname": "Lu", "fullName": "Shaoyuan Lu", "affiliation": "Key Laboratory of Behavior Sciences, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Su-Jing", "surname": "Wang", "fullName": "Su-Jing Wang", "affiliation": "Key Laboratory of Behavior Sciences, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wen-Jing", "surname": "Yan", "fullName": "Wen-Jing Yan", "affiliation": "School of Mental Health, Wenzhou Medical University, Wenzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yinhuan", "surname": "Ma", "fullName": "Yinhuan Ma", "affiliation": "School of Computer science, Jiangsu University of Science and Technology, Zhenjiang, Jiangsu, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ye", "surname": "Liu", "fullName": "Ye Liu", "affiliation": "State Key Laboratory of Brain and Cognitive Science, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Changbing", "surname": "Huang", "fullName": "Changbing Huang", "affiliation": "Key Laboratory of Behavior Sciences, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaolan", "surname": "Fu", "fullName": "Xiaolan Fu", "affiliation": "State Key Laboratory of Brain and Cognitive Science, Institute of Psychology, Chinese Academy of Sciences, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2782-2800", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/04/09681238", "title": "M<sup>2</sup>: Mixed Models With Preferences, Popularities and Transitions for Next-Basket Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/04/09681238/1A8c5TwZjtS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08730423", "title": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "doi": null, "abstractUrl": "/journal/tb/2020/02/08730423/1aAwyubtkha", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09133279", "title": "Data-Driven Variable Decomposition for Treatment Effect Estimation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09133279/1la7EFn5FrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09286502", "title": "Multi-Target Positive Emotion Recognition From EEG Signals", "doi": null, "abstractUrl": "/journal/ta/2023/01/09286502/1poqIBFs1Ne", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09450011", "title": "S<sup>2</sup> Engine: A Novel Systolic Architecture for Sparse Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tc/2022/06/09450011/1uiiTrEWIlG", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/05/09511831", "title": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "doi": null, "abstractUrl": "/journal/td/2022/05/09511831/1vYRJw2uV0I", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09497715", "title": "Spherical DNNs and Their Applications in 360<inline-formula><tex-math notation=\"LaTeX\">Z_$^\\circ$_Z</tex-math></inline-formula> Images and Videos", "doi": null, "abstractUrl": "/journal/tp/2022/10/09497715/1vzY9kuYnwA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09773017", "articleId": "1DhYyFBzSaA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09796582", "articleId": "1EexjnGsWgo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KsSnytQXe0", "name": "ttp202303-09774929s1-supp3-3174895.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202303-09774929s1-supp3-3174895.pdf", "extension": "pdf", "size": "239 kB", "__typename": "WebExtraType" }, { "id": "1KsSnDDKSOI", "name": "ttp202303-09774929s1-supp1-3174895.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202303-09774929s1-supp1-3174895.mp4", "extension": "mp4", "size": "550 kB", "__typename": "WebExtraType" }, { "id": "1KsSntnDOk8", "name": "ttp202303-09774929s1-supp2-3174895.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202303-09774929s1-supp2-3174895.mp4", "extension": "mp4", "size": "1.58 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNx7ouKv", "title": "March-April", "year": "2020", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "17", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1aAwyubtkha", "doi": "10.1109/TCBB.2019.2920646", "abstract": "<inline-formula><tex-math notation=\"LaTeX\">Z_${}^{1}$_Z</tex-math></inline-formula>H High-Resolution Magic Angle Spinning (HRMAS) Nuclear Magnetic Resonance (NMR) is a reliable technology used for detecting metabolites in solid tissues. Fast response time enables guiding surgeons in real time, for detecting tumor cells that are left over in the excision cavity. However, severe overlap of spectral resonances in 1D signal often render distinguishing metabolites impossible. In that case, Heteronuclear Single Quantum Coherence Spectroscopy (HSQC) NMR is applied which can distinguish metabolites by generating 2D spectra (<inline-formula><tex-math notation=\"LaTeX\">Z_${}^{1}$_Z</tex-math></inline-formula>H-<inline-formula><tex-math notation=\"LaTeX\">Z_${}^{13}$_Z</tex-math></inline-formula>C). Unfortunately, this analysis requires much longer time and prohibits real time analysis. Thus, obtaining 2D spectrum fast has major implications in medicine. In this study, we show that using multiple multivariate regression and statistical total correlation spectroscopy, we can learn the relation between the <inline-formula><tex-math notation=\"LaTeX\">Z_${}^{1}$_Z</tex-math></inline-formula>H and <inline-formula><tex-math notation=\"LaTeX\">Z_${}^{13}$_Z</tex-math></inline-formula>C dimensions. Learning is possible with small sample sizes and without the need for performing the HSQC analysis, we can predict the <inline-formula><tex-math notation=\"LaTeX\">Z_${}^{13}$_Z</tex-math></inline-formula>C dimension by just performing <inline-formula><tex-math notation=\"LaTeX\">Z_${}^{1}$_Z</tex-math></inline-formula>H HRMAS NMR experiment. We show on a rat model of central nervous system tissues (80 samples, 5 tissues) that our methods achieve 0.971 and 0.957 mean <inline-formula><tex-math notation=\"LaTeX\">Z_$R^2$_Z</tex-math></inline-formula> values, respectively. Our tests on 15 human brain tumor samples show that we can predict 104 groups of 39 metabolites with 97 percent accuracy. Finally, we show that we can predict the presence of a drug resistant tumor biomarker (creatine) despite obstructed signal in <inline-formula><tex-math notation=\"LaTeX\">Z_${}^{1}$_Z</tex-math></inline-formula>H dimension. In practice, this information can provide valuable feedback to the surgeon to further resect the cavity to avoid potential recurrence.", "abstracts": [ { "abstractType": "Regular", "content": "<inline-formula><tex-math notation=\"LaTeX\">${}^{1}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>1</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq1-2920646.gif\"/></alternatives></inline-formula>H High-Resolution Magic Angle Spinning (HRMAS) Nuclear Magnetic Resonance (NMR) is a reliable technology used for detecting metabolites in solid tissues. Fast response time enables guiding surgeons in real time, for detecting tumor cells that are left over in the excision cavity. However, severe overlap of spectral resonances in 1D signal often render distinguishing metabolites impossible. In that case, Heteronuclear Single Quantum Coherence Spectroscopy (HSQC) NMR is applied which can distinguish metabolites by generating 2D spectra (<inline-formula><tex-math notation=\"LaTeX\">${}^{1}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>1</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq2-2920646.gif\"/></alternatives></inline-formula>H-<inline-formula><tex-math notation=\"LaTeX\">${}^{13}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>13</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq3-2920646.gif\"/></alternatives></inline-formula>C). Unfortunately, this analysis requires much longer time and prohibits real time analysis. Thus, obtaining 2D spectrum fast has major implications in medicine. In this study, we show that using multiple multivariate regression and statistical total correlation spectroscopy, we can learn the relation between the <inline-formula><tex-math notation=\"LaTeX\">${}^{1}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>1</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq4-2920646.gif\"/></alternatives></inline-formula>H and <inline-formula><tex-math notation=\"LaTeX\">${}^{13}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>13</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq5-2920646.gif\"/></alternatives></inline-formula>C dimensions. Learning is possible with small sample sizes and without the need for performing the HSQC analysis, we can predict the <inline-formula><tex-math notation=\"LaTeX\">${}^{13}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>13</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq6-2920646.gif\"/></alternatives></inline-formula>C dimension by just performing <inline-formula><tex-math notation=\"LaTeX\">${}^{1}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>1</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq7-2920646.gif\"/></alternatives></inline-formula>H HRMAS NMR experiment. We show on a rat model of central nervous system tissues (80 samples, 5 tissues) that our methods achieve 0.971 and 0.957 mean <inline-formula><tex-math notation=\"LaTeX\">$R^2$</tex-math><alternatives><mml:math><mml:msup><mml:mi>R</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq8-2920646.gif\"/></alternatives></inline-formula> values, respectively. Our tests on 15 human brain tumor samples show that we can predict 104 groups of 39 metabolites with 97 percent accuracy. Finally, we show that we can predict the presence of a drug resistant tumor biomarker (creatine) despite obstructed signal in <inline-formula><tex-math notation=\"LaTeX\">${}^{1}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>1</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cicek-ieq9-2920646.gif\"/></alternatives></inline-formula>H dimension. In practice, this information can provide valuable feedback to the surgeon to further resect the cavity to avoid potential recurrence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "-H High-Resolution Magic Angle Spinning (HRMAS) Nuclear Magnetic Resonance (NMR) is a reliable technology used for detecting metabolites in solid tissues. Fast response time enables guiding surgeons in real time, for detecting tumor cells that are left over in the excision cavity. However, severe overlap of spectral resonances in 1D signal often render distinguishing metabolites impossible. In that case, Heteronuclear Single Quantum Coherence Spectroscopy (HSQC) NMR is applied which can distinguish metabolites by generating 2D spectra (-H--C). Unfortunately, this analysis requires much longer time and prohibits real time analysis. Thus, obtaining 2D spectrum fast has major implications in medicine. In this study, we show that using multiple multivariate regression and statistical total correlation spectroscopy, we can learn the relation between the -H and -C dimensions. Learning is possible with small sample sizes and without the need for performing the HSQC analysis, we can predict the -C dimension by just performing -H HRMAS NMR experiment. We show on a rat model of central nervous system tissues (80 samples, 5 tissues) that our methods achieve 0.971 and 0.957 mean - values, respectively. Our tests on 15 human brain tumor samples show that we can predict 104 groups of 39 metabolites with 97 percent accuracy. Finally, we show that we can predict the presence of a drug resistant tumor biomarker (creatine) despite obstructed signal in -H dimension. In practice, this information can provide valuable feedback to the surgeon to further resect the cavity to avoid potential recurrence.", "title": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "normalizedTitle": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "fno": "08730423", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Nuclear Magnetic Resonance", "Surgery", "Two Dimensional Displays", "Tumors", "Correlation", "Spectroscopy", "Cavity Resonators", "Metabolomics", "HRMAS NMR", "HSQC NMR" ], "authors": [ { "givenName": "E. Onur", "surname": "Karakaslar", "fullName": "E. Onur Karakaslar", "affiliation": "Computer Engineering Department, Bilkent University, Ankara, Turkey", "__typename": "ArticleAuthorType" }, { "givenName": "Baris", "surname": "Coskun", "fullName": "Baris Coskun", "affiliation": "TUSAS-TAI, Ankara, Turkey", "__typename": "ArticleAuthorType" }, { "givenName": "Hassiba", "surname": "Outilaft", "fullName": "Hassiba Outilaft", "affiliation": "University of Strasbourg, Strasbourg, France", "__typename": "ArticleAuthorType" }, { "givenName": "Izzie Jacques", "surname": "Namer", "fullName": "Izzie Jacques Namer", "affiliation": "Strasbourg University, Strasbourg, France", "__typename": "ArticleAuthorType" }, { "givenName": "A. Ercument", "surname": "Cicek", "fullName": "A. Ercument Cicek", "affiliation": "Computer Engineering Department, Bilkent University, Ankara, Turkey", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2020-03-01 00:00:00", "pubType": "trans", "pages": "719-725", "year": "2020", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2019/05/08344546", "title": "What Makes Objects Similar: A Unified Multi-Metric Learning Approach", "doi": null, "abstractUrl": "/journal/tp/2019/05/08344546/13rRUNvgyXK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2020/06/08976264", "title": "Algorithms for Inversion Mod &#x3C;inline-formula&#x3E;&#x3C;tex-math notation=&#x22;LaTeX&#x22;&#x3E;Z_$p^k$_Z&#x3C;/tex-math&#x3E;&#x3C;/inline-formula&#x3E;", "doi": null, "abstractUrl": "/journal/tc/2020/06/08976264/1h0W7qmGRHO", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09039684", "title": "HyperMinHash: MinHash in LogLog Space", "doi": null, "abstractUrl": "/journal/tk/2022/01/09039684/1igS2G8DNfi", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09133279", "title": "Data-Driven Variable Decomposition for Treatment Effect Estimation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09133279/1la7EFn5FrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09450011", "title": "S<sup>2</sup> Engine: A Novel Systolic Architecture for Sparse Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tc/2022/06/09450011/1uiiTrEWIlG", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/05/09511831", "title": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "doi": null, "abstractUrl": "/journal/td/2022/05/09511831/1vYRJw2uV0I", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09535228", "title": "Improved Fixed-Parameter Algorithm for the Tree Containment Problem on Unrooted Phylogenetic Network", "doi": null, "abstractUrl": "/journal/tb/2022/06/09535228/1wMEIAs9pni", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08651305", "articleId": "17WX58O2ynn", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1L8lujshfos", "title": "Jan.-March", "year": "2023", "issueNum": "01", "idPrefix": "ta", "pubType": "journal", "volume": "14", "label": "Jan.-March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1poqIBFs1Ne", "doi": "10.1109/TAFFC.2020.3043135", "abstract": "Compared with the widely studied negative emotions in which different classes are easy to distinguish, nowadays less attention is paid to the recognition of positive emotions that are not fully independent. In this article, we propose to recognize multiple continuous positive emotions that exhibit statistical dependencies using multi-target regression &#x2014; by analyzing brain activities when an individual watches emotional film clips &#x2014; and explore the neural representation of different positive emotions. Thirty-seven participants volunteered to participate in our study, in which their brain activities were recorded when watching five selected film clips (corresponding to five positive emotions: amusement, happiness, romance, tenderness and warmth). First, 150 well-known power features extracted from Electroencephalography (EEG) signals and 105 multimedia content analysis features were collected as the pool of candidate features. Second, based on the collected features, we propose to use a linear model (linear regression) and a nonlinear model (long short-term memory network, LSTM) to predict the percentage of five positive emotions. Then, percentage values were converted to ranking numbers and Kendall rank correlation coefficients were calculated. Our results showed that (1) ensemble of regressor chains (ERC) using LSTM as unit regressor obtained both the best regression results (with lowest RMSE &#x003D; 8.325 and highest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\text{R }^{2} = 0.346$_Z</tex-math></inline-formula>) and the best Kendall rank correlation coefficient (0.165) on EEG features merely, and (2) selective features from alpha frequency bands of EEG signals could represent different positive emotions. These results demonstrate the effectiveness of selective EEG features on recognizing different positive emotions.", "abstracts": [ { "abstractType": "Regular", "content": "Compared with the widely studied negative emotions in which different classes are easy to distinguish, nowadays less attention is paid to the recognition of positive emotions that are not fully independent. In this article, we propose to recognize multiple continuous positive emotions that exhibit statistical dependencies using multi-target regression &#x2014; by analyzing brain activities when an individual watches emotional film clips &#x2014; and explore the neural representation of different positive emotions. Thirty-seven participants volunteered to participate in our study, in which their brain activities were recorded when watching five selected film clips (corresponding to five positive emotions: amusement, happiness, romance, tenderness and warmth). First, 150 well-known power features extracted from Electroencephalography (EEG) signals and 105 multimedia content analysis features were collected as the pool of candidate features. Second, based on the collected features, we propose to use a linear model (linear regression) and a nonlinear model (long short-term memory network, LSTM) to predict the percentage of five positive emotions. Then, percentage values were converted to ranking numbers and Kendall rank correlation coefficients were calculated. Our results showed that (1) ensemble of regressor chains (ERC) using LSTM as unit regressor obtained both the best regression results (with lowest RMSE &#x003D; 8.325 and highest <inline-formula><tex-math notation=\"LaTeX\">$\\text{R }^{2} = 0.346$</tex-math><alternatives><mml:math><mml:mrow><mml:msup><mml:mtext>R</mml:mtext><mml:mn>2</mml:mn></mml:msup><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>.</mml:mo><mml:mn>346</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"liu-ieq1-3043135.gif\"/></alternatives></inline-formula>) and the best Kendall rank correlation coefficient (0.165) on EEG features merely, and (2) selective features from alpha frequency bands of EEG signals could represent different positive emotions. These results demonstrate the effectiveness of selective EEG features on recognizing different positive emotions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Compared with the widely studied negative emotions in which different classes are easy to distinguish, nowadays less attention is paid to the recognition of positive emotions that are not fully independent. In this article, we propose to recognize multiple continuous positive emotions that exhibit statistical dependencies using multi-target regression — by analyzing brain activities when an individual watches emotional film clips — and explore the neural representation of different positive emotions. Thirty-seven participants volunteered to participate in our study, in which their brain activities were recorded when watching five selected film clips (corresponding to five positive emotions: amusement, happiness, romance, tenderness and warmth). First, 150 well-known power features extracted from Electroencephalography (EEG) signals and 105 multimedia content analysis features were collected as the pool of candidate features. Second, based on the collected features, we propose to use a linear model (linear regression) and a nonlinear model (long short-term memory network, LSTM) to predict the percentage of five positive emotions. Then, percentage values were converted to ranking numbers and Kendall rank correlation coefficients were calculated. Our results showed that (1) ensemble of regressor chains (ERC) using LSTM as unit regressor obtained both the best regression results (with lowest RMSE = 8.325 and highest -) and the best Kendall rank correlation coefficient (0.165) on EEG features merely, and (2) selective features from alpha frequency bands of EEG signals could represent different positive emotions. These results demonstrate the effectiveness of selective EEG features on recognizing different positive emotions.", "title": "Multi-Target Positive Emotion Recognition From EEG Signals", "normalizedTitle": "Multi-Target Positive Emotion Recognition From EEG Signals", "fno": "09286502", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Electroencephalography", "Emotion Recognition", "Feature Extraction", "Medical Signal Processing", "Recurrent Neural Nets", "Regression Analysis", "Signal Classification", "105 Multimedia Content Analysis Features", "Brain Activities", "Different Positive Emotions", "Emotional Film Clips", "Kendall Rank Correlation Coefficient", "Linear Model", "Multiple Continuous Positive Emotions", "Multitarget Positive Emotion Recognition", "Multitarget Regression", "Watching Five Selected Film Clips", "Widely Studied Negative Emotions", "Emotion Recognition", "Electroencephalography", "Brain Modeling", "Feature Extraction", "Psychology", "Task Analysis", "Predictive Models", "Emotion Recognition", "Positive Emotion", "Multi Target", "Regression Model", "EEG" ], "authors": [ { "givenName": "Guozhen", "surname": "Zhao", "fullName": "Guozhen Zhao", "affiliation": "CAS Key Laboratory of Behavioral Science, Institute of Psychology, Beijing, P. R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Yulin", "surname": "Zhang", "fullName": "Yulin Zhang", "affiliation": "CAS Key Laboratory of Behavioral Science, Institute of Psychology, Beijing, P. R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Guanhua", "surname": "Zhang", "fullName": "Guanhua Zhang", "affiliation": "Department of Computer Science and Technology, BNRist, MOE-Key Laboratory of Pervasive Computing, Tsinghua University, Beijing, P. R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Zhang", "fullName": "Dan Zhang", "affiliation": "Department of Psychology, Tsinghua University, Beijing, P. R. China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong-Jin", "surname": "Liu", "fullName": "Yong-Jin Liu", "affiliation": "Department of Computer Science and Technology, BNRist, MOE-Key Laboratory of Pervasive Computing, Tsinghua University, Beijing, P. R. China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "370-381", "year": "2023", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icme/2012/4711/0/4711b039", "title": "EEG-based Dominance Level Recognition for Emotion-Enabled Interaction", "doi": null, "abstractUrl": "/proceedings-article/icme/2012/4711b039/12OmNCwCLrn", "parentPublication": { "id": "proceedings/icme/2012/4711/0", "title": "2012 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csit/2016/8914/0/07549457", "title": "Emotion estimation from EEG signals during listening to Quran using PSD features", "doi": null, "abstractUrl": "/proceedings-article/csit/2016/07549457/12OmNvk7JTE", "parentPublication": { "id": "proceedings/csit/2016/8914/0", "title": "2016 7th International Conference on Computer Science and Information Technology (CSIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890301", "title": "Continuous emotion detection using EEG signals and facial expressions", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890301/12OmNyQYtb1", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2020/02/08089737", "title": "Emotion Recognition Based on High-Resolution EEG Recordings and Reconstructed Brain Sources", "doi": null, "abstractUrl": "/journal/ta/2020/02/08089737/13rRUwIF6cs", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2018/03/08241761", "title": "Emotion Analysis for Personality Inference from EEG Signals", "doi": null, "abstractUrl": "/journal/ta/2018/03/08241761/13rRUytF47R", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2018/04/07835688", "title": "Real-Time Movie-Induced Discrete Emotion Recognition from EEG Signals", "doi": null, "abstractUrl": "/journal/ta/2018/04/07835688/17D45XvMceV", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/04/08651389", "title": "An EEG-Based Brain Computer Interface for Emotion Recognition and Its Application in Patients with Disorder of Consciousness", "doi": null, "abstractUrl": "/journal/ta/2021/04/08651389/17WX57VxzoZ", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainit/2021/1296/0/129600a217", "title": "Analysis of bimodal emotion recognition method based on EEG signals", "doi": null, "abstractUrl": "/proceedings-article/ainit/2021/129600a217/1BzWEXnfXmE", "parentPublication": { "id": "proceedings/ainit/2021/1296/0", "title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ishc/2021/6743/0/674300a169", "title": "Emotion Classification from Short-term EEG Signals in Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ishc/2021/674300a169/1EBWbO64hgs", "parentPublication": { "id": "proceedings/ishc/2021/6743/0", "title": "2021 3rd International Symposium on Smart and Healthy Cities (ISHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09946368", "title": "MMPosE: Movie-induced Multi-label Positive Emotion Classification Through EEG Signals", "doi": null, "abstractUrl": "/journal/ta/5555/01/09946368/1IdqYG8gCvC", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09397355", "articleId": "1sA4NyMnxKg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09204431", "articleId": "1nkyOYiLAAg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DU9C1cnFPq", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1r8knzBTSWA", "doi": "10.1109/TPAMI.2021.3058852", "abstract": "Spectral clustering (SC) has become one of the most widely-adopted clustering algorithms, and been successfully applied into various applications. We in this work explore the problem of spectral clustering in a lifelong learning framework termed as <underline>G</underline>eneralized <underline>L</underline>ife<underline>l</underline>ong <underline>S</underline>pectral <underline>C</underline>lustering (GL<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SC). Different from most current studies, which concentrate on a fixed spectral clustering task set and cannot efficiently incorporate a new clustering task, the goal of our work is to establish a generalized model for new spectral clustering tasks by &#x201C;What&#x201D; and &#x201C;How&#x201D; to lifelong learn from past tasks. In respect of &#x201C;what to lifelong learn&#x201D;, our GL<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SC framework contains a dual memory mechanism with a deep orthogonal factorization manner: an orthogonal basis memory stores hidden and hierarchical clustering centers among learned tasks, and a feature embedding memory captures deep manifold representation common across multiple related tasks. When learning a new clustering task, the intuition here for &#x201C;how to lifelong learn&#x201D; is that GL<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SC can transfer intrinsic knowledge from dual memory mechanism to obtain task-specific encoding matrix. Then the encoding matrix can redefine the dual memory over time to provide maximal benefits when learning future tasks, and reversely maximize performance for past tasks. To achieve this, we propose an alternative optimization formulation with convergence guarantee for solving our GL<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SC model. To the end, empirical comparisons on several benchmark datasets show the effectiveness of our GL<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SC, in comparison with several state-of-the-art clustering models.", "abstracts": [ { "abstractType": "Regular", "content": "Spectral clustering (SC) has become one of the most widely-adopted clustering algorithms, and been successfully applied into various applications. We in this work explore the problem of spectral clustering in a lifelong learning framework termed as <underline>G</underline>eneralized <underline>L</underline>ife<underline>l</underline>ong <underline>S</underline>pectral <underline>C</underline>lustering (GL<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"sun-ieq1-3058852.gif\"/></alternatives></inline-formula>SC). Different from most current studies, which concentrate on a fixed spectral clustering task set and cannot efficiently incorporate a new clustering task, the goal of our work is to establish a generalized model for new spectral clustering tasks by &#x201C;What&#x201D; and &#x201C;How&#x201D; to lifelong learn from past tasks. In respect of &#x201C;what to lifelong learn&#x201D;, our GL<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"sun-ieq2-3058852.gif\"/></alternatives></inline-formula>SC framework contains a dual memory mechanism with a deep orthogonal factorization manner: an orthogonal basis memory stores hidden and hierarchical clustering centers among learned tasks, and a feature embedding memory captures deep manifold representation common across multiple related tasks. When learning a new clustering task, the intuition here for &#x201C;how to lifelong learn&#x201D; is that GL<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"sun-ieq3-3058852.gif\"/></alternatives></inline-formula>SC can transfer intrinsic knowledge from dual memory mechanism to obtain task-specific encoding matrix. Then the encoding matrix can redefine the dual memory over time to provide maximal benefits when learning future tasks, and reversely maximize performance for past tasks. To achieve this, we propose an alternative optimization formulation with convergence guarantee for solving our GL<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"sun-ieq4-3058852.gif\"/></alternatives></inline-formula>SC model. To the end, empirical comparisons on several benchmark datasets show the effectiveness of our GL<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"sun-ieq5-3058852.gif\"/></alternatives></inline-formula>SC, in comparison with several state-of-the-art clustering models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spectral clustering (SC) has become one of the most widely-adopted clustering algorithms, and been successfully applied into various applications. We in this work explore the problem of spectral clustering in a lifelong learning framework termed as Generalized Lifelong Spectral Clustering (GL-SC). Different from most current studies, which concentrate on a fixed spectral clustering task set and cannot efficiently incorporate a new clustering task, the goal of our work is to establish a generalized model for new spectral clustering tasks by “What” and “How” to lifelong learn from past tasks. In respect of “what to lifelong learn”, our GL-SC framework contains a dual memory mechanism with a deep orthogonal factorization manner: an orthogonal basis memory stores hidden and hierarchical clustering centers among learned tasks, and a feature embedding memory captures deep manifold representation common across multiple related tasks. When learning a new clustering task, the intuition here for “how to lifelong learn” is that GL-SC can transfer intrinsic knowledge from dual memory mechanism to obtain task-specific encoding matrix. Then the encoding matrix can redefine the dual memory over time to provide maximal benefits when learning future tasks, and reversely maximize performance for past tasks. To achieve this, we propose an alternative optimization formulation with convergence guarantee for solving our GL-SC model. To the end, empirical comparisons on several benchmark datasets show the effectiveness of our GL-SC, in comparison with several state-of-the-art clustering models.", "title": "What and How: Generalized Lifelong Spectral Clustering via Dual Memory", "normalizedTitle": "What and How: Generalized Lifelong Spectral Clustering via Dual Memory", "fno": "09353224", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Learning Artificial Intelligence", "Matrix Algebra", "Pattern Clustering", "Lifelong Learning Framework", "Fixed Spectral Clustering Task Set", "Dual Memory Mechanism", "Task Specific Encoding Matrix", "Generalized Lifelong Spectral Clustering", "GL Sup 2 Sup SC", "Orthogonal Basis Memory", "Task Analysis", "Correlation", "Encoding", "Clustering Algorithms", "Semantics", "Robots", "Refining", "Lifelong Machine Learning", "Spectral Clustering", "Deep Transfer Learning", "Neural Networks" ], "authors": [ { "givenName": "Gan", "surname": "Sun", "fullName": "Gan Sun", "affiliation": "State Key Laboratory of Robotics, Shenyang Institute of Automation, Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yang", "surname": "Cong", "fullName": "Yang Cong", "affiliation": "State Key Laboratory of Robotics, Shenyang Institute of Automation, Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiahua", "surname": "Dong", "fullName": "Jiahua Dong", "affiliation": "State Key Laboratory of Robotics, Shenyang Institute of Automation, Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuyang", "surname": "Liu", "fullName": "Yuyang Liu", "affiliation": "State Key Laboratory of Robotics, Shenyang Institute of Automation, Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhengming", "surname": "Ding", "fullName": "Zhengming Ding", "affiliation": "Department of Computer Science, Tulane University, New Orleans, LA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Haibin", "surname": "Yu", "fullName": "Haibin Yu", "affiliation": "State Key Laboratory of Robotics, Shenyang Institute of Automation, Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "3895-3908", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2019/05/08344546", "title": "What Makes Objects Similar: A Unified Multi-Metric Learning Approach", "doi": null, "abstractUrl": "/journal/tp/2019/05/08344546/13rRUNvgyXK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09712197", "title": "Fast LDP-MST: An Efficient Density-Peak-Based Clustering Method for Large-Size Datasets", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712197/1AUkecqbRok", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/02/09726869", "title": "Real-Time Scheduling on Hierarchical Heterogeneous Fog Networks", "doi": null, "abstractUrl": "/journal/sc/2023/02/09726869/1Brwj3QVNXq", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09851943", "title": "ROLLED: <underline>R</underline>acetrack Memory <underline>O</underline>ptimized <underline>L</underline>inear <underline>L</underline>ayout and <underline>E</underline>fficient <underline>D</underline>ecomposition of Decision Trees", "doi": null, "abstractUrl": "/journal/tc/2023/05/09851943/1FFHeRJbMTm", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08730423", "title": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "doi": null, "abstractUrl": "/journal/tb/2020/02/08730423/1aAwyubtkha", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2022/02/08976273", "title": "Distributed Traffic Flow Consolidation for Power Efficiency of Large-Scale Data Center Network", "doi": null, "abstractUrl": "/journal/cc/2022/02/08976273/1h0VVDXFBh6", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/08/09055089", "title": "Real-Time Detection for Drowsy Driving via Acoustic Sensing on Smartphones", "doi": null, "abstractUrl": "/journal/tm/2021/08/09055089/1iHr5Cy5eIE", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09039684", "title": "HyperMinHash: MinHash in LogLog Space", "doi": null, "abstractUrl": "/journal/tk/2022/01/09039684/1igS2G8DNfi", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/05/09511831", "title": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "doi": null, "abstractUrl": "/journal/td/2022/05/09511831/1vYRJw2uV0I", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09340560", "articleId": "1qMJODoYi40", "__typename": "AdjacentArticleType" }, "next": { "fno": "09361131", "articleId": "1rseyL4D9de", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IUAvQtX5zW", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tB9b1r0Y12", "doi": "10.1109/TKDE.2021.3080293", "abstract": "Corporate relative valuation (CRV) refers to the process of comparing a company&#x2019;s value from company products, core staff and other related information, so that we can assess the company&#x2019;s market value, which is critical for venture capital firms. Traditional relative valuation methods heavily rely on tedious and expensive human efforts, especially for non-publicly listed companies. However, the availability of information about company&#x2019;s invisible assets, such as patents, talent, and investors, enables a new paradigm to learn and evaluate corporate relative values automatically. Indeed, in this paper, we reveal that, the companies and their core members can natually be formed as a heterogeneous graph and the attributes of different nodes include semantically-rich multi-modal data, thereby we are able to extract a latent embedding for each company. The network embeddings can reflect domain experts&#x2019; behavior and are effective for corporate relative valuation. Along this line, we develop a heterogeneous multi-modal graph neural network method, named HM<inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula>, which deals with embedding challenges involving modal attribute encoding, multi-modal aggregation, and valuation prediction modules. Specifically, HM<inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula> first performs the representation learning for heterogeneous neighbors of the input company by taking relationships among nodes into consideration, which aggregates node attributes via linkage-aware multi-head attention mechanism, rather than multi-instance based methods. Then, HM<inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula> adopts the self-attention network to aggregate different modal embeddings for final prediction, and employs dynamic triplet loss with embeddings of competitors as the constraint. As a result, HM<inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula> can explore companies&#x2019; intrinsic properties to improve the CRV performance. Extensive experiments on real-world data demonstrate the effectiveness of the proposed HM<inline-formula><tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math></inline-formula>.", "abstracts": [ { "abstractType": "Regular", "content": "Corporate relative valuation (CRV) refers to the process of comparing a company&#x2019;s value from company products, core staff and other related information, so that we can assess the company&#x2019;s market value, which is critical for venture capital firms. Traditional relative valuation methods heavily rely on tedious and expensive human efforts, especially for non-publicly listed companies. However, the availability of information about company&#x2019;s invisible assets, such as patents, talent, and investors, enables a new paradigm to learn and evaluate corporate relative values automatically. Indeed, in this paper, we reveal that, the companies and their core members can natually be formed as a heterogeneous graph and the attributes of different nodes include semantically-rich multi-modal data, thereby we are able to extract a latent embedding for each company. The network embeddings can reflect domain experts&#x2019; behavior and are effective for corporate relative valuation. Along this line, we develop a heterogeneous multi-modal graph neural network method, named HM<inline-formula><tex-math notation=\"LaTeX\">$^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq1-3080293.gif\"/></alternatives></inline-formula>, which deals with embedding challenges involving modal attribute encoding, multi-modal aggregation, and valuation prediction modules. Specifically, HM<inline-formula><tex-math notation=\"LaTeX\">$^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq2-3080293.gif\"/></alternatives></inline-formula> first performs the representation learning for heterogeneous neighbors of the input company by taking relationships among nodes into consideration, which aggregates node attributes via linkage-aware multi-head attention mechanism, rather than multi-instance based methods. Then, HM<inline-formula><tex-math notation=\"LaTeX\">$^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq3-3080293.gif\"/></alternatives></inline-formula> adopts the self-attention network to aggregate different modal embeddings for final prediction, and employs dynamic triplet loss with embeddings of competitors as the constraint. As a result, HM<inline-formula><tex-math notation=\"LaTeX\">$^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq4-3080293.gif\"/></alternatives></inline-formula> can explore companies&#x2019; intrinsic properties to improve the CRV performance. Extensive experiments on real-world data demonstrate the effectiveness of the proposed HM<inline-formula><tex-math notation=\"LaTeX\">$^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq5-3080293.gif\"/></alternatives></inline-formula>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Corporate relative valuation (CRV) refers to the process of comparing a company’s value from company products, core staff and other related information, so that we can assess the company’s market value, which is critical for venture capital firms. Traditional relative valuation methods heavily rely on tedious and expensive human efforts, especially for non-publicly listed companies. However, the availability of information about company’s invisible assets, such as patents, talent, and investors, enables a new paradigm to learn and evaluate corporate relative values automatically. Indeed, in this paper, we reveal that, the companies and their core members can natually be formed as a heterogeneous graph and the attributes of different nodes include semantically-rich multi-modal data, thereby we are able to extract a latent embedding for each company. The network embeddings can reflect domain experts’ behavior and are effective for corporate relative valuation. Along this line, we develop a heterogeneous multi-modal graph neural network method, named HM-, which deals with embedding challenges involving modal attribute encoding, multi-modal aggregation, and valuation prediction modules. Specifically, HM- first performs the representation learning for heterogeneous neighbors of the input company by taking relationships among nodes into consideration, which aggregates node attributes via linkage-aware multi-head attention mechanism, rather than multi-instance based methods. Then, HM- adopts the self-attention network to aggregate different modal embeddings for final prediction, and employs dynamic triplet loss with embeddings of competitors as the constraint. As a result, HM- can explore companies’ intrinsic properties to improve the CRV performance. Extensive experiments on real-world data demonstrate the effectiveness of the proposed HM-.", "title": "Corporate Relative Valuation Using Heterogeneous Multi-Modal Graph Neural Network", "normalizedTitle": "Corporate Relative Valuation Using Heterogeneous Multi-Modal Graph Neural Network", "fno": "09431704", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Data Handling", "Financial Data Processing", "Graph Theory", "Learning Artificial Intelligence", "Neural Nets", "Venture Capital", "Corporate Relative Valuation", "Corporate Relative Values", "Heterogeneous Graph", "Heterogeneous Multimodal Graph Neural Network", "Linkage Aware Multihead Attention Mechanism", "Modal Attribute Encoding", "Modal Embeddings", "Multiinstance Based Methods", "Multimodal Aggregation", "Multimodal Graph Neural Network Method", "Network Embeddings", "Nonpublicly Listed Companies", "Semantically Rich Multimodal Data", "Traditional Relative Valuation Methods", "Valuation Prediction Modules", "Companies", "Cost Accounting", "Couplings", "Hidden Markov Models", "Business", "Aggregates", "Task Analysis", "Corporate Relative Valuation", "Heterogeneous Graph", "Multi Modal Learning", "Linkage Aware" ], "authors": [ { "givenName": "Yang", "surname": "Yang", "fullName": "Yang Yang", "affiliation": "PCA Lab, Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education, and Jiangsu Key Lab of Image and Video Understanding for Social Security, School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jia-Qi", "surname": "Yang", "fullName": "Jia-Qi Yang", "affiliation": "Nanjing University, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ran", "surname": "Bao", "fullName": "Ran Bao", "affiliation": "Nanjing University, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "De-Chuan", "surname": "Zhan", "fullName": "De-Chuan Zhan", "affiliation": "Nanjing University, Nanjing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hengshu", "surname": "Zhu", "fullName": "Hengshu Zhu", "affiliation": "Baidu Talent Intelligence Center, Baidu Inc, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiao-Ru", "surname": "Gao", "fullName": "Xiao-Ru Gao", "affiliation": "Management Science and Information Systems Department, Rutgers Business School, Rutgers University, Newark, NJ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Hui", "surname": "Xiong", "fullName": "Hui Xiong", "affiliation": "Management Science and Information Systems Department, Rutgers Business School, Rutgers University, Newark, NJ, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jian", "surname": "Yang", "fullName": "Jian Yang", "affiliation": "PCA Lab, Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education, and Jiangsu Key Lab of Image and Video Understanding for Social Security, School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "211-224", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2019/05/08344546", "title": "What Makes Objects Similar: A Unified Multi-Metric Learning Approach", "doi": null, "abstractUrl": "/journal/tp/2019/05/08344546/13rRUNvgyXK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08730423", "title": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "doi": null, "abstractUrl": "/journal/tb/2020/02/08730423/1aAwyubtkha", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09133279", "title": "Data-Driven Variable Decomposition for Treatment Effect Estimation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09133279/1la7EFn5FrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/03/09252871", "title": "Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage", "doi": null, "abstractUrl": "/journal/tq/2022/03/09252871/1oCjG7MNb0Y", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/05/09511831", "title": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "doi": null, "abstractUrl": "/journal/td/2022/05/09511831/1vYRJw2uV0I", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09535228", "title": "Improved Fixed-Parameter Algorithm for the Tree Containment Problem on Unrooted Phylogenetic Network", "doi": null, "abstractUrl": "/journal/tb/2022/06/09535228/1wMEIAs9pni", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2023/06/09657212", "title": "Boost Spectrum Prediction With Temporal-Frequency Fusion Network via Transfer Learning", "doi": null, "abstractUrl": "/journal/tm/2023/06/09657212/1zw1hslbnXy", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09452800", "articleId": "1ulCu0Hdqs8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09423624", "articleId": "1tky8J2xWDK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IUAHXThYME", "name": "ttk202301-09431704s1-supp1-3080293.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk202301-09431704s1-supp1-3080293.pdf", "extension": "pdf", "size": "352 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1DeF3m08bU4", "title": "June", "year": "2022", "issueNum": "06", "idPrefix": "tc", "pubType": "journal", "volume": "71", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1uiiTrEWIlG", "doi": "10.1109/TC.2021.3087946", "abstract": "Convolutional neural networks (CNNs) have achieved great success in performing cognitive tasks. However, execution of CNNs requires a large amount of computing resources and generates heavy memory traffic, which imposes a severe challenge on computing system design. Through optimizing parallel executions and data reuse in convolution, systolic architecture demonstrates great advantages in accelerating CNN computations. However, regular internal data transmission path in traditional systolic architecture prevents the systolic architecture from completely leveraging the benefits introduced by neural network sparsity. Deployment of fine-grained sparsity on the existing systolic architectures is greatly hindered by the incurred computational overheads. In this work, we propose <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {S}}^{2}$_Z</tex-math></inline-formula>Engine &#x2013; a novel systolic architecture that can fully exploit the sparsity in CNNs with maximized data reuse. <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {S}}^{2}$_Z</tex-math></inline-formula>Engine transmits compressed data internally and allows each processing element to dynamically select an aligned data from the compressed dataflow in convolution. Compared to the na&#x00EF;ve systolic array, <inline-formula><tex-math notation=\"LaTeX\">Z_${\\mathsf {S}}^{2}$_Z</tex-math></inline-formula>Engine achieves about <inline-formula><tex-math notation=\"LaTeX\">Z_$3.2\\times$_Z</tex-math></inline-formula> and about <inline-formula><tex-math notation=\"LaTeX\">Z_$3.0\\times$_Z</tex-math></inline-formula> improvements on speed and energy efficiency, respectively.", "abstracts": [ { "abstractType": "Regular", "content": "Convolutional neural networks (CNNs) have achieved great success in performing cognitive tasks. However, execution of CNNs requires a large amount of computing resources and generates heavy memory traffic, which imposes a severe challenge on computing system design. Through optimizing parallel executions and data reuse in convolution, systolic architecture demonstrates great advantages in accelerating CNN computations. However, regular internal data transmission path in traditional systolic architecture prevents the systolic architecture from completely leveraging the benefits introduced by neural network sparsity. Deployment of fine-grained sparsity on the existing systolic architectures is greatly hindered by the incurred computational overheads. In this work, we propose <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {S}}^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant=\"sans-serif\">S</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq1-3087946.gif\"/></alternatives></inline-formula>Engine &#x2013; a novel systolic architecture that can fully exploit the sparsity in CNNs with maximized data reuse. <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {S}}^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant=\"sans-serif\">S</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq2-3087946.gif\"/></alternatives></inline-formula>Engine transmits compressed data internally and allows each processing element to dynamically select an aligned data from the compressed dataflow in convolution. Compared to the na&#x00EF;ve systolic array, <inline-formula><tex-math notation=\"LaTeX\">${\\mathsf {S}}^{2}$</tex-math><alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant=\"sans-serif\">S</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"yang-ieq3-3087946.gif\"/></alternatives></inline-formula>Engine achieves about <inline-formula><tex-math notation=\"LaTeX\">$3.2\\times$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>3</mml:mn><mml:mo>.</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x00D7;</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"yang-ieq4-3087946.gif\"/></alternatives></inline-formula> and about <inline-formula><tex-math notation=\"LaTeX\">$3.0\\times$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>3</mml:mn><mml:mo>.</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x00D7;</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"yang-ieq5-3087946.gif\"/></alternatives></inline-formula> improvements on speed and energy efficiency, respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Convolutional neural networks (CNNs) have achieved great success in performing cognitive tasks. However, execution of CNNs requires a large amount of computing resources and generates heavy memory traffic, which imposes a severe challenge on computing system design. Through optimizing parallel executions and data reuse in convolution, systolic architecture demonstrates great advantages in accelerating CNN computations. However, regular internal data transmission path in traditional systolic architecture prevents the systolic architecture from completely leveraging the benefits introduced by neural network sparsity. Deployment of fine-grained sparsity on the existing systolic architectures is greatly hindered by the incurred computational overheads. In this work, we propose -Engine – a novel systolic architecture that can fully exploit the sparsity in CNNs with maximized data reuse. -Engine transmits compressed data internally and allows each processing element to dynamically select an aligned data from the compressed dataflow in convolution. Compared to the naïve systolic array, -Engine achieves about - and about - improvements on speed and energy efficiency, respectively.", "title": "S<sup>2</sup> Engine: A Novel Systolic Architecture for Sparse Convolutional Neural Networks", "normalizedTitle": "S2 Engine: A Novel Systolic Architecture for Sparse Convolutional Neural Networks", "fno": "09450011", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Convolutional Neural Nets", "Software Reusability", "Systolic Arrays", "Cognitive Tasks", "Heavy Memory Traffic", "Parallel Executions", "CNN Computations", "Regular Internal Data Transmission Path", "Neural Network Sparsity", "Fine Grained Sparsity", "Systolic Architectures", "Computational Overheads", "Maximized Data Reuse", "Aligned Data", "Sparse Convolutional Neural Networks", "Naive Systolic Array", "Convolution", "Arrays", "Engines", "Kernel", "Neural Networks", "Memory Management", "Computational Modeling", "Systolic Array", "Sparsity", "Convolution Neural Network", "Accelerator" ], "authors": [ { "givenName": "Jianlei", "surname": "Yang", "fullName": "Jianlei Yang", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenzhi", "surname": "Fu", "fullName": "Wenzhi Fu", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xingzhou", "surname": "Cheng", "fullName": "Xingzhou Cheng", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xucheng", "surname": "Ye", "fullName": "Xucheng Ye", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Pengcheng", "surname": "Dai", "fullName": "Pengcheng Dai", "affiliation": "School of Integrated Circuits and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weisheng", "surname": "Zhao", "fullName": "Weisheng Zhao", "affiliation": "School of Integrated Circuits and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1440-1452", "year": "2022", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/06/09759987", "title": "Sparse and Flexible Projections for Unsupervised Feature Selection", "doi": null, "abstractUrl": "/journal/tk/2023/06/09759987/1CHsvtlNSSI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09765671", "title": "Design and Implementation of 2D Convolution on x86/x64 Processors", "doi": null, "abstractUrl": "/journal/td/2022/12/09765671/1CY3S0xMZeo", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09774929", "title": "CAS(ME)<sup>3</sup>: A Third Generation Facial Spontaneous Micro-Expression Database With Depth Information and High Ecological Validity", "doi": null, "abstractUrl": "/journal/tp/2023/03/09774929/1Dlifb1d2c8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09815150", "title": "TriangleKV: Reducing Write Stalls and Write Amplification in LSM-Tree Based KV Stores With Triangle Container in NVM", "doi": null, "abstractUrl": "/journal/td/2022/12/09815150/1EJBwt5msJG", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/03/09806391", "title": "DyNNamic: Dynamically Reshaping, High Data-Reuse Accelerator for Compact DNNs", "doi": null, "abstractUrl": "/journal/tc/2023/03/09806391/1Et0j7cbvOw", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09851943", "title": "ROLLED: <underline>R</underline>acetrack Memory <underline>O</underline>ptimized <underline>L</underline>inear <underline>L</underline>ayout and <underline>E</underline>fficient <underline>D</underline>ecomposition of Decision Trees", "doi": null, "abstractUrl": "/journal/tc/2023/05/09851943/1FFHeRJbMTm", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2022/02/09854046", "title": "Open-Source Hardware Memory Protection Engine Integrated With NVMM Simulator", "doi": null, "abstractUrl": "/journal/ca/2022/02/09854046/1FJ0ToM0ikw", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/09976297", "title": "Exploring Memory Access Similarity to Improve Irregular Application Performance for Distributed Hybrid Memory Systems", "doi": null, "abstractUrl": "/journal/td/2023/03/09976297/1IWfP8p5MQ0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/03/09219246", "title": "Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions", "doi": null, "abstractUrl": "/journal/tq/2022/03/09219246/1nMMo03q2zu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09309378", "title": "Recurrent Learning on PM<sup>2.5</sup> Prediction Based on Clustered Airbox Dataset", "doi": null, "abstractUrl": "/journal/tk/2022/10/09309378/1pVCNMx9bwc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09447982", "articleId": "1ueZ21wt3ZS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09454330", "articleId": "1uqBiqLBqxi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1xNJrQvB79K", "title": "May", "year": "2022", "issueNum": "05", "idPrefix": "td", "pubType": "journal", "volume": "33", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1vYRJw2uV0I", "doi": "10.1109/TPDS.2021.3104241", "abstract": "In the multi-access edge computing (MEC) environment, app vendors&#x2019; data can be cached on edge servers to ensure low-latency data retrieval. Massive users can simultaneously access edge servers with high data rates through flexible allocations of transmit power. The ability to manage networking resources offers unique opportunities to app vendors but also raises unprecedented challenges. To ensure fast data retrieval for users in the MEC environment, edge data caching must take into account the allocations of data, users, and transmit power jointly. We make the first attempt to study the Data, User, and Power Allocation (DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula>) problem, aiming to serve the most users and maximize their overall data rate. First, we formulate the DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula> problem and prove its <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {NP}$_Z</tex-math></inline-formula>-completeness. Then, we model the DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula> problem as a potential DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula> game admitting at least one Nash equilibrium and propose a two-phase game-theoretic decentralized algorithm named DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula>Game to achieve the Nash equilibrium as the solution to the DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula> problem. To evaluate DUPA<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula>Game, we analyze its theoretical performance and conduct extensive experiments to demonstrate its effectiveness and efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "In the multi-access edge computing (MEC) environment, app vendors&#x2019; data can be cached on edge servers to ensure low-latency data retrieval. Massive users can simultaneously access edge servers with high data rates through flexible allocations of transmit power. The ability to manage networking resources offers unique opportunities to app vendors but also raises unprecedented challenges. To ensure fast data retrieval for users in the MEC environment, edge data caching must take into account the allocations of data, users, and transmit power jointly. We make the first attempt to study the Data, User, and Power Allocation (DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq1-3104241.gif\"/></alternatives></inline-formula>) problem, aiming to serve the most users and maximize their overall data rate. First, we formulate the DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq2-3104241.gif\"/></alternatives></inline-formula> problem and prove its <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {NP}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"script\">NP</mml:mi></mml:math><inline-graphic xlink:href=\"xia-ieq3-3104241.gif\"/></alternatives></inline-formula>-completeness. Then, we model the DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq4-3104241.gif\"/></alternatives></inline-formula> problem as a potential DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq5-3104241.gif\"/></alternatives></inline-formula> game admitting at least one Nash equilibrium and propose a two-phase game-theoretic decentralized algorithm named DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq6-3104241.gif\"/></alternatives></inline-formula>Game to achieve the Nash equilibrium as the solution to the DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq7-3104241.gif\"/></alternatives></inline-formula> problem. To evaluate DUPA<inline-formula><tex-math notation=\"LaTeX\">$^3$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>3</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"xia-ieq8-3104241.gif\"/></alternatives></inline-formula>Game, we analyze its theoretical performance and conduct extensive experiments to demonstrate its effectiveness and efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the multi-access edge computing (MEC) environment, app vendors’ data can be cached on edge servers to ensure low-latency data retrieval. Massive users can simultaneously access edge servers with high data rates through flexible allocations of transmit power. The ability to manage networking resources offers unique opportunities to app vendors but also raises unprecedented challenges. To ensure fast data retrieval for users in the MEC environment, edge data caching must take into account the allocations of data, users, and transmit power jointly. We make the first attempt to study the Data, User, and Power Allocation (DUPA-) problem, aiming to serve the most users and maximize their overall data rate. First, we formulate the DUPA- problem and prove its --completeness. Then, we model the DUPA- problem as a potential DUPA- game admitting at least one Nash equilibrium and propose a two-phase game-theoretic decentralized algorithm named DUPA-Game to achieve the Nash equilibrium as the solution to the DUPA- problem. To evaluate DUPA-Game, we analyze its theoretical performance and conduct extensive experiments to demonstrate its effectiveness and efficiency.", "title": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "normalizedTitle": "Data, User and Power Allocations for Caching in Multi-Access Edge Computing", "fno": "09511831", "hasPdf": true, "idPrefix": "td", "keywords": [ "Cache Storage", "Distributed Processing", "Game Theory", "Multi Access Systems", "Network Servers", "Potential DUPA 3 Game", "Two Phase Game Theoretic Decentralized Algorithm", "Nash Equilibrium", "NP Completeness", "DUPA 3 Problem", "Edge Data Caching", "Data Retrieval", "Networking Resources", "Transmit Power", "Flexible Allocations", "Access Edge Servers", "Low Latency Data Retrieval", "App Vendors Data", "MEC Environment", "Data User Power Allocations", "Multiaccess Edge Computing Caching", "Servers", "Resource Management", "Games", "Interference", "NOMA", "Intercell Interference", "Distributed Databases", "Edge Computing", "Data Allocation", "User Allocation", "Power Allocation", "Optimization", "Multi Access" ], "authors": [ { "givenName": "Xiaoyu", "surname": "Xia", "fullName": "Xiaoyu Xia", "affiliation": "School of Information Technology, Deakin University, Melbourne, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Feifei", "surname": "Chen", "fullName": "Feifei Chen", "affiliation": "School of Information Technology, Deakin University, Melbourne, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Qiang", "surname": "He", "fullName": "Qiang He", "affiliation": "Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Guangming", "surname": "Cui", "fullName": "Guangming Cui", "affiliation": "Department of Computer Science and Software Engineering, Swinburne University of Technology, Melbourne, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "John C.", "surname": "Grundy", "fullName": "John C. Grundy", "affiliation": "Faculty of Information Technology, Monash University, Clayton, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Mohamed", "surname": "Abdelrazek", "fullName": "Mohamed Abdelrazek", "affiliation": "School of Information Technology, Deakin University, Melbourne, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaolong", "surname": "Xu", "fullName": "Xiaolong Xu", "affiliation": "School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hai", "surname": "Jin", "fullName": "Hai Jin", "affiliation": "School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-05-01 00:00:00", "pubType": "trans", "pages": "1144-1155", "year": "2022", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tm/2019/05/08413108", "title": "Fast and Resilient Indoor Floor Plan Construction with a Single User", "doi": null, "abstractUrl": "/journal/tm/2019/05/08413108/13rRUILLkEu", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/05/08344546", "title": "What Makes Objects Similar: A Unified Multi-Metric Learning Approach", "doi": null, "abstractUrl": "/journal/tp/2019/05/08344546/13rRUNvgyXK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09732663", "title": "Optimal Convex Hull Formation on a Grid by Asynchronous Robots With Lights", "doi": null, "abstractUrl": "/journal/td/2022/12/09732663/1BD8Qcr91gQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08730423", "title": "Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery", "doi": null, "abstractUrl": "/journal/tb/2020/02/08730423/1aAwyubtkha", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09133279", "title": "Data-Driven Variable Decomposition for Treatment Effect Estimation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09133279/1la7EFn5FrG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09187550", "title": "Towards More Secure Constructions of Adjustable Join Schemes", "doi": null, "abstractUrl": "/journal/tq/2022/02/09187550/1mVFLWkSEQU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/06/09242286", "title": "Wireless Powered Mobile Edge Computing: Dynamic Resource Allocation and Throughput Maximization", "doi": null, "abstractUrl": "/journal/tm/2022/06/09242286/1oijtIm7Ecg", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2020/02/09274530", "title": "A Lightweight Memory Access Pattern Obfuscation Framework for NVM", "doi": null, "abstractUrl": "/journal/ca/2020/02/09274530/1pLFv3MkGJO", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09618848", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "doi": null, "abstractUrl": "/journal/ts/2022/12/09618848/1yBC5MAzo0U", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09511790", "articleId": "1vYRIgUZUVW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09485041", "articleId": "1veoqBgbKUM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1xPo4UTj2JW", "name": "ttd202205-09511831s1-supp1-3104241.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttd202205-09511831s1-supp1-3104241.pdf", "extension": "pdf", "size": "222 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1IXUpNdkyWs", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "ts", "pubType": "journal", "volume": "48", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1yBC5MAzo0U", "doi": "10.1109/TSE.2021.3124795", "abstract": "As modern software systems are increasingly developed for running in distributed environments, it is crucial to provide fundamental techniques such as dependence analysis for checking, diagnosing, and evolving those systems. However, traditional dependence analysis is either inapplicable or of very limited utility for distributed programs due to the decoupled components of these programs which run in concurrent processes at physically separated machines. Motivated by the need for dependence analysis of distributed software and the diverse cost-effectiveness needs of dependence-based applications, this paper presents <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>, a framework of dynamic dependence analysis for distributed programs. By partially ordering distributed method execution events and inferring causality from the ordered events, <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc> computes method-level dependencies both within and across process boundaries. Further, by exploiting message-passing semantics across processes, and incorporating static dependencies and statement coverage within individual components, <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc> offers three additional instantiations that trade efficiency for better precision. We present the design of the <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc> framework and evaluate the four instantiations of <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc> on distributed systems of various architectures and scales using our implementation for Java. Our empirical results show that <sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc> is significantly more effective than existing options while offering varying levels of cost-effectiveness tradeoffs. As our framework essentially computes whole-system run-time dependencies, it naturally empowers a range of other dependence-based applications.", "abstracts": [ { "abstractType": "Regular", "content": "As modern software systems are increasingly developed for running in distributed environments, it is crucial to provide fundamental techniques such as dependence analysis for checking, diagnosing, and evolving those systems. However, traditional dependence analysis is either inapplicable or of very limited utility for distributed programs due to the decoupled components of these programs which run in concurrent processes at physically separated machines. Motivated by the need for dependence analysis of distributed software and the diverse cost-effectiveness needs of dependence-based applications, this paper presents <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq2-3124795.gif\"/></alternatives></inline-formula>Abs</sc>, a framework of dynamic dependence analysis for distributed programs. By partially ordering distributed method execution events and inferring causality from the ordered events, <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq3-3124795.gif\"/></alternatives></inline-formula>Abs</sc> computes method-level dependencies both within and across process boundaries. Further, by exploiting message-passing semantics across processes, and incorporating static dependencies and statement coverage within individual components, <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq4-3124795.gif\"/></alternatives></inline-formula>Abs</sc> offers three additional instantiations that trade efficiency for better precision. We present the design of the <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq5-3124795.gif\"/></alternatives></inline-formula>Abs</sc> framework and evaluate the four instantiations of <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq6-3124795.gif\"/></alternatives></inline-formula>Abs</sc> on distributed systems of various architectures and scales using our implementation for Java. Our empirical results show that <sc>D<inline-formula><tex-math notation=\"LaTeX\">$^2$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mn>2</mml:mn></mml:msup></mml:math><inline-graphic xlink:href=\"cai-ieq7-3124795.gif\"/></alternatives></inline-formula>Abs</sc> is significantly more effective than existing options while offering varying levels of cost-effectiveness tradeoffs. As our framework essentially computes whole-system run-time dependencies, it naturally empowers a range of other dependence-based applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As modern software systems are increasingly developed for running in distributed environments, it is crucial to provide fundamental techniques such as dependence analysis for checking, diagnosing, and evolving those systems. However, traditional dependence analysis is either inapplicable or of very limited utility for distributed programs due to the decoupled components of these programs which run in concurrent processes at physically separated machines. Motivated by the need for dependence analysis of distributed software and the diverse cost-effectiveness needs of dependence-based applications, this paper presents D-Abs, a framework of dynamic dependence analysis for distributed programs. By partially ordering distributed method execution events and inferring causality from the ordered events, D-Abs computes method-level dependencies both within and across process boundaries. Further, by exploiting message-passing semantics across processes, and incorporating static dependencies and statement coverage within individual components, D-Abs offers three additional instantiations that trade efficiency for better precision. We present the design of the D-Abs framework and evaluate the four instantiations of D-Abs on distributed systems of various architectures and scales using our implementation for Java. Our empirical results show that D-Abs is significantly more effective than existing options while offering varying levels of cost-effectiveness tradeoffs. As our framework essentially computes whole-system run-time dependencies, it naturally empowers a range of other dependence-based applications.", "title": "<sc>D<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>Abs</sc>: A Framework for Dynamic Dependence Analysis of Distributed Programs", "normalizedTitle": "D-Abs: A Framework for Dynamic Dependence Analysis of Distributed Programs", "fno": "09618848", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Distributed Processing", "Distributed Programming", "Java", "Message Passing", "Program Diagnostics", "2 Abs", "2 Abscomputes Method Level", "2 Absframework", "2 Absis", "2 Absoffers Three Additional Instantiations", "2 Abson Distributed Systems", "Dependence Based Applications", "Distributed Environments", "Distributed Programs", "Distributed Software", "Dynamic Dependence Analysis", "Inferring Causality", "Method Execution Events", "Modern Software Systems", "Statement Coverage", "Static Dependencies", "Traditional Dependence Analysis", "Whole System Run Time Dependencies", "Performance Analysis", "Software", "Heuristic Algorithms", "Codes", "Task Analysis", "Sockets", "Costs", "Distributed System", "Program Analysis", "Dependence Analysis", "Dynamic Analysis" ], "authors": [ { "givenName": "Haipeng", "surname": "Cai", "fullName": "Haipeng Cai", "affiliation": "School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoqin", "surname": "Fu", "fullName": "Xiaoqin Fu", "affiliation": "School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "4733-4761", "year": "2022", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2022/06/09723546", "title": "Multicriteria Scalable Graph Drawing via Stochastic Gradient Descent, <inline-formula><tex-math notation=\"LaTeX\">Z_$(SGD)^{2}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tg/2022/06/09723546/1BocJwdaFYk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09816125", "title": "<italic>E<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula>Outlier:</italic> a Self-Supervised Framework for Unsupervised Deep Outlier Detection", "doi": null, "abstractUrl": "/journal/tp/2023/03/09816125/1EMV4w3EOUU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/01/08789541", "title": "Regression Guided by Relative Ranking Using Convolutional Neural Network (R<inline-formula><tex-math notation=\"LaTeX\">Z_$^3$_Z</tex-math></inline-formula>CNN) for Facial Beauty Prediction", "doi": null, "abstractUrl": "/journal/ta/2022/01/08789541/1ch5uXuM97G", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/06/08954811", "title": "Lucene-P<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>: A Distributed Platform for Privacy-Preserving Text-Based Search", "doi": null, "abstractUrl": "/journal/tq/2021/06/08954811/1gs4XOshKHC", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2021/01/09143480", "title": "<sc>K-Athena</sc>: A Performance Portable Structured Grid Finite Volume Magnetohydrodynamics Code", "doi": null, "abstractUrl": "/journal/td/2021/01/09143480/1lxmD8qe0NO", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/06/09445629", "title": "Up to <inline-formula><tex-math notation=\"LaTeX\">Z_$8k$_Z</tex-math></inline-formula>-bit Modular Montgomery Multiplication in Residue Number Systems With Fast 16-bit Residue Channels", "doi": null, "abstractUrl": "/journal/tc/2022/06/09445629/1uaauvs6N0c", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09497715", "title": "Spherical DNNs and Their Applications in 360<inline-formula><tex-math notation=\"LaTeX\">Z_$^\\circ$_Z</tex-math></inline-formula> Images and Videos", "doi": null, "abstractUrl": "/journal/tp/2022/10/09497715/1vzY9kuYnwA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09524471", "title": "A(DP)<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent With Differential Privacy", "doi": null, "abstractUrl": "/journal/tp/2022/11/09524471/1wpq5To7ikU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541093", "title": "Learning Spherical Convolution for <inline-formula><tex-math notation=\"LaTeX\">Z_$360^{\\circ }$_Z</tex-math></inline-formula> Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541093/1x3fMiX57S8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09647957", "title": "WAMP<inline-formula><tex-math notation=\"LaTeX\">Z_$^2$_Z</tex-math></inline-formula>S: Workload-Aware GPU Performance Model Based Pseudo-Preemptive Real-Time Scheduling for the Airborne Embedded System", "doi": null, "abstractUrl": "/journal/td/2022/11/09647957/1ziKjgqTuRa", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09611365", "articleId": "1yrD6sliZwc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09606549", "articleId": "1ymFpn90LjW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzn38Js", "title": "Oct.", "year": "2020", "issueNum": "10", "idPrefix": "tp", "pubType": "journal", "volume": "42", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1e7BX0ZwdrO", "doi": "10.1109/TPAMI.2019.2947048", "abstract": "We address the problem of mesh reconstruction from live RGB-D video, assuming a calibrated camera and poses provided externally (e.g., by a SLAM system). In contrast to most existing approaches, we do not fuse depth measurements in a volume but in a dense surfel cloud. We asynchronously (re)triangulate the smoothed surfels to reconstruct a surface mesh. This novel approach enables to maintain a dense surface representation of the scene during SLAM which can quickly adapt to loop closures. This is possible by deforming the surfel cloud and asynchronously remeshing the surface where necessary. The surfel-based representation also naturally supports strongly varying scan resolution. In particular, it reconstructs colors at the input camera's resolution. Moreover, in contrast to many volumetric approaches, ours can reconstruct thin objects since objects do not need to enclose a volume. We demonstrate our approach in a number of experiments, showing that it produces reconstructions that are competitive with the state-of-the-art, and we discuss its advantages and limitations. The algorithm (excluding loop closure functionality) is available as open source at https://github.com/puzzlepaint/surfelmeshing.", "abstracts": [ { "abstractType": "Regular", "content": "We address the problem of mesh reconstruction from live RGB-D video, assuming a calibrated camera and poses provided externally (e.g., by a SLAM system). In contrast to most existing approaches, we do not fuse depth measurements in a volume but in a dense surfel cloud. We asynchronously (re)triangulate the smoothed surfels to reconstruct a surface mesh. This novel approach enables to maintain a dense surface representation of the scene during SLAM which can quickly adapt to loop closures. This is possible by deforming the surfel cloud and asynchronously remeshing the surface where necessary. The surfel-based representation also naturally supports strongly varying scan resolution. In particular, it reconstructs colors at the input camera's resolution. Moreover, in contrast to many volumetric approaches, ours can reconstruct thin objects since objects do not need to enclose a volume. We demonstrate our approach in a number of experiments, showing that it produces reconstructions that are competitive with the state-of-the-art, and we discuss its advantages and limitations. The algorithm (excluding loop closure functionality) is available as open source at https://github.com/puzzlepaint/surfelmeshing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We address the problem of mesh reconstruction from live RGB-D video, assuming a calibrated camera and poses provided externally (e.g., by a SLAM system). In contrast to most existing approaches, we do not fuse depth measurements in a volume but in a dense surfel cloud. We asynchronously (re)triangulate the smoothed surfels to reconstruct a surface mesh. This novel approach enables to maintain a dense surface representation of the scene during SLAM which can quickly adapt to loop closures. This is possible by deforming the surfel cloud and asynchronously remeshing the surface where necessary. The surfel-based representation also naturally supports strongly varying scan resolution. In particular, it reconstructs colors at the input camera's resolution. Moreover, in contrast to many volumetric approaches, ours can reconstruct thin objects since objects do not need to enclose a volume. We demonstrate our approach in a number of experiments, showing that it produces reconstructions that are competitive with the state-of-the-art, and we discuss its advantages and limitations. The algorithm (excluding loop closure functionality) is available as open source at https://github.com/puzzlepaint/surfelmeshing.", "title": "SurfelMeshing: Online Surfel-Based Mesh Reconstruction", "normalizedTitle": "SurfelMeshing: Online Surfel-Based Mesh Reconstruction", "fno": "08868189", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cameras", "Computational Geometry", "Image Colour Analysis", "Image Reconstruction", "Image Representation", "Mesh Generation", "SLAM Robots", "Solid Modelling", "Surfel Based Mesh Reconstruction", "Live RGB D Video", "Calibrated Camera", "SLAM System", "Depth Measurements", "Dense Surfel Cloud", "Smoothed Surfels", "Surface Mesh", "Dense Surface Representation", "Surfel Based Representation", "Scan Resolution", "Input Camera", "Volumetric Approaches", "Loop Closure Functionality", "Real Time Systems", "Simultaneous Localization And Mapping", "Three Dimensional Displays", "Surface Reconstruction", "Cameras", "Noise Reduction", "Image Reconstruction", "Applications Of RGB D Vision", "Depth Fusion", "Loop Closure", "3 D Modeling And Scene Reconstruction", "RGB D SLAM", "Real Time Dense Mapping", "Surfels" ], "authors": [ { "givenName": "Thomas", "surname": "Schöps", "fullName": "Thomas Schöps", "affiliation": "Department of Computer Science, ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Torsten", "surname": "Sattler", "fullName": "Torsten Sattler", "affiliation": "Chalmers University of Technology, Göteborg, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Marc", "surname": "Pollefeys", "fullName": "Marc Pollefeys", "affiliation": "Department of Computer Science, ETH Zurich, Zürich, Switzerland", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2020-10-01 00:00:00", "pubType": "trans", "pages": "2494-2507", "year": "2020", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851d271", "title": "Online Reconstruction of Indoor Scenes from RGB-D Streams", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851d271/12OmNxj238p", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034c418", "title": "Probabilistic Surfel Fusion for Dense LiDAR Mapping", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034c418/12OmNyQYtiq", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457g565", "title": "CNN-SLAM: Real-Time Dense Monocular SLAM with Learned Depth Prediction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g565/12OmNzTH0Qa", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000c560", "title": "CodeSLAM - Learning a Compact, Optimisable Representation for Dense Visual SLAM", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000c560/17D45VUZMVf", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a616", "title": "Multi-planar Monocular Reconstruction of Manhattan Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a616/17D45XvMcbo", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699273", "title": "CNN-MonoFusion: Online Monocular Dense Reconstruction Using Learned Depth from Single View", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699273/19F1QKV77QQ", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a308", "title": "Online Adaptive Integration of Observation and Inpainting for Diminished Reality with Online Surface Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a308/1J7Wkijm8Yo", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a574", "title": "Mobile Photometric Stereo with Keypoint-Based SLAM for Dense 3D Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a574/1ezREwjZfFe", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a101", "title": "Improved ORB-SLAM Based 3D Dense Reconstruction for Monocular Endoscopic Image", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a101/1vg8aYQPZi8", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09496211", "title": "PlaneFusion: Real-Time Indoor Scene Reconstruction With Planar Prior", "doi": null, "abstractUrl": "/journal/tg/2022/12/09496211/1vyjumhb4ZO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08691513", "articleId": "1jeCTblwCMo", "__typename": "AdjacentArticleType" }, "next": { "fno": "08708933", "articleId": "19Q3hT6JyUg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1mP2j2o4GmA", "name": "ttp202010-08868189s1-supplementalvideo.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202010-08868189s1-supplementalvideo.mp4", "extension": "mp4", "size": "42.2 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1LUpyYLBfeo", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYoqyI8xfq", "doi": "10.1109/TVCG.2023.3247052", "abstract": "Using a map in an unfamiliar environment requires identifying correspondences between elements of the map's allocentric representation and elements in egocentric views. Aligning the map with the environment can be challenging. Virtual reality (VR) allows learning about unfamiliar environments in a sequence of egocentric views that correspond closely to the perspectives and views that are experienced in the actual environment. We compared three methods to prepare for localization and navigation tasks performed by teleoperating a robot in an office building: studying a floor plan of the building and two forms of VR exploration. One group of participants studied a building plan, a second group explored a faithful VR reconstruction of the building from a normal-sized avatar's perspective, and a third group explored the VR from a giant-sized avatar's perspective. All methods contained marked checkpoints. The subsequent tasks were identical for all groups. The self-localization task required indication of the approximate location of the robot in the environment. The navigation task required navigation between checkpoints. Participants took less time to learn with the giant VR perspective and with the floorplan than with the normal VR perspective. Both VR learning methods significantly outperformed the floorplan in the orientation task. Navigation was performed quicker after learning in the giant perspective compared to the normal perspective and the building plan. We conclude that the normal perspective and especially the giant perspective in VR are viable options for preparing for teleoperation in unfamiliar environments when a virtual model of the environment is available.", "abstracts": [ { "abstractType": "Regular", "content": "Using a map in an unfamiliar environment requires identifying correspondences between elements of the map's allocentric representation and elements in egocentric views. Aligning the map with the environment can be challenging. Virtual reality (VR) allows learning about unfamiliar environments in a sequence of egocentric views that correspond closely to the perspectives and views that are experienced in the actual environment. We compared three methods to prepare for localization and navigation tasks performed by teleoperating a robot in an office building: studying a floor plan of the building and two forms of VR exploration. One group of participants studied a building plan, a second group explored a faithful VR reconstruction of the building from a normal-sized avatar's perspective, and a third group explored the VR from a giant-sized avatar's perspective. All methods contained marked checkpoints. The subsequent tasks were identical for all groups. The self-localization task required indication of the approximate location of the robot in the environment. The navigation task required navigation between checkpoints. Participants took less time to learn with the giant VR perspective and with the floorplan than with the normal VR perspective. Both VR learning methods significantly outperformed the floorplan in the orientation task. Navigation was performed quicker after learning in the giant perspective compared to the normal perspective and the building plan. We conclude that the normal perspective and especially the giant perspective in VR are viable options for preparing for teleoperation in unfamiliar environments when a virtual model of the environment is available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Using a map in an unfamiliar environment requires identifying correspondences between elements of the map's allocentric representation and elements in egocentric views. Aligning the map with the environment can be challenging. Virtual reality (VR) allows learning about unfamiliar environments in a sequence of egocentric views that correspond closely to the perspectives and views that are experienced in the actual environment. We compared three methods to prepare for localization and navigation tasks performed by teleoperating a robot in an office building: studying a floor plan of the building and two forms of VR exploration. One group of participants studied a building plan, a second group explored a faithful VR reconstruction of the building from a normal-sized avatar's perspective, and a third group explored the VR from a giant-sized avatar's perspective. All methods contained marked checkpoints. The subsequent tasks were identical for all groups. The self-localization task required indication of the approximate location of the robot in the environment. The navigation task required navigation between checkpoints. Participants took less time to learn with the giant VR perspective and with the floorplan than with the normal VR perspective. Both VR learning methods significantly outperformed the floorplan in the orientation task. Navigation was performed quicker after learning in the giant perspective compared to the normal perspective and the building plan. We conclude that the normal perspective and especially the giant perspective in VR are viable options for preparing for teleoperation in unfamiliar environments when a virtual model of the environment is available.", "title": "Evaluating the Effects of Virtual Reality Environment Learning on Subsequent Robot Teleoperation in an Unfamiliar Building", "normalizedTitle": "Evaluating the Effects of Virtual Reality Environment Learning on Subsequent Robot Teleoperation in an Unfamiliar Building", "fno": "10049647", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Avatars", "Mobile Robots", "Navigation", "Path Planning", "Telerobotics", "Virtual Reality", "Actual Environment", "Allocentric Representation", "Avatar", "Building Plan", "Egocentric Views", "Faithful VR Reconstruction", "Floor Plan", "Floorplan", "Giant Perspective", "Giant VR Perspective", "Navigation Task Required Navigation", "Normal Perspective", "Normal VR Perspective", "Office Building", "Orientation Task", "Self Localization Task Required Indication", "Subsequent Robot Teleoperation", "Subsequent Tasks", "Unfamiliar Building", "Unfamiliar Environment", "Virtual Reality Environment Learning", "VR Exploration", "Navigation", "Buildings", "Task Analysis", "Robots", "Avatars", "Floors", "Virtual Environments", "Human Computer Interaction HCI", "Human Centered Computing", "Virtual Reality", "Human Factors", "Teleoperation", "Robot" ], "authors": [ { "givenName": "Karl", "surname": "Eisenträger", "fullName": "Karl Eisenträger", "affiliation": "Humboldt-University Berlin, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Judith", "surname": "Haubner", "fullName": "Judith Haubner", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Jennifer", "surname": "Brade", "fullName": "Jennifer Brade", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Wolfgang", "surname": "Einhäuser", "fullName": "Wolfgang Einhäuser", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Alexandra", "surname": "Bendixen", "fullName": "Alexandra Bendixen", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Sven", "surname": "Winkler", "fullName": "Sven Winkler", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Philipp", "surname": "Klimant", "fullName": "Philipp Klimant", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Georg", "surname": "Jahn", "fullName": "Georg Jahn", "affiliation": "Chemnitz University of Technology, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "2220-2229", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892335", "title": "Designing intentional impossible spaces in virtual reality narratives: A case study", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892335/12OmNApcu9b", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2010/7029/0/05543830", "title": "Robust door detection in unfamiliar environments by combining edge and corner features", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2010/05543830/12OmNCd2rP0", "parentPublication": { "id": "proceedings/cvprw/2010/7029/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446229", "title": "Any &#x201C;Body&#x201D; There? Avatar Visibility Effects in a Virtual Reality Game", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446229/13bd1fHrlRx", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08123949", "title": "Efficient VR and AR Navigation Through Multiperspective Occlusion Management", "doi": null, "abstractUrl": "/journal/tg/2018/12/08123949/14H4WNoi7Yc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049698", "title": "Gaining the High Ground: Teleportation to Mid-Air Targets in Immersive Virtual Environments", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049698/1KYotugT0xW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049764", "title": "Effects of Collaborative Training Using Virtual Co-embodiment on Motor Skill Learning", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049764/1KYox5WNvnW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798345", "title": "Investigation of Visual Self-Representation for a Walking-in-Place Navigation System in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798345/1cJ1hpkUgHS", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089540", "title": "Influence of Perspective on Dynamic Tasks in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089540/1jIxarbH6AU", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a452", "title": "Studying the Inter-Relation Between Locomotion Techniques and Embodiment in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a452/1pysvNRUnD2", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09495135", "title": "UrbanRama: Navigating Cities in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09495135/1vyjtJyV16g", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049651", "articleId": "1KYot9Va1na", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049712", "articleId": "1KYomdRJz6U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wws", "title": "March-April", "year": "2018", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "15", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyoPSVD", "doi": "10.1109/TCBB.2014.2388311", "abstract": "In systems neuroscience, it is becoming increasingly common to record the activity of hundreds of neurons simultaneously via electrode arrays. The ability to accurately measure the causal interactions among multiple neurons in the brain is crucial to understanding how neurons work in concert to generate specific brain functions. The development of new statistical methods for assessing causal influence between spike trains is still an active field of neuroscience research. Here, we suggest a copula-based Granger causality measure for the analysis of neural spike train data. This method is built upon our recent work on copula Granger causality for the analysis of continuous-valued time series by extending it to point-process neural spike train data. The proposed method is therefore able to reveal nonlinear and high-order causality in the spike trains while retaining all the computational advantages such as model-free, efficient estimation, and variability assessment of Granger causality. The performance of our algorithm can be further boosted with time-reversed data. Our method performed well on extensive simulations, and was then demonstrated on neural activity simultaneously recorded from primary visual cortex of a monkey performing a contour detection task.", "abstracts": [ { "abstractType": "Regular", "content": "In systems neuroscience, it is becoming increasingly common to record the activity of hundreds of neurons simultaneously via electrode arrays. The ability to accurately measure the causal interactions among multiple neurons in the brain is crucial to understanding how neurons work in concert to generate specific brain functions. The development of new statistical methods for assessing causal influence between spike trains is still an active field of neuroscience research. Here, we suggest a copula-based Granger causality measure for the analysis of neural spike train data. This method is built upon our recent work on copula Granger causality for the analysis of continuous-valued time series by extending it to point-process neural spike train data. The proposed method is therefore able to reveal nonlinear and high-order causality in the spike trains while retaining all the computational advantages such as model-free, efficient estimation, and variability assessment of Granger causality. The performance of our algorithm can be further boosted with time-reversed data. Our method performed well on extensive simulations, and was then demonstrated on neural activity simultaneously recorded from primary visual cortex of a monkey performing a contour detection task.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In systems neuroscience, it is becoming increasingly common to record the activity of hundreds of neurons simultaneously via electrode arrays. The ability to accurately measure the causal interactions among multiple neurons in the brain is crucial to understanding how neurons work in concert to generate specific brain functions. The development of new statistical methods for assessing causal influence between spike trains is still an active field of neuroscience research. Here, we suggest a copula-based Granger causality measure for the analysis of neural spike train data. This method is built upon our recent work on copula Granger causality for the analysis of continuous-valued time series by extending it to point-process neural spike train data. The proposed method is therefore able to reveal nonlinear and high-order causality in the spike trains while retaining all the computational advantages such as model-free, efficient estimation, and variability assessment of Granger causality. The performance of our algorithm can be further boosted with time-reversed data. Our method performed well on extensive simulations, and was then demonstrated on neural activity simultaneously recorded from primary visual cortex of a monkey performing a contour detection task.", "title": "A Copula-Based Granger Causality Measure for the Analysis of Neural Spike Train Data", "normalizedTitle": "A Copula-Based Granger Causality Measure for the Analysis of Neural Spike Train Data", "fno": "07001041", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Time Series Analysis", "Neurons", "Data Models", "History", "Firing", "Estimation", "Computational Modeling", "Granger Causality", "Copula", "Contour Integration", "Multielectrode Recordings", "Neural Spike Train Analysis" ], "authors": [ { "givenName": "Meng", "surname": "Hu", "fullName": "Meng Hu", "affiliation": "School of Biomedical Engineering, Science and Health Systems, Drexel University, Philadelphia, PA", "__typename": "ArticleAuthorType" }, { "givenName": "Wu", "surname": "Li", "fullName": "Wu Li", "affiliation": "State Key Laboratory of Cognitive Neuroscience and Learning and IDG/McGovern Institute for Brain Research, Beijing Normal University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hualou", "surname": "Liang", "fullName": "Hualou Liang", "affiliation": "School of Biomedical Engineering, Science and Health Systems, Drexel University, Philadelphia, PA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2018-03-01 00:00:00", "pubType": "trans", "pages": "562-569", "year": "2018", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bmei/2008/3118/2/3118b394", "title": "Detecting Effective Connectivity in Human Brain using Granger Causality", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118b394/12OmNA0dMF1", "parentPublication": { "id": "proceedings/bmei/2008/3118/2", "title": "BioMedical Engineering and Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013b721", "title": "Spike Trains Synchrony with Changed Neuronal Networks Parameters in a Hippocampus CA3 Small-World Network Model", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013b721/12OmNqNG3fC", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460888", "title": "Sparse Granger causality graphs for human action classification", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460888/12OmNylKB0q", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2011/4527/0/4527a439", "title": "Testing for Linear and Nonlinear Granger Causality between the Carbon Spot and Futures Prices", "doi": null, "abstractUrl": "/proceedings-article/bife/2011/4527a439/12OmNyuPLjq", "parentPublication": { "id": "proceedings/bife/2011/4527/0", "title": "2011 Fourth International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b074", "title": "Granger Causality for Time-Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b074/12OmNzYwccd", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a103", "title": "Granger Causality for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a103/12OmNzahc9L", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2014/7434/0/7434a529", "title": "Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula Model", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a529/12OmNzgeLC8", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005690", "title": "Parallel Gradient Boosting based Granger Causality Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005690/1hJsymm65ck", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09376668", "title": "Neural Granger Causality", "doi": null, "abstractUrl": "/journal/tp/2022/08/09376668/1rSMTFngKMo", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2021/0060/0/006000a558", "title": "Detecting Causal Structure on Cloud Application Microservices Using Granger Causality Models", "doi": null, "abstractUrl": "/proceedings-article/cloud/2021/006000a558/1ymJ3btWYG4", "parentPublication": { "id": "proceedings/cloud/2021/0060/0", "title": "2021 IEEE 14th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07130613", "articleId": "13rRUxNEqUi", "__typename": "AdjacentArticleType" }, "next": { "fno": "07214255", "articleId": "13rRUwfI0OA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1AO2ezGmK52", "title": "Jan.-Feb.", "year": "2022", "issueNum": "01", "idPrefix": "ic", "pubType": "magazine", "volume": "26", "label": "Jan.-Feb.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1APlAUMvn4A", "doi": "10.1109/MIC.2021.3133551", "abstract": "Humans use causality and hypothetical retrospection in their daily decision-making, planning, and understanding of life events.1 The human mind, while retrospecting a given situation, think about questions such as “What was the cause of the given situation?,” “What would be the effect of my action?,” “What would have happened if I had taken another action instead?,” or “Which action led to this effect?” The human mind has an innate understanding of causality.15 It develops a causal model of the world, which learns with fewer data points, makes inferences, and contemplates counterfactual scenarios.8 The unseen and unknown scenarios are called “counterfactuals.”2", "abstracts": [ { "abstractType": "Regular", "content": "Humans use causality and hypothetical retrospection in their daily decision-making, planning, and understanding of life events.1 The human mind, while retrospecting a given situation, think about questions such as “What was the cause of the given situation?,” “What would be the effect of my action?,” “What would have happened if I had taken another action instead?,” or “Which action led to this effect?” The human mind has an innate understanding of causality.15 It develops a causal model of the world, which learns with fewer data points, makes inferences, and contemplates counterfactual scenarios.8 The unseen and unknown scenarios are called “counterfactuals.”2", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Humans use causality and hypothetical retrospection in their daily decision-making, planning, and understanding of life events.1 The human mind, while retrospecting a given situation, think about questions such as “What was the cause of the given situation?,” “What would be the effect of my action?,” “What would have happened if I had taken another action instead?,” or “Which action led to this effect?” The human mind has an innate understanding of causality.15 It develops a causal model of the world, which learns with fewer data points, makes inferences, and contemplates counterfactual scenarios.8 The unseen and unknown scenarios are called “counterfactuals.”2", "title": "CausalKG: Causal Knowledge Graph Explainability Using Interventional and Counterfactual Reasoning", "normalizedTitle": "CausalKG: Causal Knowledge Graph Explainability Using Interventional and Counterfactual Reasoning", "fno": "09706608", "hasPdf": true, "idPrefix": "ic", "keywords": [ "Cognition", "Decision Making", "Graph Theory", "Inference Mechanisms", "Social Sciences", "Causal Knowledge Graph Explainability", "Causality", "Hypothetical Retrospection", "Daily Decision Making", "Life Events", "Human Mind", "Innate Understanding", "Causal Model", "Counterfactual Scenarios", "Data Points", "Cognition", "Internet", "Decision Making", "Planning", "Human Factors" ], "authors": [ { "givenName": "Utkarshani", "surname": "Jaimini", "fullName": "Utkarshani Jaimini", "affiliation": "Artificial Intelligence Institute, University of South Carolina, Columbia, SC, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Amit", "surname": "Sheth", "fullName": "Amit Sheth", "affiliation": "Artificial Intelligence Institute, University of South Carolina, Columbia, SC, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "mags", "pages": "43-50", "year": "2022", "issn": "1089-7801", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cts/2006/0/0/01644141", "title": "Conation: Its Historical Roots and Implications for Future Research", "doi": null, "abstractUrl": "/proceedings-article/cts/2006/01644141/12OmNB7tUrL", "parentPublication": { "id": "proceedings/cts/2006/0/0", "title": "International Symposium on Collaborative Technologies and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733a048", "title": "Inferring Hidden Statuses and Actions in Video by Causal Reasoning", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a048/12OmNzE54yU", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2015/03/mpc2015030022", "title": "Designing Wearable Personal Assistants for Surgeons: An Egocentric Approach", "doi": null, "abstractUrl": "/magazine/pc/2015/03/mpc2015030022/13rRUwjXZPF", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2013/05/mic2013050096", "title": "Augmented Intelligence", "doi": null, "abstractUrl": "/magazine/ic/2013/05/mic2013050096/13rRUxE04pB", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2012/05/msp2012050075", "title": "Security and Cognitive Bias: Exploring the Role of the Mind", "doi": null, "abstractUrl": "/magazine/sp/2012/05/msp2012050075/13rRUxYIMTh", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2018/02/mex2018020083", "title": "Explaining Explanation, Part 3: The Causal Landscape", "doi": null, "abstractUrl": "/magazine/ex/2018/02/mex2018020083/13rRUxbTMtI", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100b856", "title": "On cognitive management and non-causal reasoning for enabling highly automated driving", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100b856/1EpLOh3Y7zW", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a363", "title": "Explainability as a Non-Functional Requirement", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a363/1fHluHi8ihq", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274005", "title": "Collaborative Learning in Engineering Students under Social Distancing: An Action Research", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274005/1phRBjnxKqQ", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2020/1924/0/192400a592", "title": "Factor space:a new idea for artificial intelligence based on causal reasoning", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2020/192400a592/1uHhsJslJOU", "parentPublication": { "id": "proceedings/wi-iat/2020/1924/0", "title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09705646", "articleId": "1AO2f5FE3TO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09705648", "articleId": "1AO2gPRn0Eo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DQPlKUprk4", "title": "April-June", "year": "2022", "issueNum": "02", "idPrefix": "ta", "pubType": "journal", "volume": "13", "label": "April-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1DQPvVEO3ss", "doi": "10.1109/TAFFC.2019.2942931", "abstract": "Human perceptual and affective responses change dynamically when stimuli are experienced. In this study, we developed a method for modeling the causal structures of affective dynamics using time-series data. Using the temporal dominance of sensations method, perceptual and affective data were collected from individuals eating strawberries, and the resulting time-series data were mathematically represented using a vector auto-regression model. Multihierarchical and multidimensional causality structures that explain the temporal evolution of perceptual and affective responses were then established based on Granger causality and the information criterion. The established model suggests how affective and preferential responses are triggered following exposure to stimuli. We also assessed the quantitative and semantic validity of the model.", "abstracts": [ { "abstractType": "Regular", "content": "Human perceptual and affective responses change dynamically when stimuli are experienced. In this study, we developed a method for modeling the causal structures of affective dynamics using time-series data. Using the temporal dominance of sensations method, perceptual and affective data were collected from individuals eating strawberries, and the resulting time-series data were mathematically represented using a vector auto-regression model. Multihierarchical and multidimensional causality structures that explain the temporal evolution of perceptual and affective responses were then established based on Granger causality and the information criterion. The established model suggests how affective and preferential responses are triggered following exposure to stimuli. We also assessed the quantitative and semantic validity of the model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human perceptual and affective responses change dynamically when stimuli are experienced. In this study, we developed a method for modeling the causal structures of affective dynamics using time-series data. Using the temporal dominance of sensations method, perceptual and affective data were collected from individuals eating strawberries, and the resulting time-series data were mathematically represented using a vector auto-regression model. Multihierarchical and multidimensional causality structures that explain the temporal evolution of perceptual and affective responses were then established based on Granger causality and the information criterion. The established model suggests how affective and preferential responses are triggered following exposure to stimuli. We also assessed the quantitative and semantic validity of the model.", "title": "Affective Dynamics: Causality Modeling of Temporally Evolving Perceptual and Affective Responses", "normalizedTitle": "Affective Dynamics: Causality Modeling of Temporally Evolving Perceptual and Affective Responses", "fno": "08846069", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Autoregressive Processes", "Causality", "Regression Analysis", "Time Series", "Affective Dynamics", "Causality Modeling", "Human Perceptual Responses Change", "Affective Responses Change", "Causal Structures", "Temporal Dominance", "Sensations Method", "Perceptual Data", "Affective Data", "Resulting Time Series Data", "Vector Auto Regression Model", "Multihierarchical Causality Structures", "Multidimensional Causality Structures", "Temporal Evolution", "Granger Causality", "Preferential Responses", "Mathematical Model", "Reactive Power", "Data Models", "Time Series Analysis", "Brain Modeling", "Semantics", "Causality Modeling", "Temporal Dominance Of Sensations", "VAR Model", "Granger Causality" ], "authors": [ { "givenName": "Takumu", "surname": "Okada", "fullName": "Takumu Okada", "affiliation": "Department of Mechanical Systems Engineering, Nagoya University, Nagoya, Aichi, Japan", "__typename": "ArticleAuthorType" }, { "givenName": "Shogo", "surname": "Okamoto", "fullName": "Shogo Okamoto", "affiliation": "Department of Mechanical Systems Engineering, Nagoya University, Nagoya, Aichi, Japan", "__typename": "ArticleAuthorType" }, { "givenName": "Yoji", "surname": "Yamada", "fullName": "Yoji Yamada", "affiliation": "Department of Mechanical Systems Engineering, Nagoya University, Nagoya, Aichi, Japan", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2022-04-01 00:00:00", "pubType": "trans", "pages": "628-639", "year": "2022", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/acii/2017/0563/0/08273612", "title": "Emotional responses of vibrotactile-thermal stimuli: Effects of constant-temperature thermal stimuli", "doi": null, "abstractUrl": "/proceedings-article/acii/2017/08273612/12OmNqMPfQu", "parentPublication": { "id": "proceedings/acii/2017/0563/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a838", "title": "Development of a Binary fMRI-BCI for Alzheimer Patients: A Semantic Conditioning Paradigm Using Affective Unconditioned Stimuli", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a838/12OmNyFU78X", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2015/03/07010926", "title": "DECAF: MEG-Based Multimodal Database for Decoding Affective Physiological Responses", "doi": null, "abstractUrl": "/journal/ta/2015/03/07010926/13rRUwdrdR8", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/02/08526305", "title": "Layered-Modeling of Affective and Sensory Experiences using Structural Equation Modeling: Touch Experiences of Plastic Surfaces as an Example", "doi": null, "abstractUrl": "/journal/ta/2021/02/08526305/17D45VsBU3Q", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10050114", "title": "ARAUS: A Large-Scale Dataset and Baseline Models of Affective Responses to Augmented Urban Soundscapes", "doi": null, "abstractUrl": "/journal/ta/5555/01/10050114/1KYo8x9XrB6", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10120958", "title": "Crowdsourcing Affective Annotations via fNIRS-BCI", "doi": null, "abstractUrl": "/journal/ta/5555/01/10120958/1MYNyNXJUwU", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005690", "title": "Parallel Gradient Boosting based Granger Causality Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005690/1hJsymm65ck", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2020/5745/0/09094598", "title": "Can Lateral Inhibition for Sparse Coding Help Explain V1 Neuronal Responses To Natural Stimuli?", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2020/09094598/1jVQDOAul3y", "parentPublication": { "id": "proceedings/ssiai/2020/5745/0", "title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09265409", "title": "Computation of Sensory-Affective Relationships Depending on Material Categories of Pictorial Stimuli", "doi": null, "abstractUrl": "/journal/ta/2023/01/09265409/1oUyrN8PG7u", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09376668", "title": "Neural Granger Causality", "doi": null, "abstractUrl": "/journal/tp/2022/08/09376668/1rSMTFngKMo", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08845680", "articleId": "1dtM9Y5w7o4", "__typename": "AdjacentArticleType" }, "next": { "fno": "08854152", "articleId": "1dM26iQOIdW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1J9y2mtpt3a", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GZonB2mwwM", "doi": "10.1109/TVCG.2022.3209484", "abstract": "With the rise of AI, algorithms have become better at learning underlying patterns from the training data including ingrained social biases based on gender, race, etc. Deployment of such algorithms to domains such as hiring, healthcare, law enforcement, etc. has raised serious concerns about fairness, accountability, trust and interpretability in machine learning algorithms. To alleviate this problem, we propose D-BIAS, a visual interactive tool that embodies human-in-the-loop AI approach for auditing and mitigating social biases from tabular datasets. It uses a graphical causal model to represent causal relationships among different features in the dataset and as a medium to inject domain knowledge. A user can detect the presence of bias against a group, say females, or a subgroup, say black females, by identifying unfair causal relationships in the causal network and using an array of fairness metrics. Thereafter, the user can mitigate bias by refining the causal model and acting on the unfair causal edges. For each interaction, say weakening/deleting a biased causal edge, the system uses a novel method to simulate a new (debiased) dataset based on the current causal model while ensuring a minimal change from the original dataset. Users can visually assess the impact of their interactions on different fairness metrics, utility metrics, data distortion, and the underlying data distribution. Once satisfied, they can download the debiased dataset and use it for any downstream application for fairer predictions. We evaluate D-BIAS by conducting experiments on 3 datasets and also a formal user study. We found that D-BIAS helps reduce bias significantly compared to the baseline debiasing approach across different fairness metrics while incurring little data distortion and a small loss in utility. Moreover, our human-in-the-loop based approach significantly outperforms an automated approach on trust, interpretability and accountability.", "abstracts": [ { "abstractType": "Regular", "content": "With the rise of AI, algorithms have become better at learning underlying patterns from the training data including ingrained social biases based on gender, race, etc. Deployment of such algorithms to domains such as hiring, healthcare, law enforcement, etc. has raised serious concerns about fairness, accountability, trust and interpretability in machine learning algorithms. To alleviate this problem, we propose D-BIAS, a visual interactive tool that embodies human-in-the-loop AI approach for auditing and mitigating social biases from tabular datasets. It uses a graphical causal model to represent causal relationships among different features in the dataset and as a medium to inject domain knowledge. A user can detect the presence of bias against a group, say females, or a subgroup, say black females, by identifying unfair causal relationships in the causal network and using an array of fairness metrics. Thereafter, the user can mitigate bias by refining the causal model and acting on the unfair causal edges. For each interaction, say weakening/deleting a biased causal edge, the system uses a novel method to simulate a new (debiased) dataset based on the current causal model while ensuring a minimal change from the original dataset. Users can visually assess the impact of their interactions on different fairness metrics, utility metrics, data distortion, and the underlying data distribution. Once satisfied, they can download the debiased dataset and use it for any downstream application for fairer predictions. We evaluate D-BIAS by conducting experiments on 3 datasets and also a formal user study. We found that D-BIAS helps reduce bias significantly compared to the baseline debiasing approach across different fairness metrics while incurring little data distortion and a small loss in utility. Moreover, our human-in-the-loop based approach significantly outperforms an automated approach on trust, interpretability and accountability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rise of AI, algorithms have become better at learning underlying patterns from the training data including ingrained social biases based on gender, race, etc. Deployment of such algorithms to domains such as hiring, healthcare, law enforcement, etc. has raised serious concerns about fairness, accountability, trust and interpretability in machine learning algorithms. To alleviate this problem, we propose D-BIAS, a visual interactive tool that embodies human-in-the-loop AI approach for auditing and mitigating social biases from tabular datasets. It uses a graphical causal model to represent causal relationships among different features in the dataset and as a medium to inject domain knowledge. A user can detect the presence of bias against a group, say females, or a subgroup, say black females, by identifying unfair causal relationships in the causal network and using an array of fairness metrics. Thereafter, the user can mitigate bias by refining the causal model and acting on the unfair causal edges. For each interaction, say weakening/deleting a biased causal edge, the system uses a novel method to simulate a new (debiased) dataset based on the current causal model while ensuring a minimal change from the original dataset. Users can visually assess the impact of their interactions on different fairness metrics, utility metrics, data distortion, and the underlying data distribution. Once satisfied, they can download the debiased dataset and use it for any downstream application for fairer predictions. We evaluate D-BIAS by conducting experiments on 3 datasets and also a formal user study. We found that D-BIAS helps reduce bias significantly compared to the baseline debiasing approach across different fairness metrics while incurring little data distortion and a small loss in utility. Moreover, our human-in-the-loop based approach significantly outperforms an automated approach on trust, interpretability and accountability.", "title": "D-BIAS: A Causality-Based Human-in-the-Loop System for Tackling Algorithmic Bias", "normalizedTitle": "D-BIAS: A Causality-Based Human-in-the-Loop System for Tackling Algorithmic Bias", "fno": "09903601", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Causality", "Data Visualisation", "Human Factors", "Interactive Systems", "Learning Artificial Intelligence", "Algorithmic Bias", "Causal Edge", "Causal Network", "Causal Relationships", "Causality", "D BIAS", "Data Distortion", "Data Distribution", "Fairness Metrics", "Graphical Causal Model", "Human In The Loop AI", "Human In The Loop System", "Machine Learning", "Social Biases", "Tabular Datasets", "Utility Metrics", "Visual Interactive Tool", "Measurement", "Visualization", "Mathematical Models", "Human In The Loop", "Distortion", "Data Models", "Machine Learning Algorithms", "Algorithmic Fairness", "Causality", "Debiasing", "Human In The Loop", "Visual Analytics" ], "authors": [ { "givenName": "Bhavya", "surname": "Ghai", "fullName": "Bhavya Ghai", "affiliation": "Computer Science department, Stony Brook University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Klaus", "surname": "Mueller", "fullName": "Klaus Mueller", "affiliation": "Computer Science department, Stony Brook University, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "473-482", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icse/2012/1066/0/06227169", "title": "Reducing confounding bias in predicate-level statistical debugging metrics", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227169/12OmNxUMHpx", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b062", "title": "Hubness as a Case of Technical Algorithmic Bias in Music Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b062/18jXA8K5fLG", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2021/3176/0/09667053", "title": "Information-Theoretic Bias Assessment Of Learned Representations Of Pretrained Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2021/09667053/1A6ByD4xePm", "parentPublication": { "id": "proceedings/fg/2021/3176/0", "title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500d879", "title": "Evaluating and Mitigating Bias in Image Classifiers: A Causal Perspective Using Counterfactuals", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500d879/1B133UE1MqY", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09792455", "title": "Domain-Incremental Continual Learning for Mitigating Bias in Facial Expression and Action Unit Recognition", "doi": null, "abstractUrl": "/journal/ta/5555/01/09792455/1E5LuyXVj4k", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2022/1008/0/10017577", "title": "Towards a human-in-the-loop curation: A qualitative perspective", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2022/10017577/1KJxtLoaKOs", "parentPublication": { "id": "proceedings/aiccsa/2022/1008/0", "title": "2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021135", "title": "Mitigating Frequency Bias in Next-Basket Recommendation via Deconfounders", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021135/1KfT62BHVCM", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2023/2056/0/205600a340", "title": "Causal Structure Learning of Bias for Fair Affect Recognition", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2023/205600a340/1KzyWLLfdrG", "parentPublication": { "id": "proceedings/wacvw/2023/2056/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b189", "title": "An Empirical Study on Algorithmic Bias", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b189/1nkDnrMZ8J2", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552229", "title": "FairRankVis: A Visual Analytics Framework for Exploring Algorithmic Fairness in Graph Mining Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552229/1xic387kwVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09904430", "articleId": "1H1gshbCX2U", "__typename": "AdjacentArticleType" }, "next": { "fno": "09903515", "articleId": "1GZokjZcWFq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1J9yWk5fwQg", "name": "ttg202301-09903601s1-supp1-3209484.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202301-09903601s1-supp1-3209484.pdf", "extension": "pdf", "size": "3.55 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1qL5hsvvVkc", "title": "Feb.", "year": "2021", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1o3nAe6qces", "doi": "10.1109/TVCG.2020.3030342", "abstract": "With machine learning models being increasingly applied to various decision-making scenarios, people have spent growing efforts to make machine learning models more transparent and explainable. Among various explanation techniques, counterfactual explanations have the advantages of being human-friendly and actionable-a counterfactual explanation tells the user how to gain the desired prediction with minimal changes to the input. Besides, counterfactual explanations can also serve as efficient probes to the models' decisions. In this work, we exploit the potential of counterfactual explanations to understand and explore the behavior of machine learning models. We design DECE, an interactive visualization system that helps understand and explore a model's decisions on individual instances and data subsets, supporting users ranging from decision-subjects to model developers. DECE supports exploratory analysis of model decisions by combining the strengths of counterfactual explanations at instance- and subgroup-levels. We also introduce a set of interactions that enable users to customize the generation of counterfactual explanations to find more actionable ones that can suit their needs. Through three use cases and an expert interview, we demonstrate the effectiveness of DECE in supporting decision exploration tasks and instance explanations.", "abstracts": [ { "abstractType": "Regular", "content": "With machine learning models being increasingly applied to various decision-making scenarios, people have spent growing efforts to make machine learning models more transparent and explainable. Among various explanation techniques, counterfactual explanations have the advantages of being human-friendly and actionable-a counterfactual explanation tells the user how to gain the desired prediction with minimal changes to the input. Besides, counterfactual explanations can also serve as efficient probes to the models' decisions. In this work, we exploit the potential of counterfactual explanations to understand and explore the behavior of machine learning models. We design DECE, an interactive visualization system that helps understand and explore a model's decisions on individual instances and data subsets, supporting users ranging from decision-subjects to model developers. DECE supports exploratory analysis of model decisions by combining the strengths of counterfactual explanations at instance- and subgroup-levels. We also introduce a set of interactions that enable users to customize the generation of counterfactual explanations to find more actionable ones that can suit their needs. Through three use cases and an expert interview, we demonstrate the effectiveness of DECE in supporting decision exploration tasks and instance explanations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With machine learning models being increasingly applied to various decision-making scenarios, people have spent growing efforts to make machine learning models more transparent and explainable. Among various explanation techniques, counterfactual explanations have the advantages of being human-friendly and actionable-a counterfactual explanation tells the user how to gain the desired prediction with minimal changes to the input. Besides, counterfactual explanations can also serve as efficient probes to the models' decisions. In this work, we exploit the potential of counterfactual explanations to understand and explore the behavior of machine learning models. We design DECE, an interactive visualization system that helps understand and explore a model's decisions on individual instances and data subsets, supporting users ranging from decision-subjects to model developers. DECE supports exploratory analysis of model decisions by combining the strengths of counterfactual explanations at instance- and subgroup-levels. We also introduce a set of interactions that enable users to customize the generation of counterfactual explanations to find more actionable ones that can suit their needs. Through three use cases and an expert interview, we demonstrate the effectiveness of DECE in supporting decision exploration tasks and instance explanations.", "title": "DECE: Decision Explorer with Counterfactual Explanations for Machine Learning Models", "normalizedTitle": "DECE: Decision Explorer with Counterfactual Explanations for Machine Learning Models", "fno": "09229232", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Making", "Learning Artificial Intelligence", "Interactive Visualization System", "Actionable A Counterfactual Explanation", "Explanation Techniques", "Instance Explanations", "Decision Exploration Tasks", "Model Decisions", "DECE", "Machine Learning Models", "Machine Learning", "Analytical Models", "Predictive Models", "Tools", "Computational Modeling", "Decision Making", "Data Models", "Tabular Data", "Explainable Machine Learning", "Counterfactual Explanation", "Decision Making" ], "authors": [ { "givenName": "Furui", "surname": "Cheng", "fullName": "Furui Cheng", "affiliation": "Hong Kong University of Science and Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Yao", "surname": "Ming", "fullName": "Yao Ming", "affiliation": "Hong Kong University of Science and Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Huamin", "surname": "Qu", "fullName": "Huamin Qu", "affiliation": "Hong Kong University of Science and Technology", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2021-02-01 00:00:00", "pubType": "trans", "pages": "1438-1447", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2021/2398/0/239800a409", "title": "Multi-objective Explanations of GNN Predictions", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a409/1Aqx2ehvsGc", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b036", "title": "Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b036/1BmEYixVeEg", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seip/2022/9590/0/959000a125", "title": "Counterfactual Explanations for Models of Code", "doi": null, "abstractUrl": "/proceedings-article/icse-seip/2022/959000a125/1EhsbBawG2s", "parentPublication": { "id": "proceedings/icse-seip/2022/9590/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aitest/2022/8737/0/873700a103", "title": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations", "doi": null, "abstractUrl": "/proceedings-article/aitest/2022/873700a103/1GZjWCUDVLO", "parentPublication": { "id": "proceedings/aitest/2022/8737/0", "title": "2022 IEEE International Conference On Artificial Intelligence Testing (AITest)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09960739", "title": "Explain the Explainer: Interpreting Model-Agnostic Counterfactual Explanations of a Deep Reinforcement Learning Agent", "doi": null, "abstractUrl": "/journal/ai/5555/01/09960739/1Ixw1BnABeo", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020488", "title": "Label Denoising and Counterfactual Explanation with A Plug and Play Framework", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020488/1KfRw4nKIlW", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2019/06/08920138", "title": "Factual and Counterfactual Explanations for Black Box Decision Making", "doi": null, "abstractUrl": "/magazine/ex/2019/06/08920138/1fsFpKYoEqk", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i978", "title": "SCOUT: Self-Aware Discriminant Counterfactual Explanations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i978/1m3nF9S7iRq", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a031", "title": "AdViCE: Aggregated Visual Counterfactual Explanations for Machine Learning Model Validation", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a031/1yXu7JvSbio", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800b466", "title": "DisCERN: Discovering Counterfactual Explanations using Relevance Features from Neighbourhoods", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800b466/1zw6d42xCmY", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09222255", "articleId": "1nTrQTppqhi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09216629", "articleId": "1nJsGFc8lUY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1qLgkO0TJKw", "name": "ttg202102-09229232s1-supp3-3030342.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09229232s1-supp3-3030342.pdf", "extension": "pdf", "size": "740 kB", "__typename": "WebExtraType" }, { "id": "1qLgkIVOZmU", "name": "ttg202102-09229232s1-supp2-3030342.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09229232s1-supp2-3030342.pdf", "extension": "pdf", "size": "39.7 kB", "__typename": "WebExtraType" }, { "id": "1qLgl46DLXi", "name": "ttg202102-09229232s1-supp1-3030342.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202102-09229232s1-supp1-3030342.mp4", "extension": "mp4", "size": "35.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KOqKyuerbW", "doi": "10.1109/TVCG.2023.3245609", "abstract": "Delivering customer services through video communications has brought new opportunities to analyze customer satisfaction for quality management. However, due to the lack of reliable self-reported responses, service providers are troubled by the inadequate estimation of customer services and the tedious investigation into multimodal video recordings. We introduce <italic>Anchorage</italic>, a visual analytics system to evaluate customer satisfaction by summarizing multimodal behavioral features in customer service videos and revealing abnormal operations in the service process. We leverage the semantically meaningful operations to introduce structured event understanding into videos which help service providers quickly navigate to events of their interest. <italic>Anchorage</italic> supports a comprehensive evaluation of customer satisfaction from the service and operation levels and efficient analysis of customer behavioral dynamics via multifaceted visualization views. We extensively evaluate <italic>Anchorage</italic> through a case study and a carefully-designed user study. The results demonstrate its effectiveness and usability in assessing customer satisfaction using customer service videos. We found that introducing event contexts in assessing customer satisfaction can enhance its performance without compromising annotation precision. Our approach can be adapted in situations where unlabelled and unstructured videos are collected along with sequential records.", "abstracts": [ { "abstractType": "Regular", "content": "Delivering customer services through video communications has brought new opportunities to analyze customer satisfaction for quality management. However, due to the lack of reliable self-reported responses, service providers are troubled by the inadequate estimation of customer services and the tedious investigation into multimodal video recordings. We introduce <italic>Anchorage</italic>, a visual analytics system to evaluate customer satisfaction by summarizing multimodal behavioral features in customer service videos and revealing abnormal operations in the service process. We leverage the semantically meaningful operations to introduce structured event understanding into videos which help service providers quickly navigate to events of their interest. <italic>Anchorage</italic> supports a comprehensive evaluation of customer satisfaction from the service and operation levels and efficient analysis of customer behavioral dynamics via multifaceted visualization views. We extensively evaluate <italic>Anchorage</italic> through a case study and a carefully-designed user study. The results demonstrate its effectiveness and usability in assessing customer satisfaction using customer service videos. We found that introducing event contexts in assessing customer satisfaction can enhance its performance without compromising annotation precision. Our approach can be adapted in situations where unlabelled and unstructured videos are collected along with sequential records.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Delivering customer services through video communications has brought new opportunities to analyze customer satisfaction for quality management. However, due to the lack of reliable self-reported responses, service providers are troubled by the inadequate estimation of customer services and the tedious investigation into multimodal video recordings. We introduce Anchorage, a visual analytics system to evaluate customer satisfaction by summarizing multimodal behavioral features in customer service videos and revealing abnormal operations in the service process. We leverage the semantically meaningful operations to introduce structured event understanding into videos which help service providers quickly navigate to events of their interest. Anchorage supports a comprehensive evaluation of customer satisfaction from the service and operation levels and efficient analysis of customer behavioral dynamics via multifaceted visualization views. We extensively evaluate Anchorage through a case study and a carefully-designed user study. The results demonstrate its effectiveness and usability in assessing customer satisfaction using customer service videos. We found that introducing event contexts in assessing customer satisfaction can enhance its performance without compromising annotation precision. Our approach can be adapted in situations where unlabelled and unstructured videos are collected along with sequential records.", "title": "Anchorage: Visual Analysis of Satisfaction in Customer Service Videos Via Anchor Events", "normalizedTitle": "Anchorage: Visual Analysis of Satisfaction in Customer Service Videos Via Anchor Events", "fno": "10045801", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Videos", "Customer Services", "Behavioral Sciences", "Customer Satisfaction", "Visual Analytics", "Visualization", "Data Visualization", "Customer Satisfaction", "Video Data", "Video Visualization", "Visual Analytics" ], "authors": [ { "givenName": "Kam Kwai", "surname": "Wong", "fullName": "Kam Kwai Wong", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Xingbo", "surname": "Wang", "fullName": "Xingbo Wang", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Yong", "surname": "Wang", "fullName": "Yong Wang", "affiliation": "Singapore Management University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Jianben", "surname": "He", "fullName": "Jianben He", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Rong", "surname": "Zhang", "fullName": "Rong Zhang", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Huamin", "surname": "Qu", "fullName": "Huamin Qu", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iciii/2011/4523/3/4523c161", "title": "Customer Satisfaction Evaluation in Retail Businesses", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523c161/12OmNqESugJ", "parentPublication": { "id": "proceedings/iciii/2011/4523/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmb/2009/3691/0/3691a115", "title": "Customer Satisfaction and Loyalty of Mobile Services", "doi": null, "abstractUrl": "/proceedings-article/icmb/2009/3691a115/12OmNqJHFrp", "parentPublication": { "id": "proceedings/icmb/2009/3691/0", "title": "2009 Eighth International Conference on Mobile Business, ICMB", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isbim/2008/3560/2/3560b295", "title": "Research of Customer Satisfaction Optimal Model Based on Business CRM", "doi": null, "abstractUrl": "/proceedings-article/isbim/2008/3560b295/12OmNrAdsEc", "parentPublication": { "id": "proceedings/isbim/2008/3560/2", "title": "Business and Information Management, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997d111", "title": "Fuzzy Comprehensive Evaluation Model of Customer Satisfaction Degree", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997d111/12OmNrIJqqU", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iitaw/2009/3860/0/3860a431", "title": "Application of Unascertained Measurement Model in Customer Satisfaction Measurement", "doi": null, "abstractUrl": "/proceedings-article/iitaw/2009/3860a431/12OmNrMZpnJ", "parentPublication": { "id": "proceedings/iitaw/2009/3860/0", "title": "2009 Third International Symposium on Intelligent Information Technology Application Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2011/4523/2/4523b190", "title": "The Impact of Information and Information System Satisfaction on Customer Satisfaction under E-commerce", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523b190/12OmNx5Yvhe", "parentPublication": { "id": "proceedings/iciii/2011/4523/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssme/2009/3729/0/3729a136", "title": "Empirical Study on Electric Power Customer Satisfaction Based on Kano Model", "doi": null, "abstractUrl": "/proceedings-article/ssme/2009/3729a136/12OmNxisQNx", "parentPublication": { "id": "proceedings/ssme/2009/3729/0", "title": "2009 IITA International Conference on Services Science, Management and Engineering (SSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asia/2009/3910/0/3910a191", "title": "B2B E-commerce Website Customer Satisfaction: A Formula and Scale", "doi": null, "abstractUrl": "/proceedings-article/asia/2009/3910a191/12OmNyRPgvB", "parentPublication": { "id": "proceedings/asia/2009/3910/0", "title": "2009 International Asia Symposium on Intelligent Interaction and Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcss/2012/4731/0/4731a115", "title": "Does Back-Office Employee Satisfaction Affect Customer Satisfaction? An Empirical Examination", "doi": null, "abstractUrl": "/proceedings-article/ijcss/2012/4731a115/12OmNybfr9O", "parentPublication": { "id": "proceedings/ijcss/2012/4731/0", "title": "Service Sciences, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2010/3987/2/3987b399", "title": "Research on Relationship of Customer Satisfaction in Chinese Higher Education", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987b399/12OmNzSQdm8", "parentPublication": { "id": "proceedings/etcs/2010/3987/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10045805", "articleId": "1KOqKkmxUUU", "__typename": "AdjacentArticleType" }, "next": { "fno": "10048575", "articleId": "1KQ5KN76WNq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1LiKLk3JxyU", "doi": "10.1109/TPAMI.2023.3253211", "abstract": "Kernel method is a proven technique in multi-view learning. It implicitly defines a Hilbert space where samples can be linearly separated. Most kernel-based multi-view learning algorithms compute a kernel function aggregating and compressing the views into a single kernel. However, existing approaches compute the kernels <italic>independently</italic> for each view. This ignores complementary information across views and thus may result in a bad kernel choice. In contrast, we propose the <italic>Contrastive Multi-view Kernel</italic> &#x2014; a novel kernel function based on the emerging contrastive learning framework. The Contrastive Multi-view Kernel implicitly embeds the views into a joint semantic space where all of them resemble each other while promoting to learn diverse views. We validate the method&#x0027;s effectiveness in a large empirical study. It is worth noting that the proposed kernel functions share the types and parameters with traditional ones, making them fully compatible with existing kernel theory and application. On this basis, we also propose a contrastive multi-view clustering framework and instantiate it with multiple kernel <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-means, achieving a promising performance. To the best of our knowledge, this is the first attempt to explore kernel generation in multi-view setting and the first approach to use contrastive learning for a multi-view kernel learning.", "abstracts": [ { "abstractType": "Regular", "content": "Kernel method is a proven technique in multi-view learning. It implicitly defines a Hilbert space where samples can be linearly separated. Most kernel-based multi-view learning algorithms compute a kernel function aggregating and compressing the views into a single kernel. However, existing approaches compute the kernels <italic>independently</italic> for each view. This ignores complementary information across views and thus may result in a bad kernel choice. In contrast, we propose the <italic>Contrastive Multi-view Kernel</italic> &#x2014; a novel kernel function based on the emerging contrastive learning framework. The Contrastive Multi-view Kernel implicitly embeds the views into a joint semantic space where all of them resemble each other while promoting to learn diverse views. We validate the method&#x0027;s effectiveness in a large empirical study. It is worth noting that the proposed kernel functions share the types and parameters with traditional ones, making them fully compatible with existing kernel theory and application. On this basis, we also propose a contrastive multi-view clustering framework and instantiate it with multiple kernel <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-means, achieving a promising performance. To the best of our knowledge, this is the first attempt to explore kernel generation in multi-view setting and the first approach to use contrastive learning for a multi-view kernel learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Kernel method is a proven technique in multi-view learning. It implicitly defines a Hilbert space where samples can be linearly separated. Most kernel-based multi-view learning algorithms compute a kernel function aggregating and compressing the views into a single kernel. However, existing approaches compute the kernels independently for each view. This ignores complementary information across views and thus may result in a bad kernel choice. In contrast, we propose the Contrastive Multi-view Kernel — a novel kernel function based on the emerging contrastive learning framework. The Contrastive Multi-view Kernel implicitly embeds the views into a joint semantic space where all of them resemble each other while promoting to learn diverse views. We validate the method's effectiveness in a large empirical study. It is worth noting that the proposed kernel functions share the types and parameters with traditional ones, making them fully compatible with existing kernel theory and application. On this basis, we also propose a contrastive multi-view clustering framework and instantiate it with multiple kernel --means, achieving a promising performance. To the best of our knowledge, this is the first attempt to explore kernel generation in multi-view setting and the first approach to use contrastive learning for a multi-view kernel learning.", "title": "Contrastive Multi-View Kernel Learning", "normalizedTitle": "Contrastive Multi-View Kernel Learning", "fno": "10061269", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Kernel", "Hilbert Space", "Support Vector Machines", "Semantics", "Partitioning Algorithms", "Optimization", "Fuses", "Contrastive Learning", "Kernel Function", "Kernel Method", "Multi View Clustering", "Multiple Kernel Clustering" ], "authors": [ { "givenName": "Jiyuan", "surname": "Liu", "fullName": "Jiyuan Liu", "affiliation": "College of Systems Engineering, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinwang", "surname": "Liu", "fullName": "Xinwang Liu", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuexiang", "surname": "Yang", "fullName": "Yuexiang Yang", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qing", "surname": "Liao", "fullName": "Qing Liao", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuanqing", "surname": "Xia", "fullName": "Yuanqing Xia", "affiliation": "School of Automation, Beijing Institute of Technology, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1-15", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209d774", "title": "Multiple Kernel Learning Based Multi-view Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d774/12OmNAIdBSZ", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671851", "title": "CONAN: Contrastive Fusion Networks for Multi-view Clustering", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671851/1A8hgAJGGsg", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600q6030", "title": "Multi-level Feature Learning for Contrastive Multi-view Clustering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600q6030/1H1mMDOdGz6", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09973276", "title": "Region Embedding With Intra and Inter-View Contrastive Learning", "doi": null, "abstractUrl": "/journal/tk/5555/01/09973276/1IUAvqUlMZy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995438", "title": "MOVE: Integrating Multi-source Information for Predicting DTI via Cross-view Contrastive Learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995438/1JC1Gas11Ly", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10016684", "title": "Fast Multi-view Clustering via Ensembles: Towards Scalability, Superiority, and Simplicity", "doi": null, "abstractUrl": "/journal/tk/5555/01/10016684/1JTZXlhcnug", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a467", "title": "MORI-RAN: Multi-view Robust Representation Learning via Hybrid Contrastive Fusion", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a467/1KBqRT0IU8M", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2022/7260/0/726000a338", "title": "Multi-View Contrastive Learning from Demonstrations", "doi": null, "abstractUrl": "/proceedings-article/irc/2022/726000a338/1Kckgg2icGk", "parentPublication": { "id": "proceedings/irc/2022/7260/0", "title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d370", "title": "Multi-View Action Recognition using Contrastive Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d370/1L8qz3dLegM", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09298842", "title": "Consensus One-Step Multi-View Subspace Clustering", "doi": null, "abstractUrl": "/journal/tk/2022/10/09298842/1pF1Nb97TuE", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10061493", "articleId": "1LiKLcmRr2w", "__typename": "AdjacentArticleType" }, "next": { "fno": "10061274", "articleId": "1LiKLv9e0Ba", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Lk2BX2fuFi", "name": "ttp555501-010061269s1-supp1-3253211.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-010061269s1-supp1-3253211.pdf", "extension": "pdf", "size": "208 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNyPQ4Dx", "title": "Dec.", "year": "2012", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "18", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwbs2b2", "doi": "10.1109/TVCG.2012.226", "abstract": "A discourse parser is a natural language processing system which can represent the organization of a document based on a rhetorical structure tree-one of the key data structures enabling applications such as text summarization, question answering and dialogue generation. Computational linguistics researchers currently rely on manually exploring and comparing the discourse structures to get intuitions for improving parsing algorithms. In this paper, we present DAViewer, an interactive visualization system for assisting computational linguistics researchers to explore, compare, evaluate and annotate the results of discourse parsers. An iterative user-centered design process with domain experts was conducted in the development of DAViewer. We report the results of an informal formative study of the system to better understand how the proposed visualization and interaction techniques are used in the real research environment.", "abstracts": [ { "abstractType": "Regular", "content": "A discourse parser is a natural language processing system which can represent the organization of a document based on a rhetorical structure tree-one of the key data structures enabling applications such as text summarization, question answering and dialogue generation. Computational linguistics researchers currently rely on manually exploring and comparing the discourse structures to get intuitions for improving parsing algorithms. In this paper, we present DAViewer, an interactive visualization system for assisting computational linguistics researchers to explore, compare, evaluate and annotate the results of discourse parsers. An iterative user-centered design process with domain experts was conducted in the development of DAViewer. We report the results of an informal formative study of the system to better understand how the proposed visualization and interaction techniques are used in the real research environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A discourse parser is a natural language processing system which can represent the organization of a document based on a rhetorical structure tree-one of the key data structures enabling applications such as text summarization, question answering and dialogue generation. Computational linguistics researchers currently rely on manually exploring and comparing the discourse structures to get intuitions for improving parsing algorithms. In this paper, we present DAViewer, an interactive visualization system for assisting computational linguistics researchers to explore, compare, evaluate and annotate the results of discourse parsers. An iterative user-centered design process with domain experts was conducted in the development of DAViewer. We report the results of an informal formative study of the system to better understand how the proposed visualization and interaction techniques are used in the real research environment.", "title": "Facilitating Discourse Analysis with Interactive Visualization", "normalizedTitle": "Facilitating Discourse Analysis with Interactive Visualization", "fno": "ttg2012122639", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Tree Data Structures", "Computational Linguistics", "Data Visualisation", "Document Handling", "Grammars", "Interactive Systems", "Iterative Methods", "Natural Language Processing", "Iterative User Centered Design Process", "Discourse Analysis", "Discourse Parser", "Natural Language Processing System", "Document", "Rhetorical Structure Tree", "Data Structures", "Text Summarization", "Question Answering", "Dialogue Generation", "Computational Linguistics Researchers", "DA Viewer", "Parsing Algorithms", "Interactive Visualization System", "Visualization", "Algorithm Design And Analysis", "Data Visualization", "Prototypes", "Computational Linguistics", "Standards", "Image Color Analysis", "Interaction Techniques", "Discourse Structure", "Tree Comparison", "Computational Linguisitics", "Visual Analytics" ], "authors": [ { "givenName": null, "surname": "Jian Zhao", "fullName": "Jian Zhao", "affiliation": "Univ. of Toronto, Toronto, ON, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "F.", "surname": "Chevalier", "fullName": "F. Chevalier", "affiliation": "Univ. of Toronto, Toronto, ON, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "C.", "surname": "Collins", "fullName": "C. Collins", "affiliation": "Univ. of Ontario Inst. of Technol., Oshawa, ON, Canada", "__typename": "ArticleAuthorType" }, { "givenName": "R.", "surname": "Balakrishnan", "fullName": "R. Balakrishnan", "affiliation": "Univ. of Toronto, Toronto, ON, Canada", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2012-12-01 00:00:00", "pubType": "trans", "pages": "2639-2648", "year": "2012", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/e-science/2009/5946/0/05407981", "title": "Changing modes of scientific discourse analysis, changing perceptions of science", "doi": null, "abstractUrl": "/proceedings-article/e-science/2009/05407981/12OmNAnuTDB", "parentPublication": { "id": "proceedings/e-science/2009/5946/0", "title": "2009 5th IEEE International Conference on e-Science Workshops (e-science 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2007/2997/0/29970027", "title": "Automatic Generation of Multi-Modal Dialogue from Text Based on Discourse Structure Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsc/2007/29970027/12OmNC1Y5lB", "parentPublication": { "id": "proceedings/icsc/2007/2997/0", "title": "International Conference on Semantic Computing (ICSC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2006/0591/0/04035760", "title": "Visualizing the Performance of Computational Linguistics Algorithms", "doi": null, "abstractUrl": "/proceedings-article/vast/2006/04035760/12OmNqBtiCX", "parentPublication": { "id": "proceedings/vast/2006/0591/0", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eidwt/2012/4734/0/4734a147", "title": "A Tool for Discourse Analysis and Visualization", "doi": null, "abstractUrl": "/proceedings-article/eidwt/2012/4734a147/12OmNqI04EL", "parentPublication": { "id": "proceedings/eidwt/2012/4734/0", "title": "2012 Third International Conference on Emerging Intelligent Data and Web Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1988/0873/0/00017220", "title": "Coherent analysis of argumentative discourse", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1988/00017220/12OmNqJq4h4", "parentPublication": { "id": "proceedings/cmpsac/1988/0873/0", "title": "Proceedings COMPSAC 88: The Twelfth Annual International Computer Software & Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2010/4147/0/4147a645", "title": "A Corpus-Based Analysis of Coreferential Recency Effect in Japanese Discourse for Tracking Dynamic Topic", "doi": null, "abstractUrl": "/proceedings-article/icis/2010/4147a645/12OmNwHhoQI", "parentPublication": { "id": "proceedings/icis/2010/4147/0", "title": "Computer and Information Science, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2015/7935/0/07050842", "title": "Corpus-based analysis of rhetorical relations: A study of lexical cues", "doi": null, "abstractUrl": "/proceedings-article/icsc/2015/07050842/12OmNx0A7IB", "parentPublication": { "id": "proceedings/icsc/2015/7935/0", "title": "2015 IEEE International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2002/1435/8/14350255", "title": "Discourse Analysis of Requirements and Knowledge Elicitation Interviews", "doi": null, "abstractUrl": "/proceedings-article/hicss/2002/14350255/12OmNxI0KzK", "parentPublication": { "id": "proceedings/hicss/2002/1435/8", "title": "Proceedings of the 35th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icghit/2019/0627/0/062700a119", "title": "Formal Notations of Linguistic Analysis for Monetary Policy", "doi": null, "abstractUrl": "/proceedings-article/icghit/2019/062700a119/1e5ZfN7rMqY", "parentPublication": { "id": "proceedings/icghit/2019/0627/0", "title": "2019 International Conference on Green and Human Information Technology (ICGHIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09511808", "title": "VisInReport: Complementing Visual Discourse Analytics Through Personalized Insight Reports", "doi": null, "abstractUrl": "/journal/tg/2022/12/09511808/1vYRHccYKDS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2012122631", "articleId": "13rRUyfKIHJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2012122649", "articleId": "13rRUxBa5rU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXnFpH", "name": "ttg2012122639s1.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2012122639s1.mp4", "extension": "mp4", "size": "32.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1HmfNuaEwJW", "title": "Sept.-Oct.", "year": "2022", "issueNum": "05", "idPrefix": "tb", "pubType": "journal", "volume": "19", "label": "Sept.-Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1uOtyyGeDa8", "doi": "10.1109/TCBB.2021.3092719", "abstract": "Proposing a more effective and accurate epistatic loci detection method in large-scale genomic data has important research significance for improving crop quality, disease treatment, <italic>etc</italic>. Due to the characteristics of high accuracy and processing non-linear relationship, Bayesian network (<italic>BN</italic>) has been widely used in constructing the network of SNPs and phenotype traits and thus to mine epistatic loci. However, the shortcoming of <italic>BN</italic> is that it is easy to fall into local optimum and unable to process large-scale of SNPs. In this work, we transform the problem of learning Bayesian network into the optimization of integer linear programming (<italic>ILP</italic>). We use the algorithms of branch-and-bound and cutting planes to get the global optimal Bayesian network (<italic>ILPBN</italic>), and thus to get epistatic loci influencing specific phenotype traits. In order to handle large-scale of SNP loci and further to improve efficiency, we use the method of optimizing Markov blanket to reduce the number of candidate parent nodes for each node. In addition, we use <italic>&#x03B1;-BIC</italic> that is suitable for processing the epistatis mining to calculate the <italic>BN</italic> score. We use four properties of <italic>BN</italic> decomposable scoring functions to further reduce the number of candidate parent sets for each node. Experiment results show that <italic>ILPBN</italic> can not only process 2-locus and 3-locus epistasis mining, but also realize multi-locus epistasis detection. Finally, we compare <italic>ILPBN</italic> with several popular epistasis mining algorithms by using simulated and real Age-related macular disease (AMD) dataset. Experiment results show that <italic>ILPBN</italic> has better epistasis detection accuracy, F1-score and false positive rate in premise of ensuring the efficiency compared with other methods. Availability: Codes and dataset are available at: <uri>http://122.205.95.139/ILPBN/</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Proposing a more effective and accurate epistatic loci detection method in large-scale genomic data has important research significance for improving crop quality, disease treatment, <italic>etc</italic>. Due to the characteristics of high accuracy and processing non-linear relationship, Bayesian network (<italic>BN</italic>) has been widely used in constructing the network of SNPs and phenotype traits and thus to mine epistatic loci. However, the shortcoming of <italic>BN</italic> is that it is easy to fall into local optimum and unable to process large-scale of SNPs. In this work, we transform the problem of learning Bayesian network into the optimization of integer linear programming (<italic>ILP</italic>). We use the algorithms of branch-and-bound and cutting planes to get the global optimal Bayesian network (<italic>ILPBN</italic>), and thus to get epistatic loci influencing specific phenotype traits. In order to handle large-scale of SNP loci and further to improve efficiency, we use the method of optimizing Markov blanket to reduce the number of candidate parent nodes for each node. In addition, we use <italic>&#x03B1;-BIC</italic> that is suitable for processing the epistatis mining to calculate the <italic>BN</italic> score. We use four properties of <italic>BN</italic> decomposable scoring functions to further reduce the number of candidate parent sets for each node. Experiment results show that <italic>ILPBN</italic> can not only process 2-locus and 3-locus epistasis mining, but also realize multi-locus epistasis detection. Finally, we compare <italic>ILPBN</italic> with several popular epistasis mining algorithms by using simulated and real Age-related macular disease (AMD) dataset. Experiment results show that <italic>ILPBN</italic> has better epistasis detection accuracy, F1-score and false positive rate in premise of ensuring the efficiency compared with other methods. Availability: Codes and dataset are available at: <uri>http://122.205.95.139/ILPBN/</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Proposing a more effective and accurate epistatic loci detection method in large-scale genomic data has important research significance for improving crop quality, disease treatment, etc. Due to the characteristics of high accuracy and processing non-linear relationship, Bayesian network (BN) has been widely used in constructing the network of SNPs and phenotype traits and thus to mine epistatic loci. However, the shortcoming of BN is that it is easy to fall into local optimum and unable to process large-scale of SNPs. In this work, we transform the problem of learning Bayesian network into the optimization of integer linear programming (ILP). We use the algorithms of branch-and-bound and cutting planes to get the global optimal Bayesian network (ILPBN), and thus to get epistatic loci influencing specific phenotype traits. In order to handle large-scale of SNP loci and further to improve efficiency, we use the method of optimizing Markov blanket to reduce the number of candidate parent nodes for each node. In addition, we use α-BIC that is suitable for processing the epistatis mining to calculate the BN score. We use four properties of BN decomposable scoring functions to further reduce the number of candidate parent sets for each node. Experiment results show that ILPBN can not only process 2-locus and 3-locus epistasis mining, but also realize multi-locus epistasis detection. Finally, we compare ILPBN with several popular epistasis mining algorithms by using simulated and real Age-related macular disease (AMD) dataset. Experiment results show that ILPBN has better epistasis detection accuracy, F1-score and false positive rate in premise of ensuring the efficiency compared with other methods. Availability: Codes and dataset are available at: http://122.205.95.139/ILPBN/.", "title": "An Approach of Epistasis Detection Using Integer Linear Programming Optimizing Bayesian Network", "normalizedTitle": "An Approach of Epistasis Detection Using Integer Linear Programming Optimizing Bayesian Network", "fno": "09466430", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Belief Networks", "Bioinformatics", "Data Mining", "Diseases", "Genetics", "Genomics", "Integer Programming", "Learning Artificial Intelligence", "Linear Programming", "Markov Processes", "Molecular Biophysics", "Epistatic Loci Detection Method", "Markov Blanket Optimization", "Age Related Macular Disease Dataset", "Epistasis Mining Algorithms", "Multilocus Epistasis Detection", "3 Locus Epistasis Mining", "Process 2 Locus", "Candidate Parent Sets", "BN Decomposable Scoring", "Candidate Parent Nodes", "SNP Loci", "Phenotype Traits", "ILPBN", "Global Optimal Bayesian Network", "Cutting Planes", "Disease Treatment", "Crop Quality", "Large Scale Genomic Data", "Integer Linear Programming", "Bayes Methods", "Markov Processes", "Integer Linear Programming", "Optimization", "Statistical Analysis", "Search Problems", "Genomics", "Epistasis", "Integer Linear Programming", "Bayesian Network", "Markov Blanket", "Multi Locus" ], "authors": [ { "givenName": "Xuan", "surname": "Yang", "fullName": "Xuan Yang", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chen", "surname": "Yang", "fullName": "Chen Yang", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jimeng", "surname": "Lei", "fullName": "Jimeng Lei", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jianxiao", "surname": "Liu", "fullName": "Jianxiao Liu", "affiliation": "College of Informatics, Huazhong Agricultural University, Wuhan, Hubei, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "2654-2671", "year": "2022", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2009/5121/0/05332105", "title": "EpICS: A system for genome-wide epistasis and genetic variation analysis using protein-protein interactions", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332105/12OmNz61dcB", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/03/07403975", "title": "Searching Genome-Wide Multi-Locus Associations for Multiple Diseases Based on Bayesian Inference", "doi": null, "abstractUrl": "/journal/tb/2017/03/07403975/13rRUxBa54H", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08523629", "title": "Introducing Heuristic Information Into Ant Colony Optimization Algorithm for Identifying Epistasis", "doi": null, "abstractUrl": "/journal/tb/2020/04/08523629/17D45VTRotK", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995264", "title": "EpiMCBN: A Kind of Epistasis Mining Approach Using MCMC Sampling Optimizing Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995264/1JC2C8UeJvW", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a703", "title": "An Approach of Bayesian Network Learning Based on Optimizing Fringe Search", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a703/1LSPaZFd1XG", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983151", "title": "BnBeeEpi: An Approach of Epistasis Mining Based on Artificial Bee Colony Algorithm Optimizing Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983151/1hgunEl6YOk", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09225720", "title": "Evaluation of Existing Methods for High-Order Epistasis Detection", "doi": null, "abstractUrl": "/journal/tb/2022/02/09225720/1nWJCHEGjEQ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/03/09290388", "title": "Bayesian Modeling for Epistasis Analysis Using Data-Driven Reversible Jump", "doi": null, "abstractUrl": "/journal/tb/2022/03/09290388/1prKB112BdC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313440", "title": "A Kind of Epistasis Mining Method Based on K-tree and Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313440/1qmfPdE7Juw", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/04/08884123", "title": "AFSBN: A Method of Artificial Fish Swarm Optimizing Bayesian Network for Epistasis Detection", "doi": null, "abstractUrl": "/journal/tb/2021/04/08884123/1vQz5U39dtu", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09516887", "articleId": "1watV7JbMJ2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09511081", "articleId": "1vXcKOIix0c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1La0vXkxsNq", "doi": "10.1109/TKDE.2023.3238993", "abstract": "Entity alignment is a vital task in knowledge fusion, which aims to align entities from different knowledge graphs and merge them into one single graph. Existing entity alignment models focus on local features and try to minimize the distance between pairs of pre-aligned entities. Despite their success, these models heavily rely on the number of existing pre-aligned entity pairs and the topology information from the rest large set of unaligned entities is still largely unexplored. To overcome the limitation of existing models, we propose a model, termed Global Alignment and Local Information Aggregation, or GALA. GALA constructs global features for the knowledge graphs to be aligned using entity embeddings. It aligns the entities in the graphs by forcing their global features to match with each other and progressively updating the entity embeddings by aggregating local information from the other network. Empirical studies on commonly-used KG alignment data sets confirm the effectiveness of the proposed model.", "abstracts": [ { "abstractType": "Regular", "content": "Entity alignment is a vital task in knowledge fusion, which aims to align entities from different knowledge graphs and merge them into one single graph. Existing entity alignment models focus on local features and try to minimize the distance between pairs of pre-aligned entities. Despite their success, these models heavily rely on the number of existing pre-aligned entity pairs and the topology information from the rest large set of unaligned entities is still largely unexplored. To overcome the limitation of existing models, we propose a model, termed Global Alignment and Local Information Aggregation, or GALA. GALA constructs global features for the knowledge graphs to be aligned using entity embeddings. It aligns the entities in the graphs by forcing their global features to match with each other and progressively updating the entity embeddings by aggregating local information from the other network. Empirical studies on commonly-used KG alignment data sets confirm the effectiveness of the proposed model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Entity alignment is a vital task in knowledge fusion, which aims to align entities from different knowledge graphs and merge them into one single graph. Existing entity alignment models focus on local features and try to minimize the distance between pairs of pre-aligned entities. Despite their success, these models heavily rely on the number of existing pre-aligned entity pairs and the topology information from the rest large set of unaligned entities is still largely unexplored. To overcome the limitation of existing models, we propose a model, termed Global Alignment and Local Information Aggregation, or GALA. GALA constructs global features for the knowledge graphs to be aligned using entity embeddings. It aligns the entities in the graphs by forcing their global features to match with each other and progressively updating the entity embeddings by aggregating local information from the other network. Empirical studies on commonly-used KG alignment data sets confirm the effectiveness of the proposed model.", "title": "Semi-Supervised Entity Alignment With Global Alignment and Local Information Aggregation", "normalizedTitle": "Semi-Supervised Entity Alignment With Global Alignment and Local Information Aggregation", "fno": "10057019", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Knowledge Graphs", "Task Analysis", "Training", "Topology", "Graph Neural Networks", "Data Models", "Ontologies", "Entity Alignment", "Knowledge Graph", "Network Alignment" ], "authors": [ { "givenName": "Xuefeng", "surname": "Zhang", "fullName": "Xuefeng Zhang", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Richong", "surname": "Zhang", "fullName": "Richong Zhang", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junfan", "surname": "Chen", "fullName": "Junfan Chen", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jaein", "surname": "Kim", "fullName": "Jaein Kim", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yongyi", "surname": "Mao", "fullName": "Yongyi Mao", "affiliation": "School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icbk/2017/3120/0/3120a033", "title": "Self-Learning and Embedding Based Entity Alignment", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a033/12OmNwNwzJA", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2017/0771/0/08109778", "title": "A multi-view fusion approach for entity alignment", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2017/08109778/12OmNznkK44", "parentPublication": { "id": "proceedings/icci*cc/2017/0771/0", "title": "2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a144", "title": "A Review of Entity Alignment based on Graph Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a144/1CuhMCZJmuY", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09954199", "title": "Semi-supervised Entity Alignment via Relation-based Adaptive Neighborhood Matching", "doi": null, "abstractUrl": "/journal/tk/5555/01/09954199/1InoqSa0QfK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09999339", "title": "Independent Relation Representation With Line Graph for Cross-Lingual Entity Alignment", "doi": null, "abstractUrl": "/journal/tk/5555/01/09999339/1JqCjx4RA0U", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b570", "title": "Entity Alignment Based on Latent Structural Information Mining Graph Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b570/1LSPC8icvYY", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300c258", "title": "Dual-Guided Collective Entity Alignment for Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300c258/1LSPhHxxMo8", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2020/9558/0/09172867", "title": "Seeds Optimization for Entity Alignment in Knowledge Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/dsc/2020/09172867/1mtwjqvAOVq", "parentPublication": { "id": "proceedings/dsc/2020/9558/0", "title": "2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194492", "title": "Embedding-Based Entity Alignment Using Relation Structural Similarity", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194492/1n2njiy6is0", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a949", "title": "A correlation-based entity embedding approach for robust entity linking", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a949/1pP3zkFjnEY", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10057080", "articleId": "1La0vxlXsLm", "__typename": "AdjacentArticleType" }, "next": { "fno": "10057085", "articleId": "1La0w4h8X7i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNARAndg", "title": "Dec.", "year": "2017", "issueNum": "04", "idPrefix": "ci", "pubType": "journal", "volume": "9", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxCitLM", "doi": "10.1109/TCIAIG.2016.2593977", "abstract": "Character intention revision is an essential component of stories, but it has yet to be incorporated into story generation systems. However, intentionality, one component of intention revision, has been explored in both narrative generation and logical formalisms. The intention revision in storytelling (IRIS) system adopts the belief/desire/intention framework of intentionality from logical formalisms and combines it with preexisting concepts of intentionality in narrative. IRIS also introduces the crucial concept of intention revision for the protagonist of the story. The IRIS system uses its generative power alongside psychological and narrative models of suspense to computationally create suspenseful stories. It has been used in the creation of suspenseful noninteractive text stories and an interactive text-based video game.", "abstracts": [ { "abstractType": "Regular", "content": "Character intention revision is an essential component of stories, but it has yet to be incorporated into story generation systems. However, intentionality, one component of intention revision, has been explored in both narrative generation and logical formalisms. The intention revision in storytelling (IRIS) system adopts the belief/desire/intention framework of intentionality from logical formalisms and combines it with preexisting concepts of intentionality in narrative. IRIS also introduces the crucial concept of intention revision for the protagonist of the story. The IRIS system uses its generative power alongside psychological and narrative models of suspense to computationally create suspenseful stories. It has been used in the creation of suspenseful noninteractive text stories and an interactive text-based video game.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Character intention revision is an essential component of stories, but it has yet to be incorporated into story generation systems. However, intentionality, one component of intention revision, has been explored in both narrative generation and logical formalisms. The intention revision in storytelling (IRIS) system adopts the belief/desire/intention framework of intentionality from logical formalisms and combines it with preexisting concepts of intentionality in narrative. IRIS also introduces the crucial concept of intention revision for the protagonist of the story. The IRIS system uses its generative power alongside psychological and narrative models of suspense to computationally create suspenseful stories. It has been used in the creation of suspenseful noninteractive text stories and an interactive text-based video game.", "title": "Leveraging Intention Revision in Narrative Planning to Create Suspenseful Stories", "normalizedTitle": "Leveraging Intention Revision in Narrative Planning to Create Suspenseful Stories", "fno": "07519091", "hasPdf": true, "idPrefix": "ci", "keywords": [ "Iris", "Planning", "Games", "Media", "Psychology", "Context", "Cognitive Science", "Artificial Intelligence" ], "authors": [ { "givenName": "Matthew William", "surname": "Fendt", "fullName": "Matthew William Fendt", "affiliation": "Department of Computer Science, Baylor University, Waco, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "R. Michael", "surname": "Young", "fullName": "R. Michael Young", "affiliation": "School of Computing, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2017-10-01 00:00:00", "pubType": "trans", "pages": "381-392", "year": "2017", "issn": "1943-068X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2016/4459/0/4459a698", "title": "Adversarial Intention Recognition as Inverse Game-Theoretic Planning for Threat Assessment", "doi": null, "abstractUrl": "/proceedings-article/ictai/2016/4459a698/12OmNBKW9yQ", "parentPublication": { "id": "proceedings/ictai/2016/4459/0", "title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04418017", "title": "Investigating the relations of ethnicity to female students' perceptions and intention to major in engineering using social cognitive theory", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04418017/12OmNBh8gW8", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiaiaai/2014/4174/0/06913300", "title": "The Study of Continuance Intention for Online Social Games", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2014/06913300/12OmNqHqSs3", "parentPublication": { "id": "proceedings/iiaiaai/2014/4174/0", "title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2010/4284/0/4284a051", "title": "Intentional Learning Procedures as Intention Revision Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/micai/2010/4284a051/12OmNxGj9OK", "parentPublication": { "id": "proceedings/micai/2010/4284/0", "title": "2010 Ninth Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2014/03/06623111", "title": "A computational model of plan-based narrative conflict at the Fabula level", "doi": null, "abstractUrl": "/journal/ci/2014/03/06623111/13rRUwbaqO1", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2016/04/07295580", "title": "Intentionality and Conflict in The Best Laid Plans Interactive Narrative Virtual Environment", "doi": null, "abstractUrl": "/journal/ci/2016/04/07295580/13rRUxASu6n", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2015/01/06815689", "title": "Suspenser: a story generation system for suspense", "doi": null, "abstractUrl": "/journal/ci/2015/01/06815689/13rRUxk89gI", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2014/02/06646191", "title": "Lessons on Using Computationally Generated Influence for Shaping Narrative Experiences", "doi": null, "abstractUrl": "/journal/ci/2014/02/06646191/13rRUxly9gj", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2022/9402/0/940200a174", "title": "MENTA: how to balance authorial intention and user agency in virtual environments", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2022/940200a174/1MBEQMhx1F6", "parentPublication": { "id": "proceedings/wi-iat/2022/9402/0", "title": "2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07518633", "articleId": "13rRUy2YM1i", "__typename": "AdjacentArticleType" }, "next": { "fno": "07556962", "articleId": "13rRUzpQPO0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1LdknrlrmjS", "title": "Jan.-March", "year": "2023", "issueNum": "01", "idPrefix": "ec", "pubType": "journal", "volume": "11", "label": "Jan.-March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1BLngdsv49q", "doi": "10.1109/TETC.2022.3157948", "abstract": "Regular Expressions (REs) are a computational kernel widely used for finding patterns in data in compute-intensive tasks such as genomic markers research, signature-based detection, and database query. Although flexible on the set of searched REs, software-based solutions cannot fulfill latency or throughput requirements to analyze massive data volumes at a given power budget. For this reason, many approaches exploit hardware accelerators as an offloading engine for REs matching. Indeed, various solutions rely on FPGA reconfigurability to embed automata into the reconfigurable fabric. However, this approach leads to time-consuming updates of the REs to search. This work exploits REs as sequences of basic instructions and builds a Domain-Specific Architecture (DSA), called TiReX, for RE matching on FPGAs. Our approach enables the user to change the desired RE at run-time, providing software programmability, flexibility, and specialized hardware mechanisms. Our DSA delivers performance in line with other state-of-the-art hardware approaches, while providing remarkable flexibility and we underline the importance of energy efficiency for these computations. We compared with multiple state-of-the-art software obtaining remarkable performance while achieving noticeable results with a better energy efficiency that ranges from 3&#x00D7; to 490&#x00D7; with our multi-core.", "abstracts": [ { "abstractType": "Regular", "content": "Regular Expressions (REs) are a computational kernel widely used for finding patterns in data in compute-intensive tasks such as genomic markers research, signature-based detection, and database query. Although flexible on the set of searched REs, software-based solutions cannot fulfill latency or throughput requirements to analyze massive data volumes at a given power budget. For this reason, many approaches exploit hardware accelerators as an offloading engine for REs matching. Indeed, various solutions rely on FPGA reconfigurability to embed automata into the reconfigurable fabric. However, this approach leads to time-consuming updates of the REs to search. This work exploits REs as sequences of basic instructions and builds a Domain-Specific Architecture (DSA), called TiReX, for RE matching on FPGAs. Our approach enables the user to change the desired RE at run-time, providing software programmability, flexibility, and specialized hardware mechanisms. Our DSA delivers performance in line with other state-of-the-art hardware approaches, while providing remarkable flexibility and we underline the importance of energy efficiency for these computations. We compared with multiple state-of-the-art software obtaining remarkable performance while achieving noticeable results with a better energy efficiency that ranges from 3&#x00D7; to 490&#x00D7; with our multi-core.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Regular Expressions (REs) are a computational kernel widely used for finding patterns in data in compute-intensive tasks such as genomic markers research, signature-based detection, and database query. Although flexible on the set of searched REs, software-based solutions cannot fulfill latency or throughput requirements to analyze massive data volumes at a given power budget. For this reason, many approaches exploit hardware accelerators as an offloading engine for REs matching. Indeed, various solutions rely on FPGA reconfigurability to embed automata into the reconfigurable fabric. However, this approach leads to time-consuming updates of the REs to search. This work exploits REs as sequences of basic instructions and builds a Domain-Specific Architecture (DSA), called TiReX, for RE matching on FPGAs. Our approach enables the user to change the desired RE at run-time, providing software programmability, flexibility, and specialized hardware mechanisms. Our DSA delivers performance in line with other state-of-the-art hardware approaches, while providing remarkable flexibility and we underline the importance of energy efficiency for these computations. We compared with multiple state-of-the-art software obtaining remarkable performance while achieving noticeable results with a better energy efficiency that ranges from 3× to 490× with our multi-core.", "title": "An Energy-Efficient Domain-Specific Architecture for Regular Expressions", "normalizedTitle": "An Energy-Efficient Domain-Specific Architecture for Regular Expressions", "fno": "09735153", "hasPdf": true, "idPrefix": "ec", "keywords": [ "Field Programmable Gate Arrays", "Genomics", "Query Processing", "Reconfigurable Architectures", "Computational Kernel", "Compute Intensive Tasks", "Database Query", "DSA", "Embed Automata", "Energy Efficiency", "Energy Efficient Domain Specific Architecture", "FPGA Reconfigurability", "Genomic Markers Research", "Given Power Budget", "Hardware Accelerators", "Hardware Mechanisms", "Massive Data Volumes", "Multiple State Of The Art Software", "Offloading Engine", "Reconfigurable Fabric", "Regular Expressions", "Remarkable Flexibility", "R Es Matching", "Searched R Es", "Signature Based Detection", "Software Programmability", "Software Based Solutions", "Solutions Rely", "State Of The Art Hardware Approaches", "Time Consuming Updates", "Computer Architecture", "Hardware", "Field Programmable Gate Arrays", "Bioinformatics", "Genomics", "Engines", "Automata", "Regular Expressions", "Domain Specific Architecture", "FPGA", "Multi Core", "Reconfigurable ISA" ], "authors": [ { "givenName": "Davide", "surname": "Conficconi", "fullName": "Davide Conficconi", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Emanuele Del", "surname": "Sozzo", "fullName": "Emanuele Del Sozzo", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Filippo", "surname": "Carloni", "fullName": "Filippo Carloni", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Alessandro", "surname": "Comodi", "fullName": "Alessandro Comodi", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Alberto", "surname": "Scolari", "fullName": "Alberto Scolari", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Marco Domenico", "surname": "Santambrogio", "fullName": "Marco Domenico Santambrogio", "affiliation": "Novel, Emerging Computing System Technologies Laboratory (NECSTLab), Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB), Politecnico di Milano, Milano, Italy", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "3-17", "year": "2023", "issn": "2168-6750", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icst/2016/1827/0/1827a309", "title": "Generating Evil Test Strings for Regular Expressions", "doi": null, "abstractUrl": "/proceedings-article/icst/2016/1827a309/12OmNwK7o7T", "parentPublication": { "id": "proceedings/icst/2016/1827/0", "title": "2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2016/2817/0/2817a591", "title": "Dynamically Reconfigurable Architecture with Atomic Configuration Updates for Flexible Regular Expressions Matching in FPGA", "doi": null, "abstractUrl": "/proceedings-article/dsd/2016/2817a591/12OmNwdtw9j", "parentPublication": { "id": "proceedings/dsd/2016/2817/0", "title": "2016 Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wse/2010/8637/0/05623572", "title": "Regular expressions on the web", "doi": null, "abstractUrl": "/proceedings-article/wse/2010/05623572/12OmNxETanF", "parentPublication": { "id": "proceedings/wse/2010/8637/0", "title": "12th IEEE International Symposium on Web Systems Evolution (WSE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b758", "title": "Ultra Power-Efficient CNN Domain Specific Accelerator with 9.3TOPS/Watt for Mobile and Embedded Applications", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b758/17D45Xh13wK", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2019/1444/0/144400a277", "title": "FPGA Accelerated INDEL Realignment in the Cloud", "doi": null, "abstractUrl": "/proceedings-article/hpca/2019/144400a277/18M7Ohss2WI", "parentPublication": { "id": "proceedings/hpca/2019/1444/0", "title": "2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150425", "title": "SALSA: A Domain Specific Architecture for Sequence Alignment", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150425/1lPGDExXewg", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150422", "title": "Leveraging Succinct Data Structures for DNA Sequence Mapping on FPGA", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150422/1lPGGPczbFu", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2020/7383/0/738300a951", "title": "GenASM: A High-Performance, Low-Power Approximate String Matching Acceleration Framework for Genome Sequence Analysis", "doi": null, "abstractUrl": "/proceedings-article/micro/2020/738300a951/1oFGCBpdTl6", "parentPublication": { "id": "proceedings/micro/2020/7383/0", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09520260", "title": "An FPGA Based Energy-Efficient Read Mapper With Parallel Filtering and In-Situ Verification", "doi": null, "abstractUrl": "/journal/tb/2022/05/09520260/1wdNJRO2KcM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fpl/2021/3759/0/375900a151", "title": "An FPGA Accelerator of the Wavefront Algorithm for Genomics Pairwise Alignment", "doi": null, "abstractUrl": "/proceedings-article/fpl/2021/375900a151/1xDPZd1tnuo", "parentPublication": { "id": "proceedings/fpl/2021/3759/0", "title": "2021 31st International Conference on Field-Programmable Logic and Applications (FPL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10058700", "articleId": "1LdkqmMwF6E", "__typename": "AdjacentArticleType" }, "next": { "fno": "09743596", "articleId": "1C6XFCBKFuU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBcj5E9", "title": "January/February", "year": "2006", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "12", "label": "January/February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyY294u", "doi": "10.1109/TVCG.2006.9", "abstract": "Expression mapping (also called performance driven animation) has been a popular method for generating facial animations. A shortcoming of this method is that it does not generate expression details such as the wrinkles due to skin deformations. In this paper, we provide a solution to this problem. We have developed a geometry-driven facial expression synthesis system. Given feature point positions (the geometry) of a facial expression, our system automatically synthesizes a corresponding expression image that includes photorealistic and natural looking expression details. Due to the difficulty of point tracking, the number of feature points required by the synthesis system is, in general, more than what is directly available from a performance sequence. We have developed a technique to infer the missing feature point motions from the tracked subset by using an example-based approach. Another application of our system is expression editing where the user drags feature points while the system interactively generates facial expressions with skin deformation details.", "abstracts": [ { "abstractType": "Regular", "content": "Expression mapping (also called performance driven animation) has been a popular method for generating facial animations. A shortcoming of this method is that it does not generate expression details such as the wrinkles due to skin deformations. In this paper, we provide a solution to this problem. We have developed a geometry-driven facial expression synthesis system. Given feature point positions (the geometry) of a facial expression, our system automatically synthesizes a corresponding expression image that includes photorealistic and natural looking expression details. Due to the difficulty of point tracking, the number of feature points required by the synthesis system is, in general, more than what is directly available from a performance sequence. We have developed a technique to infer the missing feature point motions from the tracked subset by using an example-based approach. Another application of our system is expression editing where the user drags feature points while the system interactively generates facial expressions with skin deformation details.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Expression mapping (also called performance driven animation) has been a popular method for generating facial animations. A shortcoming of this method is that it does not generate expression details such as the wrinkles due to skin deformations. In this paper, we provide a solution to this problem. We have developed a geometry-driven facial expression synthesis system. Given feature point positions (the geometry) of a facial expression, our system automatically synthesizes a corresponding expression image that includes photorealistic and natural looking expression details. Due to the difficulty of point tracking, the number of feature points required by the synthesis system is, in general, more than what is directly available from a performance sequence. We have developed a technique to infer the missing feature point motions from the tracked subset by using an example-based approach. Another application of our system is expression editing where the user drags feature points while the system interactively generates facial expressions with skin deformation details.", "title": "Geometry-driven photorealistic facial expression synthesis", "normalizedTitle": "Geometry-driven photorealistic facial expression synthesis", "fno": "v0048", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Computer Animation", "Realistic Images", "Computational Geometry", "Face Recognition", "Photorealistic Facial Expression Synthesis", "Expression Mapping", "Facial Animation", "Computational Geometry", "Feature Point Motion", "Skin Deformation", "Facial Animation", "Skin", "Tracking", "Head", "Geometry", "Computer Graphics", "Books", "Facial Features", "Eyes", "Mouth", "Facial Animation", "Expression Mapping", "Expression Details", "Facial Expressions", "Performance Driven Animation" ], "authors": [ { "givenName": "Qingshan", "surname": "Zhang", "fullName": "Qingshan Zhang", "affiliation": "Research and Innovation Center, Alcatel Shanghai Bell Ltd., Pudong, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zicheng", "surname": "Liu", "fullName": "Zicheng Liu", "affiliation": "Microsoft Research, One Microsoft Way, Redmond, WA 98052", "__typename": "ArticleAuthorType" }, { "givenName": "Baining", "surname": "Guo", "fullName": "Baining Guo", "affiliation": "Microsoft Research Asia, Haidian District, Beijing, China 100080", "__typename": "ArticleAuthorType" }, { "givenName": "Demetri", "surname": "Terzopoulos", "fullName": "Demetri Terzopoulos", "affiliation": "New York University, Media Research Lab, New York, NY 10003-6806", "__typename": "ArticleAuthorType" }, { "givenName": "Heung-Yeung", "surname": "Shum", "fullName": "Heung-Yeung Shum", "affiliation": "Microsoft Research Asia, Haidian District, Beijing, China 100080", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2006-01-01 00:00:00", "pubType": "trans", "pages": "48-60", "year": "2006", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fg/2008/2153/0/04813308", "title": "Spontaneous facial expression classification with facial motion vectors", "doi": null, "abstractUrl": "/proceedings-article/fg/2008/04813308/12OmNA0MZ3d", "parentPublication": { "id": "proceedings/fg/2008/2153/0", "title": "2008 8th IEEE International Conference on Automatic Face & Gesture Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2013/0792/0/06616505", "title": "Automatic Facial Expression Recognition System", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2013/06616505/12OmNBsue6K", "parentPublication": { "id": "proceedings/aiccsa/2013/0792/0", "title": "2013 ACS International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118b781", "title": "A Hierarchical Probabilistic Model for Facial Feature Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118b781/12OmNvCRgji", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2009/5497/0/05403102", "title": "Precise 2.5D facial landmarking via an analysis by synthesis approach", "doi": null, "abstractUrl": "/proceedings-article/wacv/2009/05403102/12OmNwO5LZR", "parentPublication": { "id": "proceedings/wacv/2009/5497/0", "title": "2009 Workshop on Applications of Computer Vision (WACV 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ihmsc/2011/4444/2/4444b131", "title": "Realistic Tree-Dimensional Facial Expression Synthesis", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2011/4444b131/12OmNwpXRXW", "parentPublication": { "id": "proceedings/ihmsc/2011/4444/2", "title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458169", "title": "Automatic Synthesis of Realistic Facial Expressions", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458169/12OmNxvO08Q", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380558", "title": "Facial components extraction and expression recognition in static images", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380558/12OmNxvO0a6", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2006/2728/0/27280685", "title": "A Local-Global Graph Approach for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/ictai/2006/27280685/12OmNzC5TeX", "parentPublication": { "id": "proceedings/ictai/2006/2728/0", "title": "2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csii/2018/7875/0/787501a133", "title": "Estimation of Facial Expression Intensity for Lifelog Videos Retrieval", "doi": null, "abstractUrl": "/proceedings-article/csii/2018/787501a133/13xI8AAc3rd", "parentPublication": { "id": "proceedings/csii/2018/7875/0", "title": "2018 5th International Conference on Computational Science/Intelligence and Applied Informatics (CSII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b199", "title": "Unsupervised Features for Facial Expression Intensity Estimation Over Time", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b199/17D45Wuc37p", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "v0001", "articleId": "13rRUwcS1CI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }