data
dict
{ "issue": { "id": "12OmNAmmuQq", "title": "Jan.-Feb.", "year": "2019", "issueNum": "01", "idPrefix": "so", "pubType": "magazine", "volume": "36", "label": "Jan.-Feb.", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WB0qb7", "doi": "10.1109/MS.2018.2880598", "abstract": "We bring you this month one of my own shows, Software Engineering Radio Episode 337, featuring guest Ben Sigelman. Sigelman is the cofounder and chief executive officer of LightStep, where he is building reliability management software, and a coauthor of the OpenTracing project. We discuss tracing in general and distributed tracing, which involves the propagation of tracing across process boundaries in a distributed system. The discussion covers the basics of tracing, how distributed tracing is different, the instrumentation required to collect tracing data, what is collected and how, where the data go, and use cases for the data itself, including monitoring, analytics, and capacity planning. The excerpt presented here contains about one half of the interview, with the remaining half available for download from our website or via RSS.", "abstracts": [ { "abstractType": "Regular", "content": "We bring you this month one of my own shows, Software Engineering Radio Episode 337, featuring guest Ben Sigelman. Sigelman is the cofounder and chief executive officer of LightStep, where he is building reliability management software, and a coauthor of the OpenTracing project. We discuss tracing in general and distributed tracing, which involves the propagation of tracing across process boundaries in a distributed system. The discussion covers the basics of tracing, how distributed tracing is different, the instrumentation required to collect tracing data, what is collected and how, where the data go, and use cases for the data itself, including monitoring, analytics, and capacity planning. The excerpt presented here contains about one half of the interview, with the remaining half available for download from our website or via RSS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We bring you this month one of my own shows, Software Engineering Radio Episode 337, featuring guest Ben Sigelman. Sigelman is the cofounder and chief executive officer of LightStep, where he is building reliability management software, and a coauthor of the OpenTracing project. We discuss tracing in general and distributed tracing, which involves the propagation of tracing across process boundaries in a distributed system. The discussion covers the basics of tracing, how distributed tracing is different, the instrumentation required to collect tracing data, what is collected and how, where the data go, and use cases for the data itself, including monitoring, analytics, and capacity planning. The excerpt presented here contains about one half of the interview, with the remaining half available for download from our website or via RSS.", "title": "Ben Sigelman on Distributed Tracing [Software Engineering Radio]", "normalizedTitle": "Ben Sigelman on Distributed Tracing [Software Engineering Radio]", "fno": "08611462", "hasPdf": true, "idPrefix": "so", "keywords": [ "Interviews", "Software Engineering", "Distributed Databases", "Reliability Engineering" ], "authors": [ { "givenName": "Robert", "surname": "Blumen", "fullName": "Robert Blumen", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "mags", "pages": "98-101", "year": "2019", "issn": "0740-7459", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/pvg/2003/2091/0/20910011", "title": "Distributed Interactive Ray Tracing of Dynamic Scenes", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910011/12OmNBO3KjK", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcs/1988/0865/0/00012544", "title": "Maintaining consistency in distributed software engineering environments", "doi": null, "abstractUrl": "/proceedings-article/dcs/1988/00012544/12OmNs0kyH5", "parentPublication": { "id": "proceedings/dcs/1988/0865/0", "title": "The 8th International Conference on Distributed", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2009/4927/0/05366158", "title": "Efficient tracing and performance analysis for large distributed systems", "doi": null, "abstractUrl": "/proceedings-article/mascots/2009/05366158/12OmNzEVS0v", "parentPublication": { "id": "proceedings/mascots/2009/4927/0", "title": "2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2016/01/mso2016010117", "title": "Ben Hindman on Apache Mesos", "doi": null, "abstractUrl": "/magazine/so/2016/01/mso2016010117/13rRUxBJhtg", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669663", "title": "A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669663/1A9WjMeuWyI", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a179", "title": "Distributed online extraction of a fluid model for microservice applications using local tracing data", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a179/1G6l8C1W1Nu", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09940545", "title": "Temporal Coherence-Based Distributed Ray Tracing of Massive Scenes", "doi": null, "abstractUrl": "/journal/tg/5555/01/09940545/1I6O5QqMxQ4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10034850", "title": "A Qualitative Interview Study of Distributed Tracing Visualisation: A Characterisation of Challenges and Opportunities", "doi": null, "abstractUrl": "/journal/tg/5555/01/10034850/1KpxdJPurhm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloudcom/2019/5011/0/501100a209", "title": "A Data-Centric Approach to Distributed Tracing", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2019/501100a209/1h0KuMBkwSY", "parentPublication": { "id": "proceedings/cloudcom/2019/5011/0", "title": "2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552600", "title": "Data-Aware Predictive Scheduling for Distributed-Memory Ray Tracing", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552600/1xic3V39h96", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08611452", "articleId": "17D45WaTkcL", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1AH3dGTIX28", "title": "Jan.-Feb.", "year": "2022", "issueNum": "01", "idPrefix": "sc", "pubType": "journal", "volume": "15", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1d6xyVdVCXS", "doi": "10.1109/TSC.2019.2940009", "abstract": "Monitoring is a core practice in any software system. Trends in microservices systems exacerbate the role of monitoring and pose novel challenges to data sources being used for monitoring, such as event logs. Current deployments create a distinct log per microservice; moreover, composing microservices by different vendors exacerbates format and semantic heterogeneity of logs. Understanding and traversing the logs from different microservices demands for substantial cognitive work by human experts. This paper proposes a novel approach to accompany microservices logs with black box tracing to help practitioners in making informed decisions for troubleshooting. Our approach is based on the passive tracing of request-response messages of the REpresentational State Transfer (REST) communication model. Differently from many existing tools for microservices, our tracing is application transparent and non-intrusive. We present an implementation called MetroFunnel and conduct an assessment in the context of two case studies: a Clearwater IP Multimedia Subsystem (IMS) setup consisting of Docker microservices and a Kubernetes orchestrator deployment hosting tens of microservices. MetroFunnel allows making useful attributions in traversing the logs; more important, it reduces the size of collected monitoring data at negligible performance overhead with respect to traditional logs.", "abstracts": [ { "abstractType": "Regular", "content": "Monitoring is a core practice in any software system. Trends in microservices systems exacerbate the role of monitoring and pose novel challenges to data sources being used for monitoring, such as event logs. Current deployments create a distinct log per microservice; moreover, composing microservices by different vendors exacerbates format and semantic heterogeneity of logs. Understanding and traversing the logs from different microservices demands for substantial cognitive work by human experts. This paper proposes a novel approach to accompany microservices logs with black box tracing to help practitioners in making informed decisions for troubleshooting. Our approach is based on the passive tracing of request-response messages of the REpresentational State Transfer (REST) communication model. Differently from many existing tools for microservices, our tracing is application transparent and non-intrusive. We present an implementation called MetroFunnel and conduct an assessment in the context of two case studies: a Clearwater IP Multimedia Subsystem (IMS) setup consisting of Docker microservices and a Kubernetes orchestrator deployment hosting tens of microservices. MetroFunnel allows making useful attributions in traversing the logs; more important, it reduces the size of collected monitoring data at negligible performance overhead with respect to traditional logs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Monitoring is a core practice in any software system. Trends in microservices systems exacerbate the role of monitoring and pose novel challenges to data sources being used for monitoring, such as event logs. Current deployments create a distinct log per microservice; moreover, composing microservices by different vendors exacerbates format and semantic heterogeneity of logs. Understanding and traversing the logs from different microservices demands for substantial cognitive work by human experts. This paper proposes a novel approach to accompany microservices logs with black box tracing to help practitioners in making informed decisions for troubleshooting. Our approach is based on the passive tracing of request-response messages of the REpresentational State Transfer (REST) communication model. Differently from many existing tools for microservices, our tracing is application transparent and non-intrusive. We present an implementation called MetroFunnel and conduct an assessment in the context of two case studies: a Clearwater IP Multimedia Subsystem (IMS) setup consisting of Docker microservices and a Kubernetes orchestrator deployment hosting tens of microservices. MetroFunnel allows making useful attributions in traversing the logs; more important, it reduces the size of collected monitoring data at negligible performance overhead with respect to traditional logs.", "title": "Microservices Monitoring with Event Logs and Black Box Execution Tracing", "normalizedTitle": "Microservices Monitoring with Event Logs and Black Box Execution Tracing", "fno": "08826375", "hasPdf": true, "idPrefix": "sc", "keywords": [ "Message Passing", "Program Diagnostics", "Service Oriented Architecture", "Event Logs", "Passive Tracing", "R Epresentational State Transfer Communication Model", "Docker Microservices", "Monitoring Data", "Microservice Monitoring", "Black Box Execution Tracing", "Microservice Logs", "Software System Monitoring", "Log Semantic Heterogeneity", "Request Response Messages", "REST Communication Model", "Metro Funnel", "Clearwater IP Multimedia Subsystem", "Kubernetes Orchestrator Deployment", "Performance Overhead", "Monitoring", "Instruments", "Microservice Architecture", "Measurement", "Semantics", "Runtime", "Software Systems", "Market Research", "IP Networks", "Monitoring", "Microservices", "REST", "Docker", "Clearwater", "Kubernetes", "Log Analysis" ], "authors": [ { "givenName": "Marcello", "surname": "Cinque", "fullName": "Marcello Cinque", "affiliation": "Dipartimento di Ingegneria Elettrica e delle Tecnologie dell'Informazione (DIETI), Università degli Studi di Napoli Federico II, via Claudio 21, Napoli, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Raffaele Della", "surname": "Corte", "fullName": "Raffaele Della Corte", "affiliation": "Dipartimento di Ingegneria Elettrica e delle Tecnologie dell'Informazione (DIETI), Università degli Studi di Napoli Federico II, via Claudio 21, Napoli, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Antonio", "surname": "Pecchia", "fullName": "Antonio Pecchia", "affiliation": "Dipartimento di Ingegneria Elettrica e delle Tecnologie dell'Informazione (DIETI), Università degli Studi di Napoli Federico II, via Claudio 21, Napoli, Italy", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "294-307", "year": "2022", "issn": "1939-1374", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/edcc/2018/8060/0/806000a112", "title": "An Exploratory Study on Zeroconf Monitoring of Microservices Systems", "doi": null, "abstractUrl": "/proceedings-article/edcc/2018/806000a112/17D45XzbnKD", "parentPublication": { "id": "proceedings/edcc/2018/8060/0", "title": "2018 14th European Dependable Computing Conference (EDCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seip/2022/9590/0/959000a149", "title": "Field-Based Static Taint Analysis for Industrial Microservices", "doi": null, "abstractUrl": "/proceedings-article/icse-seip/2022/959000a149/1Ehsbc6qQTe", "parentPublication": { "id": "proceedings/icse-seip/2022/9590/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetseb/2022/9331/0/933100a039", "title": "How Blockchain and Microservices are Being Used Together: a Systematic Mapping Study", "doi": null, "abstractUrl": "/proceedings-article/wetseb/2022/933100a039/1F1VuCqLQjK", "parentPublication": { "id": "proceedings/wetseb/2022/9331/0", "title": "2022 IEEE/ACM 5th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000b762", "title": "Instrumenting Microservices for Concurrent Audit Logging: Beyond Horn Clauses", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000b762/1FJ5TViz27u", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a489", "title": "Localizing and Explaining Faults in Microservices Using Distributed Tracing", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a489/1G6l9NBJvck", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2022/5537/0/553700a477", "title": "Analyzing and Monitoring Kubernetes Microservices based on Distributed Tracing and Service Mesh", "doi": null, "abstractUrl": "/proceedings-article/apsec/2022/553700a477/1KOvfRtuoBG", "parentPublication": { "id": "proceedings/apsec/2022/5537/0", "title": "2022 29th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020831", "title": "A Real-time, Scalable Monitoring and User Analytics Solution for Microservices-based Software Applications", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020831/1KfSh83IKdi", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2019/5138/0/513800a122", "title": "Advancing Monitoring in Microservices Systems", "doi": null, "abstractUrl": "/proceedings-article/issrew/2019/513800a122/1hrL5Hfow80", "parentPublication": { "id": "proceedings/issrew/2019/5138/0", "title": "2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300b357", "title": "Towards Concurrent Audit Logging in Microservices", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300b357/1wLcCgBDdG8", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2021/2719/0/271900a012", "title": "Microservices Monitoring with Event Logs and Black Box Execution Tracing", "doi": null, "abstractUrl": "/proceedings-article/services/2021/271900a012/1yyl1lutdMk", "parentPublication": { "id": "proceedings/services/2021/2719/0", "title": "2021 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08823036", "articleId": "1d1yPBg9KLe", "__typename": "AdjacentArticleType" }, "next": { "fno": "08826379", "articleId": "1d6xzconoJO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xic0SUdCNO", "doi": "10.1109/TVCG.2021.3114782", "abstract": "Authors often transform a large screen visualization for smaller displays through rescaling, aggregation and other techniques when creating visualizations for both desktop and mobile devices (i.e., responsive visualization). However, transformations can alter relationships or patterns implied by the large screen view, requiring authors to reason carefully about what information to preserve while adjusting their design for the smaller display. We propose an automated approach to approximating the loss of support for task-oriented visualization insights (identification, comparison, and trend) in responsive transformation of a source visualization. We operationalize identification, comparison, and trend loss as objective functions calculated by comparing properties of the rendered source visualization to each realized target (small screen) visualization. To evaluate the utility of our approach, we train machine learning models on human ranked small screen alternative visualizations across a set of source visualizations. We find that our approach achieves an accuracy of 84% (random forest model) in ranking visualizations. We demonstrate this approach in a prototype responsive visualization recommender that enumerates responsive transformations using Answer Set Programming and evaluates the preservation of task-oriented insights using our loss measures. We discuss implications of our approach for the development of automated and semi-automated responsive visualization recommendation.", "abstracts": [ { "abstractType": "Regular", "content": "Authors often transform a large screen visualization for smaller displays through rescaling, aggregation and other techniques when creating visualizations for both desktop and mobile devices (i.e., responsive visualization). However, transformations can alter relationships or patterns implied by the large screen view, requiring authors to reason carefully about what information to preserve while adjusting their design for the smaller display. We propose an automated approach to approximating the loss of support for task-oriented visualization insights (identification, comparison, and trend) in responsive transformation of a source visualization. We operationalize identification, comparison, and trend loss as objective functions calculated by comparing properties of the rendered source visualization to each realized target (small screen) visualization. To evaluate the utility of our approach, we train machine learning models on human ranked small screen alternative visualizations across a set of source visualizations. We find that our approach achieves an accuracy of 84% (random forest model) in ranking visualizations. We demonstrate this approach in a prototype responsive visualization recommender that enumerates responsive transformations using Answer Set Programming and evaluates the preservation of task-oriented insights using our loss measures. We discuss implications of our approach for the development of automated and semi-automated responsive visualization recommendation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Authors often transform a large screen visualization for smaller displays through rescaling, aggregation and other techniques when creating visualizations for both desktop and mobile devices (i.e., responsive visualization). However, transformations can alter relationships or patterns implied by the large screen view, requiring authors to reason carefully about what information to preserve while adjusting their design for the smaller display. We propose an automated approach to approximating the loss of support for task-oriented visualization insights (identification, comparison, and trend) in responsive transformation of a source visualization. We operationalize identification, comparison, and trend loss as objective functions calculated by comparing properties of the rendered source visualization to each realized target (small screen) visualization. To evaluate the utility of our approach, we train machine learning models on human ranked small screen alternative visualizations across a set of source visualizations. We find that our approach achieves an accuracy of 84% (random forest model) in ranking visualizations. We demonstrate this approach in a prototype responsive visualization recommender that enumerates responsive transformations using Answer Set Programming and evaluates the preservation of task-oriented insights using our loss measures. We discuss implications of our approach for the development of automated and semi-automated responsive visualization recommendation.", "title": "An Automated Approach to Reasoning About Task-Oriented Insights in Responsive Visualization", "normalizedTitle": "An Automated Approach to Reasoning About Task-Oriented Insights in Responsive Visualization", "fno": "09552592", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Visualization", "Data Visualization", "Task Analysis", "Loss Measurement", "Encoding", "Economic Indicators", "Market Research", "Task Oriented Insight Preservation", "Responsive Visualization" ], "authors": [ { "givenName": "Hyeok", "surname": "Kim", "fullName": "Hyeok Kim", "affiliation": "Northwestern University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ryan", "surname": "Rossi", "fullName": "Ryan Rossi", "affiliation": "Adobe Research, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Abhraneel", "surname": "Sarma", "fullName": "Abhraneel Sarma", "affiliation": "Northwestern University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Dominik", "surname": "Moritz", "fullName": "Dominik Moritz", "affiliation": "Carnegie Mellon University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jessica", "surname": "Hullman", "fullName": "Jessica Hullman", "affiliation": "Northwestern University, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "129-139", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1998/9176/0/91760463", "title": "Battlefield Visualization on the Responsive Workbench", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760463/12OmNwwd2KP", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2011/0155/0/06092338", "title": "Evolving a rapid prototyping environment for visually and analytically exploring large-scale Linked Open Data", "doi": null, "abstractUrl": "/proceedings-article/ldav/2011/06092338/12OmNx19k34", "parentPublication": { "id": "proceedings/ldav/2011/0155/0", "title": "IEEE Symposium on Large Data Analysis and Visualization (LDAV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876042", "title": "iVisDesigner: Expressive Interactive Design of Information Visualizations", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876042/13rRUwI5U2H", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040028", "title": "Characterizing Visualization Insights from Quantified Selfers' Personal Data Presentations", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040028/13rRUxCRFQl", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2022/6679/0/667900a140", "title": "Automated Repair of Responsive Web Page Layouts", "doi": null, "abstractUrl": "/proceedings-article/icst/2022/667900a140/1E2wEvLyhA4", "parentPublication": { "id": "proceedings/icst/2022/6679/0", "title": "2022 IEEE Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904451", "title": "Multi-View Design Patterns and Responsive Visualization for Genomics Data", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904451/1H1gfVbEsiA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10029921", "title": "Semi-Automatic Layout Adaptation for Responsive Multiple-View Visualization Design", "doi": null, "abstractUrl": "/journal/tg/5555/01/10029921/1KmyX4gJuMg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093469", "title": "2-MAP: Aligned Visualizations for Comparison of High-Dimensional Point Sets", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093469/1jPbpOaFbRC", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09226461", "title": "Responsive Matrix Cells: A Focus+Context Approach for Exploring and Editing Multivariate Graphs", "doi": null, "abstractUrl": "/journal/tg/2021/02/09226461/1nYrgS8Y9Py", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/03/09275378", "title": "Task-Based Effectiveness of Interactive Contiguous Area Cartograms", "doi": null, "abstractUrl": "/journal/tg/2021/03/09275378/1pcOsFJxDYQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09557225", "articleId": "1xlvZlGiUsE", "__typename": "AdjacentArticleType" }, "next": { "fno": "09557192", "articleId": "1xlw1UFWxDa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaCe0fdao", "name": "ttg202201-09552592s1-tvcg-3114782-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552592s1-tvcg-3114782-mm.zip", "extension": "zip", "size": "2.15 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xjQX1LHQJi", "doi": "10.1109/TVCG.2021.3114860", "abstract": "Visual information displays are typically composed of multiple visualizations that are used to facilitate an understanding of the underlying data. A common example are dashboards, which are frequently used in domains such as finance, process monitoring and business intelligence. However, users may not be aware of existing guidelines and lack expert design knowledge when composing such multi-view visualizations. In this paper, we present semantic snapping, an approach to help non-expert users design effective multi-view visualizations from sets of pre-existing views. When a particular view is placed on a canvas, it is “aligned” with the remaining views-not with respect to its geometric layout, but based on aspects of the visual encoding itself, such as how data dimensions are mapped to channels. Our method uses an on-the-fly procedure to detect and suggest resolutions for conflicting, misleading, or ambiguous designs, as well as to provide suggestions for alternative presentations. With this approach, users can be guided to avoid common pitfalls encountered when composing visualizations. Our provided examples and case studies demonstrate the usefulness and validity of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Visual information displays are typically composed of multiple visualizations that are used to facilitate an understanding of the underlying data. A common example are dashboards, which are frequently used in domains such as finance, process monitoring and business intelligence. However, users may not be aware of existing guidelines and lack expert design knowledge when composing such multi-view visualizations. In this paper, we present semantic snapping, an approach to help non-expert users design effective multi-view visualizations from sets of pre-existing views. When a particular view is placed on a canvas, it is “aligned” with the remaining views-not with respect to its geometric layout, but based on aspects of the visual encoding itself, such as how data dimensions are mapped to channels. Our method uses an on-the-fly procedure to detect and suggest resolutions for conflicting, misleading, or ambiguous designs, as well as to provide suggestions for alternative presentations. With this approach, users can be guided to avoid common pitfalls encountered when composing visualizations. Our provided examples and case studies demonstrate the usefulness and validity of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual information displays are typically composed of multiple visualizations that are used to facilitate an understanding of the underlying data. A common example are dashboards, which are frequently used in domains such as finance, process monitoring and business intelligence. However, users may not be aware of existing guidelines and lack expert design knowledge when composing such multi-view visualizations. In this paper, we present semantic snapping, an approach to help non-expert users design effective multi-view visualizations from sets of pre-existing views. When a particular view is placed on a canvas, it is “aligned” with the remaining views-not with respect to its geometric layout, but based on aspects of the visual encoding itself, such as how data dimensions are mapped to channels. Our method uses an on-the-fly procedure to detect and suggest resolutions for conflicting, misleading, or ambiguous designs, as well as to provide suggestions for alternative presentations. With this approach, users can be guided to avoid common pitfalls encountered when composing visualizations. Our provided examples and case studies demonstrate the usefulness and validity of our approach.", "title": "Semantic Snapping for Guided Multi-View Visualization Design", "normalizedTitle": "Semantic Snapping for Guided Multi-View Visualization Design", "fno": "09555491", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Semantics", "Task Analysis", "Guidelines", "Visualization", "Tools", "Image Color Analysis", "Tabular Data", "Guidelines", "Mixed Initiative Human Machine Analysis", "Coordinated And Multiple Views" ], "authors": [ { "givenName": "Yngve S.", "surname": "Kristiansen", "fullName": "Yngve S. Kristiansen", "affiliation": "Department of Informatics, University of Bergen, Norway", "__typename": "ArticleAuthorType" }, { "givenName": "Laura", "surname": "Garrison", "fullName": "Laura Garrison", "affiliation": "Department of Informatics, University of Bergen, Norway", "__typename": "ArticleAuthorType" }, { "givenName": "Stefan", "surname": "Bruckner", "fullName": "Stefan Bruckner", "affiliation": "Department of Informatics, University of Bergen, Norway", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "43-53", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vizsec/2017/2693/0/08062195", "title": "Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2017/08062195/12OmNyfdOR3", "parentPublication": { "id": "proceedings/vizsec/2017/2693/0", "title": "2017 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a649", "title": "Tracking via Robust Multi-task Multi-view Joint Sparse Representation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a649/12OmNzR8CzP", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a590", "title": "Multi-graph-view Learning for Graph Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a590/12OmNzkuKJl", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903511", "title": "Supporting Expressive and Faithful Pictorial Visualization Design with Visual Style Transfer", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903511/1GZokWw73mo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904451", "title": "Multi-View Design Patterns and Responsive Visualization for Genomics Data", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904451/1H1gfVbEsiA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10029921", "title": "Semi-Automatic Layout Adaptation for Responsive Multiple-View Visualization Design", "doi": null, "abstractUrl": "/journal/tg/5555/01/10029921/1KmyX4gJuMg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805429", "title": "Color Crafting: Automating the Construction of Designer Quality Color Ramps", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805429/1cG4w5XPNUQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a372", "title": "Visualization-Guided Attention Direction in Dynamic Control Tasks", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a372/1gysnIklSSY", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09035622", "title": "LADV: Deep Learning Assisted Authoring of Dashboard Visualizations From Images and Sketches", "doi": null, "abstractUrl": "/journal/tg/2021/09/09035622/1iaeAO11H6o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222323", "title": "Composition and Configuration Patterns in Multiple-View Visualizations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222323/1nTqTQAK47K", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09552927", "articleId": "1xic6oeRxnO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09555226", "articleId": "1xjQVmm2wE0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaCtLPJ8A", "name": "ttg202201-09555491s1-supp1-3114860.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09555491s1-supp1-3114860.mp4", "extension": "mp4", "size": "52.6 MB", "__typename": "WebExtraType" }, { "id": "1zBaCPh5D5C", "name": "ttg202201-09555491s1-supp2-3114860.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09555491s1-supp2-3114860.pdf", "extension": "pdf", "size": "1.54 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwIHoDX", "title": "Feb.", "year": "2016", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "22", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxASuAx", "doi": "10.1109/TVCG.2015.2424878", "abstract": "Data with multiple probabilistic labels are common in many situations. For example, a movie may be associated with multiple genres with different levels of confidence. Despite their ubiquity, the problem of visualizing probabilistic labels has not been adequately addressed. Existing approaches often either discard the probabilistic information, or map the data to a low-dimensional subspace where their associations with original labels are obscured. In this paper, we propose a novel visual technique, UnTangle Map, for visualizing probabilistic multi-labels. In our proposed visualization, data items are placed inside a web of connected triangles, with labels assigned to the triangle vertices such that nearby labels are more relevant to each other. The positions of the data items are determined based on the probabilistic associations between items and labels. UnTangle Map provides both (a) an automatic label placement algorithm, and (b) adaptive interactions that allow users to control the label positioning for different information needs. Our work makes a unique contribution by providing an effective way to investigate the relationship between data items and their probabilistic labels, as well as the relationships among labels. Our user study suggests that the visualization effectively helps users discover emergent patterns and compare the nuances of probabilistic information in the data labels.", "abstracts": [ { "abstractType": "Regular", "content": "Data with multiple probabilistic labels are common in many situations. For example, a movie may be associated with multiple genres with different levels of confidence. Despite their ubiquity, the problem of visualizing probabilistic labels has not been adequately addressed. Existing approaches often either discard the probabilistic information, or map the data to a low-dimensional subspace where their associations with original labels are obscured. In this paper, we propose a novel visual technique, UnTangle Map, for visualizing probabilistic multi-labels. In our proposed visualization, data items are placed inside a web of connected triangles, with labels assigned to the triangle vertices such that nearby labels are more relevant to each other. The positions of the data items are determined based on the probabilistic associations between items and labels. UnTangle Map provides both (a) an automatic label placement algorithm, and (b) adaptive interactions that allow users to control the label positioning for different information needs. Our work makes a unique contribution by providing an effective way to investigate the relationship between data items and their probabilistic labels, as well as the relationships among labels. Our user study suggests that the visualization effectively helps users discover emergent patterns and compare the nuances of probabilistic information in the data labels.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data with multiple probabilistic labels are common in many situations. For example, a movie may be associated with multiple genres with different levels of confidence. Despite their ubiquity, the problem of visualizing probabilistic labels has not been adequately addressed. Existing approaches often either discard the probabilistic information, or map the data to a low-dimensional subspace where their associations with original labels are obscured. In this paper, we propose a novel visual technique, UnTangle Map, for visualizing probabilistic multi-labels. In our proposed visualization, data items are placed inside a web of connected triangles, with labels assigned to the triangle vertices such that nearby labels are more relevant to each other. The positions of the data items are determined based on the probabilistic associations between items and labels. UnTangle Map provides both (a) an automatic label placement algorithm, and (b) adaptive interactions that allow users to control the label positioning for different information needs. Our work makes a unique contribution by providing an effective way to investigate the relationship between data items and their probabilistic labels, as well as the relationships among labels. Our user study suggests that the visualization effectively helps users discover emergent patterns and compare the nuances of probabilistic information in the data labels.", "title": "UnTangle Map: Visual Analysis of Probabilistic Multi-Label Data", "normalizedTitle": "UnTangle Map: Visual Analysis of Probabilistic Multi-Label Data", "fno": "07091015", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Probabilistic Logic", "Visualization", "Layout", "Distributed Databases", "Motion Pictures", "Data Models", "Probability Vector", "Visualization", "Multidimensional Visualization", "Probability Vector", "Visualization", "Multidimensional Visualization" ], "authors": [ { "givenName": "Nan", "surname": "Cao", "fullName": "Nan Cao", "affiliation": "Graph Computing, IBM T.J. Watson Research Center, Yorktown Heights, NY", "__typename": "ArticleAuthorType" }, { "givenName": "Yu-Ru", "surname": "Lin", "fullName": "Yu-Ru Lin", "affiliation": "School of Information Sciences, University of Pittsburgh, PA", "__typename": "ArticleAuthorType" }, { "givenName": "David", "surname": "Gotz", "fullName": "David Gotz", "affiliation": "School of Information and Library Science, University of North Carolina Chapel Hill School, Mannign Hall, Chapel Hill, NC", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2016-02-01 00:00:00", "pubType": "trans", "pages": "1149-1163", "year": "2016", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460148", "title": "Probabilistic depth map fusion for real-time multi-view stereo", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460148/12OmNCmGNY5", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a437", "title": "Probabilistic Classification Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a437/12OmNybfqUk", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a340", "title": "UnTangle: Visual Mining for Data with Uncertain Multi-labels via Triangle Map", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a340/12OmNzA6GSx", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b161", "title": "Probabilistic Label Relation Graphs with Ising Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b161/12OmNzlUKG6", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/11/08007295", "title": "Dense Visual SLAM with Probabilistic Surfel Map", "doi": null, "abstractUrl": "/journal/tg/2017/11/08007295/13rRUNvgz4n", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/04/07152950", "title": "Map-Based Probabilistic Visual Self-Localization", "doi": null, "abstractUrl": "/journal/tp/2016/04/07152950/13rRUxCitEl", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e914", "title": "Multimodal Visual Concept Learning with Weakly Supervised Techniques", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e914/17D45VsBTZX", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a459", "title": "Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a459/1AUpDiKk0Io", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/08/09000714", "title": "LCBM: A Multi-View Probabilistic Model for Multi-Label Classification", "doi": null, "abstractUrl": "/journal/tp/2021/08/09000714/1hy7YtHevGU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101468", "title": "Continuously Tracking Core Items in Data Streams with Probabilistic Decays", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101468/1kaMOFEE7hC", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07072524", "articleId": "13rRUwbaqLx", "__typename": "AdjacentArticleType" }, "next": { "fno": "07111373", "articleId": "13rRUyuNsx0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesU0", "name": "ttg201602-07091015s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttg201602-07091015s1.zip", "extension": "zip", "size": "22.4 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBBhN8N", "title": "Dec.", "year": "2020", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ncgvG9aJ6o", "doi": "10.1109/TVCG.2020.3023601", "abstract": "Thermally modulated Nanophotonic Phased Arrays (NPAs) can be used as phase-only holographic displays. Compared to the holographic displays based on Liquid Crystal on Silicon Spatial Light Modulators (LCoS SLMs), NPAs have the advantage of integrated light source and high refresh rate. However, the formation of the desired wavefront requires accurate modulation of the phase which is distorted by the thermal proximity effect. This problem has been largely overlooked and existing approaches to similar problems are either slow or do not provide a good result in the setting of NPAs. We propose two new algorithms based on the iterative phase retrieval algorithm and the proximal algorithm to address this challenge. We have carried out computational simulations to compare and contrast various algorithms in terms of image quality and computational efficiency. This work is going to benefit the research on NPAs and enable the use of large-scale NPAs as holographic displays.", "abstracts": [ { "abstractType": "Regular", "content": "Thermally modulated Nanophotonic Phased Arrays (NPAs) can be used as phase-only holographic displays. Compared to the holographic displays based on Liquid Crystal on Silicon Spatial Light Modulators (LCoS SLMs), NPAs have the advantage of integrated light source and high refresh rate. However, the formation of the desired wavefront requires accurate modulation of the phase which is distorted by the thermal proximity effect. This problem has been largely overlooked and existing approaches to similar problems are either slow or do not provide a good result in the setting of NPAs. We propose two new algorithms based on the iterative phase retrieval algorithm and the proximal algorithm to address this challenge. We have carried out computational simulations to compare and contrast various algorithms in terms of image quality and computational efficiency. This work is going to benefit the research on NPAs and enable the use of large-scale NPAs as holographic displays.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Thermally modulated Nanophotonic Phased Arrays (NPAs) can be used as phase-only holographic displays. Compared to the holographic displays based on Liquid Crystal on Silicon Spatial Light Modulators (LCoS SLMs), NPAs have the advantage of integrated light source and high refresh rate. However, the formation of the desired wavefront requires accurate modulation of the phase which is distorted by the thermal proximity effect. This problem has been largely overlooked and existing approaches to similar problems are either slow or do not provide a good result in the setting of NPAs. We propose two new algorithms based on the iterative phase retrieval algorithm and the proximal algorithm to address this challenge. We have carried out computational simulations to compare and contrast various algorithms in terms of image quality and computational efficiency. This work is going to benefit the research on NPAs and enable the use of large-scale NPAs as holographic displays.", "title": "Correcting the Proximity Effect in Nanophotonic Phased Arrays", "normalizedTitle": "Correcting the Proximity Effect in Nanophotonic Phased Arrays", "fno": "09199563", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Holographic Displays", "Iterative Methods", "Nanophotonics", "Optical Arrays", "Integrated Light Source", "High Refresh Rate", "Wavefront", "Thermal Proximity Effect", "Iterative Phase Retrieval Algorithm", "Proximal Algorithm", "Thermally Modulated Nanophotonic Phased Arrays", "Phase Only Holographic Displays", "Liquid Crystal On Silicon Spatial Light Modulators", "Computational Simulations", "Image Quality", "Proximity Effects", "Holography", "Phased Arrays", "Holographic Optical Components", "Optical Imaging", "Adaptive Optics", "Phase Modulation", "Nanophotonics", "Nanophotonic Phased Array", "Proximity Effect Correction", "Proximal Algorithms", "Phase Only Hologram" ], "authors": [ { "givenName": "Xuetong", "surname": "Sun", "fullName": "Xuetong Sun", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Yang", "surname": "Zhang", "fullName": "Yang Zhang", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Po-Chun", "surname": "Huang", "fullName": "Po-Chun Huang", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Niloy", "surname": "Acharjee", "fullName": "Niloy Acharjee", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Mario", "surname": "Dagenais", "fullName": "Mario Dagenais", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Martin", "surname": "Peckerar", "fullName": "Martin Peckerar", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" }, { "givenName": "Amitabh", "surname": "Varshney", "fullName": "Amitabh Varshney", "affiliation": "University of Maryland, College Park", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2020-12-01 00:00:00", "pubType": "trans", "pages": "3503-3513", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icig/2013/5050/0/5050a761", "title": "Holographic Projection Using Converging Spherical Wave Illumination", "doi": null, "abstractUrl": "/proceedings-article/icig/2013/5050a761/12OmNASraPv", "parentPublication": { "id": "proceedings/icig/2013/5050/0", "title": "2013 Seventh International Conference on Image and Graphics (ICIG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2016/4320/0/07945751", "title": "Towards the growth of optical security systems for image encryption by polarized light", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2016/07945751/12OmNqGiu9S", "parentPublication": { "id": "proceedings/aiccsa/2016/4320/0", "title": "2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300078", "title": "Holographic Video Display of Time-Series Volumetric Medical Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300078/12OmNx76TAX", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1989/1911/1/00047188", "title": "A coherent system for performing an optical transform", "doi": null, "abstractUrl": "/proceedings-article/hicss/1989/00047188/12OmNx8wTlX", "parentPublication": { "id": "proceedings/hicss/1989/1911/1", "title": "Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume 1: Architecture Track", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dft/2010/8447/0/05634942", "title": "Recovery Method for a Laser Array Failure on Dynamic Optically Reconfigurable Gate Arrays", "doi": null, "abstractUrl": "/proceedings-article/dft/2010/05634942/12OmNyz5JSM", "parentPublication": { "id": "proceedings/dft/2010/8447/0", "title": "2010 IEEE 25th International Symposium on Defect and Fault Tolerance in VLSI Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a553", "title": "Sparse Nanophotonic Phased Arrays for Energy-Efficient Holographic Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a553/1CJczHyWyjK", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a418", "title": "Realistic Defocus Blur for Multiplane Computer-Generated Holography", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a418/1MNgFZaCqiI", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a237", "title": "A Compact Photochromic Occlusion Capable See-through Display with Holographic Lenses", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a237/1MNgTZ7ZNLO", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a312", "title": "Towards Eyeglass-style Holographic Near-eye Displays with Statically", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a312/1pysyaCOe76", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a353", "title": "Proximity Effect Correction for Fresnel Holograms on Nanophotonic Phased Arrays", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a353/1tuB1K9iOKk", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09212653", "articleId": "1nG96pJ3dKg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09199568", "articleId": "1ncglEW2yUo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNrYlmwC", "title": "Aug.", "year": "2015", "issueNum": "08", "idPrefix": "tp", "pubType": "journal", "volume": "37", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwghd6c", "doi": "10.1109/TPAMI.2014.2377712", "abstract": "A fundamental problem in computer vision is that of inferring the intrinsic, 3D structure of the world from flat, 2D images of that world. Traditional methods for recovering scene properties such as shape, reflectance, or illumination rely on multiple observations of the same scene to overconstrain the problem. Recovering these same properties from a single image seems almost impossible in comparison—there are an infinite number of shapes, paint, and lights that exactly reproduce a single image. However, certain explanations are more likely than others: surfaces tend to be smooth, paint tends to be uniform, and illumination tends to be natural. We therefore pose this problem as one of statistical inference, and define an optimization problem that searches for the most likely explanation of a single image. Our technique can be viewed as a superset of several classic computer vision problems (shape-from-shading, intrinsic images, color constancy, illumination estimation, etc) and outperforms all previous solutions to those constituent problems.", "abstracts": [ { "abstractType": "Regular", "content": "A fundamental problem in computer vision is that of inferring the intrinsic, 3D structure of the world from flat, 2D images of that world. Traditional methods for recovering scene properties such as shape, reflectance, or illumination rely on multiple observations of the same scene to overconstrain the problem. Recovering these same properties from a single image seems almost impossible in comparison—there are an infinite number of shapes, paint, and lights that exactly reproduce a single image. However, certain explanations are more likely than others: surfaces tend to be smooth, paint tends to be uniform, and illumination tends to be natural. We therefore pose this problem as one of statistical inference, and define an optimization problem that searches for the most likely explanation of a single image. Our technique can be viewed as a superset of several classic computer vision problems (shape-from-shading, intrinsic images, color constancy, illumination estimation, etc) and outperforms all previous solutions to those constituent problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A fundamental problem in computer vision is that of inferring the intrinsic, 3D structure of the world from flat, 2D images of that world. Traditional methods for recovering scene properties such as shape, reflectance, or illumination rely on multiple observations of the same scene to overconstrain the problem. Recovering these same properties from a single image seems almost impossible in comparison—there are an infinite number of shapes, paint, and lights that exactly reproduce a single image. However, certain explanations are more likely than others: surfaces tend to be smooth, paint tends to be uniform, and illumination tends to be natural. We therefore pose this problem as one of statistical inference, and define an optimization problem that searches for the most likely explanation of a single image. Our technique can be viewed as a superset of several classic computer vision problems (shape-from-shading, intrinsic images, color constancy, illumination estimation, etc) and outperforms all previous solutions to those constituent problems.", "title": "Shape, Illumination, and Reflectance from Shading", "normalizedTitle": "Shape, Illumination, and Reflectance from Shading", "fno": "06975182", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Lighting", "Shape", "Image Color Analysis", "GSM", "Computer Vision", "Paints", "Optimization", "Shape Estimation", "Computer Vision", "Machine Learning", "Intrinsic Images", "Shape From Shading", "Color Constancy" ], "authors": [ { "givenName": "Jonathan T.", "surname": "Barron", "fullName": "Jonathan T. Barron", "affiliation": "Department of Electrical Engineering and Computer Science, University of California at Berkeley, Berkeley, CA", "__typename": "ArticleAuthorType" }, { "givenName": "Jitendra", "surname": "Malik", "fullName": "Jitendra Malik", "affiliation": "Department of Electrical Engineering and Computer Science, University of California at Berkeley, Berkeley, CA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "08", "pubDate": "2015-08-01 00:00:00", "pubType": "trans", "pages": "1670-1687", "year": "2015", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/043P1A43", "title": "Shape, albedo, and illumination from a single image of an unknown object", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/043P1A43/12OmNAIvcXo", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1990/2062/1/00118069", "title": "Reconstructing shape from shading images under point light source illumination", "doi": null, "abstractUrl": "/proceedings-article/icpr/1990/00118069/12OmNBp52vd", "parentPublication": { "id": "proceedings/icpr/1990/2062/1", "title": "Proceedings 10th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c163", "title": "Multiview Shape and Reflectance from Natural Illumination", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c163/12OmNCcbDZp", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccrv/2004/2127/0/01301427", "title": "Recovering the shading image under known illumination", "doi": null, "abstractUrl": "/proceedings-article/cccrv/2004/01301427/12OmNvDZF0N", "parentPublication": { "id": "proceedings/cccrv/2004/2127/0", "title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbmcv/1995/7021/0/00514684", "title": "Reflectance analysis under solar illumination", "doi": null, "abstractUrl": "/proceedings-article/pbmcv/1995/00514684/12OmNxbW4O4", "parentPublication": { "id": "proceedings/pbmcv/1995/7021/0", "title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/02/07858760", "title": "Shading-Based Surface Detail Recovery Under General Unknown Illumination", "doi": null, "abstractUrl": "/journal/tp/2018/02/07858760/13rRUwdIOW8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/01/07102772", "title": "Reflectance and Illumination Recovery in the Wild", "doi": null, "abstractUrl": "/journal/tp/2016/01/07102772/13rRUygT7u2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859833", "title": "Physics-Based Appearance and Illumination Estimation from a Single Face Image", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859833/1G9EwvbJWnu", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b277", "title": "Real-Time Physics-Based Removal of Shadows and Shading From Road Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b277/1iTvrmg32iQ", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09431726", "title": "Hybrid Face Reflectance, Illumination, and Shape From a Single Image", "doi": null, "abstractUrl": "/journal/tp/2022/09/09431726/1tB9cGkk1gY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06975169", "articleId": "13rRUynHukt", "__typename": "AdjacentArticleType" }, "next": { "fno": "06987362", "articleId": "13rRUwI5TSu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgxO", "name": "ttp201508-06975182s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttp201508-06975182s1.zip", "extension": "zip", "size": "5.73 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzA6GUu", "title": "Sept.", "year": "2018", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "40", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwjGoHh", "doi": "10.1109/TPAMI.2017.2748579", "abstract": "In this paper, we present a novel framework for unsupervised kinematic structure learning of complex articulated objects from a single-view 2D image sequence. In contrast to prior motion-based methods, which estimate relatively simple articulations, our method can generate arbitrarily complex kinematic structures with skeletal topology via a successive iterative merging strategy. The iterative merge process is guided by a density weighted skeleton map which is generated from a novel object boundary generation method from sparse 2D feature points. Our main contributions can be summarised as follows: (i) An unsupervised complex articulated kinematic structure estimation method that combines motion segments with skeleton information. (ii) An iterative fine-to-coarse merging strategy for adaptive motion segmentation and structural topology embedding. (iii) A skeleton estimation method based on a novel silhouette boundary generation from sparse feature points using an adaptive model selection method. (iv) A new highly articulated object dataset with ground truth annotation. We have verified the effectiveness of our proposed method in terms of computational time and estimation accuracy through rigorous experiments with multiple datasets. Our experiments show that the proposed method outperforms state-of-the-art methods both quantitatively and qualitatively.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a novel framework for unsupervised kinematic structure learning of complex articulated objects from a single-view 2D image sequence. In contrast to prior motion-based methods, which estimate relatively simple articulations, our method can generate arbitrarily complex kinematic structures with skeletal topology via a successive iterative merging strategy. The iterative merge process is guided by a density weighted skeleton map which is generated from a novel object boundary generation method from sparse 2D feature points. Our main contributions can be summarised as follows: (i) An unsupervised complex articulated kinematic structure estimation method that combines motion segments with skeleton information. (ii) An iterative fine-to-coarse merging strategy for adaptive motion segmentation and structural topology embedding. (iii) A skeleton estimation method based on a novel silhouette boundary generation from sparse feature points using an adaptive model selection method. (iv) A new highly articulated object dataset with ground truth annotation. We have verified the effectiveness of our proposed method in terms of computational time and estimation accuracy through rigorous experiments with multiple datasets. Our experiments show that the proposed method outperforms state-of-the-art methods both quantitatively and qualitatively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a novel framework for unsupervised kinematic structure learning of complex articulated objects from a single-view 2D image sequence. In contrast to prior motion-based methods, which estimate relatively simple articulations, our method can generate arbitrarily complex kinematic structures with skeletal topology via a successive iterative merging strategy. The iterative merge process is guided by a density weighted skeleton map which is generated from a novel object boundary generation method from sparse 2D feature points. Our main contributions can be summarised as follows: (i) An unsupervised complex articulated kinematic structure estimation method that combines motion segments with skeleton information. (ii) An iterative fine-to-coarse merging strategy for adaptive motion segmentation and structural topology embedding. (iii) A skeleton estimation method based on a novel silhouette boundary generation from sparse feature points using an adaptive model selection method. (iv) A new highly articulated object dataset with ground truth annotation. We have verified the effectiveness of our proposed method in terms of computational time and estimation accuracy through rigorous experiments with multiple datasets. Our experiments show that the proposed method outperforms state-of-the-art methods both quantitatively and qualitatively.", "title": "Highly Articulated Kinematic Structure Estimation Combining Motion and Skeleton Information", "normalizedTitle": "Highly Articulated Kinematic Structure Estimation Combining Motion and Skeleton Information", "fno": "08025409", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Estimation Theory", "Image Motion Analysis", "Image Segmentation", "Image Sequences", "Image Thinning", "Iterative Methods", "Topology", "Unsupervised Learning", "Density Weighted Skeleton Map", "Sparse 2 D Feature Points", "Unsupervised Complex Articulated Kinematic Structure Estimation Method", "Skeleton Information", "Iterative Fine To Coarse Merging Strategy", "Adaptive Motion Segmentation", "Structural Topology Embedding", "Skeleton Estimation Method", "Adaptive Model Selection Method", "Unsupervised Kinematic Structure Learning", "Single View 2 D Image Sequence", "Articulated Object Dataset", "Silhouette Boundary Generation", "Motion Based Methods", "Skeletal Topology", "Object Boundary Generation Method", "Ground Truth Annotation", "Kinematics", "Motion Segmentation", "Estimation", "Skeleton", "Three Dimensional Displays", "Shape", "Computer Vision", "Highly Articulated Kinematic Structure Estimation", "Adaptive Motion Segmentation", "Density Weighted Silhouette Generation From Sparse Points", "Adaptive Kernel Selection" ], "authors": [ { "givenName": "Hyung Jin", "surname": "Chang", "fullName": "Hyung Jin Chang", "affiliation": "Department of Electrical and Electronic Engineering, Personal Robotics Lab, Imperial College London, London, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Yiannis", "surname": "Demiris", "fullName": "Yiannis Demiris", "affiliation": "Department of Electrical and Electronic Engineering, Personal Robotics Lab, Imperial College London, London, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2018-09-01 00:00:00", "pubType": "trans", "pages": "2165-2179", "year": "2018", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2008/2174/0/04761011", "title": "Fast and precise kinematic skeleton extraction of 3D dynamic meshes", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761011/12OmNqBbHPx", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2017/2610/0/261001a038", "title": "Dynamic High Resolution Deformable Articulated Tracking", "doi": null, "abstractUrl": "/proceedings-article/3dv/2017/261001a038/12OmNqFa5nJ", "parentPublication": { "id": "proceedings/3dv/2017/2610/0", "title": "2017 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2015/6759/0/07301345", "title": "ICPIK: Inverse Kinematics based articulated-ICP", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2015/07301345/12OmNwF0BVE", "parentPublication": { "id": "proceedings/cvprw/2015/6759/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/07780826", "title": "Kinematic Structure Correspondences via Hypergraph Matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/07780826/12OmNx0A7PB", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298933", "title": "Unsupervised learning of complex articulated kinematic structures combining motion and skeleton information", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298933/12OmNyYDDIG", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2006/2597/1/259710712", "title": "Automatic Kinematic Chain Building from Feature Trajectories of Articulated Objects", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2006/259710712/12OmNyeECvz", "parentPublication": { "id": "proceedings/cvpr/2006/2597/2", "title": "2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/1/01315126", "title": "Articulated models from video", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315126/12OmNzCF4Zv", "parentPublication": { "id": "proceedings/cvpr/2004/2158/1", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2008/05/ttp2008050865", "title": "A Factorization-Based Approach for Articulated Nonrigid Shape, Motion and Kinematic Chain Recovery From Video", "doi": null, "abstractUrl": "/journal/tp/2008/05/ttp2008050865/13rRUwcS1E8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/12/08119820", "title": "Learning Kinematic Structure Correspondences Using Multi-Order Similarities", "doi": null, "abstractUrl": "/journal/tp/2018/12/08119820/17D45WXIkEi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a764", "title": "Motion-Pose Recurrent Neural Network with Instantaneous Kinematic Descriptor for Skeleton Based Gesture Detection and Recognition", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a764/17D45WwsQ7N", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08024004", "articleId": "13rRUypp58S", "__typename": "AdjacentArticleType" }, "next": { "fno": "08022957", "articleId": "13rRUwInvKP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GhRKXiGLEA", "doi": "10.1109/TPAMI.2022.3203347", "abstract": "Coherent diffraction imaging (CDI) is a computational technique for reconstructing a complex-valued optical field from an intensity measurement. The approach is to illuminate an object with a coherent beam of light to form a diffraction pattern, and use a phase retrieval algorithm to reconstruct the object&#x0027;s complex transmittance from the measurement. However, as the name implies, conventional CDI assumes highly coherent illumination. Recent works therefore extend CDI to account for partial coherence and imperfect detection, by modeling light as an incoherent mixture of multiple fields (<italic>e.g.</italic>, multiple wavelengths) and recovering each field simultaneously. In this work, we make strides towards the practical implementation and usage of <italic>multi-wavelength</italic> diffraction imaging. In particular, we provide novel analysis of the noise characteristics of multi-wavelength diffraction imaging, and show that it is preferable to coherent diffraction imaging under high signal-independent noise. Additionally, we present a compact coded diffraction imaging system and corresponding phase retrieval algorithms to robustly and simultaneously recover complex fields representing multiple wavelengths. Using a novel mixed-norm color prior, our prototype system reconstructs a larger number of multi-wavelength fields from fewer measurements than existing methods, and supports applications such as micron-scale optical path difference measurement via synthetic wavelength holography.", "abstracts": [ { "abstractType": "Regular", "content": "Coherent diffraction imaging (CDI) is a computational technique for reconstructing a complex-valued optical field from an intensity measurement. The approach is to illuminate an object with a coherent beam of light to form a diffraction pattern, and use a phase retrieval algorithm to reconstruct the object&#x0027;s complex transmittance from the measurement. However, as the name implies, conventional CDI assumes highly coherent illumination. Recent works therefore extend CDI to account for partial coherence and imperfect detection, by modeling light as an incoherent mixture of multiple fields (<italic>e.g.</italic>, multiple wavelengths) and recovering each field simultaneously. In this work, we make strides towards the practical implementation and usage of <italic>multi-wavelength</italic> diffraction imaging. In particular, we provide novel analysis of the noise characteristics of multi-wavelength diffraction imaging, and show that it is preferable to coherent diffraction imaging under high signal-independent noise. Additionally, we present a compact coded diffraction imaging system and corresponding phase retrieval algorithms to robustly and simultaneously recover complex fields representing multiple wavelengths. Using a novel mixed-norm color prior, our prototype system reconstructs a larger number of multi-wavelength fields from fewer measurements than existing methods, and supports applications such as micron-scale optical path difference measurement via synthetic wavelength holography.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Coherent diffraction imaging (CDI) is a computational technique for reconstructing a complex-valued optical field from an intensity measurement. The approach is to illuminate an object with a coherent beam of light to form a diffraction pattern, and use a phase retrieval algorithm to reconstruct the object's complex transmittance from the measurement. However, as the name implies, conventional CDI assumes highly coherent illumination. Recent works therefore extend CDI to account for partial coherence and imperfect detection, by modeling light as an incoherent mixture of multiple fields (e.g., multiple wavelengths) and recovering each field simultaneously. In this work, we make strides towards the practical implementation and usage of multi-wavelength diffraction imaging. In particular, we provide novel analysis of the noise characteristics of multi-wavelength diffraction imaging, and show that it is preferable to coherent diffraction imaging under high signal-independent noise. Additionally, we present a compact coded diffraction imaging system and corresponding phase retrieval algorithms to robustly and simultaneously recover complex fields representing multiple wavelengths. Using a novel mixed-norm color prior, our prototype system reconstructs a larger number of multi-wavelength fields from fewer measurements than existing methods, and supports applications such as micron-scale optical path difference measurement via synthetic wavelength holography.", "title": "Towards Mixed-State Coded Diffraction Imaging", "normalizedTitle": "Towards Mixed-State Coded Diffraction Imaging", "fno": "09872132", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Diffraction", "X Ray Diffraction", "Imaging", "Image Reconstruction", "Wavelength Measurement", "Optical Diffraction", "Optical Variables Measurement", "Phase Retrieval", "Diffraction Imaging", "Partial Coherence" ], "authors": [ { "givenName": "Benjamin", "surname": "Attal", "fullName": "Benjamin Attal", "affiliation": "Robotics Institute, Carnegie Mellon University, Pittsburgh, PA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Matthew", "surname": "O'Toole", "fullName": "Matthew O'Toole", "affiliation": "Robotics Institute, Carnegie Mellon University, Pittsburgh, PA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-08-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icassp/1988/9999/0/00196842", "title": "Reconstruction from incomplete data in echo diffraction imaging", "doi": null, "abstractUrl": "/proceedings-article/icassp/1988/00196842/12OmNAZfxOp", "parentPublication": { "id": "proceedings/icassp/1988/9999/0", "title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eqec/2005/8973/0/01567498", "title": "Superfocusing of light beams below the diffraction limit by photonic crystals with negative refraction", "doi": null, "abstractUrl": "/proceedings-article/eqec/2005/01567498/12OmNAndigo", "parentPublication": { "id": "proceedings/eqec/2005/8973/0", "title": "2005 European Quantum Electronics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gtsd/2016/3638/0/3638a161", "title": "Phase Quantitative Computation for Multi-Phase Materials by Means of X-Ray Diffraction", "doi": null, "abstractUrl": "/proceedings-article/gtsd/2016/3638a161/12OmNBp52GE", "parentPublication": { "id": "proceedings/gtsd/2016/3638/0", "title": "2016 3rd International Conference on Green Technology and Sustainable Development (GTSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asmc/2003/7673/0/01194465", "title": "Alignment and overlay metrology using a spectroscopic diffraction method", "doi": null, "abstractUrl": "/proceedings-article/asmc/2003/01194465/12OmNvA1hxz", "parentPublication": { "id": "proceedings/asmc/2003/7673/0", "title": "IEEE/SEMI Advanced Semiconductor Manufacturing Conference and Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013b467", "title": "Diffraction Effect in Compressive Sensing Ghost Imaging", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013b467/12OmNyuPL0N", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ectc/2017/6315/0/07999739", "title": "Nondestructive, In Situ Mapping of Die Surface Displacements in Encapsulated IC Chip Packages Using X-Ray Diffraction Imaging Techniques", "doi": null, "abstractUrl": "/proceedings-article/ectc/2017/07999739/12OmNz5JC7c", "parentPublication": { "id": "proceedings/ectc/2017/6315/0", "title": "2017 IEEE 67th Electronic Components and Technology Conference (ECTC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2012/4558/0/06528206", "title": "Polarization Imaging for crystallographic orientation of large mercurous halide crystals", "doi": null, "abstractUrl": "/proceedings-article/aipr/2012/06528206/12OmNzllxYV", "parentPublication": { "id": "proceedings/aipr/2012/4558/0", "title": "2012 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ai4s/2022/6207/0/620700a001", "title": "Automated Continual Learning of Defect Identification in Coherent Diffraction Imaging", "doi": null, "abstractUrl": "/proceedings-article/ai4s/2022/620700a001/1KnWGhFvE9W", "parentPublication": { "id": "proceedings/ai4s/2022/6207/0", "title": "2022 IEEE/ACM International Workshop on Artificial Intelligence and Machine Learning for Scientific Applications (AI4S)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2021/1952/0/09466266", "title": "Deconvolving Diffraction for Fast Imaging of Sparse Scenes", "doi": null, "abstractUrl": "/proceedings-article/iccp/2021/09466266/1uST05ZhhPW", "parentPublication": { "id": "proceedings/iccp/2021/1952/0", "title": "2021 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a517", "title": "Image Distillation Based Screening for X-ray Crystallography Diffraction Images", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a517/1zxLfTfyzhm", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09870559", "articleId": "1GgcM53dti8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09874257", "articleId": "1GjwyS313JC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1GjwB9P5kHu", "name": "ttp555501-09872132s1-tpami-3203347-mm.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-09872132s1-tpami-3203347-mm.zip", "extension": "zip", "size": "58.7 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwdL7lu", "title": "July/August", "year": "2006", "issueNum": "04", "idPrefix": "tg", "pubType": "journal", "volume": "12", "label": "July/August", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxZRbnT", "doi": "10.1109/TVCG.2006.67", "abstract": "Abstract—We describe a new method for visualization of directed graphs. The method combines constraint programming techniques with a high performance force-directed placement (FDP) algorithm. The resulting placements highlight hierarchy in directed graphs while retaining useful properties of FDP; such as emphasis of symmetries and preservation of proximity relations. Our algorithm automatically identifies those parts of the digraph that contain hierarchical information and draws them accordingly. Additionally, those parts that do not contain hierarchy are drawn at the same quality expected from a nonhierarchical, undirected layout algorithm. Our experiments show that this new approach is better able to convey the structure of large digraphs than the most widely used hierarchical graph-drawing method. An interesting application of our algorithm is directional multidimensional scaling (DMDS). DMDS deals with low-dimensional embedding of multivariate data where we want to emphasize the overall flow in the data (e.g., chronological progress) along one of the axes.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—We describe a new method for visualization of directed graphs. The method combines constraint programming techniques with a high performance force-directed placement (FDP) algorithm. The resulting placements highlight hierarchy in directed graphs while retaining useful properties of FDP; such as emphasis of symmetries and preservation of proximity relations. Our algorithm automatically identifies those parts of the digraph that contain hierarchical information and draws them accordingly. Additionally, those parts that do not contain hierarchy are drawn at the same quality expected from a nonhierarchical, undirected layout algorithm. Our experiments show that this new approach is better able to convey the structure of large digraphs than the most widely used hierarchical graph-drawing method. An interesting application of our algorithm is directional multidimensional scaling (DMDS). DMDS deals with low-dimensional embedding of multivariate data where we want to emphasize the overall flow in the data (e.g., chronological progress) along one of the axes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—We describe a new method for visualization of directed graphs. The method combines constraint programming techniques with a high performance force-directed placement (FDP) algorithm. The resulting placements highlight hierarchy in directed graphs while retaining useful properties of FDP; such as emphasis of symmetries and preservation of proximity relations. Our algorithm automatically identifies those parts of the digraph that contain hierarchical information and draws them accordingly. Additionally, those parts that do not contain hierarchy are drawn at the same quality expected from a nonhierarchical, undirected layout algorithm. Our experiments show that this new approach is better able to convey the structure of large digraphs than the most widely used hierarchical graph-drawing method. An interesting application of our algorithm is directional multidimensional scaling (DMDS). DMDS deals with low-dimensional embedding of multivariate data where we want to emphasize the overall flow in the data (e.g., chronological progress) along one of the axes.", "title": "Drawing Directed Graphs Using Quadratic Programming", "normalizedTitle": "Drawing Directed Graphs Using Quadratic Programming", "fno": "v0536", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Directed Graphs", "Graph Drawing", "Hierarchy", "Force Directed Algorithms", "Majorization", "Quadratic Programming" ], "authors": [ { "givenName": "Tim", "surname": "Dwyer", "fullName": "Tim Dwyer", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Yehuda", "surname": "Koren", "fullName": "Yehuda Koren", "affiliation": "IEEE", "__typename": "ArticleAuthorType" }, { "givenName": "Kim", "surname": "Marriott", "fullName": "Kim Marriott", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2006-07-01 00:00:00", "pubType": "trans", "pages": "536-548", "year": "2006", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/infvis/2005/9464/0/01532130", "title": "Dig-CoLa: directed graph layout through constrained energy minimization", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532130/12OmNBU1jJ7", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126223", "title": "Force-directed drawing method for intersecting clustered graphs", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126223/12OmNqH9hkO", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126218", "title": "Efficiently drawing a significant spanning tree of a directed graph", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126218/12OmNvA1hwj", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a038", "title": "Visualization of Clustered Directed Acyclic Graphs without Node Overlapping", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a038/12OmNvsDHHu", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900009", "title": "DIG-COLA: Directed Graph Layout through Constrained Energy Minimization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900009/12OmNwMXnuu", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a454", "title": "A Multilevel Force-directed Graph Drawing Algorithm Using Multilevel Global Force Approximation", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a454/12OmNy2Jt2D", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126219", "title": "Directed graphs and rectangular layouts", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126219/12OmNy3RRw8", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532130", "title": "Dig-CoLa: directed graph layout through constrained energy minimization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532130/12OmNzTppEL", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/01/v0046", "title": "Combining Hierarchy and Energy Drawing Directed Graphs", "doi": null, "abstractUrl": "/journal/tg/2004/01/v0046/13rRUwgQpDf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1993/03/e0214", "title": "A Technique for Drawing Directed Graphs", "doi": null, "abstractUrl": "/journal/ts/1993/03/e0214/13rRUxDItiN", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "v0535", "articleId": "13rRUxd2aYQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0549", "articleId": "13rRUwjoNwR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1JC5yDf0E5q", "doi": "10.1109/TVCG.2022.3233287", "abstract": "Recent works in graph visualization attempt to reduce the runtime of <italic>repulsion</italic> force computation of force-directed algorithms using sampling. However, they fail to reduce the runtime for <italic>attraction</italic> force computation to sublinear in the number of edges. We present the <monospace>SubLinearForce</monospace> framework for a fully sublinear-time <italic>force computation</italic> algorithm for drawing large complex graphs. More precisely, we present new sublinear-time algorithms for the <italic>attraction force</italic> computation of force-directed algorithms. We then integrate them with sublinear-time repulsion force computation to give a fully sublinear-time force computation. Extensive experiments show that our algorithms compute layouts on average 80&#x0025; faster than the existing linear-time force computation algorithm, while obtaining significantly better quality metrics such as edge crossing and shape-based metrics.", "abstracts": [ { "abstractType": "Regular", "content": "Recent works in graph visualization attempt to reduce the runtime of <italic>repulsion</italic> force computation of force-directed algorithms using sampling. However, they fail to reduce the runtime for <italic>attraction</italic> force computation to sublinear in the number of edges. We present the <monospace>SubLinearForce</monospace> framework for a fully sublinear-time <italic>force computation</italic> algorithm for drawing large complex graphs. More precisely, we present new sublinear-time algorithms for the <italic>attraction force</italic> computation of force-directed algorithms. We then integrate them with sublinear-time repulsion force computation to give a fully sublinear-time force computation. Extensive experiments show that our algorithms compute layouts on average 80&#x0025; faster than the existing linear-time force computation algorithm, while obtaining significantly better quality metrics such as edge crossing and shape-based metrics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent works in graph visualization attempt to reduce the runtime of repulsion force computation of force-directed algorithms using sampling. However, they fail to reduce the runtime for attraction force computation to sublinear in the number of edges. We present the SubLinearForce framework for a fully sublinear-time force computation algorithm for drawing large complex graphs. More precisely, we present new sublinear-time algorithms for the attraction force computation of force-directed algorithms. We then integrate them with sublinear-time repulsion force computation to give a fully sublinear-time force computation. Extensive experiments show that our algorithms compute layouts on average 80% faster than the existing linear-time force computation algorithm, while obtaining significantly better quality metrics such as edge crossing and shape-based metrics.", "title": "SubLinearForce: Fully Sublinear-Time Force Computation for Large Complex Graph Drawing", "normalizedTitle": "SubLinearForce: Fully Sublinear-Time Force Computation for Large Complex Graph Drawing", "fno": "10005087", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Force", "Runtime", "Measurement", "Resistance", "Approximation Algorithms", "Springs", "Scalability", "Graph Drawing", "Force Directed Algorithms", "Sublinear Time Algorithms" ], "authors": [ { "givenName": "Amyra", "surname": "Meidiana", "fullName": "Amyra Meidiana", "affiliation": "University of Sydney, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Seok-Hee", "surname": "Hong", "fullName": "Seok-Hee Hong", "affiliation": "University of Sydney, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Shijun", "surname": "Cai", "fullName": "Shijun Cai", "affiliation": "University of Sydney, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Marnijati", "surname": "Torkel", "fullName": "Marnijati Torkel", "affiliation": "University of Sydney, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Peter", "surname": "Eades", "fullName": "Peter Eades", "affiliation": "University of Sydney, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2005/2397/0/23970329", "title": "A New Force-Directed Graph Drawing Method Based on Edge-Edge Repulsion", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970329/12OmNCwCLry", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1987/0781/0/01586315", "title": "Heuristic Acceleration of Force-Directed Placement", "doi": null, "abstractUrl": "/proceedings-article/dac/1987/01586315/12OmNwvDQuj", "parentPublication": { "id": "proceedings/dac/1987/0781/0", "title": "24th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/03/07556272", "title": "Vibrotactile Compliance Feedback for Tangential Force Interaction", "doi": null, "abstractUrl": "/journal/th/2017/03/07556272/13rRUwcS1D9", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/01/06674293", "title": "Grip Force Control during Virtual Object Interaction: Effect of Force Feedback, Accuracy Demands, and Training", "doi": null, "abstractUrl": "/journal/th/2014/01/06674293/13rRUxAASW5", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/07/08606273", "title": "Penalty Force for Coupling Materials with Coulomb Friction", "doi": null, "abstractUrl": "/journal/tg/2020/07/08606273/17D45WB0qbq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09881908", "title": "PropelWalker: A Leg-Based Wearable System With Propeller-Based Force Feedback for Walking in Fluids in VR", "doi": null, "abstractUrl": "/journal/tg/5555/01/09881908/1Gv909WpCG4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10024360", "title": "Force-Directed Graph Layouts Revisited: A New Force Based on the T-Distribution", "doi": null, "abstractUrl": "/journal/tg/5555/01/10024360/1KaBabqZxSg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944364", "title": "Force-Directed Graph Layouts by Edge Sampling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944364/1grOFicLl9S", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a096", "title": "Accelerating Force-Directed Graph Drawing with RT Cores", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a096/1qROE1kZkek", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a146", "title": "Sublinear-Time Attraction Force Computation for Large Complex Graph Drawing", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a146/1tTtrX8Ij72", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10005035", "articleId": "1JC5yiVyrXa", "__typename": "AdjacentArticleType" }, "next": { "fno": "10005621", "articleId": "1JF3Umx3TXy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Lk2nmMLR6M", "title": "April", "year": "2023", "issueNum": "04", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1G9WoQwVOHm", "doi": "10.1109/TPAMI.2022.3202158", "abstract": "Graph autoencoders (GAEs) are powerful tools in representation learning for graph embedding. However, the performance of GAEs is very dependent on the quality of the graph structure, i.e., of the adjacency matrix. In other words, GAEs would perform poorly when the adjacency matrix is incomplete or be disturbed. In this paper, two novel unsupervised graph embedding methods, <italic>unsupervised graph embedding via adaptive graph learning</italic> (BAGE) and <italic>unsupervised graph embedding via variational adaptive graph learning</italic> (VBAGE) are proposed. The proposed methods expand the application range of GAEs on graph embedding, i.e, on the general datasets without graph structure. Meanwhile, the adaptive learning mechanism can initialize the adjacency matrix without being affected by the parameter. Besides that, the latent representations are embedded with the Laplacian graph structure to preserve the topology structure of the graph in the vector space. Moreover, the adjacency matrix can be self-learned for better embedding performance when the original graph structure is incomplete. With adaptive learning, the proposed method is much more robust to the graph structure. Experimental studies on several datasets validate our design and demonstrate that our methods outperform baselines by a wide margin in node clustering, node classification, link prediction, and graph visualization tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Graph autoencoders (GAEs) are powerful tools in representation learning for graph embedding. However, the performance of GAEs is very dependent on the quality of the graph structure, i.e., of the adjacency matrix. In other words, GAEs would perform poorly when the adjacency matrix is incomplete or be disturbed. In this paper, two novel unsupervised graph embedding methods, <italic>unsupervised graph embedding via adaptive graph learning</italic> (BAGE) and <italic>unsupervised graph embedding via variational adaptive graph learning</italic> (VBAGE) are proposed. The proposed methods expand the application range of GAEs on graph embedding, i.e, on the general datasets without graph structure. Meanwhile, the adaptive learning mechanism can initialize the adjacency matrix without being affected by the parameter. Besides that, the latent representations are embedded with the Laplacian graph structure to preserve the topology structure of the graph in the vector space. Moreover, the adjacency matrix can be self-learned for better embedding performance when the original graph structure is incomplete. With adaptive learning, the proposed method is much more robust to the graph structure. Experimental studies on several datasets validate our design and demonstrate that our methods outperform baselines by a wide margin in node clustering, node classification, link prediction, and graph visualization tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph autoencoders (GAEs) are powerful tools in representation learning for graph embedding. However, the performance of GAEs is very dependent on the quality of the graph structure, i.e., of the adjacency matrix. In other words, GAEs would perform poorly when the adjacency matrix is incomplete or be disturbed. In this paper, two novel unsupervised graph embedding methods, unsupervised graph embedding via adaptive graph learning (BAGE) and unsupervised graph embedding via variational adaptive graph learning (VBAGE) are proposed. The proposed methods expand the application range of GAEs on graph embedding, i.e, on the general datasets without graph structure. Meanwhile, the adaptive learning mechanism can initialize the adjacency matrix without being affected by the parameter. Besides that, the latent representations are embedded with the Laplacian graph structure to preserve the topology structure of the graph in the vector space. Moreover, the adjacency matrix can be self-learned for better embedding performance when the original graph structure is incomplete. With adaptive learning, the proposed method is much more robust to the graph structure. Experimental studies on several datasets validate our design and demonstrate that our methods outperform baselines by a wide margin in node clustering, node classification, link prediction, and graph visualization tasks.", "title": "Unsupervised Graph Embedding via Adaptive Graph Learning", "normalizedTitle": "Unsupervised Graph Embedding via Adaptive Graph Learning", "fno": "09868157", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Pattern Clustering", "Unsupervised Learning", "Adaptive Learning Mechanism", "Adjacency Matrix", "Embedding Performance", "GA Es", "Graph Autoencoders", "Graph Visualization Tasks", "Laplacian Graph Structure", "Original Graph Structure", "Representation Learning", "Unsupervised Graph Embedding", "Variational Adaptive Graph", "Laplace Equations", "Graph Neural Networks", "Adaptation Models", "Adaptive Learning", "Task Analysis", "Decoding", "Topology", "Graph Embedding", "Adaptive Graph Learning", "Graph Autoencoder" ], "authors": [ { "givenName": "Rui", "surname": "Zhang", "fullName": "Rui Zhang", "affiliation": "School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University, Xi’an, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yunxing", "surname": "Zhang", "fullName": "Yunxing Zhang", "affiliation": "School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University, Xi’an, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chengjun", "surname": "Lu", "fullName": "Chengjun Lu", "affiliation": "School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University, Xi’an, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xuelong", "surname": "Li", "fullName": "Xuelong Li", "affiliation": "School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University, Xi’an, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "5329-5336", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ias/2009/3744/2/3744b707", "title": "Boosting Graph Embedding with Application to Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744b707/12OmNvy25aU", "parentPublication": { "id": "proceedings/ias/2009/3744/2", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2018/5886/0/08477202", "title": "Semi-Supervised Classification with Adaptive High-Order Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/sera/2018/08477202/144U9bsvaKj", "parentPublication": { "id": "proceedings/sera/2018/5886/0", "title": "2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09896198", "title": "Distribution Knowledge Embedding for Graph Pooling", "doi": null, "abstractUrl": "/journal/tk/5555/01/09896198/1GP3HhSsAZa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/06/09964227", "title": "One-Hot Graph Encoder Embedding", "doi": null, "abstractUrl": "/journal/tp/2023/06/09964227/1IFEETU8Nk4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09961953", "title": "Heterogeneous Graph Neural Network With Multi-View Representation Learning", "doi": null, "abstractUrl": "/journal/tk/5555/01/09961953/1IxvQWCOYBa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10026343", "title": "High-Quality Temporal Link Prediction for Weighted Dynamic Graphs Via Inductive Embedding Aggregation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10026343/1KkXbTHLzoc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10103196", "title": "Unsupervised Adaptive Bipartite Graph Embedding", "doi": null, "abstractUrl": "/journal/tk/5555/01/10103196/1MpWKBrUc48", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09361263", "title": "<monospace><bold>PINE</bold></monospace>: Universal Deep Embedding for Graph Nodes via Partial Permutation Invariant Set Functions", "doi": null, "abstractUrl": "/journal/tp/2022/02/09361263/1rsexdBagFO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09551789", "title": "Unsupervised Optimized Bipartite Graph Embedding", "doi": null, "abstractUrl": "/journal/tk/2023/03/09551789/1xgx0lSOQz6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400b353", "title": "Adaptive attention encoder for attribute graph embedding", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400b353/1zxL37QLwT6", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09580680", "articleId": "1xPnZXaZEhG", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1I6No9Att7y", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tk", "pubType": "journal", "volume": "34", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1sq7pCMZtyU", "doi": "10.1109/TKDE.2021.3069983", "abstract": "Heterogeneous graph embedding aims at learning low-dimensional representations from a graph featuring nodes and edges of diverse natures, and meanwhile preserving the underlying topology. Existing approaches along this line have largely relied on <italic>meta-paths</italic>, which are by nature hand-crafted and pre-defined transition rules, so as to explore the semantics of a graph. Despite the promising results, defining meta-paths requires domain knowledge, and thus when the test distribution deviates from the priors, such methods are prone to errors. In this paper, we propose a self-learning scheme for heterogeneous graph embedding, termed as self-guided walk (SILK), that bypasses meta-paths and learns adaptive attentions for node walking. SILK assumes no prior knowledge or annotation is provided, and conducts a customized random walk to encode the contexts of the heterogeneous graph of interest. Specifically, this is achieved via maintaining a dynamically-updated <italic>guidance matrix</italic> that records the node-conditioned transition potentials. Experimental results on four real-world datasets demonstrate that SILK significantly outperforms state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Heterogeneous graph embedding aims at learning low-dimensional representations from a graph featuring nodes and edges of diverse natures, and meanwhile preserving the underlying topology. Existing approaches along this line have largely relied on <italic>meta-paths</italic>, which are by nature hand-crafted and pre-defined transition rules, so as to explore the semantics of a graph. Despite the promising results, defining meta-paths requires domain knowledge, and thus when the test distribution deviates from the priors, such methods are prone to errors. In this paper, we propose a self-learning scheme for heterogeneous graph embedding, termed as self-guided walk (SILK), that bypasses meta-paths and learns adaptive attentions for node walking. SILK assumes no prior knowledge or annotation is provided, and conducts a customized random walk to encode the contexts of the heterogeneous graph of interest. Specifically, this is achieved via maintaining a dynamically-updated <italic>guidance matrix</italic> that records the node-conditioned transition potentials. Experimental results on four real-world datasets demonstrate that SILK significantly outperforms state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heterogeneous graph embedding aims at learning low-dimensional representations from a graph featuring nodes and edges of diverse natures, and meanwhile preserving the underlying topology. Existing approaches along this line have largely relied on meta-paths, which are by nature hand-crafted and pre-defined transition rules, so as to explore the semantics of a graph. Despite the promising results, defining meta-paths requires domain knowledge, and thus when the test distribution deviates from the priors, such methods are prone to errors. In this paper, we propose a self-learning scheme for heterogeneous graph embedding, termed as self-guided walk (SILK), that bypasses meta-paths and learns adaptive attentions for node walking. SILK assumes no prior knowledge or annotation is provided, and conducts a customized random walk to encode the contexts of the heterogeneous graph of interest. Specifically, this is achieved via maintaining a dynamically-updated guidance matrix that records the node-conditioned transition potentials. Experimental results on four real-world datasets demonstrate that SILK significantly outperforms state-of-the-art methods.", "title": "Walking With Attention: Self-Guided Walking for Heterogeneous Graph Embedding", "normalizedTitle": "Walking With Attention: Self-Guided Walking for Heterogeneous Graph Embedding", "fno": "09392297", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Deep Learning Artificial Intelligence", "Graph Theory", "Customized Random Walk", "Graph Featuring Nodes", "Heterogeneous Graph Embedding", "Low Dimensional Representations", "Meta Paths", "Nature Hand Crafted", "Node Conditioned Transition Potentials", "Self Guided Walk", "SILK", "Semantics", "Task Analysis", "Matrix Decomposition", "Legged Locomotion", "Training", "Topology", "Data Mining", "Graph Embedding", "Graph Representation Learning", "Heterogeneous Graph", "Attention Networks" ], "authors": [ { "givenName": "Yunzhi", "surname": "Hao", "fullName": "Yunzhi Hao", "affiliation": "Microsoft Visual Perception Laboratory, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinchao", "surname": "Wang", "fullName": "Xinchao Wang", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Xingen", "surname": "Wang", "fullName": "Xingen Wang", "affiliation": "Microsoft Visual Perception Laboratory, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinyu", "surname": "Wang", "fullName": "Xinyu Wang", "affiliation": "Microsoft Visual Perception Laboratory, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chun", "surname": "Chen", "fullName": "Chun Chen", "affiliation": "Microsoft Visual Perception Laboratory, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Mingli", "surname": "Song", "fullName": "Mingli Song", "affiliation": "Microsoft Visual Perception Laboratory, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "6047-6060", "year": "2022", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cira/1997/8138/0/81380130", "title": "Fault tolerant locomotion for walking robots", "doi": null, "abstractUrl": "/proceedings-article/cira/1997/81380130/12OmNqEjhWm", "parentPublication": { "id": "proceedings/cira/1997/8138/0", "title": "Computational Intelligence in Robotics and Automation, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2018/9125/0/912500a131", "title": "Joint Embedding of Meta-Path and Meta-Graph for Heterogeneous Information Networks", "doi": null, "abstractUrl": "/proceedings-article/icbk/2018/912500a131/17D45Xq6dBd", "parentPublication": { "id": "proceedings/icbk/2018/9125/0", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/05/09715723", "title": "Adaptive Redirection: A Context-Aware Redirected Walking Meta-Strategy", "doi": null, "abstractUrl": "/journal/tg/2022/05/09715723/1B4hxCQXB4c", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09881908", "title": "PropelWalker: A Leg-Based Wearable System With Propeller-Based Force Feedback for Walking in Fluids in VR", "doi": null, "abstractUrl": "/journal/tg/5555/01/09881908/1Gv909WpCG4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194495", "title": "Heterogeneous Dynamic Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194495/1n2nidnHf9u", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194498", "title": "Clustering via Meta-path Embedding for Heterogeneous Information Networks", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194498/1n2njV7yNjy", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a448", "title": "Spatial and Temporal Visualization of Pedestrians Based on Walking States", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a448/1rSRawLwWty", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09364750", "title": "Multi-Technique Redirected Walking Method", "doi": null, "abstractUrl": "/journal/ec/2022/02/09364750/1rxdpzgvsxG", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09428609", "title": "Heterogeneous Graph Propagation Network", "doi": null, "abstractUrl": "/journal/tk/2023/01/09428609/1twaBkzBB2E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09627584", "title": "GCN for HIN via Implicit Utilization of Attention and Meta-Paths", "doi": null, "abstractUrl": "/journal/tk/2023/04/09627584/1yORJ1GtO7K", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09372844", "articleId": "1rNOi7erMzu", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zYeFOEcMFO", "title": "Feb.", "year": "2022", "issueNum": "02", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1kRRwHRZ1Li", "doi": "10.1109/TPAMI.2020.3003846", "abstract": "Geometric deep learning is a relatively nascent field that has attracted significant attention in the past few years. This is partly due to the availability of data acquired from non-euclidean domains or features extracted from euclidean-space data that reside on smooth manifolds. For instance, pose data commonly encountered in computer vision reside in Lie groups, while covariance matrices that are ubiquitous in many fields and diffusion tensors encountered in medical imaging domain reside on the manifold of symmetric positive definite matrices. Much of this data is naturally represented as a grid of manifold-valued data. In this paper we present a novel theoretical framework for developing deep neural networks to cope with these grids of manifold-valued data inputs. We also present a novel architecture to realize this theory and call it the ManifoldNet. Analogous to vector spaces where convolutions are equivalent to computing weighted sums, manifold-valued data &#x2018;convolutions&#x2019; can be defined using the weighted Fr&#x00E9;chet Mean (<inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf wFM}$_Z</tex-math></inline-formula>). (This requires endowing the manifold with a Riemannian structure if it did not already come with one.) The hidden layers of ManifoldNet compute <inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf wFM}$_Z</tex-math></inline-formula>s of their inputs, where the weights are to be learnt. This means the data remain manifold-valued as they propagate through the hidden layers. To reduce computational complexity, we present a provably convergent recursive algorithm for computing the <inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf wFM}$_Z</tex-math></inline-formula>. Further, we prove that on non-constant sectional curvature manifolds, each <inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf wFM}$_Z</tex-math></inline-formula> layer is a contraction mapping and provide constructive evidence for its non-collapsibility when stacked in layers. This captures the two fundamental properties of deep network layers. Analogous to the equivariance of convolution in euclidean space to translations, we prove that the <inline-formula><tex-math notation=\"LaTeX\">Z_${\\sf wFM}$_Z</tex-math></inline-formula> is equivariant to the action of the group of isometries admitted by the Riemannian manifold on which the data reside. To showcase the performance of ManifoldNet, we present several experiments using both computer vision and medical imaging data sets.", "abstracts": [ { "abstractType": "Regular", "content": "Geometric deep learning is a relatively nascent field that has attracted significant attention in the past few years. This is partly due to the availability of data acquired from non-euclidean domains or features extracted from euclidean-space data that reside on smooth manifolds. For instance, pose data commonly encountered in computer vision reside in Lie groups, while covariance matrices that are ubiquitous in many fields and diffusion tensors encountered in medical imaging domain reside on the manifold of symmetric positive definite matrices. Much of this data is naturally represented as a grid of manifold-valued data. In this paper we present a novel theoretical framework for developing deep neural networks to cope with these grids of manifold-valued data inputs. We also present a novel architecture to realize this theory and call it the ManifoldNet. Analogous to vector spaces where convolutions are equivalent to computing weighted sums, manifold-valued data &#x2018;convolutions&#x2019; can be defined using the weighted Fr&#x00E9;chet Mean (<inline-formula><tex-math notation=\"LaTeX\">${\\sf wFM}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">wFM</mml:mi></mml:math><inline-graphic xlink:href=\"vemuri-ieq1-3003846.gif\"/></alternatives></inline-formula>). (This requires endowing the manifold with a Riemannian structure if it did not already come with one.) The hidden layers of ManifoldNet compute <inline-formula><tex-math notation=\"LaTeX\">${\\sf wFM}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">wFM</mml:mi></mml:math><inline-graphic xlink:href=\"vemuri-ieq2-3003846.gif\"/></alternatives></inline-formula>s of their inputs, where the weights are to be learnt. This means the data remain manifold-valued as they propagate through the hidden layers. To reduce computational complexity, we present a provably convergent recursive algorithm for computing the <inline-formula><tex-math notation=\"LaTeX\">${\\sf wFM}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">wFM</mml:mi></mml:math><inline-graphic xlink:href=\"vemuri-ieq3-3003846.gif\"/></alternatives></inline-formula>. Further, we prove that on non-constant sectional curvature manifolds, each <inline-formula><tex-math notation=\"LaTeX\">${\\sf wFM}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">wFM</mml:mi></mml:math><inline-graphic xlink:href=\"vemuri-ieq4-3003846.gif\"/></alternatives></inline-formula> layer is a contraction mapping and provide constructive evidence for its non-collapsibility when stacked in layers. This captures the two fundamental properties of deep network layers. Analogous to the equivariance of convolution in euclidean space to translations, we prove that the <inline-formula><tex-math notation=\"LaTeX\">${\\sf wFM}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">wFM</mml:mi></mml:math><inline-graphic xlink:href=\"vemuri-ieq5-3003846.gif\"/></alternatives></inline-formula> is equivariant to the action of the group of isometries admitted by the Riemannian manifold on which the data reside. To showcase the performance of ManifoldNet, we present several experiments using both computer vision and medical imaging data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geometric deep learning is a relatively nascent field that has attracted significant attention in the past few years. This is partly due to the availability of data acquired from non-euclidean domains or features extracted from euclidean-space data that reside on smooth manifolds. For instance, pose data commonly encountered in computer vision reside in Lie groups, while covariance matrices that are ubiquitous in many fields and diffusion tensors encountered in medical imaging domain reside on the manifold of symmetric positive definite matrices. Much of this data is naturally represented as a grid of manifold-valued data. In this paper we present a novel theoretical framework for developing deep neural networks to cope with these grids of manifold-valued data inputs. We also present a novel architecture to realize this theory and call it the ManifoldNet. Analogous to vector spaces where convolutions are equivalent to computing weighted sums, manifold-valued data ‘convolutions’ can be defined using the weighted Fréchet Mean (-). (This requires endowing the manifold with a Riemannian structure if it did not already come with one.) The hidden layers of ManifoldNet compute -s of their inputs, where the weights are to be learnt. This means the data remain manifold-valued as they propagate through the hidden layers. To reduce computational complexity, we present a provably convergent recursive algorithm for computing the -. Further, we prove that on non-constant sectional curvature manifolds, each - layer is a contraction mapping and provide constructive evidence for its non-collapsibility when stacked in layers. This captures the two fundamental properties of deep network layers. Analogous to the equivariance of convolution in euclidean space to translations, we prove that the - is equivariant to the action of the group of isometries admitted by the Riemannian manifold on which the data reside. To showcase the performance of ManifoldNet, we present several experiments using both computer vision and medical imaging data sets.", "title": "ManifoldNet: A Deep Neural Network for Manifold-Valued Data With Applications", "normalizedTitle": "ManifoldNet: A Deep Neural Network for Manifold-Valued Data With Applications", "fno": "09122448", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Computational Complexity", "Covariance Matrices", "Deep Learning Artificial Intelligence", "Differential Geometry", "Feature Extraction", "Geometry", "Lie Groups", "Neural Nets", "Tensors", "Vectors", "Manifold Valued Data Inputs", "Manifold Valued Data Convolutions", "Hidden Layers", "Manifold Net Compute", "Nonconstant Sectional Curvature Manifolds", "Deep Network Layers", "Riemannian Manifold", "Medical Imaging Data Sets", "Deep Neural Network", "Geometric Deep Learning", "Relatively Nascent Field", "Smooth Manifolds", "Computer Vision", "Diffusion Tensors", "Medical Imaging Domain Reside", "Symmetric Positive Definite Matrices", "Euclidean Space Data", "Vector Spaces", "Manifolds", "Computer Vision", "Computer Architecture", "Biomedical Imaging", "Neural Networks", "Measurement", "Standards", "Weighted Frechet Mean", "Equivariance", "Group Action", "Riemannian Manifolds" ], "authors": [ { "givenName": "Rudrasis", "surname": "Chakraborty", "fullName": "Rudrasis Chakraborty", "affiliation": "University of California, Berkeley, Berkeley, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jose", "surname": "Bouza", "fullName": "Jose Bouza", "affiliation": "University of Florida, Gainesville, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jonathan H.", "surname": "Manton", "fullName": "Jonathan H. Manton", "affiliation": "University of Melbourne, Parkville, VIC, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Baba C.", "surname": "Vemuri", "fullName": "Baba C. Vemuri", "affiliation": "University of Florida, Gainesville, FL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2022-02-01 00:00:00", "pubType": "trans", "pages": "799-810", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2022/12/09858633", "title": "Robustness of Subsystem Reliability of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-Cube Networks Under Probabilistic Fault Model", "doi": null, "abstractUrl": "/journal/td/2022/12/09858633/1FUYE7DVEaI", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09925098", "title": "The Proxy Step-Size Technique for Regularized Optimization on the Sphere Manifold", "doi": null, "abstractUrl": "/journal/tp/2023/05/09925098/1HBHVijhpLi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09186333", "title": "<italic>LShape</italic> Partitioning: Parallel Skyline Query Processing Using <inline-formula><tex-math notation=\"LaTeX\">Z_$MapReduce$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tk/2022/07/09186333/1mP21G1r2QE", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09187550", "title": "Towards More Secure Constructions of Adjustable Join Schemes", "doi": null, "abstractUrl": "/journal/tq/2022/02/09187550/1mVFLWkSEQU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/04/09220804", "title": "An Efficient Solution to Non-Minimal Case Essential Matrix Estimation", "doi": null, "abstractUrl": "/journal/tp/2022/04/09220804/1nRLmLHvZpC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09210070", "title": "Periodic Communities Mining in Temporal Networks: Concepts and Algorithms", "doi": null, "abstractUrl": "/journal/tk/2022/08/09210070/1nxQ8MeuyY0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09353253", "title": "Deep Polynomial Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2022/08/09353253/1r8kp3TeKGY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09363603", "title": "StLiter: A Novel Algorithm to Iteratively Build the Compacted de Bruijn Graph From Many Complete Genomes", "doi": null, "abstractUrl": "/journal/tb/2022/04/09363603/1rvy969IuR2", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09147059", "articleId": "1lIYEdEcOrK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093149", "articleId": "1jNtLSScpgY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IUAvQtX5zW", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": "35", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tiTooWy0gg", "doi": "10.1109/TKDE.2021.3077071", "abstract": "Cohesive subgraph discovery is an important problem in bipartite graph mining. In this paper, we focus on one kind of cohesive structure, called <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-biplex, where each vertex of one side is disconnected from at most <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> vertices of the other side. We consider the large maximal <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-biplex enumeration problem which is to list all those maximal <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-biplexes with the number of vertices at each side at least a non-negative integer <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>. This formulation, we observe, has various applications and targets to find non-redundant results by excluding non-maximal ones. Existing approaches suffer from massive redundant computations and can only run on small and moderate datasets. Towards improving scalability, we propose an efficient tree-based algorithm with two advanced strategies and powerful pruning techniques. Experimental results on real and synthetic datasets show the superiority of our algorithm over existing approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Cohesive subgraph discovery is an important problem in bipartite graph mining. In this paper, we focus on one kind of cohesive structure, called <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"yu-ieq1-3077071.gif\"/></alternatives></inline-formula>-biplex, where each vertex of one side is disconnected from at most <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"yu-ieq2-3077071.gif\"/></alternatives></inline-formula> vertices of the other side. We consider the large maximal <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"yu-ieq3-3077071.gif\"/></alternatives></inline-formula>-biplex enumeration problem which is to list all those maximal <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives><mml:math><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href=\"yu-ieq4-3077071.gif\"/></alternatives></inline-formula>-biplexes with the number of vertices at each side at least a non-negative integer <inline-formula><tex-math notation=\"LaTeX\">$\\theta$</tex-math><alternatives><mml:math><mml:mi>&#x03B8;</mml:mi></mml:math><inline-graphic xlink:href=\"yu-ieq5-3077071.gif\"/></alternatives></inline-formula>. This formulation, we observe, has various applications and targets to find non-redundant results by excluding non-maximal ones. Existing approaches suffer from massive redundant computations and can only run on small and moderate datasets. Towards improving scalability, we propose an efficient tree-based algorithm with two advanced strategies and powerful pruning techniques. Experimental results on real and synthetic datasets show the superiority of our algorithm over existing approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cohesive subgraph discovery is an important problem in bipartite graph mining. In this paper, we focus on one kind of cohesive structure, called --biplex, where each vertex of one side is disconnected from at most - vertices of the other side. We consider the large maximal --biplex enumeration problem which is to list all those maximal --biplexes with the number of vertices at each side at least a non-negative integer -. This formulation, we observe, has various applications and targets to find non-redundant results by excluding non-maximal ones. Existing approaches suffer from massive redundant computations and can only run on small and moderate datasets. Towards improving scalability, we propose an efficient tree-based algorithm with two advanced strategies and powerful pruning techniques. Experimental results on real and synthetic datasets show the superiority of our algorithm over existing approaches.", "title": "On Efficient Large Maximal Biplex Discovery", "normalizedTitle": "On Efficient Large Maximal Biplex Discovery", "fno": "09422157", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Data Mining", "Network Theory Graphs", "Tree Searching", "Bipartite Graph Mining", "Biplex Enumeration Problem", "Cohesive Structure", "Cohesive Subgraph Discovery", "Efficient Tree Based Algorithm", "K Vertices", "Massive Redundant Computations", "Moderate Datasets", "Nonmaximal Ones", "Nonnegative Integer", "Nonredundant Results", "Bipartite Graph", "Scalability", "Computer Science", "Backtracking", "Partitioning Algorithms", "Proteins", "Navigation", "Bipartite Graph", "Large Maximal Biplex", "Graph Mining", "Maximal Subgraph Enumeration" ], "authors": [ { "givenName": "Kaiqiang", "surname": "Yu", "fullName": "Kaiqiang Yu", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Cheng", "surname": "Long", "fullName": "Cheng Long", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Deepak", "surname": "P", "fullName": "Deepak P", "affiliation": "School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, Belfast, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Tanmoy", "surname": "Chakraborty", "fullName": "Tanmoy Chakraborty", "affiliation": "Department of Computer Science and Engineering, Indraprastha Institute of Information Technology, Delhi (IIIT-D), Delhi, India", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "824-829", "year": "2023", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09712197", "title": "Fast LDP-MST: An Efficient Density-Peak-Based Clustering Method for Large-Size Datasets", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712197/1AUkecqbRok", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/03/09827923", "title": "PMNS for Efficient Arithmetic and Small Memory Cost", "doi": null, "abstractUrl": "/journal/ec/2022/03/09827923/1EWSBFUfd6M", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/05/08911258", "title": "Large-Scale Automatic K-Means Clustering for Heterogeneous Many-Core Supercomputer", "doi": null, "abstractUrl": "/journal/td/2020/05/08911258/1gXC2EiyM6Y", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09187569", "title": "Distributed Hypergraph Processing Using Intersection Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/07/09187569/1mVFlr5j4Aw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09253703", "title": "Effective and Efficient Discovery of Top-k Meta Paths in Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09253703/1oDXxbwvBoQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/05/09423579", "title": "Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks", "doi": null, "abstractUrl": "/journal/tc/2022/05/09423579/1tkyeT8TOwg", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09534476", "title": "Discovering Significant Communities on Bipartite Graphs: An Index-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2023/03/09534476/1wLbitNpdle", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09629291", "title": "Efficient Influential Community Search in Large Uncertain Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/04/09629291/1yXvGVkW7ra", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09665221", "title": "An Efficient Index-Based Approach to Distributed Set Reachability on Small-World Graphs", "doi": null, "abstractUrl": "/journal/td/2022/10/09665221/1zJiQNKABEs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09462391", "articleId": "1uDStl914ME", "__typename": "AdjacentArticleType" }, "next": { "fno": "09446631", "articleId": "1u8lpn0Cqg8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Ecp81i5G00", "doi": "10.1109/TKDE.2022.3180808", "abstract": "Consider a stream of <inline-formula><tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula>-dimensional rows (points in <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbb {R}^{d}$_Z</tex-math></inline-formula>) arriving sequentially. An <inline-formula><tex-math notation=\"LaTeX\">Z_$\\epsilon$_Z</tex-math></inline-formula>-coreset is a positively weighted subset that approximates their sum of squared distances to any linear subspace of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbb{R}^{d}$_Z</tex-math></inline-formula>, up to a <inline-formula><tex-math notation=\"LaTeX\">Z_$1 \\pm \\epsilon$_Z</tex-math></inline-formula> factor. Unlike other data summarizations, such a coreset: (1) can be used to minimize faster any optimization function that uses this sum, such as regularized or constrained regression, (2) preserves input sparsity; (3) easily interpretable; (4) avoids numerical errors; (5) applies to problems with constraints on the input, such as subspaces that are spanned by few input points. Our main result is the first algorithm that returns such an <inline-formula><tex-math notation=\"LaTeX\">Z_$\\epsilon$_Z</tex-math></inline-formula>-coreset using finite and constant memory during the streaming, i.e., independent of <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>, the number of rows seen so far. The coreset consists of <inline-formula><tex-math notation=\"LaTeX\">Z_$O(d \\log ^{2} d / \\epsilon ^{2})$_Z</tex-math></inline-formula> weighted rows, which is nearly optimal according to existing lower bounds of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\Omega (d / \\epsilon ^{2})$_Z</tex-math></inline-formula>. We support our findings with experiments on the Wikipedia dataset benchmarked against state-of-the-art algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Consider a stream of <inline-formula><tex-math notation=\"LaTeX\">$d$</tex-math></inline-formula>-dimensional rows (points in <inline-formula><tex-math notation=\"LaTeX\">$\\mathbb {R}^{d}$</tex-math></inline-formula>) arriving sequentially. An <inline-formula><tex-math notation=\"LaTeX\">$\\epsilon$</tex-math></inline-formula>-coreset is a positively weighted subset that approximates their sum of squared distances to any linear subspace of <inline-formula><tex-math notation=\"LaTeX\">$\\mathbb{R}^{d}$</tex-math></inline-formula>, up to a <inline-formula><tex-math notation=\"LaTeX\">$1 \\pm \\epsilon$</tex-math></inline-formula> factor. Unlike other data summarizations, such a coreset: (1) can be used to minimize faster any optimization function that uses this sum, such as regularized or constrained regression, (2) preserves input sparsity; (3) easily interpretable; (4) avoids numerical errors; (5) applies to problems with constraints on the input, such as subspaces that are spanned by few input points. Our main result is the first algorithm that returns such an <inline-formula><tex-math notation=\"LaTeX\">$\\epsilon$</tex-math></inline-formula>-coreset using finite and constant memory during the streaming, i.e., independent of <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>, the number of rows seen so far. The coreset consists of <inline-formula><tex-math notation=\"LaTeX\">$O(d \\log ^{2} d / \\epsilon ^{2})$</tex-math></inline-formula> weighted rows, which is nearly optimal according to existing lower bounds of <inline-formula><tex-math notation=\"LaTeX\">$\\Omega (d / \\epsilon ^{2})$</tex-math></inline-formula>. We support our findings with experiments on the Wikipedia dataset benchmarked against state-of-the-art algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Consider a stream of --dimensional rows (points in -) arriving sequentially. An --coreset is a positively weighted subset that approximates their sum of squared distances to any linear subspace of -, up to a - factor. Unlike other data summarizations, such a coreset: (1) can be used to minimize faster any optimization function that uses this sum, such as regularized or constrained regression, (2) preserves input sparsity; (3) easily interpretable; (4) avoids numerical errors; (5) applies to problems with constraints on the input, such as subspaces that are spanned by few input points. Our main result is the first algorithm that returns such an --coreset using finite and constant memory during the streaming, i.e., independent of -, the number of rows seen so far. The coreset consists of - weighted rows, which is nearly optimal according to existing lower bounds of -. We support our findings with experiments on the Wikipedia dataset benchmarked against state-of-the-art algorithms.", "title": "Least-Mean-Squares Coresets for Infinite Streams", "normalizedTitle": "Least-Mean-Squares Coresets for Infinite Streams", "fno": "09795326", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Memory Management", "Random Access Memory", "Computational Modeling", "Sparse Matrices", "Libraries", "Covariance Matrices", "Big Data", "Optimization", "Streaming Algorithms", "Big Data", "Coresets" ], "authors": [ { "givenName": "Vladimir", "surname": "Braverman", "fullName": "Vladimir Braverman", "affiliation": "CS Deprtment, Johns Hopkins University, Baltimore, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Feldman", "fullName": "Dan Feldman", "affiliation": "Computer Science Department, Robotics & Big Data Lab, University of Haifa, Israel", "__typename": "ArticleAuthorType" }, { "givenName": "Harry", "surname": "Lang", "fullName": "Harry Lang", "affiliation": "CSAIL, MIT, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Daniela", "surname": "Rus", "fullName": "Daniela Rus", "affiliation": "CSAIL, MIT, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Adiel", "surname": "Statman", "fullName": "Adiel Statman", "affiliation": "Computer Science Department, Robotics & Big Data Lab, University of Haifa, Israel", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "1-18", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2022/12/09677460", "title": "Fast and Accurate Least-Mean-Squares Solvers for High Dimensional Data", "doi": null, "abstractUrl": "/journal/tp/2022/12/09677460/1A4So1C0azu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09774007", "title": "Graph Stream Sketch: Summarizing Graph Streams With High Speed and Accuracy", "doi": null, "abstractUrl": "/journal/tk/2023/06/09774007/1DjDnjq9sGI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/04/09858684", "title": "GRIP: A Graph Neural Network Accelerator Architecture", "doi": null, "abstractUrl": "/journal/tc/2023/04/09858684/1FUYCxUwwvu", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09893402", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "doi": null, "abstractUrl": "/journal/tk/5555/01/09893402/1GGLdY0vH0c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10091452", "title": "Sparse Quadratic Approximation for Graph Learning", "doi": null, "abstractUrl": "/journal/tp/5555/01/10091452/1M2IHz1BulG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09241452", "title": "Enhanced Group Sparse Regularized Nonconvex Regression for Face Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/05/09241452/1ogEy0c42R2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09405430", "title": "Learning Log-Determinant Divergences for Positive Definite Matrices", "doi": null, "abstractUrl": "/journal/tp/2022/09/09405430/1sP16sJ7CCs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09463735", "title": "Signed Graph Metric Learning via Gershgorin Disc Perfect Alignment", "doi": null, "abstractUrl": "/journal/tp/2022/10/09463735/1uFxm1okYhO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/04/09459541", "title": "<sc>gSoFa</sc>: Scalable Sparse Symbolic LU Factorization on GPUs", "doi": null, "abstractUrl": "/journal/td/2022/04/09459541/1uvA0zwhJKg", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09672718", "title": "Efficient Variational Bayes Learning of Graphical Models With Smooth Structural Changes", "doi": null, "abstractUrl": "/journal/tp/2023/01/09672718/1zWzGNERf0c", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09794568", "articleId": "1Eb12L6bPNK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09797289", "articleId": "1Eexif0D9ks", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1LR6bYPCVAA", "name": "ttk555501-09795326s1-supp1-3180808.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk555501-09795326s1-supp1-3180808.pdf", "extension": "pdf", "size": "466 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1FlM51CnLeo", "doi": "10.1109/TDSC.2022.3194321", "abstract": "An <inline-formula><tex-math notation=\"LaTeX\">Z_$(n,m,t)$_Z</tex-math></inline-formula>-homomorphic secret sharing (HSS) scheme for a function family <inline-formula><tex-math notation=\"LaTeX\">Z_$\\cal F$_Z</tex-math></inline-formula> allows <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula> clients to share their data <inline-formula><tex-math notation=\"LaTeX\">Z_$x_{1}, \\ldots ,x_{n}$_Z</tex-math></inline-formula> among <inline-formula><tex-math notation=\"LaTeX\">Z_$m$_Z</tex-math></inline-formula> servers and then distribute the computation of any function <inline-formula><tex-math notation=\"LaTeX\">Z_$f\\in {\\cal F}$_Z</tex-math></inline-formula> to the servers such that: (i) any <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula> colluding servers learn no information about the data; (ii) each server is able to compute a partial result and <inline-formula><tex-math notation=\"LaTeX\">Z_$f(x_{1}, \\ldots ,x_{n})$_Z</tex-math></inline-formula> can be reconstructed from the servers&#x0027; partial results. HSS schemes cannot guarantee correct reconstruction, if some servers are malicious and provide wrong partial results. Recently, verifiable HSS (VHSS) has been introduced to achieve an additional property: (iii) any <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula> colluding servers cannot persuade the client(s) to accept their partial results and reconstruct a wrong value. The property (iii) is usually achieved by the client verifying the servers&#x0027; partial results. A VHSS scheme is compact if the verification is substantially faster than locally computing <inline-formula><tex-math notation=\"LaTeX\">Z_$f(x_{1},\\ldots ,x_{n})$_Z</tex-math></inline-formula>. Of the existing VHSS schemes for polynomials, some are not compact; the others are compact but impose very heavy workload on the servers, even for low degree polynomials (e.g., they are at least 4000&#x00D7; slower than the existing HSS schemes in order to evaluate polynomials of degree <inline-formula><tex-math notation=\"LaTeX\">Z_$\\leq 5$_Z</tex-math></inline-formula>, which have many applications such as privacy-preserving machine learning). In this paper, we propose both a single-client VHSS (SVHSS) model and a multi-client VHSS (MVHSS) model. Our SVHSS allows a client to use a secret key to share its data among servers; our MVHSS allows multiple clients to share their data with a public key. For any integers <inline-formula><tex-math notation=\"LaTeX\">Z_$m,t&gt;0$_Z</tex-math></inline-formula>, we constructed both an <inline-formula><tex-math notation=\"LaTeX\">Z_$(m,t)$_Z</tex-math></inline-formula>-SVHSS scheme and an <inline-formula><tex-math notation=\"LaTeX\">Z_$(m,t)$_Z</tex-math></inline-formula>-MVHSS scheme that satisfy the properties of (i)-(iii). Our constructions are based on level-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> homomorphic encryptions. The <inline-formula><tex-math notation=\"LaTeX\">Z_$(m,t)$_Z</tex-math></inline-formula>-SVHSS and <inline-formula><tex-math notation=\"LaTeX\">Z_$(m,t)$_Z</tex-math></inline-formula>-MVHSS are compact and allow the computations of degree-<inline-formula><tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula> polynomials for <inline-formula><tex-math notation=\"LaTeX\">Z_$d\\leq ((k+1)m-1)/t$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$d\\leq ((k+1)(m-t)-1)/t$_Z</tex-math></inline-formula>, respectively. Experiments show that our schemes are much more efficient than the existing compact VHSS for low degree polynomials. For example, to compute polynomials of degree <inline-formula><tex-math notation=\"LaTeX\">Z_$\\leq 5$_Z</tex-math></inline-formula>, our MVHSS scheme is at least 420&#x00D7;faster. By applying SVHSS and MVHSS, we may add verifiability to privacy-preserving machine learning (PPML) algorithms. Experiments show that the resulting schemes are at least 52&#x00D7; and 20&#x00D7; faster than the existing verifiable PPML schemes.", "abstracts": [ { "abstractType": "Regular", "content": "An <inline-formula><tex-math notation=\"LaTeX\">$(n,m,t)$</tex-math></inline-formula>-homomorphic secret sharing (HSS) scheme for a function family <inline-formula><tex-math notation=\"LaTeX\">$\\cal F$</tex-math></inline-formula> allows <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula> clients to share their data <inline-formula><tex-math notation=\"LaTeX\">$x_{1}, \\ldots ,x_{n}$</tex-math></inline-formula> among <inline-formula><tex-math notation=\"LaTeX\">$m$</tex-math></inline-formula> servers and then distribute the computation of any function <inline-formula><tex-math notation=\"LaTeX\">$f\\in {\\cal F}$</tex-math></inline-formula> to the servers such that: (i) any <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math></inline-formula> colluding servers learn no information about the data; (ii) each server is able to compute a partial result and <inline-formula><tex-math notation=\"LaTeX\">$f(x_{1}, \\ldots ,x_{n})$</tex-math></inline-formula> can be reconstructed from the servers&#x0027; partial results. HSS schemes cannot guarantee correct reconstruction, if some servers are malicious and provide wrong partial results. Recently, verifiable HSS (VHSS) has been introduced to achieve an additional property: (iii) any <inline-formula><tex-math notation=\"LaTeX\">$t$</tex-math></inline-formula> colluding servers cannot persuade the client(s) to accept their partial results and reconstruct a wrong value. The property (iii) is usually achieved by the client verifying the servers&#x0027; partial results. A VHSS scheme is compact if the verification is substantially faster than locally computing <inline-formula><tex-math notation=\"LaTeX\">$f(x_{1},\\ldots ,x_{n})$</tex-math></inline-formula>. Of the existing VHSS schemes for polynomials, some are not compact; the others are compact but impose very heavy workload on the servers, even for low degree polynomials (e.g., they are at least 4000&#x00D7; slower than the existing HSS schemes in order to evaluate polynomials of degree <inline-formula><tex-math notation=\"LaTeX\">$\\leq 5$</tex-math></inline-formula>, which have many applications such as privacy-preserving machine learning). In this paper, we propose both a single-client VHSS (SVHSS) model and a multi-client VHSS (MVHSS) model. Our SVHSS allows a client to use a secret key to share its data among servers; our MVHSS allows multiple clients to share their data with a public key. For any integers <inline-formula><tex-math notation=\"LaTeX\">$m,t&gt;0$</tex-math></inline-formula>, we constructed both an <inline-formula><tex-math notation=\"LaTeX\">$(m,t)$</tex-math></inline-formula>-SVHSS scheme and an <inline-formula><tex-math notation=\"LaTeX\">$(m,t)$</tex-math></inline-formula>-MVHSS scheme that satisfy the properties of (i)-(iii). Our constructions are based on level-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> homomorphic encryptions. The <inline-formula><tex-math notation=\"LaTeX\">$(m,t)$</tex-math></inline-formula>-SVHSS and <inline-formula><tex-math notation=\"LaTeX\">$(m,t)$</tex-math></inline-formula>-MVHSS are compact and allow the computations of degree-<inline-formula><tex-math notation=\"LaTeX\">$d$</tex-math></inline-formula> polynomials for <inline-formula><tex-math notation=\"LaTeX\">$d\\leq ((k+1)m-1)/t$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$d\\leq ((k+1)(m-t)-1)/t$</tex-math></inline-formula>, respectively. Experiments show that our schemes are much more efficient than the existing compact VHSS for low degree polynomials. For example, to compute polynomials of degree <inline-formula><tex-math notation=\"LaTeX\">$\\leq 5$</tex-math></inline-formula>, our MVHSS scheme is at least 420&#x00D7;faster. By applying SVHSS and MVHSS, we may add verifiability to privacy-preserving machine learning (PPML) algorithms. Experiments show that the resulting schemes are at least 52&#x00D7; and 20&#x00D7; faster than the existing verifiable PPML schemes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An --homomorphic secret sharing (HSS) scheme for a function family - allows - clients to share their data - among - servers and then distribute the computation of any function - to the servers such that: (i) any - colluding servers learn no information about the data; (ii) each server is able to compute a partial result and - can be reconstructed from the servers' partial results. HSS schemes cannot guarantee correct reconstruction, if some servers are malicious and provide wrong partial results. Recently, verifiable HSS (VHSS) has been introduced to achieve an additional property: (iii) any - colluding servers cannot persuade the client(s) to accept their partial results and reconstruct a wrong value. The property (iii) is usually achieved by the client verifying the servers' partial results. A VHSS scheme is compact if the verification is substantially faster than locally computing -. Of the existing VHSS schemes for polynomials, some are not compact; the others are compact but impose very heavy workload on the servers, even for low degree polynomials (e.g., they are at least 4000× slower than the existing HSS schemes in order to evaluate polynomials of degree -, which have many applications such as privacy-preserving machine learning). In this paper, we propose both a single-client VHSS (SVHSS) model and a multi-client VHSS (MVHSS) model. Our SVHSS allows a client to use a secret key to share its data among servers; our MVHSS allows multiple clients to share their data with a public key. For any integers -, we constructed both an --SVHSS scheme and an --MVHSS scheme that satisfy the properties of (i)-(iii). Our constructions are based on level-- homomorphic encryptions. The --SVHSS and --MVHSS are compact and allow the computations of degree-- polynomials for - and -, respectively. Experiments show that our schemes are much more efficient than the existing compact VHSS for low degree polynomials. For example, to compute polynomials of degree -, our MVHSS scheme is at least 420×faster. By applying SVHSS and MVHSS, we may add verifiability to privacy-preserving machine learning (PPML) algorithms. Experiments show that the resulting schemes are at least 52× and 20× faster than the existing verifiable PPML schemes.", "title": "Verifiable Homomorphic Secret Sharing for Low Degree Polynomials", "normalizedTitle": "Verifiable Homomorphic Secret Sharing for Low Degree Polynomials", "fno": "09842386", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Servers", "Cryptography", "Genomics", "Bioinformatics", "Computational Modeling", "Data Models", "Data Privacy", "Homomorphic Secret Sharing", "Verifiability", "Homomorphic Encryption", "Privacy" ], "authors": [ { "givenName": "Xin", "surname": "Chen", "fullName": "Xin Chen", "affiliation": "School of Information Science and Technology, ShanghaiTech University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Liang Feng", "surname": "Zhang", "fullName": "Liang Feng Zhang", "affiliation": "School of Information Science and Technology, ShanghaiTech University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jing", "surname": "Liu", "fullName": "Jing Liu", "affiliation": "School of Information Science and Technology, ShanghaiTech University, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/5555/01/09894703", "title": "Analyzing Preference Data With Local Privacy: Optimal Utility and Enhanced Robustness", "doi": null, "abstractUrl": "/journal/tk/5555/01/09894703/1GNpaBpcJA4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/09925109", "title": "Privacy-Preserving and Publicly Verifiable Matrix Multiplication", "doi": null, "abstractUrl": "/journal/sc/5555/01/09925109/1HBHUwyHb6o", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09933877", "title": "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", "doi": null, "abstractUrl": "/journal/tq/5555/01/09933877/1HWLN6aNgDS", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09935302", "title": "Hercules: Boosting the Performance of Privacy-preserving Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/09935302/1HYqNfSfohW", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09976235", "title": "Efficient Noise Generation Protocols for Differentially Private Multiparty Computation", "doi": null, "abstractUrl": "/journal/tq/5555/01/09976235/1IWfPrcSm2Y", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10023987", "title": "Towards Multi-User, Secure, and Verifiable <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>NN Query in Cloud Database", "doi": null, "abstractUrl": "/journal/tk/5555/01/10023987/1K9soYKgOT6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10024795", "title": "PILE: Robust Privacy-Preserving Federated Learning via Verifiable Perturbations", "doi": null, "abstractUrl": "/journal/tq/5555/01/10024795/1KaBpoEUnK0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10093038", "title": "Privacy-Preserving and Byzantine-Robust Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/10093038/1M61YImr8dO", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2020/11/09179010", "title": "Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption", "doi": null, "abstractUrl": "/journal/si/2020/11/09179010/1mDpvhCa3rW", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09540319", "title": "Extraction of Long <italic>k</italic>-mers Using Spaced Seeds", "doi": null, "abstractUrl": "/journal/tb/2022/06/09540319/1wWC92V3JbG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09841036", "articleId": "1Fk7kq0VJsc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09844276", "articleId": "1Fnr13j4ykM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Fnr1nZNR8k", "name": "ttq555501-09842386s1-supp1-3194321.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttq555501-09842386s1-supp1-3194321.pdf", "extension": "pdf", "size": "343 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GGLdY0vH0c", "doi": "10.1109/TKDE.2022.3206881", "abstract": "Non-negative matrix factorization (NMF) is a powerful tool for dimensionality reduction and clustering. However, the interpretation of the clustering result from NMF is difficult, especially for the high-dimensional biological data without effective feature selection. To address this problem, we introduce a row-sparse NMF with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint (NMF<inline-formula><tex-math notation=\"LaTeX\">Z_$\\_\\ell _{20}$_Z</tex-math></inline-formula>), where the basis matrix <inline-formula><tex-math notation=\"LaTeX\">Z_$\\bm {W}$_Z</tex-math></inline-formula> is constrained by using the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint such that <inline-formula><tex-math notation=\"LaTeX\">Z_$\\bm {W}$_Z</tex-math></inline-formula> has a row-sparsity pattern with feature selection. However, it is a challenge to solve the model, because the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint is a non-convex and non-smooth function. Fortunately, we prove that the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint satisfies the Kurdyka-&#x0141;ojasiewicz property. Based on this finding, we present a proximal alternating linearized minimization algorithm and its monotone accelerated version to solve the NMF<inline-formula><tex-math notation=\"LaTeX\">Z_$\\_\\ell _{20}$_Z</tex-math></inline-formula> model. In addition, we further present a orthogonal NMF with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-norm constraint (ONMF<inline-formula><tex-math notation=\"LaTeX\">Z_$\\_\\ell _{20}$_Z</tex-math></inline-formula>) to enhance the clustering performance by using a non-negative orthogonal constraint. The ONMF<inline-formula><tex-math notation=\"LaTeX\">Z_$\\_\\ell _{20}$_Z</tex-math></inline-formula> model is solved by transforming into a series of constrained and penalized matrix factorization problems. The convergence and guarantees for these proposed algorithms are proved and the computational complexity is well evaluated. The results on numerical and scRNA-seq datasets demonstrate the efficiency of our methods in comparison with existing methods.", "abstracts": [ { "abstractType": "Regular", "content": "Non-negative matrix factorization (NMF) is a powerful tool for dimensionality reduction and clustering. However, the interpretation of the clustering result from NMF is difficult, especially for the high-dimensional biological data without effective feature selection. To address this problem, we introduce a row-sparse NMF with <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math></inline-formula>-norm constraint (NMF<inline-formula><tex-math notation=\"LaTeX\">$\\_\\ell _{20}$</tex-math></inline-formula>), where the basis matrix <inline-formula><tex-math notation=\"LaTeX\">$\\bm {W}$</tex-math></inline-formula> is constrained by using the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math></inline-formula>-norm constraint such that <inline-formula><tex-math notation=\"LaTeX\">$\\bm {W}$</tex-math></inline-formula> has a row-sparsity pattern with feature selection. However, it is a challenge to solve the model, because the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math></inline-formula>-norm constraint is a non-convex and non-smooth function. Fortunately, we prove that the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math></inline-formula>-norm constraint satisfies the Kurdyka-&#x0141;ojasiewicz property. Based on this finding, we present a proximal alternating linearized minimization algorithm and its monotone accelerated version to solve the NMF<inline-formula><tex-math notation=\"LaTeX\">$\\_\\ell _{20}$</tex-math></inline-formula> model. In addition, we further present a orthogonal NMF with <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2,0}$</tex-math></inline-formula>-norm constraint (ONMF<inline-formula><tex-math notation=\"LaTeX\">$\\_\\ell _{20}$</tex-math></inline-formula>) to enhance the clustering performance by using a non-negative orthogonal constraint. The ONMF<inline-formula><tex-math notation=\"LaTeX\">$\\_\\ell _{20}$</tex-math></inline-formula> model is solved by transforming into a series of constrained and penalized matrix factorization problems. The convergence and guarantees for these proposed algorithms are proved and the computational complexity is well evaluated. The results on numerical and scRNA-seq datasets demonstrate the efficiency of our methods in comparison with existing methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Non-negative matrix factorization (NMF) is a powerful tool for dimensionality reduction and clustering. However, the interpretation of the clustering result from NMF is difficult, especially for the high-dimensional biological data without effective feature selection. To address this problem, we introduce a row-sparse NMF with --norm constraint (NMF-), where the basis matrix - is constrained by using the --norm constraint such that - has a row-sparsity pattern with feature selection. However, it is a challenge to solve the model, because the --norm constraint is a non-convex and non-smooth function. Fortunately, we prove that the --norm constraint satisfies the Kurdyka-Łojasiewicz property. Based on this finding, we present a proximal alternating linearized minimization algorithm and its monotone accelerated version to solve the NMF- model. In addition, we further present a orthogonal NMF with --norm constraint (ONMF-) to enhance the clustering performance by using a non-negative orthogonal constraint. The ONMF- model is solved by transforming into a series of constrained and penalized matrix factorization problems. The convergence and guarantees for these proposed algorithms are proved and the computational complexity is well evaluated. The results on numerical and scRNA-seq datasets demonstrate the efficiency of our methods in comparison with existing methods.", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "normalizedTitle": "Structured Sparse Non-negative Matrix Factorization with --Norm", "fno": "09893402", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Feature Extraction", "Data Models", "Convergence", "Clustering Algorithms", "Biological System Modeling", "Sparse Matrices", "Minimization", "<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math> </inline-formula>-norm", "Feature Selection", "Row Sparse NMF And ONMF", "Non Convex Optimization", "Sc RNA Seq Data Clustering" ], "authors": [ { "givenName": "Wenwen", "surname": "Min", "fullName": "Wenwen Min", "affiliation": "School of Information Science and Engineering, Yunnan University, Kunming, Yunnan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Taosheng", "surname": "Xu", "fullName": "Taosheng Xu", "affiliation": "Warshel Institute for Computational Biology, The Chinese University of Hong Kong, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiang", "surname": "Wan", "fullName": "Xiang Wan", "affiliation": "Shenzhen Research Institute of Big Data, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tsung-Hui", "surname": "Chang", "fullName": "Tsung-Hui Chang", "affiliation": "The Chinese University of Hong Kong, Shenzhen, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2015/04/06800081", "title": "The <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi g}$_Z</tex-math></inline-formula>-Good-Neighbor Conditional Diagnosability of <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi k}$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi n}$_Z</tex-math></inline-formula>-Cubes under the PMC Model and MM Model", "doi": null, "abstractUrl": "/journal/td/2015/04/06800081/13rRUyeCka1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/02/08214273", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _0$_Z</tex-math></inline-formula>TV: A Sparse Optimization Method for Impulse Noise Image Restoration", "doi": null, "abstractUrl": "/journal/tp/2019/02/08214273/17D45WIXbPe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09860045", "title": "Searching Personalized <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-wing in Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09860045/1FUYx502pJC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09914660", "title": "(<inline-formula><tex-math notation=\"LaTeX\">Z_$k,\\alpha$_Z</tex-math></inline-formula>)-Coverage for RIS-Aided Mmwave Directional Communication", "doi": null, "abstractUrl": "/journal/tm/5555/01/09914660/1Hmg6qLDz68", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09916142", "title": "Structured Sparsity Optimization With Non-Convex Surrogates of <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm: A Unified Algorithmic Framework", "doi": null, "abstractUrl": "/journal/tp/2023/05/09916142/1HojygQOnNm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09944955", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$kt$_Z</tex-math></inline-formula>-Safety: Graph Release via <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Anonymity and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>-Closeness", "doi": null, "abstractUrl": "/journal/tk/5555/01/09944955/1IbM9dSufYI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10018284", "title": "Bidirectional String Anchors for Improved Text Indexing and Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$K$_Z</tex-math></inline-formula> Similarity Search", "doi": null, "abstractUrl": "/journal/tk/5555/01/10018284/1JYYXitocWQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10078319", "title": "Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> Community Similarity Search Over Large-Scale Road Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/10078319/1LIN5YpM6HK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09444882", "title": "Coordinate Descent Method for <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-means", "doi": null, "abstractUrl": "/journal/tp/2022/05/09444882/1u51seEJDiM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09448409", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1}$_Z</tex-math></inline-formula>-Norm Quantile Regression Screening Rule via the Dual Circumscribed Sphere", "doi": null, "abstractUrl": "/journal/tp/2022/10/09448409/1ugE4OYu2Xu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09893407", "articleId": "1GGLdFfhvXO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09893908", "articleId": "1GIq6sR2oCI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1GSnx74jqcE", "name": "ttk555501-09893402s1-supp1-3206881.docx", "location": "https://www.computer.org/csdl/api/v1/extra/ttk555501-09893402s1-supp1-3206881.docx", "extension": "docx", "size": "37.8 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvSbBK1", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "cc", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1J7RK3HdSpO", "doi": "10.1109/TCC.2022.3229269", "abstract": "With the rapid development of cloud computing and Internet of Things (IoT), smart health (s-health) is anticipated to enhance healthcare quality significantly. However, data integrity, user anonymity, and authentication concerns have not been adequately addressed in s-health. Remote data integrity checking (RDIC) and digital signature schemes have great potential to address these requirements. Nevertheless, the direct adoption of these schemes suffers from two flaws. Firstly, they incur prohibitively high computation and communication overhead. Secondly, they leak sensitive health information about patients and do not provide complete anonymity. To address these issues, we introduce <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula>, an aggregate anonymous attribute-based remote data verification scheme. In <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula>, the integrity of an arbitrary number of cloud data files can be verified at once without downloading the whole data, thereby saving communication and computation resources. Moreover, in <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula>, data owners can be authenticated by performing highly efficient operations. Also, <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula> provides complete anonymity and supports dishonest-user traceability. We provide security definitions for <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula> and prove its security under the hardness assumption of the bilinear Diffie-Hellman (BDH) problem. Performance comparisons and experimental results indicate that <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {A^{3}B}$_Z</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathbf {RDV}$_Z</tex-math></inline-formula> is more efficient and expressive than state-of-the-art approaches.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid development of cloud computing and Internet of Things (IoT), smart health (s-health) is anticipated to enhance healthcare quality significantly. However, data integrity, user anonymity, and authentication concerns have not been adequately addressed in s-health. Remote data integrity checking (RDIC) and digital signature schemes have great potential to address these requirements. Nevertheless, the direct adoption of these schemes suffers from two flaws. Firstly, they incur prohibitively high computation and communication overhead. Secondly, they leak sensitive health information about patients and do not provide complete anonymity. To address these issues, we introduce <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula>, an aggregate anonymous attribute-based remote data verification scheme. In <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula>, the integrity of an arbitrary number of cloud data files can be verified at once without downloading the whole data, thereby saving communication and computation resources. Moreover, in <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula>, data owners can be authenticated by performing highly efficient operations. Also, <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula> provides complete anonymity and supports dishonest-user traceability. We provide security definitions for <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula> and prove its security under the hardness assumption of the bilinear Diffie-Hellman (BDH) problem. Performance comparisons and experimental results indicate that <inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {A^{3}B}$</tex-math></inline-formula>-<inline-formula><tex-math notation=\"LaTeX\">$\\mathbf {RDV}$</tex-math></inline-formula> is more efficient and expressive than state-of-the-art approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid development of cloud computing and Internet of Things (IoT), smart health (s-health) is anticipated to enhance healthcare quality significantly. However, data integrity, user anonymity, and authentication concerns have not been adequately addressed in s-health. Remote data integrity checking (RDIC) and digital signature schemes have great potential to address these requirements. Nevertheless, the direct adoption of these schemes suffers from two flaws. Firstly, they incur prohibitively high computation and communication overhead. Secondly, they leak sensitive health information about patients and do not provide complete anonymity. To address these issues, we introduce ---, an aggregate anonymous attribute-based remote data verification scheme. In ---, the integrity of an arbitrary number of cloud data files can be verified at once without downloading the whole data, thereby saving communication and computation resources. Moreover, in ---, data owners can be authenticated by performing highly efficient operations. Also, --- provides complete anonymity and supports dishonest-user traceability. We provide security definitions for --- and prove its security under the hardness assumption of the bilinear Diffie-Hellman (BDH) problem. Performance comparisons and experimental results indicate that --- is more efficient and expressive than state-of-the-art approaches.", "title": "Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health", "normalizedTitle": "Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health", "fno": "09987649", "hasPdf": true, "idPrefix": "cc", "keywords": [ "Cloud Computing", "Protocols", "Servers", "Internet Of Things", "Security", "Data Integrity", "Authentication", "Attribute Based Cryptography", "Authentication", "Batch Verification", "Cloud Computing", "Data Integrity", "Privacy Protection", "Smart Health" ], "authors": [ { "givenName": "Mohammad", "surname": "Ali", "fullName": "Mohammad Ali", "affiliation": "Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran", "__typename": "ArticleAuthorType" }, { "givenName": "Mohammad-Reza", "surname": "Sadeghi", "fullName": "Mohammad-Reza Sadeghi", "affiliation": "Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran", "__typename": "ArticleAuthorType" }, { "givenName": "Ximeng", "surname": "Liu", "fullName": "Ximeng Liu", "affiliation": "College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian Province, China", "__typename": "ArticleAuthorType" }, { "givenName": "Athanasios V.", "surname": "Vasilakos", "fullName": "Athanasios V. Vasilakos", "affiliation": "College of Computer and Data Science, Fuzhou University, Fuzhou, Fujian Province, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "2168-7161", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2018/04/08118111", "title": "Reverse Z_$k$_Z Nearest Neighbor Search over Trajectories", "doi": null, "abstractUrl": "/journal/tk/2018/04/08118111/13rRUwInvtg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09681162", "title": "Point Cloud Sampling via Graph Balancing and Gershgorin Disc Alignment", "doi": null, "abstractUrl": "/journal/tp/2023/01/09681162/1A8c6sY0Afe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09816369", "title": "Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT", "doi": null, "abstractUrl": "/journal/tq/5555/01/09816369/1EMV8T2kRFu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09933877", "title": "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", "doi": null, "abstractUrl": "/journal/tq/5555/01/09933877/1HWLN6aNgDS", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/01/08826379", "title": "Achieving One-Round Password-Based Authenticated Key Exchange over Lattices", "doi": null, "abstractUrl": "/journal/sc/2022/01/08826379/1d6xzconoJO", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09134823", "title": "An Anonymous Authentication System for Pay-As-You-Go Cloud Computing<inline-formula><tex-math notation=\"LaTeX\">Z_$^*$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tq/2022/02/09134823/1lgLxv3Unm0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/03/09272675", "title": "Quantum-Safe Round-Optimal Password Authentication for Mobile Devices", "doi": null, "abstractUrl": "/journal/tq/2022/03/09272675/1p4wcaAsyOY", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09463735", "title": "Signed Graph Metric Learning via Gershgorin Disc Perfect Alignment", "doi": null, "abstractUrl": "/journal/tp/2022/10/09463735/1uFxm1okYhO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/04/09459541", "title": "<sc>gSoFa</sc>: Scalable Sparse Symbolic LU Factorization on GPUs", "doi": null, "abstractUrl": "/journal/td/2022/04/09459541/1uvA0zwhJKg", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09477110", "title": "LuxGeo: Efficient and Security-Enhanced Geometric Range Queries", "doi": null, "abstractUrl": "/journal/tk/2023/02/09477110/1v2M0gZ7HMs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09984946", "articleId": "1J6cRBM4QUw", "__typename": "AdjacentArticleType" }, "next": { "fno": "09989344", "articleId": "1J7RKczkuuQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1JilRtmEhDa", "name": "tcc555501-09987649s1-supp1-3229269.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tcc555501-09987649s1-supp1-3229269.pdf", "extension": "pdf", "size": "96.2 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1LKs95C31FC", "title": "April", "year": "2023", "issueNum": "04", "idPrefix": "si", "pubType": "journal", "volume": "31", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KxPXOB1Ogg", "doi": "10.1109/TVLSI.2023.3240505", "abstract": "Test data compression allows compressed tests to be stored on a tester and decompressed on-chip. Test data compression has not been applied before to transparent-scan sequences in spite of their ability to provide test compaction beyond conventional scan-based tests. A transparent-scan sequence <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> can be obtained from a conventional compact scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. In this case, the length of <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> is equal to the number of clock cycles required for applying <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. Test compaction applied to <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> can reduce its length well below the number of clock cycles required for <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. To allow test data compression and test compaction to be applied together to a transparent-scan sequence, this brief defines a format for a conventional compressed scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula> that supports features of a compact transparent-scan sequence, and allows a compact transparent-scan sequence <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> to be obtained from <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. Using this format, compaction of <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> is achieved by modifying certain parameters of <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. The decompression logic remains similar to the conventional logic used for <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>. Experimental results for the set of single stuck-at faults in benchmark circuits demonstrate significant reductions in the length of <inline-formula> <tex-math notation=\"LaTeX\">Z_$T$_Z</tex-math></inline-formula> starting from a compressed and compacted scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">Z_$C$_Z</tex-math></inline-formula>.", "abstracts": [ { "abstractType": "Regular", "content": "Test data compression allows compressed tests to be stored on a tester and decompressed on-chip. Test data compression has not been applied before to transparent-scan sequences in spite of their ability to provide test compaction beyond conventional scan-based tests. A transparent-scan sequence <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> can be obtained from a conventional compact scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. In this case, the length of <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> is equal to the number of clock cycles required for applying <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. Test compaction applied to <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> can reduce its length well below the number of clock cycles required for <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. To allow test data compression and test compaction to be applied together to a transparent-scan sequence, this brief defines a format for a conventional compressed scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula> that supports features of a compact transparent-scan sequence, and allows a compact transparent-scan sequence <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> to be obtained from <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. Using this format, compaction of <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> is achieved by modifying certain parameters of <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. The decompression logic remains similar to the conventional logic used for <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>. Experimental results for the set of single stuck-at faults in benchmark circuits demonstrate significant reductions in the length of <inline-formula> <tex-math notation=\"LaTeX\">$T$ </tex-math></inline-formula> starting from a compressed and compacted scan-based test set <inline-formula> <tex-math notation=\"LaTeX\">$C$ </tex-math></inline-formula>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Test data compression allows compressed tests to be stored on a tester and decompressed on-chip. Test data compression has not been applied before to transparent-scan sequences in spite of their ability to provide test compaction beyond conventional scan-based tests. A transparent-scan sequence - can be obtained from a conventional compact scan-based test set -. In this case, the length of - is equal to the number of clock cycles required for applying -. Test compaction applied to - can reduce its length well below the number of clock cycles required for -. To allow test data compression and test compaction to be applied together to a transparent-scan sequence, this brief defines a format for a conventional compressed scan-based test set - that supports features of a compact transparent-scan sequence, and allows a compact transparent-scan sequence - to be obtained from -. Using this format, compaction of - is achieved by modifying certain parameters of -. The decompression logic remains similar to the conventional logic used for -. Experimental results for the set of single stuck-at faults in benchmark circuits demonstrate significant reductions in the length of - starting from a compressed and compacted scan-based test set -.", "title": "Test Data Compression for Transparent-Scan Sequences", "normalizedTitle": "Test Data Compression for Transparent-Scan Sequences", "fno": "10036482", "hasPdf": true, "idPrefix": "si", "keywords": [ "Data Compression", "Fault Diagnosis", "Logic Circuits", "Logic Testing", "Sequences", "Compressed Compacted Scan Based Test Set C", "Decompressed On Chip", "Decompression Logic", "Test Data Compression", "Transparent Scan Sequence", "Compaction", "Clocks", "Circuit Faults", "Test Data Compression", "System On Chip", "Flip Flops", "Benchmark Testing", "Full Scan Circuits", "Test Compaction", "Test Data Compression", "Test Generation", "Transparent Scan" ], "authors": [ { "givenName": "Irith", "surname": "Pomeranz", "fullName": "Irith Pomeranz", "affiliation": "School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "601-605", "year": "2023", "issn": "1063-8210", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2018/02/08081813", "title": "Reverse Approximate Nearest Neighbor Queries", "doi": null, "abstractUrl": "/journal/tk/2018/02/08081813/13rRUwbs21q", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2018/02/07501604", "title": "Conditional Z_$(t,k)$_Z -Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model", "doi": null, "abstractUrl": "/journal/tq/2018/02/07501604/13rRUyuvRqo", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09815150", "title": "TriangleKV: Reducing Write Stalls and Write Amplification in LSM-Tree Based KV Stores With Triangle Container in NVM", "doi": null, "abstractUrl": "/journal/td/2022/12/09815150/1EJBwt5msJG", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09816369", "title": "Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT", "doi": null, "abstractUrl": "/journal/tq/5555/01/09816369/1EMV8T2kRFu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10008070", "title": "Cohesive Subgraph Discovery over Uncertain Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10008070/1JInEtdlgfm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10021892", "title": "Discrete Morse Sandwich: Fast Computation of Persistence Diagrams for Scalar Data &#x2013; An Algorithm and A Benchmark", "doi": null, "abstractUrl": "/journal/tg/5555/01/10021892/1K3XDAtRZ8Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/10032115", "title": "Adaptive Uplink Data Compression in Spectrum Crowdsensing Systems", "doi": null, "abstractUrl": "/journal/nt/5555/01/10032115/1KmyfWKUUPC", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/10102434", "title": "Ark Filter: A General and Space-Efficient Sketch for Network Flow Analysis", "doi": null, "abstractUrl": "/journal/nt/5555/01/10102434/1MjiYE1u4IE", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/08964488", "title": "Efficient Compression and Indexing for Highly Repetitive DNA Sequence Collections", "doi": null, "abstractUrl": "/journal/tb/2021/06/08964488/1gLZGsjhZkc", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2020/11/09179010", "title": "Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption", "doi": null, "abstractUrl": "/journal/si/2020/11/09179010/1mDpvhCa3rW", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10048766", "articleId": "1KV4wPqIy2s", "__typename": "AdjacentArticleType" }, "next": { "fno": "10043637", "articleId": "1KJsnb9NLR6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNx4gUpX", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "td", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1M61XDsMpB6", "doi": "10.1109/TPDS.2023.3264698", "abstract": "The <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cube <inline-formula><tex-math notation=\"LaTeX\">Z_$Q_{n}^{k}$_Z</tex-math></inline-formula> is one of the most important interconnection networks for building network-on-chips, data center networks, and parallel computing systems owing to its desirable properties. Since edge faults grow rapidly and the path structure plays a vital role in large-scale networks for parallel computing, fault-tolerant path embedding and its related problems have attracted extensive attention in the literature. However, the existing path embedding approaches usually only focus on the theoretical proofs and produce an <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-related linear fault tolerance since they are based on the traditional fault model, which allows all faults to be adjacent to the same node. In this paper, we design an efficient fault-tolerant Hamiltonian path embedding algorithm for enhancing the fault-tolerant capacity of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes. To facilitate the algorithm, we first introduce a new conditional fault model, named Partitioned Edge Fault model (PEF model). Based on this model, for the <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cube <inline-formula><tex-math notation=\"LaTeX\">Z_$Q_{n}^{k}$_Z</tex-math></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">Z_$n\\geq 2$_Z</tex-math></inline-formula> and odd <inline-formula><tex-math notation=\"LaTeX\">Z_$k\\geq 3$_Z</tex-math></inline-formula>, we explore the existence of a Hamiltonian path in <inline-formula><tex-math notation=\"LaTeX\">Z_$Q_{n}^{k}$_Z</tex-math></inline-formula> with large-scale edge faults. Then we give an <inline-formula><tex-math notation=\"LaTeX\">Z_$O(N)$_Z</tex-math></inline-formula> algorithm, named HP-PEF, to embed the Hamiltonian path into <inline-formula><tex-math notation=\"LaTeX\">Z_$Q_{n}^{k}$_Z</tex-math></inline-formula> under the PEF model, where <inline-formula><tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> is the number of nodes in <inline-formula><tex-math notation=\"LaTeX\">Z_$Q_{n}^{k}$_Z</tex-math></inline-formula>. The performance analysis of HP-PEF shows the average path length of adjacent node pairs in the Hamiltonian path constructed by HP-PEF. We also make comparisons to show that our result of edge fault tolerance has exponentially improved other known results. We further experimentally show that HP-PEF can support the dynamic degradation of average success rate of constructing Hamiltonian paths when increasing faulty edges exceed the fault tolerance.", "abstracts": [ { "abstractType": "Regular", "content": "The <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>-cube <inline-formula><tex-math notation=\"LaTeX\">$Q_{n}^{k}$</tex-math></inline-formula> is one of the most important interconnection networks for building network-on-chips, data center networks, and parallel computing systems owing to its desirable properties. Since edge faults grow rapidly and the path structure plays a vital role in large-scale networks for parallel computing, fault-tolerant path embedding and its related problems have attracted extensive attention in the literature. However, the existing path embedding approaches usually only focus on the theoretical proofs and produce an <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>-related linear fault tolerance since they are based on the traditional fault model, which allows all faults to be adjacent to the same node. In this paper, we design an efficient fault-tolerant Hamiltonian path embedding algorithm for enhancing the fault-tolerant capacity of <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>-cubes. To facilitate the algorithm, we first introduce a new conditional fault model, named Partitioned Edge Fault model (PEF model). Based on this model, for the <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>-cube <inline-formula><tex-math notation=\"LaTeX\">$Q_{n}^{k}$</tex-math></inline-formula> with <inline-formula><tex-math notation=\"LaTeX\">$n\\geq 2$</tex-math></inline-formula> and odd <inline-formula><tex-math notation=\"LaTeX\">$k\\geq 3$</tex-math></inline-formula>, we explore the existence of a Hamiltonian path in <inline-formula><tex-math notation=\"LaTeX\">$Q_{n}^{k}$</tex-math></inline-formula> with large-scale edge faults. Then we give an <inline-formula><tex-math notation=\"LaTeX\">$O(N)$</tex-math></inline-formula> algorithm, named HP-PEF, to embed the Hamiltonian path into <inline-formula><tex-math notation=\"LaTeX\">$Q_{n}^{k}$</tex-math></inline-formula> under the PEF model, where <inline-formula><tex-math notation=\"LaTeX\">$N$</tex-math></inline-formula> is the number of nodes in <inline-formula><tex-math notation=\"LaTeX\">$Q_{n}^{k}$</tex-math></inline-formula>. The performance analysis of HP-PEF shows the average path length of adjacent node pairs in the Hamiltonian path constructed by HP-PEF. We also make comparisons to show that our result of edge fault tolerance has exponentially improved other known results. We further experimentally show that HP-PEF can support the dynamic degradation of average success rate of constructing Hamiltonian paths when increasing faulty edges exceed the fault tolerance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The --ary --cube - is one of the most important interconnection networks for building network-on-chips, data center networks, and parallel computing systems owing to its desirable properties. Since edge faults grow rapidly and the path structure plays a vital role in large-scale networks for parallel computing, fault-tolerant path embedding and its related problems have attracted extensive attention in the literature. However, the existing path embedding approaches usually only focus on the theoretical proofs and produce an --related linear fault tolerance since they are based on the traditional fault model, which allows all faults to be adjacent to the same node. In this paper, we design an efficient fault-tolerant Hamiltonian path embedding algorithm for enhancing the fault-tolerant capacity of --ary --cubes. To facilitate the algorithm, we first introduce a new conditional fault model, named Partitioned Edge Fault model (PEF model). Based on this model, for the --ary --cube - with - and odd -, we explore the existence of a Hamiltonian path in - with large-scale edge faults. Then we give an - algorithm, named HP-PEF, to embed the Hamiltonian path into - under the PEF model, where - is the number of nodes in -. The performance analysis of HP-PEF shows the average path length of adjacent node pairs in the Hamiltonian path constructed by HP-PEF. We also make comparisons to show that our result of edge fault tolerance has exponentially improved other known results. We further experimentally show that HP-PEF can support the dynamic degradation of average success rate of constructing Hamiltonian paths when increasing faulty edges exceed the fault tolerance.", "title": "An Efficient Algorithm for Hamiltonian Path Embedding of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-Cubes under the Partitioned Edge Fault Model", "normalizedTitle": "An Efficient Algorithm for Hamiltonian Path Embedding of --Ary --Cubes under the Partitioned Edge Fault Model", "fno": "10093117", "hasPdf": true, "idPrefix": "td", "keywords": [ "Fault Tolerant Systems", "Fault Tolerance", "Circuit Faults", "Routing", "Three Dimensional Displays", "Through Silicon Vias", "System Recovery", "Interconnection Networks", "<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math> </inline-formula>-ary <inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math> </inline-formula>-cubes", "Fault Tolerant Embedding", "Algorithm", "Hamiltonian Path" ], "authors": [ { "givenName": "Hongbin", "surname": "Zhuang", "fullName": "Hongbin Zhuang", "affiliation": "College of Computer and Data Science, Fuzhou University, Fuzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiao-Yan", "surname": "Li", "fullName": "Xiao-Yan Li", "affiliation": "College of Computer and Data Science, Fuzhou University, Fuzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jou-Ming", "surname": "Chang", "fullName": "Jou-Ming Chang", "affiliation": "Institute of Information and Decision Sciences, National Taipei University of Business, Taipei, Taiwan", "__typename": "ArticleAuthorType" }, { "givenName": "Dajin", "surname": "Wang", "fullName": "Dajin Wang", "affiliation": "Department of Computer Science, Montclair State University, Upper Montclair, NJ, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2015/04/06800081", "title": "The <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi g}$_Z</tex-math></inline-formula>-Good-Neighbor Conditional Diagnosability of <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi k}$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi n}$_Z</tex-math></inline-formula>-Cubes under the PMC Model and MM Model", "doi": null, "abstractUrl": "/journal/td/2015/04/06800081/13rRUyeCka1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09860045", "title": "Searching Personalized <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-wing in Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09860045/1FUYx502pJC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09893402", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "doi": null, "abstractUrl": "/journal/tk/5555/01/09893402/1GGLdY0vH0c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09894070", "title": "mCore <inline-formula><tex-math notation=\"LaTeX\">Z_$+$_Z</tex-math></inline-formula>: A Real-Time Design Achieving <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim 500~\\mu$_Z</tex-math></inline-formula> s Scheduling for 5G MU-MIMO Systems", "doi": null, "abstractUrl": "/journal/tm/5555/01/09894070/1GIqn6CnOY8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09914660", "title": "(<inline-formula><tex-math notation=\"LaTeX\">Z_$k,\\alpha$_Z</tex-math></inline-formula>)-Coverage for RIS-Aided Mmwave Directional Communication", "doi": null, "abstractUrl": "/journal/tm/5555/01/09914660/1Hmg6qLDz68", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09944955", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$kt$_Z</tex-math></inline-formula>-Safety: Graph Release via <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Anonymity and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>-Closeness", "doi": null, "abstractUrl": "/journal/tk/5555/01/09944955/1IbM9dSufYI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10053638", "title": "A 0.0043-mm<inline-formula> <tex-math notation=\"LaTeX\">Z_$^{2}$_Z</tex-math> </inline-formula> 0.085-<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\mu$_Z</tex-math> </inline-formula>W/MHz Relaxation Oscillator Using Charge-Prestored Asymmetric Swings R-RC Network", "doi": null, "abstractUrl": "/journal/si/5555/01/10053638/1L1HYpMHqmY", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10078319", "title": "Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> Community Similarity Search Over Large-Scale Road Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/10078319/1LIN5YpM6HK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10108909", "title": "A 0.3-V 8.5-<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\mu $_Z</tex-math> </inline-formula>A Bulk-Driven OTA", "doi": null, "abstractUrl": "/journal/si/5555/01/10108909/1MDGl5NnAmA", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10093111", "articleId": "1M61Xvjwq4g", "__typename": "AdjacentArticleType" }, "next": { "fno": "10093139", "articleId": "1M61XMk2ehW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IRiaDKFcU8", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tm", "pubType": "journal", "volume": "22", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tdUGrSPdg4", "doi": "10.1109/TMC.2021.3076755", "abstract": "We consider the problem of timely exchange of updates between a central station and a set of ground terminals <inline-formula><tex-math notation=\"LaTeX\">Z_$V$_Z</tex-math></inline-formula>, via a mobile agent that traverses across the ground terminals along a mobility graph <inline-formula><tex-math notation=\"LaTeX\">Z_$G = (V, E)$_Z</tex-math></inline-formula>. We design the trajectory of the mobile agent to minimize average-peak and average age of information (AoI), two recently proposed metrics for measuring timeliness of information. We consider randomized trajectories, in which the mobile agent travels from terminal <inline-formula><tex-math notation=\"LaTeX\">Z_$i$_Z</tex-math></inline-formula> to terminal <inline-formula><tex-math notation=\"LaTeX\">Z_$j$_Z</tex-math></inline-formula> with probability <inline-formula><tex-math notation=\"LaTeX\">Z_$P_{i,j}$_Z</tex-math></inline-formula>. For the information gathering problem, we show that a randomized trajectory is average-peak age optimal and factor-<inline-formula><tex-math notation=\"LaTeX\">Z_$8\\mathcal {H}$_Z</tex-math></inline-formula> average age optimal, where <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {H}$_Z</tex-math></inline-formula> is the mixing time of the randomized trajectory on the mobility graph <inline-formula><tex-math notation=\"LaTeX\">Z_$G$_Z</tex-math></inline-formula>. We also show that the average age minimization problem is NP-hard. For the information dissemination problem, we prove that the same randomized trajectory is factor-<inline-formula><tex-math notation=\"LaTeX\">Z_$O(\\mathcal {H})$_Z</tex-math></inline-formula> average-peak and average age optimal. Moreover, we propose an age-based trajectory, which utilizes information about current age at terminals, and show that it is factor-2 average age optimal in a symmetric setting.", "abstracts": [ { "abstractType": "Regular", "content": "We consider the problem of timely exchange of updates between a central station and a set of ground terminals <inline-formula><tex-math notation=\"LaTeX\">$V$</tex-math><alternatives><mml:math><mml:mi>V</mml:mi></mml:math><inline-graphic xlink:href=\"tripathi-ieq1-3076755.gif\"/></alternatives></inline-formula>, via a mobile agent that traverses across the ground terminals along a mobility graph <inline-formula><tex-math notation=\"LaTeX\">$G = (V, E)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mo>(</mml:mo><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"tripathi-ieq2-3076755.gif\"/></alternatives></inline-formula>. We design the trajectory of the mobile agent to minimize average-peak and average age of information (AoI), two recently proposed metrics for measuring timeliness of information. We consider randomized trajectories, in which the mobile agent travels from terminal <inline-formula><tex-math notation=\"LaTeX\">$i$</tex-math><alternatives><mml:math><mml:mi>i</mml:mi></mml:math><inline-graphic xlink:href=\"tripathi-ieq3-3076755.gif\"/></alternatives></inline-formula> to terminal <inline-formula><tex-math notation=\"LaTeX\">$j$</tex-math><alternatives><mml:math><mml:mi>j</mml:mi></mml:math><inline-graphic xlink:href=\"tripathi-ieq4-3076755.gif\"/></alternatives></inline-formula> with probability <inline-formula><tex-math notation=\"LaTeX\">$P_{i,j}$</tex-math><alternatives><mml:math><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math><inline-graphic xlink:href=\"tripathi-ieq5-3076755.gif\"/></alternatives></inline-formula>. For the information gathering problem, we show that a randomized trajectory is average-peak age optimal and factor-<inline-formula><tex-math notation=\"LaTeX\">$8\\mathcal {H}$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>8</mml:mn><mml:mi mathvariant=\"script\">H</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href=\"tripathi-ieq6-3076755.gif\"/></alternatives></inline-formula> average age optimal, where <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {H}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"script\">H</mml:mi></mml:math><inline-graphic xlink:href=\"tripathi-ieq7-3076755.gif\"/></alternatives></inline-formula> is the mixing time of the randomized trajectory on the mobility graph <inline-formula><tex-math notation=\"LaTeX\">$G$</tex-math><alternatives><mml:math><mml:mi>G</mml:mi></mml:math><inline-graphic xlink:href=\"tripathi-ieq8-3076755.gif\"/></alternatives></inline-formula>. We also show that the average age minimization problem is NP-hard. For the information dissemination problem, we prove that the same randomized trajectory is factor-<inline-formula><tex-math notation=\"LaTeX\">$O(\\mathcal {H})$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>O</mml:mi><mml:mo>(</mml:mo><mml:mi mathvariant=\"script\">H</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"tripathi-ieq9-3076755.gif\"/></alternatives></inline-formula> average-peak and average age optimal. Moreover, we propose an age-based trajectory, which utilizes information about current age at terminals, and show that it is factor-2 average age optimal in a symmetric setting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider the problem of timely exchange of updates between a central station and a set of ground terminals -, via a mobile agent that traverses across the ground terminals along a mobility graph -. We design the trajectory of the mobile agent to minimize average-peak and average age of information (AoI), two recently proposed metrics for measuring timeliness of information. We consider randomized trajectories, in which the mobile agent travels from terminal - to terminal - with probability -. For the information gathering problem, we show that a randomized trajectory is average-peak age optimal and factor-- average age optimal, where - is the mixing time of the randomized trajectory on the mobility graph -. We also show that the average age minimization problem is NP-hard. For the information dissemination problem, we prove that the same randomized trajectory is factor-- average-peak and average age optimal. Moreover, we propose an age-based trajectory, which utilizes information about current age at terminals, and show that it is factor-2 average age optimal in a symmetric setting.", "title": "Age Optimal Information Gathering and Dissemination on Graphs", "normalizedTitle": "Age Optimal Information Gathering and Dissemination on Graphs", "fno": "09420260", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Ageing", "Computational Complexity", "Graph Theory", "Information Dissemination", "Minimisation", "Mobile Agents", "Age Based Trajectory", "Average Age Minimization Problem", "Average Peak Age Optimal", "Central Station", "Factor 2 Average Age Optimal", "Factor 8 H Average Age Optimal", "Ground Terminals", "Information Dissemination Problem", "Information Gathering Problem", "Mixing Time", "Mobile Agent Travels", "Mobility Graph G", "NP Hard Problem", "Randomized Trajectory", "Mobile Agents", "Trajectory", "Minimization", "Wireless Sensor Networks", "Sea Measurements", "Pollution Measurement", "Mobile Computing", "Age Of Information", "Wireless Networks", "Trajectory Optimization", "Scheduling" ], "authors": [ { "givenName": "Vishrant", "surname": "Tripathi", "fullName": "Vishrant Tripathi", "affiliation": "Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Rajat", "surname": "Talak", "fullName": "Rajat Talak", "affiliation": "Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Eytan", "surname": "Modiano", "fullName": "Eytan Modiano", "affiliation": "Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "54-68", "year": "2023", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/bd/2022/03/08450054", "title": "Link Prediction in Knowledge Graphs: A Hierarchy-Constrained Approach", "doi": null, "abstractUrl": "/journal/bd/2022/03/08450054/13rRUxN5ev7", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09250607", "title": "Enumerating Maximum Cliques in Massive Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/09/09250607/1oxjS6MBaA8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/06/09309172", "title": "Detecting Meaningful Clusters From High-Dimensional Data: A Strongly Consistent Sparse Center-Based Clustering Approach", "doi": null, "abstractUrl": "/journal/tp/2022/06/09309172/1pQEdzozLwY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09452800", "title": "Core Decomposition on Uncertain Graphs Revisited", "doi": null, "abstractUrl": "/journal/tk/2023/01/09452800/1ulCu0Hdqs8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09534476", "title": "Discovering Significant Communities on Bipartite Graphs: An Index-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2023/03/09534476/1wLbitNpdle", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2023/03/09524557", "title": "Jamming-Resilient Message Dissemination in Wireless Networks", "doi": null, "abstractUrl": "/journal/tm/2023/03/09524557/1wpq6ok6SeQ", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09580703", "title": "Efficient and Optimal Algorithms for Tree Summarization With Weighted Terminologies", "doi": null, "abstractUrl": "/journal/tk/2023/03/09580703/1xPnZzu3u9O", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09662190", "title": "Higher-Order Truss Decomposition in Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/04/09662190/1zzl2ZAAVvq", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09415152", "articleId": "1t2ifPPh8Va", "__typename": "AdjacentArticleType" }, "next": { "fno": "09394785", "articleId": "1striBQlEqs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IRigrhCDwA", "name": "ttm202301-09420260s1-supp1-3076755.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttm202301-09420260s1-supp1-3076755.pdf", "extension": "pdf", "size": "195 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1B2CJpTsZyw", "title": "Feb.", "year": "2022", "issueNum": "01", "idPrefix": "nt", "pubType": "journal", "volume": "30", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1wnL9MNq6Vq", "doi": "10.1109/TNET.2021.3105480", "abstract": "This paper considers the steady-state performance of load balancing algorithms in a many-server system with distributed queues. The system has <inline-formula> <tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula> servers, and each server maintains a local queue with buffer size <inline-formula> <tex-math notation=\"LaTeX\">Z_$b-1$_Z</tex-math></inline-formula>, i.e. a server can hold at most one job in service and <inline-formula> <tex-math notation=\"LaTeX\">Z_$b-1$_Z</tex-math></inline-formula> jobs in the queue. Jobs in the same queue are served according to the first-in-first-out (FIFO) order. The system is operated in a heavy-traffic regime such that the workload per server is <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\lambda = 1 - N^{-\\alpha }$_Z</tex-math></inline-formula> for <inline-formula> <tex-math notation=\"LaTeX\">Z_$0.5\\leq \\alpha &lt; 1$_Z</tex-math></inline-formula>. We identify a set of algorithms such that the steady-state queues have the following universal scaling, where <italic>universal</italic> means that it holds for any <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\alpha \\in [0.5,1$_Z</tex-math></inline-formula>): (i) the number of busy servers is <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\lambda N-o(1)$_Z</tex-math></inline-formula>; and (ii) the number of servers with two jobs (one in service and one in queue) is <inline-formula> <tex-math notation=\"LaTeX\">Z_$O(N^{\\alpha }\\log N)$_Z</tex-math></inline-formula>; and (iii) the number of servers with more than two jobs is <inline-formula> <tex-math notation=\"LaTeX\">Z_$O({1}/{N^{r(1-\\alpha)-1}})$_Z</tex-math></inline-formula>, where <inline-formula> <tex-math notation=\"LaTeX\">Z_$r$_Z</tex-math></inline-formula> can be any positive integer independent of <inline-formula> <tex-math notation=\"LaTeX\">Z_$N$_Z</tex-math></inline-formula>. The set of load balancing algorithms that satisfy the sufficient condition includes join-the-shortest-queue (JSQ), idle-one-first (I1F), and power-of-<inline-formula> <tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula>-choices (Po<inline-formula> <tex-math notation=\"LaTeX\">Z_$d$_Z</tex-math></inline-formula>) with <inline-formula> <tex-math notation=\"LaTeX\">Z_$d\\geq 2N^\\alpha \\log N$_Z</tex-math></inline-formula>. We further argue that the waiting time of such an algorithm is near optimal order-wise.", "abstracts": [ { "abstractType": "Regular", "content": "This paper considers the steady-state performance of load balancing algorithms in a many-server system with distributed queues. The system has <inline-formula> <tex-math notation=\"LaTeX\">$N$ </tex-math></inline-formula> servers, and each server maintains a local queue with buffer size <inline-formula> <tex-math notation=\"LaTeX\">$b-1$ </tex-math></inline-formula>, i.e. a server can hold at most one job in service and <inline-formula> <tex-math notation=\"LaTeX\">$b-1$ </tex-math></inline-formula> jobs in the queue. Jobs in the same queue are served according to the first-in-first-out (FIFO) order. The system is operated in a heavy-traffic regime such that the workload per server is <inline-formula> <tex-math notation=\"LaTeX\">$\\lambda = 1 - N^{-\\alpha }$ </tex-math></inline-formula> for <inline-formula> <tex-math notation=\"LaTeX\">$0.5\\leq \\alpha &lt; 1$ </tex-math></inline-formula>. We identify a set of algorithms such that the steady-state queues have the following universal scaling, where <italic>universal</italic> means that it holds for any <inline-formula> <tex-math notation=\"LaTeX\">$\\alpha \\in [0.5,1$ </tex-math></inline-formula>): (i) the number of busy servers is <inline-formula> <tex-math notation=\"LaTeX\">$\\lambda N-o(1)$ </tex-math></inline-formula>; and (ii) the number of servers with two jobs (one in service and one in queue) is <inline-formula> <tex-math notation=\"LaTeX\">$O(N^{\\alpha }\\log N)$ </tex-math></inline-formula>; and (iii) the number of servers with more than two jobs is <inline-formula> <tex-math notation=\"LaTeX\">$O({1}/{N^{r(1-\\alpha)-1}})$ </tex-math></inline-formula>, where <inline-formula> <tex-math notation=\"LaTeX\">$r$ </tex-math></inline-formula> can be any positive integer independent of <inline-formula> <tex-math notation=\"LaTeX\">$N$ </tex-math></inline-formula>. The set of load balancing algorithms that satisfy the sufficient condition includes join-the-shortest-queue (JSQ), idle-one-first (I1F), and power-of-<inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>-choices (Po<inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>) with <inline-formula> <tex-math notation=\"LaTeX\">$d\\geq 2N^\\alpha \\log N$ </tex-math></inline-formula>. We further argue that the waiting time of such an algorithm is near optimal order-wise.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper considers the steady-state performance of load balancing algorithms in a many-server system with distributed queues. The system has - servers, and each server maintains a local queue with buffer size -, i.e. a server can hold at most one job in service and - jobs in the queue. Jobs in the same queue are served according to the first-in-first-out (FIFO) order. The system is operated in a heavy-traffic regime such that the workload per server is - for -. We identify a set of algorithms such that the steady-state queues have the following universal scaling, where universal means that it holds for any -): (i) the number of busy servers is -; and (ii) the number of servers with two jobs (one in service and one in queue) is -; and (iii) the number of servers with more than two jobs is -, where - can be any positive integer independent of -. The set of load balancing algorithms that satisfy the sufficient condition includes join-the-shortest-queue (JSQ), idle-one-first (I1F), and power-of---choices (Po-) with -. We further argue that the waiting time of such an algorithm is near optimal order-wise.", "title": "Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime", "normalizedTitle": "Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime", "fno": "09523604", "hasPdf": true, "idPrefix": "nt", "keywords": [ "Approximation Theory", "Exponential Distribution", "Markov Processes", "Network Servers", "Queueing Theory", "Resource Allocation", "Telecommunication Traffic", "Universal Scaling", "Distributed Queues", "Super Halfin Whitt Regime", "Many Server System", "N Servers", "Local Queue", "Buffer Size", "Heavy Traffic Regime", "Steady State Queues", "Busy Servers", "X 03 B 1 Log N", "Load Balancing Algorithms", "Join The Shortest Queue Idle One", "Servers", "Load Management", "Steady State", "Data Centers", "IEEE Transactions", "Diffusion Processes", "Delays", "Load Balancing", "Heavy Traffic Analysis", "Steins Method", "State Space Collapse SSC" ], "authors": [ { "givenName": "Xin", "surname": "Liu", "fullName": "Xin Liu", "affiliation": "Electrical Engineering and Computer Science Department, University of Michigan, Ann Arbor, MI, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Lei", "surname": "Ying", "fullName": "Lei Ying", "affiliation": "Electrical Engineering and Computer Science Department, University of Michigan, Ann Arbor, MI, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-02-01 00:00:00", "pubType": "trans", "pages": "190-201", "year": "2022", "issn": "1063-6692", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/nt/2022/04/09705528", "title": "A Converse Result on Convergence Time for Opportunistic Wireless Scheduling", "doi": null, "abstractUrl": "/journal/nt/2022/04/09705528/1AO21AYHnHi", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/04/09724636", "title": "Demand-Aware Network Design With Minimal Congestion and Route Lengths", "doi": null, "abstractUrl": "/journal/nt/2022/04/09724636/1BpRvowCvXG", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/09934940", "title": "Scaling by Learning: Accelerating Open vSwitch Data Path With Neural Networks", "doi": null, "abstractUrl": "/journal/nt/5555/01/09934940/1HWLEgNVjos", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/09911947", "title": "An Approximation Algorithm for the <inline-formula> <tex-math notation=\"LaTeX\">Z_$h$_Z</tex-math> </inline-formula>-Hop Independently Submodular Maximization Problem and Its Applications", "doi": null, "abstractUrl": "/journal/nt/5555/01/09911947/1HeiGgm6WGY", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/09976337", "title": "Optimal Routing to Parallel Servers With Unknown Utilities&#x2014;Multi-Armed Bandit With Queues", "doi": null, "abstractUrl": "/journal/nt/5555/01/09976337/1IWfnBhukVy", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/10021291", "title": "Lazy Lagrangians for Optimistic Learning With Budget Constraints", "doi": null, "abstractUrl": "/journal/nt/5555/01/10021291/1K2iqQ0acSc", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2021/06/09512282", "title": "Cache Networks of Counting Queues", "doi": null, "abstractUrl": "/journal/nt/2021/06/09512282/1w0wvFBMUfe", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/02/09606219", "title": "Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems", "doi": null, "abstractUrl": "/journal/nt/2022/02/09606219/1ymEoKr8t3y", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609660", "title": "FFNLFD: Fault Diagnosis of Multiprocessor Systems at Local Node With Fault-Free Neighbors Under PMC Model and MM* Model", "doi": null, "abstractUrl": "/journal/td/2022/07/09609660/1yoxL0ygC2c", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/03/09640619", "title": "A Computational Approach to Packet Classification", "doi": null, "abstractUrl": "/journal/nt/2022/03/09640619/1z984vW8mWs", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09525829", "articleId": "1ww3GeojGOk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09521569", "articleId": "1wkrl7tLYIM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNz2C1Bi", "title": "June", "year": "1993", "issueNum": "06", "idPrefix": "tp", "pubType": "journal", "volume": "15", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwInvg4", "doi": "10.1109/34.216726", "abstract": "An approach to the analysis of dynamic facial images for the purposes of estimating and resynthesizing dynamic facial expressions is presented. The approach exploits a sophisticated generative model of the human face originally developed for realistic facial animation. The face model which may be simulated and rendered at interactive rates on a graphics workstation, incorporates a physics-based synthetic facial tissue and a set of anatomically motivated facial muscle actuators. The estimation of dynamical facial muscle contractions from video sequences of expressive human faces is considered. An estimation technique that uses deformable contour models (snakes) to track the nonrigid motions of facial features in video images is developed. The technique estimates muscle actuator controls with sufficient accuracy to permit the face model to resynthesize transient expressions.", "abstracts": [ { "abstractType": "Regular", "content": "An approach to the analysis of dynamic facial images for the purposes of estimating and resynthesizing dynamic facial expressions is presented. The approach exploits a sophisticated generative model of the human face originally developed for realistic facial animation. The face model which may be simulated and rendered at interactive rates on a graphics workstation, incorporates a physics-based synthetic facial tissue and a set of anatomically motivated facial muscle actuators. The estimation of dynamical facial muscle contractions from video sequences of expressive human faces is considered. An estimation technique that uses deformable contour models (snakes) to track the nonrigid motions of facial features in video images is developed. The technique estimates muscle actuator controls with sufficient accuracy to permit the face model to resynthesize transient expressions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An approach to the analysis of dynamic facial images for the purposes of estimating and resynthesizing dynamic facial expressions is presented. The approach exploits a sophisticated generative model of the human face originally developed for realistic facial animation. The face model which may be simulated and rendered at interactive rates on a graphics workstation, incorporates a physics-based synthetic facial tissue and a set of anatomically motivated facial muscle actuators. The estimation of dynamical facial muscle contractions from video sequences of expressive human faces is considered. An estimation technique that uses deformable contour models (snakes) to track the nonrigid motions of facial features in video images is developed. The technique estimates muscle actuator controls with sufficient accuracy to permit the face model to resynthesize transient expressions.", "title": "Analysis and Synthesis of Facial Image Sequences Using Physical and Anatomical Models", "normalizedTitle": "Analysis and Synthesis of Facial Image Sequences Using Physical and Anatomical Models", "fno": "i0569", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Biomechanics Expressions Resynthesis Facial Image Sequences Anatomical Models Facial Animation Face Model Graphics Workstation Physics Based Synthetic Facial Tissue Anatomically Motivated Facial Muscle Actuators Dynamical Facial Muscle Contractions Video Sequences Expressive Human Faces Deformable Contour Models Snakes Biomechanics Computer Animation Image Sequences" ], "authors": [ { "givenName": "D.", "surname": "Terzopoulos", "fullName": "D. Terzopoulos", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "K.", "surname": "Waters", "fullName": "K. Waters", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "06", "pubDate": "1993-06-01 00:00:00", "pubType": "trans", "pages": "569-579", "year": "1993", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0556", "articleId": "13rRUyYBlht", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0580", "articleId": "13rRUxASuiE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBl6EJV", "title": "October-December", "year": "2000", "issueNum": "04", "idPrefix": "tg", "pubType": "journal", "volume": "6", "label": "October-December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyuegoV", "doi": "10.1109/2945.895880", "abstract": "Abstract—In this paper, we consider accelerated rendering of high quality walkthrough animation sequences along predefined paths. To improve rendering performance, we use a combination of a hybrid ray tracing and Image-Based Rendering (IBR) technique and a novel perception-based antialiasing technique. In our rendering solution, we derive as many pixels as possible using inexpensive IBR techniques without affecting the animation quality. A perception-based spatiotemporal Animation Quality Metric (AQM) is used to automatically guide such a hybrid rendering. The Image Flow (IF) obtained as a byproduct of the IBR computation is an integral part of the AQM. The final animation quality is enhanced by an efficient spatiotemporal antialiasing which utilizes the IF to perform a motion-compensated filtering. The filter parameters have been tuned using the AQM predictions of animation quality as perceived by the human observer. These parameters adapt locally to the visual pattern velocity.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—In this paper, we consider accelerated rendering of high quality walkthrough animation sequences along predefined paths. To improve rendering performance, we use a combination of a hybrid ray tracing and Image-Based Rendering (IBR) technique and a novel perception-based antialiasing technique. In our rendering solution, we derive as many pixels as possible using inexpensive IBR techniques without affecting the animation quality. A perception-based spatiotemporal Animation Quality Metric (AQM) is used to automatically guide such a hybrid rendering. The Image Flow (IF) obtained as a byproduct of the IBR computation is an integral part of the AQM. The final animation quality is enhanced by an efficient spatiotemporal antialiasing which utilizes the IF to perform a motion-compensated filtering. The filter parameters have been tuned using the AQM predictions of animation quality as perceived by the human observer. These parameters adapt locally to the visual pattern velocity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—In this paper, we consider accelerated rendering of high quality walkthrough animation sequences along predefined paths. To improve rendering performance, we use a combination of a hybrid ray tracing and Image-Based Rendering (IBR) technique and a novel perception-based antialiasing technique. In our rendering solution, we derive as many pixels as possible using inexpensive IBR techniques without affecting the animation quality. A perception-based spatiotemporal Animation Quality Metric (AQM) is used to automatically guide such a hybrid rendering. The Image Flow (IF) obtained as a byproduct of the IBR computation is an integral part of the AQM. The final animation quality is enhanced by an efficient spatiotemporal antialiasing which utilizes the IF to perform a motion-compensated filtering. The filter parameters have been tuned using the AQM predictions of animation quality as perceived by the human observer. These parameters adapt locally to the visual pattern velocity.", "title": "Perception-Based Fast Rendering and Antialiasing of Walkthrough Sequences", "normalizedTitle": "Perception-Based Fast Rendering and Antialiasing of Walkthrough Sequences", "fno": "v0360", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Walkthrough Animation", "Human Perception", "Video Quality Metrics", "Motion Compensated Filtering" ], "authors": [ { "givenName": "Karol", "surname": "Myszkowski", "fullName": "Karol Myszkowski", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Przemyslaw", "surname": "Rokita", "fullName": "Przemyslaw Rokita", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Takehiro", "surname": "Tawara", "fullName": "Takehiro Tawara", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "04", "pubDate": "2000-10-01 00:00:00", "pubType": "trans", "pages": "360-379", "year": "2000", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "v0346", "articleId": "13rRUxOdD2s", "__typename": "AdjacentArticleType" }, "next": { "fno": "v0380", "articleId": "13rRUwbaqUE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNx8fieR", "title": "March", "year": "2012", "issueNum": "03", "idPrefix": "tg", "pubType": "journal", "volume": "18", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwwaKt6", "doi": "10.1109/TVCG.2011.73", "abstract": "We introduce a novel method for synthesizing dance motions that follow the emotions and contents of a piece of music. Our method employs a learning-based approach to model the music to motion mapping relationship embodied in example dance motions along with those motions' accompanying background music. A key step in our method is to train a music to motion matching quality rating function through learning the music to motion mapping relationship exhibited in synchronized music and dance motion data, which were captured from professional human dance performance. To generate an optimal sequence of dance motion segments to match with a piece of music, we introduce a constraint-based dynamic programming procedure. This procedure considers both music to motion matching quality and visual smoothness of a resultant dance motion sequence. We also introduce a two-way evaluation strategy, coupled with a GPU-based implementation, through which we can execute the dynamic programming process in parallel, resulting in significant speedup. To evaluate the effectiveness of our method, we quantitatively compare the dance motions synthesized by our method with motion synthesis results by several peer methods using the motions captured from professional human dancers' performance as the gold standard. We also conducted several medium-scale user studies to explore how perceptually our dance motion synthesis method can outperform existing methods in synthesizing dance motions to match with a piece of music. These user studies produced very positive results on our music-driven dance motion synthesis experiments for several Asian dance genres, confirming the advantages of our method.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a novel method for synthesizing dance motions that follow the emotions and contents of a piece of music. Our method employs a learning-based approach to model the music to motion mapping relationship embodied in example dance motions along with those motions' accompanying background music. A key step in our method is to train a music to motion matching quality rating function through learning the music to motion mapping relationship exhibited in synchronized music and dance motion data, which were captured from professional human dance performance. To generate an optimal sequence of dance motion segments to match with a piece of music, we introduce a constraint-based dynamic programming procedure. This procedure considers both music to motion matching quality and visual smoothness of a resultant dance motion sequence. We also introduce a two-way evaluation strategy, coupled with a GPU-based implementation, through which we can execute the dynamic programming process in parallel, resulting in significant speedup. To evaluate the effectiveness of our method, we quantitatively compare the dance motions synthesized by our method with motion synthesis results by several peer methods using the motions captured from professional human dancers' performance as the gold standard. We also conducted several medium-scale user studies to explore how perceptually our dance motion synthesis method can outperform existing methods in synthesizing dance motions to match with a piece of music. These user studies produced very positive results on our music-driven dance motion synthesis experiments for several Asian dance genres, confirming the advantages of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a novel method for synthesizing dance motions that follow the emotions and contents of a piece of music. Our method employs a learning-based approach to model the music to motion mapping relationship embodied in example dance motions along with those motions' accompanying background music. A key step in our method is to train a music to motion matching quality rating function through learning the music to motion mapping relationship exhibited in synchronized music and dance motion data, which were captured from professional human dance performance. To generate an optimal sequence of dance motion segments to match with a piece of music, we introduce a constraint-based dynamic programming procedure. This procedure considers both music to motion matching quality and visual smoothness of a resultant dance motion sequence. We also introduce a two-way evaluation strategy, coupled with a GPU-based implementation, through which we can execute the dynamic programming process in parallel, resulting in significant speedup. To evaluate the effectiveness of our method, we quantitatively compare the dance motions synthesized by our method with motion synthesis results by several peer methods using the motions captured from professional human dancers' performance as the gold standard. We also conducted several medium-scale user studies to explore how perceptually our dance motion synthesis method can outperform existing methods in synthesizing dance motions to match with a piece of music. These user studies produced very positive results on our music-driven dance motion synthesis experiments for several Asian dance genres, confirming the advantages of our method.", "title": "Example-Based Automatic Music-Driven Conventional Dance Motion Synthesis", "normalizedTitle": "Example-Based Automatic Music-Driven Conventional Dance Motion Synthesis", "fno": "ttg2012030501", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Music", "Dynamic Programming", "Graphics Processing Units", "Image Matching", "Image Motion Analysis", "Image Sequences", "Learning Artificial Intelligence", "Asian Dance Genres", "Example Based Automatic Music Driven Conventional Dance Motion Synthesis", "Learning Based Approach", "Motion Mapping Relationship", "Motion Matching Quality Rating Function", "Synchronized Music", "Professional Human Dance Performance", "Optimal Sequence", "Dance Motion Segments", "Constraint Based Dynamic Programming", "Visual Smoothness", "Resultant Dance Motion Sequence", "Two Way Evaluation Strategy", "GPU Based Implementation", "Peer Method", "Motion Segmentation", "Feature Extraction", "Correlation", "Training", "Joints", "Synchronization", "Humans", "Learning Based Dance Motion Synthesis", "Dance Motion And Music Mapping Relationship", "Music Driven Dance Motion Synthesis" ], "authors": [ { "givenName": null, "surname": "Rukun Fan", "fullName": "Rukun Fan", "affiliation": "Coll. of Comput. Sci., Zhejiang Univ. (Yuquan Campus), Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Songhua Xu", "fullName": "Songhua Xu", "affiliation": "Oak Ridge Nat. Lab., Oak Ridge, TN, USA", "__typename": "ArticleAuthorType" }, { "givenName": null, "surname": "Weidong Geng", "fullName": "Weidong Geng", "affiliation": "Coll. of Comput. Sci., Zhejiang Univ. (Yuquan Campus), Hangzhou, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2012-03-01 00:00:00", "pubType": "trans", "pages": "501-515", "year": "2012", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icme/2011/348/0/06011912", "title": "Motion synthesis for synchronizing with streaming music by segment-based search on metadata motion graphs", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011912/12OmNAoUTkt", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a101", "title": "Acknowledging Practice: The Applications of Streaming Audio and Video for Tertiary Music and Dance Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a101/12OmNvw2TbI", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2009/3791/0/3791a171", "title": "Automatic Composition for Contemporary Dance Using 3D Motion Clips: Experiment on Dance Training and System Evaluation", "doi": null, "abstractUrl": "/proceedings-article/cw/2009/3791a171/12OmNwEJ0HF", "parentPublication": { "id": "proceedings/cw/2009/3791/0", "title": "2009 International Conference on CyberWorlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2011/1451/0/06000356", "title": "Procedural generation of Cuban dance motion", "doi": null, "abstractUrl": "/proceedings-article/cgames/2011/06000356/12OmNxHrylJ", "parentPublication": { "id": "proceedings/cgames/2011/1451/0", "title": "2011 16th International Conference on Computer Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a045", "title": "Development of Easy-to-Use Authoring System for Noh (Japanese Traditional) Dance Animation", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a045/12OmNxaNGmE", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3381", "title": "AI Choreographer: Music Conditioned 3D Dance Generation with AIST++", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3381/1BmJ1TiWSB2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09745335", "title": "Rhythm is a Dancer: Music-Driven Motion Synthesis with Global Structure", "doi": null, "abstractUrl": "/journal/tg/5555/01/09745335/1CagHUR61pe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10018173", "title": "Keyframe Control of Music-driven 3D Dance Generation", "doi": null, "abstractUrl": "/journal/tg/5555/01/10018173/1JYZ6TXyjgk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiam/2021/3260/0/326000a055", "title": "AutoDance: Music Driven Dance Generation", "doi": null, "abstractUrl": "/proceedings-article/isaiam/2021/326000a055/1wiQVBNgFhe", "parentPublication": { "id": "proceedings/isaiam/2021/3260/0", "title": "2021 International Symposium on Artificial Intelligence and its Application on Media (ISAIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a348", "title": "Dance to Music: Generative Choreography with Music using Mixture Density Networks", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a348/1xPslGYA8Gk", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2012030488", "articleId": "13rRUxC0SW7", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2012030516", "articleId": "13rRUxYIN46", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTYesTK", "name": "ttg2012030501s.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2012030501s.pdf", "extension": "pdf", "size": "630 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxGAKWj", "title": "May", "year": "1995", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "17", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxBa5sH", "doi": "10.1109/34.391397", "abstract": "Abstract—This article describes a new method for building a natural language understanding (NLU) system, in which the system’s rules are learnt automatically from training data. The method has been applied to design of a speech understanding (SU) system. Designers of such systems rely increasingly on robust matchers to perform the task of extracting meaning from one or several word sequence hypotheses generated by a speech recognizer; a robust matcher processes semantically important islands of words and constituents rather than attempting to parse the entire word sequence. We describe a new data structure, the Semantic Classification Tree (SCT), that learns semantic rules from training data and can be a building block for robust matchers for NLU tasks. By reducing the need for handcoding and debugging a large number of rules, this approach facilitates rapid construction of an NLU system. In the case of an SU system, the rules learned by an SCT are highly resistant to errors by the speaker or by the speech recognizer because they depend on a small number of words in each utterance. Our work shows that semantic rules can be learned automatically from training data, yielding successful NLU for a realistic application.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—This article describes a new method for building a natural language understanding (NLU) system, in which the system’s rules are learnt automatically from training data. The method has been applied to design of a speech understanding (SU) system. Designers of such systems rely increasingly on robust matchers to perform the task of extracting meaning from one or several word sequence hypotheses generated by a speech recognizer; a robust matcher processes semantically important islands of words and constituents rather than attempting to parse the entire word sequence. We describe a new data structure, the Semantic Classification Tree (SCT), that learns semantic rules from training data and can be a building block for robust matchers for NLU tasks. By reducing the need for handcoding and debugging a large number of rules, this approach facilitates rapid construction of an NLU system. In the case of an SU system, the rules learned by an SCT are highly resistant to errors by the speaker or by the speech recognizer because they depend on a small number of words in each utterance. Our work shows that semantic rules can be learned automatically from training data, yielding successful NLU for a realistic application.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—This article describes a new method for building a natural language understanding (NLU) system, in which the system’s rules are learnt automatically from training data. The method has been applied to design of a speech understanding (SU) system. Designers of such systems rely increasingly on robust matchers to perform the task of extracting meaning from one or several word sequence hypotheses generated by a speech recognizer; a robust matcher processes semantically important islands of words and constituents rather than attempting to parse the entire word sequence. We describe a new data structure, the Semantic Classification Tree (SCT), that learns semantic rules from training data and can be a building block for robust matchers for NLU tasks. By reducing the need for handcoding and debugging a large number of rules, this approach facilitates rapid construction of an NLU system. In the case of an SU system, the rules learned by an SCT are highly resistant to errors by the speaker or by the speech recognizer because they depend on a small number of words in each utterance. Our work shows that semantic rules can be learned automatically from training data, yielding successful NLU for a realistic application.", "title": "The Application of Semantic Classification Trees to Natural Language Understanding", "normalizedTitle": "The Application of Semantic Classification Trees to Natural Language Understanding", "fno": "i0449", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Speech Understanding", "Semantic Classification Tree", "SCT", "Machine Learning", "Natural Language", "Decision Tree" ], "authors": [ { "givenName": "Roland", "surname": "Kuhn", "fullName": "Roland Kuhn", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Renato", "surname": "De Mori", "fullName": "Renato De Mori", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "05", "pubDate": "1995-05-01 00:00:00", "pubType": "trans", "pages": "449-460", "year": "1995", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": null, "next": { "fno": "i0461", "articleId": "13rRUzphDyO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KsRWKKVV7i", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1EexjnGsWgo", "doi": "10.1109/TPAMI.2022.3183288", "abstract": "Gait recognition plays a special role in visual surveillance due to its unique advantage, <italic>e.g.</italic>, long-distance, cross-view and non-cooperative recognition. However, it has not yet been widely applied. One reason for this awkwardness is the lack of a truly big dataset captured in practical outdoor scenarios. Here, the &#x201C;big&#x201D; at least means: (1) huge amount of gait videos; (2) sufficient subjects; (3) rich attributes; and (4) spatial and temporal variations. Moreover, most existing large-scale gait datasets are collected indoors, which have few challenges from real scenes, such as the dynamic and complex background clutters, illumination variations, vertical view variations, <italic>etc</italic>. In this article, we introduce a newly built big outdoor gait dataset, called CASIA-E. It contains more than one thousand people distributed over near one million videos. Each person involves 26 view angles and varied appearances caused by changes of bag carrying, dressing and walking styles. The videos are captured across five months and across three kinds of outdoor scenes. Soft biometric features are also recorded for all subjects including age, gender, height, weight, and nationality. Besides, we report an experimental benchmark and examine some meaningful problems that have not been well studied previously, <italic>e.g.</italic>, the influence of million-level training videos, vertical view angles, walking styles, and the thermal infrared modality. We believe that such a big outdoor dataset and the experimental benchmark will promote the development of gait recognition in both academic research and industrial applications.", "abstracts": [ { "abstractType": "Regular", "content": "Gait recognition plays a special role in visual surveillance due to its unique advantage, <italic>e.g.</italic>, long-distance, cross-view and non-cooperative recognition. However, it has not yet been widely applied. One reason for this awkwardness is the lack of a truly big dataset captured in practical outdoor scenarios. Here, the &#x201C;big&#x201D; at least means: (1) huge amount of gait videos; (2) sufficient subjects; (3) rich attributes; and (4) spatial and temporal variations. Moreover, most existing large-scale gait datasets are collected indoors, which have few challenges from real scenes, such as the dynamic and complex background clutters, illumination variations, vertical view variations, <italic>etc</italic>. In this article, we introduce a newly built big outdoor gait dataset, called CASIA-E. It contains more than one thousand people distributed over near one million videos. Each person involves 26 view angles and varied appearances caused by changes of bag carrying, dressing and walking styles. The videos are captured across five months and across three kinds of outdoor scenes. Soft biometric features are also recorded for all subjects including age, gender, height, weight, and nationality. Besides, we report an experimental benchmark and examine some meaningful problems that have not been well studied previously, <italic>e.g.</italic>, the influence of million-level training videos, vertical view angles, walking styles, and the thermal infrared modality. We believe that such a big outdoor dataset and the experimental benchmark will promote the development of gait recognition in both academic research and industrial applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gait recognition plays a special role in visual surveillance due to its unique advantage, e.g., long-distance, cross-view and non-cooperative recognition. However, it has not yet been widely applied. One reason for this awkwardness is the lack of a truly big dataset captured in practical outdoor scenarios. Here, the “big” at least means: (1) huge amount of gait videos; (2) sufficient subjects; (3) rich attributes; and (4) spatial and temporal variations. Moreover, most existing large-scale gait datasets are collected indoors, which have few challenges from real scenes, such as the dynamic and complex background clutters, illumination variations, vertical view variations, etc. In this article, we introduce a newly built big outdoor gait dataset, called CASIA-E. It contains more than one thousand people distributed over near one million videos. Each person involves 26 view angles and varied appearances caused by changes of bag carrying, dressing and walking styles. The videos are captured across five months and across three kinds of outdoor scenes. Soft biometric features are also recorded for all subjects including age, gender, height, weight, and nationality. Besides, we report an experimental benchmark and examine some meaningful problems that have not been well studied previously, e.g., the influence of million-level training videos, vertical view angles, walking styles, and the thermal infrared modality. We believe that such a big outdoor dataset and the experimental benchmark will promote the development of gait recognition in both academic research and industrial applications.", "title": "CASIA-E: A Large Comprehensive Dataset for Gait Recognition", "normalizedTitle": "CASIA-E: A Large Comprehensive Dataset for Gait Recognition", "fno": "09796582", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Biometrics Access Control", "Feature Extraction", "Gait Analysis", "Image Recognition", "26 View Angles", "Big Outdoor Dataset", "Complex Background Clutters", "Comprehensive Dataset", "Dynamic Background Clutters", "Existing Large Scale Gait Datasets", "Gait Recognition", "Gait Videos", "Illumination Variations", "Million Videos", "Million Level Training Videos", "Newly Built Big Outdoor Gait Dataset", "Outdoor Scenes", "Practical Outdoor Scenarios", "Temporal Variations", "Truly Big Dataset", "Vertical View Angles", "Vertical View Variations View Variations Etc", "Walking Styles", "Videos", "Gait Recognition", "Legged Locomotion", "Face Recognition", "Training", "Lighting", "Benchmark Testing", "Deep Learning", "Gait Dataset", "Gait Recognition", "Soft Biometrics" ], "authors": [ { "givenName": "Chunfeng", "surname": "Song", "fullName": "Chunfeng Song", "affiliation": "Center for Research on Intelligent Perception and Computing (CRIPAC), National Laboratory of Pattern Recognition (NLPR), Center for Excellence in Brain Science and Intelligence Technology (CEBSIT), Institute of Automation, Chinese Academy of Sciences (CASIA), University of Chinese Academy of Sciences (UCAS), Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yongzhen", "surname": "Huang", "fullName": "Yongzhen Huang", "affiliation": "School of Artificial Intelligence, Beijing Normal University (BNU), Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Weining", "surname": "Wang", "fullName": "Weining Wang", "affiliation": "Center for Research on Intelligent Perception and Computing (CRIPAC), National Laboratory of Pattern Recognition (NLPR), Center for Excellence in Brain Science and Intelligence Technology (CEBSIT), Institute of Automation, Chinese Academy of Sciences (CASIA), University of Chinese Academy of Sciences (UCAS), Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Liang", "surname": "Wang", "fullName": "Liang Wang", "affiliation": "Center for Research on Intelligent Perception and Computing (CRIPAC), National Laboratory of Pattern Recognition (NLPR), Center for Excellence in Brain Science and Intelligence Technology (CEBSIT), Institute of Automation, Chinese Academy of Sciences (CASIA), University of Chinese Academy of Sciences (UCAS), Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2801-2815", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/imccc/2016/1195/0/07774809", "title": "Research on Algorithm of Human Gait Recognition Based on Sparse Representation", "doi": null, "abstractUrl": "/proceedings-article/imccc/2016/07774809/12OmNvF83q9", "parentPublication": { "id": "proceedings/imccc/2016/1195/0", "title": "2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2017/4966/0/4966a059", "title": "Gait-Watch: A Context-Aware Authentication System for Smart Watch Based on Gait Recognition", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2017/4966a059/12OmNvjgWR4", "parentPublication": { "id": "proceedings/iotdi/2017/4966/0", "title": "2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572551", "title": "Effective part definition for gait identification using gait entropy image", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572551/12OmNx8wTgc", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460865", "title": "Can gait biometrics be Spoofed?", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460865/12OmNyKa61f", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2017/4822/0/482201a456", "title": "View-Normalized Gait Recognition Based on Gait Frame Difference Entropy Image", "doi": null, "abstractUrl": "/proceedings-article/cis/2017/482201a456/12OmNz4BdjU", "parentPublication": { "id": "proceedings/cis/2017/4822/0", "title": "2017 13th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460863", "title": "On including quality in applied automatic gait recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460863/12OmNzBOi01", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/02/07439821", "title": "A Comprehensive Study on Cross-View Gait Based Human Identification with Deep CNNs", "doi": null, "abstractUrl": "/journal/tp/2017/02/07439821/13rRUxAASUG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a331", "title": "Cross-Pocket Gait Recognition", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a331/17D45VObpNG", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/01/09154576", "title": "On Learning Disentangled Representations for Gait Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/01/09154576/1lZzNEsvfhu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09351667", "title": "GaitSet: Cross-View Gait Recognition Through Utilizing Gait As a Deep Set", "doi": null, "abstractUrl": "/journal/tp/2022/07/09351667/1r50n5Difbq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09774929", "articleId": "1Dlifb1d2c8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09785843", "articleId": "1DPavu2lWHS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvDI3Io", "title": "March", "year": "1993", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "15", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxYIMWa", "doi": "10.1109/34.204910", "abstract": "A mechanism for performing probabilistic reasoning in influence diagrams using interval rather than point-valued probabilities is described. Procedures for operations corresponding to conditional expectation and Bayesian conditioning in influence diagrams are derived where lower bounds on probabilities are stored at each node. The resulting bounds for the transformed diagram are shown to be the tightest possible within the class of constraints on probability distributions that can be expressed exclusively as lower bounds on the component probabilities of the diagram. Sequences of these operations can be performed to answer probabilistic queries with indeterminacies in the input and for performing sensitivity analysis on an influence diagram. The storage requirements and computational complexity of this approach are comparable to those for point-valued probabilistic inference mechanisms.", "abstracts": [ { "abstractType": "Regular", "content": "A mechanism for performing probabilistic reasoning in influence diagrams using interval rather than point-valued probabilities is described. Procedures for operations corresponding to conditional expectation and Bayesian conditioning in influence diagrams are derived where lower bounds on probabilities are stored at each node. The resulting bounds for the transformed diagram are shown to be the tightest possible within the class of constraints on probability distributions that can be expressed exclusively as lower bounds on the component probabilities of the diagram. Sequences of these operations can be performed to answer probabilistic queries with indeterminacies in the input and for performing sensitivity analysis on an influence diagram. The storage requirements and computational complexity of this approach are comparable to those for point-valued probabilistic inference mechanisms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A mechanism for performing probabilistic reasoning in influence diagrams using interval rather than point-valued probabilities is described. Procedures for operations corresponding to conditional expectation and Bayesian conditioning in influence diagrams are derived where lower bounds on probabilities are stored at each node. The resulting bounds for the transformed diagram are shown to be the tightest possible within the class of constraints on probability distributions that can be expressed exclusively as lower bounds on the component probabilities of the diagram. Sequences of these operations can be performed to answer probabilistic queries with indeterminacies in the input and for performing sensitivity analysis on an influence diagram. The storage requirements and computational complexity of this approach are comparable to those for point-valued probabilistic inference mechanisms.", "title": "Probability Intervals Over Influence Diagrams", "normalizedTitle": "Probability Intervals Over Influence Diagrams", "fno": "i0280", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Influence Diagrams Probabilistic Reasoning Conditional Expectation Bayesian Conditioning Lower Bounds Probability Distributions Probabilistic Queries Sensitivity Analysis Computational Complexity Point Valued Probabilistic Inference Mechanisms Bayes Methods Inference Mechanisms Probability Sensitivity Analysis Uncertainty Handling" ], "authors": [ { "givenName": "K.W.", "surname": "Fertig", "fullName": "K.W. Fertig", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "J.S.", "surname": "Breese", "fullName": "J.S. Breese", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "03", "pubDate": "1993-03-01 00:00:00", "pubType": "trans", "pages": "280-286", "year": "1993", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0275", "articleId": "13rRUwdIOVG", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0287", "articleId": "13rRUIJuxw6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1wTiG92JyP6", "title": "June", "year": "2021", "issueNum": "03", "idPrefix": "ai", "pubType": "journal", "volume": "2", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ua0q5D18Yg", "doi": "10.1109/TAI.2021.3086046", "abstract": "We present a theoretical framework of probabilistic learning derived from the <italic>maximum probability (MP) theorem</italic> shown in this article. In this probabilistic framework, a model is defined as an <italic>event</italic> in the probability space, and a model or the associated <italic>event</italic>&#x2014;either the true underlying model or the parameterized model&#x2014;has a quantified probability measure. This quantification of a model&#x0027;s probability measure is derived by the <italic>MP theorem</italic>, in which we have shown that an event&#x0027;s probability measure has an upper bound given its conditional distribution on an arbitrary random variable. Through this alternative framework, the notion of model parameters is encompassed in the definition of the model or the associated <italic>event</italic>. Therefore, this framework deviates from the conventional approach of assuming a prior on the model parameters. Instead, the regularizing effects of assuming prior over parameters are imposed through maximizing probabilities of models or, according to information theory, minimizing the information content of a model. The probability of a model in our framework is invariant to reparameterization and is solely dependent on the model&#x0027;s likelihood function. In addition, rather than maximizing the posterior in a conventional Bayesian setting, the objective function in our alternative framework is defined as the probability of set operations (e.g., intersection) on the <italic>event</italic> of the true underlying model and the <italic>event</italic> of the model at hand. Our theoretical framework adds clarity to probabilistic learning through solidifying the definition of probabilistic models, quantifying their probabilities, and providing a visual understanding of objective functions.</p> <p><italic>Impact Statement</italic>&#x2014;The choice of prior distribution over the parameters of probabilistic machine learning models determines the regularization of learning algorithms in the Bayesian perspective. The complexity in choice of prior over the parameters and the form of regularization is relative to the complexity of the models being used. Thereby, finding priors for parameters of complex models is often not tractable. We address this problem by uncovering the maximum probability (MP) theorem as a direct consequence of Kolmogorov&#x0027;s probability theory. Through the lens of the MP theorem, the process of regularizing models is understood and automated. The regularization process is defined as the maximization of the probability of the model. The probability of the model is understood by the MP theorem and is determined by the behavior of the model. The effects of maximizing the probability of the model can be backpropagated in a gradient-based optimization process. Consequently, the MP framework provides a form of black-box regularization and eliminates the need for case-by-case analysis of models to determine priors.", "abstracts": [ { "abstractType": "Regular", "content": "We present a theoretical framework of probabilistic learning derived from the <italic>maximum probability (MP) theorem</italic> shown in this article. In this probabilistic framework, a model is defined as an <italic>event</italic> in the probability space, and a model or the associated <italic>event</italic>&#x2014;either the true underlying model or the parameterized model&#x2014;has a quantified probability measure. This quantification of a model&#x0027;s probability measure is derived by the <italic>MP theorem</italic>, in which we have shown that an event&#x0027;s probability measure has an upper bound given its conditional distribution on an arbitrary random variable. Through this alternative framework, the notion of model parameters is encompassed in the definition of the model or the associated <italic>event</italic>. Therefore, this framework deviates from the conventional approach of assuming a prior on the model parameters. Instead, the regularizing effects of assuming prior over parameters are imposed through maximizing probabilities of models or, according to information theory, minimizing the information content of a model. The probability of a model in our framework is invariant to reparameterization and is solely dependent on the model&#x0027;s likelihood function. In addition, rather than maximizing the posterior in a conventional Bayesian setting, the objective function in our alternative framework is defined as the probability of set operations (e.g., intersection) on the <italic>event</italic> of the true underlying model and the <italic>event</italic> of the model at hand. Our theoretical framework adds clarity to probabilistic learning through solidifying the definition of probabilistic models, quantifying their probabilities, and providing a visual understanding of objective functions.</p> <p><italic>Impact Statement</italic>&#x2014;The choice of prior distribution over the parameters of probabilistic machine learning models determines the regularization of learning algorithms in the Bayesian perspective. The complexity in choice of prior over the parameters and the form of regularization is relative to the complexity of the models being used. Thereby, finding priors for parameters of complex models is often not tractable. We address this problem by uncovering the maximum probability (MP) theorem as a direct consequence of Kolmogorov&#x0027;s probability theory. Through the lens of the MP theorem, the process of regularizing models is understood and automated. The regularization process is defined as the maximization of the probability of the model. The probability of the model is understood by the MP theorem and is determined by the behavior of the model. The effects of maximizing the probability of the model can be backpropagated in a gradient-based optimization process. Consequently, the MP framework provides a form of black-box regularization and eliminates the need for case-by-case analysis of models to determine priors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a theoretical framework of probabilistic learning derived from the maximum probability (MP) theorem shown in this article. In this probabilistic framework, a model is defined as an event in the probability space, and a model or the associated event—either the true underlying model or the parameterized model—has a quantified probability measure. This quantification of a model's probability measure is derived by the MP theorem, in which we have shown that an event's probability measure has an upper bound given its conditional distribution on an arbitrary random variable. Through this alternative framework, the notion of model parameters is encompassed in the definition of the model or the associated event. Therefore, this framework deviates from the conventional approach of assuming a prior on the model parameters. Instead, the regularizing effects of assuming prior over parameters are imposed through maximizing probabilities of models or, according to information theory, minimizing the information content of a model. The probability of a model in our framework is invariant to reparameterization and is solely dependent on the model's likelihood function. In addition, rather than maximizing the posterior in a conventional Bayesian setting, the objective function in our alternative framework is defined as the probability of set operations (e.g., intersection) on the event of the true underlying model and the event of the model at hand. Our theoretical framework adds clarity to probabilistic learning through solidifying the definition of probabilistic models, quantifying their probabilities, and providing a visual understanding of objective functions. Impact Statement—The choice of prior distribution over the parameters of probabilistic machine learning models determines the regularization of learning algorithms in the Bayesian perspective. The complexity in choice of prior over the parameters and the form of regularization is relative to the complexity of the models being used. Thereby, finding priors for parameters of complex models is often not tractable. We address this problem by uncovering the maximum probability (MP) theorem as a direct consequence of Kolmogorov's probability theory. Through the lens of the MP theorem, the process of regularizing models is understood and automated. The regularization process is defined as the maximization of the probability of the model. The probability of the model is understood by the MP theorem and is determined by the behavior of the model. The effects of maximizing the probability of the model can be backpropagated in a gradient-based optimization process. Consequently, the MP framework provides a form of black-box regularization and eliminates the need for case-by-case analysis of models to determine priors.", "title": "Maximum Probability Theorem: A Framework for Probabilistic Machine Learning", "normalizedTitle": "Maximum Probability Theorem: A Framework for Probabilistic Machine Learning", "fno": "09446965", "hasPdf": true, "idPrefix": "ai", "keywords": [ "Bayes Methods", "Probability", "Random Processes", "Maximum Probability Theorem", "Probabilistic Learning", "Probabilistic Framework", "Probability Space", "Parameterized Model", "Quantified Probability Measure", "MP Theorem", "Conventional Bayesian Setting", "Objective Function", "Probabilistic Machine Learning Models", "Complex Models", "Kolmogorov Probability Theory", "Regularizing Models", "Arbitrary Random Variable", "Random Variables", "Bayes Methods", "Probabilistic Logic", "Machine Learning", "Linear Programming", "Entropy", "Complexity Theory", "Artificial Intelligence", "Information Theory", "Objective Functions", "Prior Knowledge", "Probabilistic Machine Learning", "Regularization", "Uncertainty" ], "authors": [ { "givenName": "Amir Emad", "surname": "Marvasti", "fullName": "Amir Emad Marvasti", "affiliation": "Computational Imaging Lab, University of Central Florida, Orlando, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ehsan Emad", "surname": "Marvasti", "fullName": "Ehsan Emad Marvasti", "affiliation": "Department of Computer Science, University of Central Florida, Orlando, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ulas", "surname": "Bagci", "fullName": "Ulas Bagci", "affiliation": "Center for Research in Computer Vision, University of Central Florida, Orlando, FL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Hassan", "surname": "Foroosh", "fullName": "Hassan Foroosh", "affiliation": "Department of Computer Science, University of Central Florida, Orlando, FL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2021-07-01 00:00:00", "pubType": "trans", "pages": "214-227", "year": "2021", "issn": "2691-4581", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wkdd/2010/5397/0/05432568", "title": "Using Maximum Margin Criterion and Minimax Probability Machine for Document Classification", "doi": null, "abstractUrl": "/proceedings-article/wkdd/2010/05432568/12OmNBKEynl", "parentPublication": { "id": "proceedings/wkdd/2010/5397/0", "title": "2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/2017/3018/0/08005137", "title": "A convenient category for higher-order probability theory", "doi": null, "abstractUrl": "/proceedings-article/lics/2017/08005137/12OmNsd6vjY", "parentPublication": { "id": "proceedings/lics/2017/3018/0", "title": "2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2010/7964/0/05576237", "title": "A Summary on Fuzzy Probability Theory", "doi": null, "abstractUrl": "/proceedings-article/grc/2010/05576237/12OmNvAAtvG", "parentPublication": { "id": "proceedings/grc/2010/7964/0", "title": "2010 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecrts/2012/2032/0/06257570", "title": "An Analytical Bound for Probabilistic Deadlines", "doi": null, "abstractUrl": "/proceedings-article/ecrts/2012/06257570/12OmNwHhoXC", "parentPublication": { "id": "proceedings/ecrts/2012/2032/0", "title": "24th Euromicro Conference on Real-Time Systems (ECRTS 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044429", "title": "Modernizing probability and statistics engineering curricula", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044429/12OmNwtEENJ", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004213", "title": "PGMHD: A scalable probabilistic graphical model for massive hierarchical data problems", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004213/12OmNx7ov4h", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/09/08440051", "title": "Efficient Multi-Class Probabilistic SVMs on GPUs", "doi": null, "abstractUrl": "/journal/tk/2019/09/08440051/13rRUxd2aZA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/08/08428434", "title": "An Efficient Algorithm to Compute a Quantum Probability Space", "doi": null, "abstractUrl": "/journal/tk/2019/08/08428434/13rRUxlgy4e", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/07/07420741", "title": "Improving Construction of Conditional Probability Tables for Ranked Nodes in Bayesian Networks", "doi": null, "abstractUrl": "/journal/tk/2016/07/07420741/13rRUzp02oQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400c119", "title": "Efficient Multi-Class Probabilistic SVMs on GPUs", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400c119/1aDT0EFFmIU", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09536774", "articleId": "1wTiHvy5xHW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09431709", "articleId": "1tB9gSTNPmU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBqMDkF", "title": "September/October", "year": "2017", "issueNum": "05", "idPrefix": "cg", "pubType": "magazine", "volume": "37", "label": "September/October", "downloadables": { "hasCover": true, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyg2jNt", "doi": "10.1109/MCG.2017.3621218", "abstract": "Ellen Jantzen, the artist (www.ellenjantzen.com), works with geographic composition that focuses attention on graphic elements in a scene, which might make her career particularly interesting to those working with geographic data and visualization. Her work explores reality and time, both how it is experienced and revealed, and the healing powers of the natural environment.", "abstracts": [ { "abstractType": "Regular", "content": "Ellen Jantzen, the artist (www.ellenjantzen.com), works with geographic composition that focuses attention on graphic elements in a scene, which might make her career particularly interesting to those working with geographic data and visualization. Her work explores reality and time, both how it is experienced and revealed, and the healing powers of the natural environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ellen Jantzen, the artist (www.ellenjantzen.com), works with geographic composition that focuses attention on graphic elements in a scene, which might make her career particularly interesting to those working with geographic data and visualization. Her work explores reality and time, both how it is experienced and revealed, and the healing powers of the natural environment.", "title": "Coming Into Focus: An Interview with Ellen Jantzen", "normalizedTitle": "Coming Into Focus: An Interview with Ellen Jantzen", "fno": "mcg2017050005", "hasPdf": true, "idPrefix": "cg", "keywords": [ "Interviews", "Visualization", "Computer Graphics", "Art Science Collaborations", "Digital Art" ], "authors": [ { "givenName": "Bruce D.", "surname": "Campbell", "fullName": "Bruce D. Campbell", "affiliation": "Rhode Island School of Design", "__typename": "ArticleAuthorType" }, { "givenName": "Francesca", "surname": "Samsel", "fullName": "Francesca Samsel", "affiliation": "University of Texas Austin", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "05", "pubDate": "2017-09-01 00:00:00", "pubType": "mags", "pages": "5-8", "year": "2017", "issn": "0272-1716", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/svr/2013/5001/0/06655801", "title": "Art Making Using an Haptic Device for Interactive Digital Painting", "doi": null, "abstractUrl": "/proceedings-article/svr/2013/06655801/12OmNBUAvWs", "parentPublication": { "id": "proceedings/svr/2013/5001/0", "title": "2013 XV Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2016/2305/0/2305a156", "title": "Artist-Drawing Inspired Automatic Sketch Portrait Rendering", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a156/12OmNylsZOF", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/01/mcg2015010006", "title": "Pursuing Value in Art-Science Collaborations", "doi": null, "abstractUrl": "/magazine/cg/2015/01/mcg2015010006/13rRUx0Pqv6", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/12/07369991", "title": "The Elicitation Interview Technique: Capturing People's Experiences of Data Representations", "doi": null, "abstractUrl": "/journal/tg/2016/12/07369991/13rRUxBa5s2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/01/mcg2008010004", "title": "From Chemicals to Creation [About the cover]", "doi": null, "abstractUrl": "/magazine/cg/2008/01/mcg2008010004/13rRUxjyX9C", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2018/01/mpc2018010060", "title": "An Interview with Richard E. Ladner", "doi": null, "abstractUrl": "/magazine/pc/2018/01/mpc2018010060/13rRUyYSWpP", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2011/03/mco2011030096", "title": "Computer Science: An Interview", "doi": null, "abstractUrl": "/magazine/co/2011/03/mco2011030096/13rRUyg2jRe", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soca/2018/9133/0/913300a137", "title": "An Expert Interview Study on Areas of Microservice Design", "doi": null, "abstractUrl": "/proceedings-article/soca/2018/913300a137/17D45WUj918", "parentPublication": { "id": "proceedings/soca/2018/9133/0", "title": "2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/01/09693361", "title": "Nathalie Miebach: Sculpted Data Infused With Craftsmanship", "doi": null, "abstractUrl": "/magazine/cg/2022/01/09693361/1As7BQ6zkha", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552177", "title": "Towards Understanding Sensory Substitution for Accessible Visualization: An Interview Study", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552177/1xic9a4I0pi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mcg2017050003", "articleId": "13rRUygT7cO", "__typename": "AdjacentArticleType" }, "next": { "fno": "mcg2017050009", "articleId": "13rRUx0xQ1Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwFid7w", "title": "Jan.", "year": "2019", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "25", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WZZ7Gl", "doi": "10.1109/TVCG.2018.2864914", "abstract": "Many real-world datasets are incomplete due to factors such as data collection failures or misalignments between fused datasets. Visualizations of incomplete datasets should allow analysts to draw conclusions from their data while effectively reasoning about the quality of the data and resulting conclusions. We conducted a pair of crowdsourced studies to measure how the methods used to impute and visualize missing data may influence analysts' perceptions of data quality and their confidence in their conclusions. Our experiments used different design choices for line graphs and bar charts to estimate averages and trends in incomplete time series datasets. Our results provide preliminary guidance for visualization designers to consider when working with incomplete data in different domains and scenarios.", "abstracts": [ { "abstractType": "Regular", "content": "Many real-world datasets are incomplete due to factors such as data collection failures or misalignments between fused datasets. Visualizations of incomplete datasets should allow analysts to draw conclusions from their data while effectively reasoning about the quality of the data and resulting conclusions. We conducted a pair of crowdsourced studies to measure how the methods used to impute and visualize missing data may influence analysts' perceptions of data quality and their confidence in their conclusions. Our experiments used different design choices for line graphs and bar charts to estimate averages and trends in incomplete time series datasets. Our results provide preliminary guidance for visualization designers to consider when working with incomplete data in different domains and scenarios.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many real-world datasets are incomplete due to factors such as data collection failures or misalignments between fused datasets. Visualizations of incomplete datasets should allow analysts to draw conclusions from their data while effectively reasoning about the quality of the data and resulting conclusions. We conducted a pair of crowdsourced studies to measure how the methods used to impute and visualize missing data may influence analysts' perceptions of data quality and their confidence in their conclusions. Our experiments used different design choices for line graphs and bar charts to estimate averages and trends in incomplete time series datasets. Our results provide preliminary guidance for visualization designers to consider when working with incomplete data in different domains and scenarios.", "title": "Where&#x0027;s My Data? Evaluating Visualizations with Missing Data", "normalizedTitle": "Where's My Data? Evaluating Visualizations with Missing Data", "fno": "08440857", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Bar Charts", "Data Analysis", "Data Visualisation", "Graph Theory", "Time Series", "Data Quality", "Visualization Designers", "Evaluating Visualizations", "Data Collection Failures", "Time Series Datasets", "Data Analysts Perception", "Line Graphs", "Bar Charts", "Data Visualization", "Data Integrity", "Interpolation", "Visualization", "Bars", "Encoding", "Time Series Analysis", "Information Visualization", "Graphical Perception", "Time Series Data", "Data Wrangling", "Imputation" ], "authors": [ { "givenName": "Hayeong", "surname": "Song", "fullName": "Hayeong Song", "affiliation": "University of Colorado", "__typename": "ArticleAuthorType" }, { "givenName": "Danielle Albers", "surname": "Szafir", "fullName": "Danielle Albers Szafir", "affiliation": "University of Colorado", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2019-01-01 00:00:00", "pubType": "trans", "pages": "914-924", "year": "2019", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a242", "title": "Visualizing Missing Values", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a242/12OmNAolGTR", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/08/07563865", "title": "How Progressive Visualizations Affect Exploratory Analysis", "doi": null, "abstractUrl": "/journal/tg/2017/08/07563865/13rRUNvya9q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/07/08354901", "title": "Task-Based Effectiveness of Basic Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/07/08354901/13rRUwd9CLU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440818", "title": "Looks Good To Me: Visualizations As Sanity Checks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440818/17D45W2WyxG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a726", "title": "Research on Missing Data Imputation Based on Conditional Variational Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a726/1BmO5p4bZ8k", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903288", "title": "Data Hunches: Incorporating Personal Knowledge into Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903288/1GZoks2MXAY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09916137", "title": "Revisiting the Design Patterns of Composite Visualizations", "doi": null, "abstractUrl": "/journal/tg/5555/01/09916137/1HojAjSAGNq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10008084", "title": "Tasks and Visualizations Used for Data Profiling: A Survey and Interview Study", "doi": null, "abstractUrl": "/journal/tg/5555/01/10008084/1JIoM5ABwoU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a303", "title": "Visual Imputation Analytics for Missing Time-Series Data in Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a303/1jdDwCsHB16", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552187", "title": "Causal Support: Modeling Causal Inferences with Visualizations", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552187/1xic7BF3mcE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08457476", "articleId": "17D45WaTkcP", "__typename": "AdjacentArticleType" }, "next": { "fno": "08449328", "articleId": "17D45Wuc366", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxwENDW", "title": "March", "year": "2014", "issueNum": "01", "idPrefix": "th", "pubType": "journal", "volume": "7", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxAASW5", "doi": "10.1109/TOH.2013.60", "abstract": "When grasping and manipulating objects, people are able to efficiently modulate their grip force according to the experienced load force. Effective grip force control involves providing enough grip force to prevent the object from slipping, while avoiding excessive force to avoid damage and fatigue. During indirect object manipulation via teleoperation systems or in virtual environments, users often receive limited somatosensory feedback about objects with which they interact. This study examines the effects of force feedback, accuracy demands, and training on grip force control during object interaction in a virtual environment. The task required subjects to grasp and move a virtual object while tracking a target. When force feedback was not provided, subjects failed to couple grip and load force, a capability fundamental to direct object interaction. Subjects also exerted larger grip force without force feedback and when accuracy demands of the tracking task were high. In addition, the presence or absence of force feedback during training affected subsequent performance, even when the feedback condition was switched. Subjects' grip force control remained reminiscent of their employed grip during the initial training. These results motivate the use of force feedback during telemanipulation and highlight the effect of force feedback during training.", "abstracts": [ { "abstractType": "Regular", "content": "When grasping and manipulating objects, people are able to efficiently modulate their grip force according to the experienced load force. Effective grip force control involves providing enough grip force to prevent the object from slipping, while avoiding excessive force to avoid damage and fatigue. During indirect object manipulation via teleoperation systems or in virtual environments, users often receive limited somatosensory feedback about objects with which they interact. This study examines the effects of force feedback, accuracy demands, and training on grip force control during object interaction in a virtual environment. The task required subjects to grasp and move a virtual object while tracking a target. When force feedback was not provided, subjects failed to couple grip and load force, a capability fundamental to direct object interaction. Subjects also exerted larger grip force without force feedback and when accuracy demands of the tracking task were high. In addition, the presence or absence of force feedback during training affected subsequent performance, even when the feedback condition was switched. Subjects' grip force control remained reminiscent of their employed grip during the initial training. These results motivate the use of force feedback during telemanipulation and highlight the effect of force feedback during training.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When grasping and manipulating objects, people are able to efficiently modulate their grip force according to the experienced load force. Effective grip force control involves providing enough grip force to prevent the object from slipping, while avoiding excessive force to avoid damage and fatigue. During indirect object manipulation via teleoperation systems or in virtual environments, users often receive limited somatosensory feedback about objects with which they interact. This study examines the effects of force feedback, accuracy demands, and training on grip force control during object interaction in a virtual environment. The task required subjects to grasp and move a virtual object while tracking a target. When force feedback was not provided, subjects failed to couple grip and load force, a capability fundamental to direct object interaction. Subjects also exerted larger grip force without force feedback and when accuracy demands of the tracking task were high. In addition, the presence or absence of force feedback during training affected subsequent performance, even when the feedback condition was switched. Subjects' grip force control remained reminiscent of their employed grip during the initial training. These results motivate the use of force feedback during telemanipulation and highlight the effect of force feedback during training.", "title": "Grip Force Control during Virtual Object Interaction: Effect of Force Feedback, Accuracy Demands, and Training", "normalizedTitle": "Grip Force Control during Virtual Object Interaction: Effect of Force Feedback, Accuracy Demands, and Training", "fno": "06674293", "hasPdf": true, "idPrefix": "th", "keywords": [ "Force", "Force Feedback", "Transducers", "Virtual Environments", "Springs", "Force Measurement", "Teleoperation", "Grip Force Modulation", "Force Feedback", "Virtual Environment" ], "authors": [ { "givenName": "Tricia L.", "surname": "Gibo", "fullName": "Tricia L. Gibo", "affiliation": "Dept. of Mech. Eng., Johns Hopkins Univ., Baltimore, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Amy J.", "surname": "Bastian", "fullName": "Amy J. Bastian", "affiliation": "G05-Motion Anal. Lab., Kennedy Krieger Inst., Baltimore, MD, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Allison M.", "surname": "Okamura", "fullName": "Allison M. Okamura", "affiliation": "Dept. of Mech. Eng., Stanford Univ., Stanford, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2014-01-01 00:00:00", "pubType": "trans", "pages": "37-47", "year": "2014", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2014/3624/0/06798843", "title": "The Virtual Mitten: A novel interaction paradigm for visuo-haptic manipulation of objects using grip force", "doi": null, "abstractUrl": "/proceedings-article/3dui/2014/06798843/12OmNAWH9Bf", "parentPublication": { "id": "proceedings/3dui/2014/3624/0", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptic/2006/0226/0/01627063", "title": "Event-Based Haptic Tapping with Grip Force Compensation", "doi": null, "abstractUrl": "/proceedings-article/haptic/2006/01627063/12OmNsd6vj8", "parentPublication": { "id": "proceedings/haptic/2006/0226/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/whc/2007/2738/0/04145189", "title": "Effects of Translational and Gripping Force Feedback are Decoupled in a 4-Degree-of-Freedom Telemanipulator", "doi": null, "abstractUrl": "/proceedings-article/whc/2007/04145189/12OmNwdtwdo", "parentPublication": { "id": "proceedings/whc/2007/2738/0", "title": "2007 2nd Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environments and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2006/0226/0/02260019", "title": "Event-Based Haptic Tapping with Grip Force Compensation", "doi": null, "abstractUrl": "/proceedings-article/haptics/2006/02260019/12OmNyeECw4", "parentPublication": { "id": "proceedings/haptics/2006/0226/0", "title": "2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/01/07479565", "title": "Effects of Grip-Force, Contact, and Acceleration Feedback on a Teleoperated Pick-and-Place Task", "doi": null, "abstractUrl": "/journal/th/2017/01/07479565/13rRUIM2VBS", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2011/03/tth2011030167", "title": "Effect of Grip Force and Training in Unstable Dynamics on Micromanipulation Accuracy", "doi": null, "abstractUrl": "/journal/th/2011/03/tth2011030167/13rRUwcS1D5", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2013/03/tth2013030309", "title": "Human Force Discrimination during Active Arm Motion for Force Feedback Design", "doi": null, "abstractUrl": "/journal/th/2013/03/tth2013030309/13rRUygT7yj", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2016/02/07401066", "title": "Anticipatory Vibrotactile Cueing Facilitates Grip Force Adjustment during Perturbative Loading", "doi": null, "abstractUrl": "/journal/th/2016/02/07401066/13rRUyueghh", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2022/5490/0/10086023", "title": "Grip Force as a Measure of Stress in Psychomotor Mobile Tasks", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2022/10086023/1M669m2FxxC", "parentPublication": { "id": "proceedings/aciiw/2022/5490/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090536", "title": "Elastic-Move: Passive Haptic Device with Force Feedback for Virtual Reality Locomotion", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090536/1jIxqFQXvSE", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06750756", "articleId": "13rRUwdrdKP", "__typename": "AdjacentArticleType" }, "next": { "fno": "06737331", "articleId": "13rRUy2YLT8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyq0zFp", "title": "July-December", "year": "2008", "issueNum": "02", "idPrefix": "th", "pubType": "journal", "volume": "1", "label": "July-December", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwIF6dX", "doi": "10.1109/TOH.2008.16", "abstract": "We investigate the potential role of haptics in climate visualization. In existing approaches to climate visualization, different dimensions of climate data such as temperature, humidity, wind, precipitation, and cloud water are typically represented using different visual markers and dimensions such as color, size, intensity, and orientation. Since the number of dimensions in climate data is large and climate data needs to be represented in connection with the topography, purely visual representations overwhelm users. Rather than overloading the visual channel, we investigate an alternative approach in which some of the climate information is displayed through the haptic channel in order to alleviate the perceptual and cognitive load of the user. In this approach, haptic feedback is further used to provide guidance while exploring climate data in order to enable natural and intuitive learning of cause and effect relationships between climate variables. Our experiments with 33 human subjects show that haptic feedback significantly improves the understanding of climate data and the cause and effect relations between climate variables as well as the interpretation of the variations in climate due to changes in terrain.", "abstracts": [ { "abstractType": "Regular", "content": "We investigate the potential role of haptics in climate visualization. In existing approaches to climate visualization, different dimensions of climate data such as temperature, humidity, wind, precipitation, and cloud water are typically represented using different visual markers and dimensions such as color, size, intensity, and orientation. Since the number of dimensions in climate data is large and climate data needs to be represented in connection with the topography, purely visual representations overwhelm users. Rather than overloading the visual channel, we investigate an alternative approach in which some of the climate information is displayed through the haptic channel in order to alleviate the perceptual and cognitive load of the user. In this approach, haptic feedback is further used to provide guidance while exploring climate data in order to enable natural and intuitive learning of cause and effect relationships between climate variables. Our experiments with 33 human subjects show that haptic feedback significantly improves the understanding of climate data and the cause and effect relations between climate variables as well as the interpretation of the variations in climate due to changes in terrain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We investigate the potential role of haptics in climate visualization. In existing approaches to climate visualization, different dimensions of climate data such as temperature, humidity, wind, precipitation, and cloud water are typically represented using different visual markers and dimensions such as color, size, intensity, and orientation. Since the number of dimensions in climate data is large and climate data needs to be represented in connection with the topography, purely visual representations overwhelm users. Rather than overloading the visual channel, we investigate an alternative approach in which some of the climate information is displayed through the haptic channel in order to alleviate the perceptual and cognitive load of the user. In this approach, haptic feedback is further used to provide guidance while exploring climate data in order to enable natural and intuitive learning of cause and effect relationships between climate variables. Our experiments with 33 human subjects show that haptic feedback significantly improves the understanding of climate data and the cause and effect relations between climate variables as well as the interpretation of the variations in climate due to changes in terrain.", "title": "Using Haptics to Convey Cause-and-Effect Relations in Climate Visualization", "normalizedTitle": "Using Haptics to Convey Cause-and-Effect Relations in Climate Visualization", "fno": "tth2008020130", "hasPdf": true, "idPrefix": "th", "keywords": [ "Data And Information Visualization", "Education", "Human Computer Interaction", "Human Factors" ], "authors": [ { "givenName": "Nesra", "surname": "Yannier", "fullName": "Nesra Yannier", "affiliation": "Koc University, Istanbul", "__typename": "ArticleAuthorType" }, { "givenName": "Cagatay", "surname": "Basdogan", "fullName": "Cagatay Basdogan", "affiliation": "Koc University, Istanbul", "__typename": "ArticleAuthorType" }, { "givenName": "Serdar", "surname": "Tasiran", "fullName": "Serdar Tasiran", "affiliation": "Koc University, Istanbul", "__typename": "ArticleAuthorType" }, { "givenName": "Omer Lutfi", "surname": "Sen", "fullName": "Omer Lutfi Sen", "affiliation": "Istanbul Technical University, Istanbul", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2008-07-01 00:00:00", "pubType": "trans", "pages": "130-141", "year": "2008", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hicss/1994/5090/4/00323480", "title": "Measurement of the climate for creativity in IS organizations", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323480/12OmNx8wTpY", "parentPublication": { "id": "proceedings/hicss/1994/5090/4", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004058", "title": "Information Visualization in Climate Research", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004058/12OmNyO8tVC", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539195", "title": "Haptics in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539195/12OmNyQ7G3s", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673497", "title": "Climate in undergraduate engineering education from 1995 to 2009", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673497/12OmNz4Bdrq", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2009/03/tth2009030123", "title": "Putting Haptics into the Ambience", "doi": null, "abstractUrl": "/journal/th/2009/03/tth2009030123/13rRUNvyakW", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/01/06750756", "title": "Exploring the Role of Haptic Feedback in Enabling Implicit HCI-Based Bookmarking", "doi": null, "abstractUrl": "/journal/th/2014/01/06750756/13rRUwdrdKP", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2015/01/mmu2015010041", "title": "Designing an Interactive Audio Interface for Climate Science", "doi": null, "abstractUrl": "/magazine/mu/2015/01/mmu2015010041/13rRUwdrdMQ", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2015/04/07182778", "title": "Volume Haptics with Topology-Consistent Isosurfaces", "doi": null, "abstractUrl": "/journal/th/2015/04/07182778/13rRUypp57K", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a905", "title": "Haptics in VR Using Origami-Augmented Drones", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a905/1J7WrPcWIVO", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visap/2019/5027/0/08900829", "title": "Data Manifestation: Merging the Human World &#x0026; Global Climate Change", "doi": null, "abstractUrl": "/proceedings-article/visap/2019/08900829/1eXazcVttni", "parentPublication": { "id": "proceedings/visap/2019/5027/0", "title": "2019 IEEE VIS Arts Program (VISAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "tth2008020121", "articleId": "13rRUxZRbo6", "__typename": "AdjacentArticleType" }, "next": { "fno": "th08", "articleId": "13rRUwInv4w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvkpkSQ", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "ta", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Iz0JTbEyaY", "doi": "10.1109/TAFFC.2022.3223030", "abstract": "For affective computing to have an impact outside the laboratory, facial expressions must be studied in rich naturalistic situations. We argue negotiations are one such situation as they are ubiquitous in daily life, often evoke strong emotions, and perceived emotion shapes decisions and outcomes. Negotiations are a growing focus in AI research and applications, including agents that negotiate directly with people and attempt to use affective information. We introduce the DyNego-WOZ Corpus, which includes dyadic negotiation between participants and wizard-controlled virtual humans. We demonstrate the value of this corpus to the affective computing community by examining participants&#x0027; facial expressions in response to a virtual human negotiation partner. We show that people&#x0027;s facial expressions typically co-occur with the end of their partner&#x0027;s speech (suggesting they reflect a reaction to the content of this speech), that these reactions do not correspond to prototypical <italic>emotional</italic> expressions, and that these reactions can help predict the expresser&#x0027;s subsequent action. We highlight challenges in working with such naturalistic data, including difficulties of expression recognition during speech, and the extreme variability of expressions, both across participants and within a negotiation. Our findings reinforce arguments that facial expressions convey more than emotional state but serve important communicative functions.", "abstracts": [ { "abstractType": "Regular", "content": "For affective computing to have an impact outside the laboratory, facial expressions must be studied in rich naturalistic situations. We argue negotiations are one such situation as they are ubiquitous in daily life, often evoke strong emotions, and perceived emotion shapes decisions and outcomes. Negotiations are a growing focus in AI research and applications, including agents that negotiate directly with people and attempt to use affective information. We introduce the DyNego-WOZ Corpus, which includes dyadic negotiation between participants and wizard-controlled virtual humans. We demonstrate the value of this corpus to the affective computing community by examining participants&#x0027; facial expressions in response to a virtual human negotiation partner. We show that people&#x0027;s facial expressions typically co-occur with the end of their partner&#x0027;s speech (suggesting they reflect a reaction to the content of this speech), that these reactions do not correspond to prototypical <italic>emotional</italic> expressions, and that these reactions can help predict the expresser&#x0027;s subsequent action. We highlight challenges in working with such naturalistic data, including difficulties of expression recognition during speech, and the extreme variability of expressions, both across participants and within a negotiation. Our findings reinforce arguments that facial expressions convey more than emotional state but serve important communicative functions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For affective computing to have an impact outside the laboratory, facial expressions must be studied in rich naturalistic situations. We argue negotiations are one such situation as they are ubiquitous in daily life, often evoke strong emotions, and perceived emotion shapes decisions and outcomes. Negotiations are a growing focus in AI research and applications, including agents that negotiate directly with people and attempt to use affective information. We introduce the DyNego-WOZ Corpus, which includes dyadic negotiation between participants and wizard-controlled virtual humans. We demonstrate the value of this corpus to the affective computing community by examining participants' facial expressions in response to a virtual human negotiation partner. We show that people's facial expressions typically co-occur with the end of their partner's speech (suggesting they reflect a reaction to the content of this speech), that these reactions do not correspond to prototypical emotional expressions, and that these reactions can help predict the expresser's subsequent action. We highlight challenges in working with such naturalistic data, including difficulties of expression recognition during speech, and the extreme variability of expressions, both across participants and within a negotiation. Our findings reinforce arguments that facial expressions convey more than emotional state but serve important communicative functions.", "title": "Exploring the Function of Expressions in Negotiation: the DyNego-WOZ Corpus", "normalizedTitle": "Exploring the Function of Expressions in Negotiation: the DyNego-WOZ Corpus", "fno": "09963914", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Behavioral Sciences", "Affective Computing", "Emotion Recognition", "Task Analysis", "Speech Recognition", "Shape", "Focusing", "Emotion Recognition", "Machine Learning", "Human Computer Interaction" ], "authors": [ { "givenName": "Jessie", "surname": "Hoegen", "fullName": "Jessie Hoegen", "affiliation": "USC Institute for Creative Technologies, Los Angeles, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "David", "surname": "DeVault", "fullName": "David DeVault", "affiliation": "Anticipant Speech, Inc., Irvine, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jonathan", "surname": "Gratch", "fullName": "Jonathan Gratch", "affiliation": "USC Institute for Creative Technologies, Los Angeles, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/acii/2015/9953/0/07344583", "title": "Decoupling facial expressions and head motions in complex emotions", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344583/12OmNB9t6qd", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fbie/2008/3561/0/3561a144", "title": "Facial Expression Recognition and Synthesis on Affective Emotions Composition", "doi": null, "abstractUrl": "/proceedings-article/fbie/2008/3561a144/12OmNxuFBnP", "parentPublication": { "id": "proceedings/fbie/2008/3561/0", "title": "2008 International Seminar on Future Biomedical Information Engineering (FBIE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2017/0563/0/08273598", "title": "Toward affect-sensitive virtual human tutors: The influence of facial expressions on learning and emotion", "doi": null, "abstractUrl": "/proceedings-article/acii/2017/08273598/12OmNxzMnIS", "parentPublication": { "id": "proceedings/acii/2017/0563/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a270", "title": "HapFACS: An Open Source API/Software to Generate FACS-Based Expressions for ECAs Animation and for Corpus Generation", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a270/12OmNzXFozx", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2012/01/tta2012010032", "title": "The Belfast Induced Natural Emotion Database", "doi": null, "abstractUrl": "/journal/ta/2012/01/tta2012010032/13rRUxly9cf", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2014/03/06778017", "title": "Design of a Wearable Device for Reading Positive Expressions from Facial EMG Signals", "doi": null, "abstractUrl": "/journal/ta/2014/03/06778017/13rRUyY2937", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/02/08669797", "title": "An Architecture for Emotional Facial Expressions as Social Signals", "doi": null, "abstractUrl": "/journal/ta/2021/02/08669797/18wIYXacn3a", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900c459", "title": "Video-based multimodal spontaneous emotion recognition using facial expressions and physiological signals", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900c459/1G56VA4lzxu", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2022/5908/0/09953864", "title": "Interpretable Explainability in Facial Emotion Recognition and Gamification for Data Collection", "doi": null, "abstractUrl": "/proceedings-article/acii/2022/09953864/1IAK5ikKDPW", "parentPublication": { "id": "proceedings/acii/2022/5908/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09984983", "title": "Teardrops on My Face: Automatic Weeping Detection from Nonverbal Behavior", "doi": null, "abstractUrl": "/journal/ta/5555/01/09984983/1J6cPlJS9na", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09956021", "articleId": "1Iu21tzPc2s", "__typename": "AdjacentArticleType" }, "next": { "fno": "09964278", "articleId": "1IFEw2Sw2Zi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IAFDsRzZte", "name": "tta555501-09963914s1-supp2-3223030.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tta555501-09963914s1-supp2-3223030.pdf", "extension": "pdf", "size": "194 kB", "__typename": "WebExtraType" }, { "id": "1IAFEktuMCI", "name": "tta555501-09963914s1-supp3-3223030.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tta555501-09963914s1-supp3-3223030.pdf", "extension": "pdf", "size": "61.4 kB", "__typename": "WebExtraType" }, { "id": "1IAFEqWiohO", "name": "tta555501-09963914s1-supp1-3223030.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/tta555501-09963914s1-supp1-3223030.pdf", "extension": "pdf", "size": "83.8 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1K3XDZ8pUAg", "doi": "10.1109/TVCG.2023.3237768", "abstract": "Electronic transitions in molecules due to the absorption or emission of light is a complex quantum mechanical process. Their study plays an important role in the design of novel materials. A common yet challenging task in the study is to determine the nature of electronic transitions, namely which subgroups of the molecule are involved in the transition by donating or accepting electrons, followed by an investigation of the variation in the donor-acceptor behavior for different transitions or conformations of the molecules. In this paper, we present a novel approach for the analysis of a bivariate field and show its applicability to the study of electronic transitions. This approach is based on two novel operators, the continuous scatterplot (CSP) lens operator and the CSP peel operator, that enable effective visual analysis of bivariate fields. Both operators can be applied independently or together to facilitate analysis. The operators motivate the design of control polygon inputs to extract fiber surfaces of interest in the spatial domain. The CSPs are annotated with a quantitative measure to further support the visual analysis. We study different molecular systems and demonstrate how the CSP peel and CSP lens operators help identify and study donor and acceptor characteristics in molecular systems.", "abstracts": [ { "abstractType": "Regular", "content": "Electronic transitions in molecules due to the absorption or emission of light is a complex quantum mechanical process. Their study plays an important role in the design of novel materials. A common yet challenging task in the study is to determine the nature of electronic transitions, namely which subgroups of the molecule are involved in the transition by donating or accepting electrons, followed by an investigation of the variation in the donor-acceptor behavior for different transitions or conformations of the molecules. In this paper, we present a novel approach for the analysis of a bivariate field and show its applicability to the study of electronic transitions. This approach is based on two novel operators, the continuous scatterplot (CSP) lens operator and the CSP peel operator, that enable effective visual analysis of bivariate fields. Both operators can be applied independently or together to facilitate analysis. The operators motivate the design of control polygon inputs to extract fiber surfaces of interest in the spatial domain. The CSPs are annotated with a quantitative measure to further support the visual analysis. We study different molecular systems and demonstrate how the CSP peel and CSP lens operators help identify and study donor and acceptor characteristics in molecular systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Electronic transitions in molecules due to the absorption or emission of light is a complex quantum mechanical process. Their study plays an important role in the design of novel materials. A common yet challenging task in the study is to determine the nature of electronic transitions, namely which subgroups of the molecule are involved in the transition by donating or accepting electrons, followed by an investigation of the variation in the donor-acceptor behavior for different transitions or conformations of the molecules. In this paper, we present a novel approach for the analysis of a bivariate field and show its applicability to the study of electronic transitions. This approach is based on two novel operators, the continuous scatterplot (CSP) lens operator and the CSP peel operator, that enable effective visual analysis of bivariate fields. Both operators can be applied independently or together to facilitate analysis. The operators motivate the design of control polygon inputs to extract fiber surfaces of interest in the spatial domain. The CSPs are annotated with a quantitative measure to further support the visual analysis. We study different molecular systems and demonstrate how the CSP peel and CSP lens operators help identify and study donor and acceptor characteristics in molecular systems.", "title": "Continuous Scatterplot Operators for Bivariate Analysis and Study of Electronic Transitions", "normalizedTitle": "Continuous Scatterplot Operators for Bivariate Analysis and Study of Electronic Transitions", "fno": "10021888", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Visualization", "Orbits", "Lenses", "Pipelines", "Isosurfaces", "Space Vehicles", "Behavioral Sciences", "Bivariate Field Analysis", "Continuous Scatterplot", "Fiber Surface", "Control Polygon", "Visual Analysis", "Electronic Transitions" ], "authors": [ { "givenName": "Mohit", "surname": "Sharma", "fullName": "Mohit Sharma", "affiliation": "Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India", "__typename": "ArticleAuthorType" }, { "givenName": "Talha Bin", "surname": "Masood", "fullName": "Talha Bin Masood", "affiliation": "Department of Science and Technology (ITN), Linköping University, Norrköping, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Signe S.", "surname": "Thygesen", "fullName": "Signe S. Thygesen", "affiliation": "Department of Science and Technology (ITN), Linköping University, Norrköping, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Mathieu", "surname": "Linares", "fullName": "Mathieu Linares", "affiliation": "Department of Science and Technology (ITN), Linköping University, Norrköping, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Ingrid", "surname": "Hotz", "fullName": "Ingrid Hotz", "affiliation": "Department of Science and Technology (ITN), Linköping University, Norrköping, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Vijay", "surname": "Natarajan", "fullName": "Vijay Natarajan", "affiliation": "Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/vis/2021/3335/0/333500a096", "title": "Segmentation Driven Peeling for Visual Analysis of Electronic Transitions", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a096/1yXubIDXHuU", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10021892", "articleId": "1K3XDAtRZ8Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "10024005", "articleId": "1K9ss42cTAI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1K9stcUx2fu", "name": "ttg555501-010021888s1-supp1-3237768.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-010021888s1-supp1-3237768.pdf", "extension": "pdf", "size": "99.1 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzZmZyp", "title": "Feb.", "year": "2020", "issueNum": "02", "idPrefix": "tk", "pubType": "journal", "volume": "32", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45We0UEP", "doi": "10.1109/TKDE.2018.2883613", "abstract": "We propose a simple yet effective technique to simplify the training and the resulting model of neural networks. In back propagation, only a small subset of the full gradient is computed to update the model parameters. The gradient vectors are sparsified in such a way that only the top-k elements (in terms of magnitude) are kept. As a result, only k rows or columns (depending on the layout) of the weight matrix are modified, leading to a linear reduction in the computational cost. Based on the sparsified gradients, we further simplify the model by eliminating the rows or columns that are seldom updated, which will reduce the computational cost both in the training and decoding, and potentially accelerate decoding in real-world applications. Surprisingly, experimental results demonstrate that most of the time we only need to update fewer than 5 percent of the weights at each back propagation pass. More interestingly, the accuracy of the resulting models is actually improved rather than degraded, and a detailed analysis is given. The model simplification results show that we could adaptively simplify the model which could often be reduced by around 9x, without any loss on accuracy or even with improved accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a simple yet effective technique to simplify the training and the resulting model of neural networks. In back propagation, only a small subset of the full gradient is computed to update the model parameters. The gradient vectors are sparsified in such a way that only the top-k elements (in terms of magnitude) are kept. As a result, only k rows or columns (depending on the layout) of the weight matrix are modified, leading to a linear reduction in the computational cost. Based on the sparsified gradients, we further simplify the model by eliminating the rows or columns that are seldom updated, which will reduce the computational cost both in the training and decoding, and potentially accelerate decoding in real-world applications. Surprisingly, experimental results demonstrate that most of the time we only need to update fewer than 5 percent of the weights at each back propagation pass. More interestingly, the accuracy of the resulting models is actually improved rather than degraded, and a detailed analysis is given. The model simplification results show that we could adaptively simplify the model which could often be reduced by around 9x, without any loss on accuracy or even with improved accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a simple yet effective technique to simplify the training and the resulting model of neural networks. In back propagation, only a small subset of the full gradient is computed to update the model parameters. The gradient vectors are sparsified in such a way that only the top-k elements (in terms of magnitude) are kept. As a result, only k rows or columns (depending on the layout) of the weight matrix are modified, leading to a linear reduction in the computational cost. Based on the sparsified gradients, we further simplify the model by eliminating the rows or columns that are seldom updated, which will reduce the computational cost both in the training and decoding, and potentially accelerate decoding in real-world applications. Surprisingly, experimental results demonstrate that most of the time we only need to update fewer than 5 percent of the weights at each back propagation pass. More interestingly, the accuracy of the resulting models is actually improved rather than degraded, and a detailed analysis is given. The model simplification results show that we could adaptively simplify the model which could often be reduced by around 9x, without any loss on accuracy or even with improved accuracy.", "title": "Training Simplification and Model Simplification for Deep Learning : A Minimal Effort Back Propagation Method", "normalizedTitle": "Training Simplification and Model Simplification for Deep Learning : A Minimal Effort Back Propagation Method", "fno": "08546786", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Decoding", "Gradient Methods", "Learning Artificial Intelligence", "Matrix Algebra", "Neural Nets", "Vectors", "Propagation Method", "Neural Networks", "Model Parameters", "Gradient Vectors", "Weight Matrix", "Linear Reduction", "Computational Cost", "Sparsified Gradients", "Back Propagation Pass", "Model Simplification Results", "Training Simplification", "Deep Learning", "Top K Elements", "Backpropagation", "Computational Modeling", "Training", "Adaptation Models", "Neurons", "Computational Efficiency", "Decoding", "Neural Network", "Back Propagation", "Sparse Learning", "Model Pruning" ], "authors": [ { "givenName": "Xu", "surname": "Sun", "fullName": "Xu Sun", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of Electronics Engineering and Computer Science, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xuancheng", "surname": "Ren", "fullName": "Xuancheng Ren", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuming", "surname": "Ma", "fullName": "Shuming Ma", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bingzhen", "surname": "Wei", "fullName": "Bingzhen Wei", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Li", "fullName": "Wei Li", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jingjing", "surname": "Xu", "fullName": "Jingjing Xu", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Houfeng", "surname": "Wang", "fullName": "Houfeng Wang", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yi", "surname": "Zhang", "fullName": "Yi Zhang", "affiliation": "MOE Key Laboratory of Computational Linguistics, School of EECS, Peking University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2020-02-01 00:00:00", "pubType": "trans", "pages": "374-387", "year": "2020", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/test/1990/9064/0/00114117", "title": "Minimal overhead modification of iterative logic arrays for C-testability", "doi": null, "abstractUrl": "/proceedings-article/test/1990/00114117/12OmNAolHav", "parentPublication": { "id": "proceedings/test/1990/9064/0", "title": "1990 International Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/2014/6030/0/6030a025", "title": "Optimal Redundancy Designs for CNFET-Based Circuits", "doi": null, "abstractUrl": "/proceedings-article/ats/2014/6030a025/12OmNrnJ6LQ", "parentPublication": { "id": "proceedings/ats/2014/6030/0", "title": "2014 IEEE 23rd Asian Test Symposium (ATS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/1988/0869/0/00122563", "title": "Diagnosis and repair of memory with coupling faults", "doi": null, "abstractUrl": "/proceedings-article/iccad/1988/00122563/12OmNvAAtqk", "parentPublication": { "id": "proceedings/iccad/1988/0869/0", "title": "1988 IEEE International Conference on Computer-Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwsi/1992/2482/0/00171812", "title": "Yield optimization of redundant multimegabit RAM's using the center-satellite model", "doi": null, "abstractUrl": "/proceedings-article/icwsi/1992/00171812/12OmNwtWfFN", "parentPublication": { "id": "proceedings/icwsi/1992/2482/0", "title": "1992 Proceedings International Conference on Wafer Scale Integration", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875988", "title": "Revisiting Bertin Matrices: New Interactions for Crafting Tabular Visualizations", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875988/13rRUwh80uA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2022/6812/0/681200a180", "title": "A Feasibility of 3-D Microwave Forward Modelling Simplification based on Back Propagation Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cipae/2022/681200a180/1KExJ6tEGs0", "parentPublication": { "id": "proceedings/cipae/2022/6812/0", "title": "2022 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2019/10/08673635", "title": "An Effective DRAM Address Remapping for Mitigating Rowhammer Errors", "doi": null, "abstractUrl": "/journal/tc/2019/10/08673635/1d6xG8dkjmM", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400b397", "title": "Rethinking Semantic Segmentation for Table Structure Recognition in Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400b397/1h81pCNClnW", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09187559", "title": "Row and Column Structure-Based Biclustering for Gene Expression Data", "doi": null, "abstractUrl": "/journal/tb/2022/02/09187559/1mVFjzRRRaU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icscde/2021/0142/0/014200a243", "title": "Rapid detection model of water pollution based on back propagation neural network", "doi": null, "abstractUrl": "/proceedings-article/icscde/2021/014200a243/1xtSEqOtSBW", "parentPublication": { "id": "proceedings/icscde/2021/0142/0", "title": "2021 International Conference of Social Computing and Digital Economy (ICSCDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08554120", "articleId": "17D45WWzW3e", "__typename": "AdjacentArticleType" }, "next": { "fno": "08540085", "articleId": "1gtJNMdxyow", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNx5YvqP", "title": "Nov.", "year": "2020", "issueNum": "11", "idPrefix": "tg", "pubType": "journal", "volume": "26", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1aDQt8709So", "doi": "10.1109/TVCG.2019.2921323", "abstract": "A comprehensive and comprehensible summary of existing deep neural networks (DNNs) helps practitioners understand the behaviour and evolution of DNNs, offers insights for architecture optimization, and sheds light on the working mechanisms of DNNs. However, this summary is hard to obtain because of the complexity and diversity of DNN architectures. To address this issue, we develop DNN Genealogy, an interactive visualization tool, to offer a visual summary of representative DNNs and their evolutionary relationships. DNN Genealogy enables users to learn DNNs from multiple aspects, including architecture, performance, and evolutionary relationships. Central to this tool is a systematic analysis and visualization of 66 representative DNNs based on our analysis of 140 papers. A directed acyclic graph is used to illustrate the evolutionary relationships among these DNNs and highlight the representative DNNs. A focus + context visualization is developed to orient users during their exploration. A set of network glyphs is used in the graph to facilitate the understanding and comparing of DNNs in the context of the evolution. Case studies demonstrate that DNN Genealogy provides helpful guidance in understanding, applying, and optimizing DNNs. DNN Genealogy is extensible and will continue to be updated to reflect future advances in DNNs.", "abstracts": [ { "abstractType": "Regular", "content": "A comprehensive and comprehensible summary of existing deep neural networks (DNNs) helps practitioners understand the behaviour and evolution of DNNs, offers insights for architecture optimization, and sheds light on the working mechanisms of DNNs. However, this summary is hard to obtain because of the complexity and diversity of DNN architectures. To address this issue, we develop DNN Genealogy, an interactive visualization tool, to offer a visual summary of representative DNNs and their evolutionary relationships. DNN Genealogy enables users to learn DNNs from multiple aspects, including architecture, performance, and evolutionary relationships. Central to this tool is a systematic analysis and visualization of 66 representative DNNs based on our analysis of 140 papers. A directed acyclic graph is used to illustrate the evolutionary relationships among these DNNs and highlight the representative DNNs. A focus + context visualization is developed to orient users during their exploration. A set of network glyphs is used in the graph to facilitate the understanding and comparing of DNNs in the context of the evolution. Case studies demonstrate that DNN Genealogy provides helpful guidance in understanding, applying, and optimizing DNNs. DNN Genealogy is extensible and will continue to be updated to reflect future advances in DNNs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A comprehensive and comprehensible summary of existing deep neural networks (DNNs) helps practitioners understand the behaviour and evolution of DNNs, offers insights for architecture optimization, and sheds light on the working mechanisms of DNNs. However, this summary is hard to obtain because of the complexity and diversity of DNN architectures. To address this issue, we develop DNN Genealogy, an interactive visualization tool, to offer a visual summary of representative DNNs and their evolutionary relationships. DNN Genealogy enables users to learn DNNs from multiple aspects, including architecture, performance, and evolutionary relationships. Central to this tool is a systematic analysis and visualization of 66 representative DNNs based on our analysis of 140 papers. A directed acyclic graph is used to illustrate the evolutionary relationships among these DNNs and highlight the representative DNNs. A focus + context visualization is developed to orient users during their exploration. A set of network glyphs is used in the graph to facilitate the understanding and comparing of DNNs in the context of the evolution. Case studies demonstrate that DNN Genealogy provides helpful guidance in understanding, applying, and optimizing DNNs. DNN Genealogy is extensible and will continue to be updated to reflect future advances in DNNs.", "title": "Visual Genealogy of Deep Neural Networks", "normalizedTitle": "Visual Genealogy of Deep Neural Networks", "fno": "08732351", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Directed Graphs", "Learning Artificial Intelligence", "Neural Net Architecture", "Deep Neural Networks", "Comprehensive Summary", "Architecture Optimization", "DNN Architectures", "DNN Genealogy", "Interactive Visualization Tool", "Visual Summary", "Evolutionary Relationships", "Representative DN Ns", "Context Visualization", "Visual Genealogy", "Visualization", "Computer Architecture", "Tools", "Neural Networks", "Interviews", "Task Analysis", "Deep Learning", "Interactive Visual Summary", "Information Visualization", "Educational Tool", "Deep Neural Networks" ], "authors": [ { "givenName": "Qianwen", "surname": "Wang", "fullName": "Qianwen Wang", "affiliation": "Hong Kong University of Science and Technology, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Yuan", "fullName": "Jun Yuan", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuxin", "surname": "Chen", "fullName": "Shuxin Chen", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hang", "surname": "Su", "fullName": "Hang Su", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Huamin", "surname": "Qu", "fullName": "Huamin Qu", "affiliation": "Hong Kong University of Science and Technology, Kowloon, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Shixia", "surname": "Liu", "fullName": "Shixia Liu", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2020-11-01 00:00:00", "pubType": "trans", "pages": "3340-3352", "year": "2020", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2018/1424/0/142401a180", "title": "Visualizing Deep Neural Networks for Text Analytics", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a180/12OmNwDACu7", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671328", "title": "Assessing Deep Neural Networks as Probability Estimators", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671328/1A8jlR5VWH6", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a309", "title": "Black-Box Testing of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a309/1AUp7gmgyCA", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200a652", "title": "Architecture Disentanglement for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200a652/1BmJJXrMCfS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b042", "title": "Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b042/1LSPEVH7Nuw", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a111", "title": "DeepConcolic: Testing and Debugging Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a111/1cJ7lnHQyze", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b135", "title": "Repairing Deep Neural Networks: Fix Patterns and Challenges", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b135/1pK5lDyPEgo", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2021/06/09383028", "title": "Neuroevolution in Deep Neural Networks: Current Trends and Future Challenges", "doi": null, "abstractUrl": "/journal/ai/2021/06/09383028/1saZZBLxVkY", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2021/6836/0/683600a036", "title": "A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding", "doi": null, "abstractUrl": "/proceedings-article/icst/2021/683600a036/1tRP9PPnyj6", "parentPublication": { "id": "proceedings/icst/2021/6836/0", "title": "2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2021/2701/0/270100a133", "title": "TwinDNN: A Tale of Two Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/asap/2021/270100a133/1wiR28TpFvO", "parentPublication": { "id": "proceedings/asap/2021/2701/0", "title": "2021 IEEE 32nd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08713894", "articleId": "1a31mtLBJK0", "__typename": "AdjacentArticleType" }, "next": { "fno": "08733104", "articleId": "1aFvqOkRi5G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1KsRWKKVV7i", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Dqh2PmIooM", "doi": "10.1109/TPAMI.2022.3175183", "abstract": "3D point clouds acquired by scanning real-world objects or scenes have found a wide range of applications including immersive telepresence, autonomous driving, surveillance, etc. They are often perturbed by noise or suffer from low density, which obstructs downstream tasks such as surface reconstruction and understanding. In this paper, we propose a novel paradigm of point set resampling for restoration, which learns continuous gradient fields of point clouds that converge points towards the underlying surface. In particular, we represent a point cloud via its gradient field&#x2014;the gradient of the log-probability density function, and enforce the gradient field to be continuous, thus guaranteeing the continuity of the model for solvable optimization. Based on the continuous gradient fields estimated via a proposed neural network, resampling a point cloud amounts to performing gradient-based Markov Chain Monte Carlo (MCMC) on the input noisy or sparse point cloud. Further, we propose to introduce regularization into the gradient-based MCMC during point cloud restoration, which essentially refines the intermediate resampled point cloud iteratively and accommodates various priors in the resampling process. Extensive experimental results demonstrate that the proposed point set resampling achieves the state-of-the-art performance in representative restoration tasks including point cloud denoising and upsampling.", "abstracts": [ { "abstractType": "Regular", "content": "3D point clouds acquired by scanning real-world objects or scenes have found a wide range of applications including immersive telepresence, autonomous driving, surveillance, etc. They are often perturbed by noise or suffer from low density, which obstructs downstream tasks such as surface reconstruction and understanding. In this paper, we propose a novel paradigm of point set resampling for restoration, which learns continuous gradient fields of point clouds that converge points towards the underlying surface. In particular, we represent a point cloud via its gradient field&#x2014;the gradient of the log-probability density function, and enforce the gradient field to be continuous, thus guaranteeing the continuity of the model for solvable optimization. Based on the continuous gradient fields estimated via a proposed neural network, resampling a point cloud amounts to performing gradient-based Markov Chain Monte Carlo (MCMC) on the input noisy or sparse point cloud. Further, we propose to introduce regularization into the gradient-based MCMC during point cloud restoration, which essentially refines the intermediate resampled point cloud iteratively and accommodates various priors in the resampling process. Extensive experimental results demonstrate that the proposed point set resampling achieves the state-of-the-art performance in representative restoration tasks including point cloud denoising and upsampling.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D point clouds acquired by scanning real-world objects or scenes have found a wide range of applications including immersive telepresence, autonomous driving, surveillance, etc. They are often perturbed by noise or suffer from low density, which obstructs downstream tasks such as surface reconstruction and understanding. In this paper, we propose a novel paradigm of point set resampling for restoration, which learns continuous gradient fields of point clouds that converge points towards the underlying surface. In particular, we represent a point cloud via its gradient field—the gradient of the log-probability density function, and enforce the gradient field to be continuous, thus guaranteeing the continuity of the model for solvable optimization. Based on the continuous gradient fields estimated via a proposed neural network, resampling a point cloud amounts to performing gradient-based Markov Chain Monte Carlo (MCMC) on the input noisy or sparse point cloud. Further, we propose to introduce regularization into the gradient-based MCMC during point cloud restoration, which essentially refines the intermediate resampled point cloud iteratively and accommodates various priors in the resampling process. Extensive experimental results demonstrate that the proposed point set resampling achieves the state-of-the-art performance in representative restoration tasks including point cloud denoising and upsampling.", "title": "Deep Point Set Resampling via Gradient Fields", "normalizedTitle": "Deep Point Set Resampling via Gradient Fields", "fno": "09775211", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Iterative Methods", "Markov Processes", "Monte Carlo Methods", "Sampling Methods", "Solid Modelling", "Stereo Image Processing", "Surface Reconstruction", "3 D Point Clouds", "Continuous Gradient Fields", "Deep Point Set Resampling", "Gradient Based Markov Chain Monte Carlo", "Gradient Based MCMC", "Point Cloud Denoising", "Point Cloud Restoration", "Representative Restoration Tasks", "Sparse Point Cloud", "Point Cloud Compression", "Noise Reduction", "Image Restoration", "Three Dimensional Displays", "Surface Treatment", "Noise Measurement", "Task Analysis", "Point Cloud Resampling", "Gradient Fields", "Regularization", "Denoising", "Upsampling" ], "authors": [ { "givenName": "Haolan", "surname": "Chen", "fullName": "Haolan Chen", "affiliation": "Wangxuan Institute of Computer Technology, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bi'an", "surname": "Du", "fullName": "Bi'an Du", "affiliation": "Wangxuan Institute of Computer Technology, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shitong", "surname": "Luo", "fullName": "Shitong Luo", "affiliation": "Wangxuan Institute of Computer Technology, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wei", "surname": "Hu", "fullName": "Wei Hu", "affiliation": "Wangxuan Institute of Computer Technology, Peking University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "2913-2930", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2012/1611/0/06238917", "title": "Similarity based filtering of point clouds", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06238917/12OmNvk7JOA", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a083", "title": "Robust Feature-Preserving Denoising of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a083/12OmNyRxFIQ", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/2/3570b466", "title": "Shape Morphing for Point Set Surface Based on Vertex Deformation Gradient", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570b466/12OmNzWfp83", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482069", "title": "Multi-Images Restoration Method with a Mixed-Regularization Approach for Cognitive Informatics", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482069/14dcDYzVcd4", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e563", "title": "Score-Based Point Cloud Denoising", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e563/1BmFFYz8vXa", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09727090", "title": "Point Set Self-Embedding", "doi": null, "abstractUrl": "/journal/tg/5555/01/09727090/1Brwons3Oa4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09804752", "title": "Intrinsic and Isotropic Resampling for 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2023/03/09804752/1ErlhDR4iI0", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f428", "title": "Point-NeRF: Point-based Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f428/1H1mrGLgvra", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09998112", "title": "From Noise Addition to Denoising: A Self-Variation Capture Network for Point Cloud Optimization", "doi": null, "abstractUrl": "/journal/tg/5555/01/09998112/1JlF32mS2SQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/08933110", "title": "Anisotropic Denoising of 3D Point Clouds by Aggregation of Multiple Surface-Adaptive Estimates", "doi": null, "abstractUrl": "/journal/tg/2021/06/08933110/1gKvciBzOfu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09785970", "articleId": "1DQPzYUE9R6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09773975", "articleId": "1DjDnSMD9n2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1txPs9C3tok", "title": "June", "year": "2021", "issueNum": "06", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1gKvciBzOfu", "doi": "10.1109/TVCG.2019.2959761", "abstract": "3D point clouds commonly contain positional errors which can be regarded as noise. We propose a point cloud denoising algorithm based on aggregation of multiple anisotropic estimates computed on local coordinate systems. These local estimates are adaptive to the shape of the surface underlying the point cloud, leveraging an extension of the Local Polynomial Approximation (LPA) - Intersection of Confidence Intervals (ICI) technique to 3D point clouds. The adaptivity due to LPA-ICI is further strengthened by the dense aggregation with data-driven weights. Experimental results demonstrate state-of-the-art restoration quality of both sharp features and smooth areas.", "abstracts": [ { "abstractType": "Regular", "content": "3D point clouds commonly contain positional errors which can be regarded as noise. We propose a point cloud denoising algorithm based on aggregation of multiple anisotropic estimates computed on local coordinate systems. These local estimates are adaptive to the shape of the surface underlying the point cloud, leveraging an extension of the Local Polynomial Approximation (LPA) - Intersection of Confidence Intervals (ICI) technique to 3D point clouds. The adaptivity due to LPA-ICI is further strengthened by the dense aggregation with data-driven weights. Experimental results demonstrate state-of-the-art restoration quality of both sharp features and smooth areas.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D point clouds commonly contain positional errors which can be regarded as noise. We propose a point cloud denoising algorithm based on aggregation of multiple anisotropic estimates computed on local coordinate systems. These local estimates are adaptive to the shape of the surface underlying the point cloud, leveraging an extension of the Local Polynomial Approximation (LPA) - Intersection of Confidence Intervals (ICI) technique to 3D point clouds. The adaptivity due to LPA-ICI is further strengthened by the dense aggregation with data-driven weights. Experimental results demonstrate state-of-the-art restoration quality of both sharp features and smooth areas.", "title": "Anisotropic Denoising of 3D Point Clouds by Aggregation of Multiple Surface-Adaptive Estimates", "normalizedTitle": "Anisotropic Denoising of 3D Point Clouds by Aggregation of Multiple Surface-Adaptive Estimates", "fno": "08933110", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Adaptive Estimation", "Image Denoising", "Image Restoration", "Polynomial Approximation", "Solid Modelling", "Multiple Surface Adaptive Estimation", "Multiple Anisotropic Estimation", "Intersection Of Confidence Intervals Technique", "Local Polynomial Approximation", "Local Coordinate Systems", "Point Cloud Denoising Algorithm", "3 D Point Clouds", "Anisotropic Denoising", "Three Dimensional Displays", "Noise Reduction", "Noise Measurement", "Estimation", "Adaptation Models", "Approximation Algorithms", "Shape", "3 D Point Cloud", "Denoising", "Anisotropic", "Surface Adaptive Filtering" ], "authors": [ { "givenName": "Zhongwei", "surname": "Xu", "fullName": "Zhongwei Xu", "affiliation": "Noiseless Imaging Oy (Ltd), Tampere, Finland", "__typename": "ArticleAuthorType" }, { "givenName": "Alessandro", "surname": "Foi", "fullName": "Alessandro Foi", "affiliation": "Tampere University, Tampere, Finland", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2021-06-01 00:00:00", "pubType": "trans", "pages": "2851-2868", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/028P1A28", "title": "Geometric understanding of point clouds using Laplace-Beltrami operator", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/028P1A28/12OmNApcub3", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2017/0560/0/08026263", "title": "Subjective and objective quality evaluation of 3D point cloud denoising algorithms", "doi": null, "abstractUrl": "/proceedings-article/icmew/2017/08026263/12OmNBvkdns", "parentPublication": { "id": "proceedings/icmew/2017/0560/0", "title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06455215", "title": "Two-stage Point-sampled Model Denoising by Robust Ellipsoid Criterion and Mean Shift", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06455215/12OmNrkjVhD", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460543", "title": "Nonlocal processing of 3D colored point clouds", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460543/12OmNvAiSJd", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06238917", "title": "Similarity based filtering of point clouds", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06238917/12OmNvk7JOA", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a083", "title": "Robust Feature-Preserving Denoising of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a083/12OmNyRxFIQ", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a444", "title": "Structured Low-Rank Matrix Factorization for Point-Cloud Denoising", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a444/17D45XacGiJ", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09998112", "title": "From Noise Addition to Denoising: A Self-Variation Capture Network for Point Cloud Optimization", "doi": null, "abstractUrl": "/journal/tg/5555/01/09998112/1JlF32mS2SQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icenit/2022/6307/0/630700a339", "title": "An anisotropic denoising algorithm for mesh models", "doi": null, "abstractUrl": "/proceedings-article/icenit/2022/630700a339/1KCSM6W9PUc", "parentPublication": { "id": "proceedings/icenit/2022/6307/0", "title": "2022 International Conference on Education, Network and Information Technology (ICENIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a052", "title": "Total Denoising: Unsupervised Learning of 3D Point Cloud Cleaning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a052/1hVlvo8kleE", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09359504", "articleId": "1rlAQHG5pao", "__typename": "AdjacentArticleType" }, "next": { "fno": "08907502", "articleId": "1f75Tv9969i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyKJiah", "title": "Dec.", "year": "2018", "issueNum": "12", "idPrefix": "td", "pubType": "journal", "volume": "29", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WB0qax", "doi": "10.1109/TPDS.2018.2842183", "abstract": "Key-Value stores provide scalable metadata service for distributed file systems. However, the metadata's organization itself, which is organized using a directory tree structure, does not fit the key-value access pattern, thereby limiting the performance. To address this issues, we propose a distributed file system with a flattened and fine-grained division metadata service, LocoMeta, to bridge the performance gap between file system metadata and key-value stores. LocoMeta is designed to bridge the gap between file metadata to key-value store with two techniques. First, LocoMeta flattens the directory content and structure, which organizes file and directory index nodes in a flat space while reversely indexing the directory entries. Second, it exploits a fine-grained division method to improve the key-value access performance. Evaluations show that LocoMeta with eight nodes boosts the metadata throughput by five times, which approaches 93 percent throughput of a single-node key-value store, compared to 18 percent in the state-of-the-art IndexFS.", "abstracts": [ { "abstractType": "Regular", "content": "Key-Value stores provide scalable metadata service for distributed file systems. However, the metadata's organization itself, which is organized using a directory tree structure, does not fit the key-value access pattern, thereby limiting the performance. To address this issues, we propose a distributed file system with a flattened and fine-grained division metadata service, LocoMeta, to bridge the performance gap between file system metadata and key-value stores. LocoMeta is designed to bridge the gap between file metadata to key-value store with two techniques. First, LocoMeta flattens the directory content and structure, which organizes file and directory index nodes in a flat space while reversely indexing the directory entries. Second, it exploits a fine-grained division method to improve the key-value access performance. Evaluations show that LocoMeta with eight nodes boosts the metadata throughput by five times, which approaches 93 percent throughput of a single-node key-value store, compared to 18 percent in the state-of-the-art IndexFS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Key-Value stores provide scalable metadata service for distributed file systems. However, the metadata's organization itself, which is organized using a directory tree structure, does not fit the key-value access pattern, thereby limiting the performance. To address this issues, we propose a distributed file system with a flattened and fine-grained division metadata service, LocoMeta, to bridge the performance gap between file system metadata and key-value stores. LocoMeta is designed to bridge the gap between file metadata to key-value store with two techniques. First, LocoMeta flattens the directory content and structure, which organizes file and directory index nodes in a flat space while reversely indexing the directory entries. Second, it exploits a fine-grained division method to improve the key-value access performance. Evaluations show that LocoMeta with eight nodes boosts the metadata throughput by five times, which approaches 93 percent throughput of a single-node key-value store, compared to 18 percent in the state-of-the-art IndexFS.", "title": "A Flattened Metadata Service for Distributed File Systems", "normalizedTitle": "A Flattened Metadata Service for Distributed File Systems", "fno": "08370078", "hasPdf": true, "idPrefix": "td", "keywords": [ "Metadata", "Servers", "Organizations", "Scalability", "File Systems", "Indexes", "Throughput", "Metadata Server", "Distributed File System", "Storage System" ], "authors": [ { "givenName": "Siyang", "surname": "Li", "fullName": "Siyang Li", "affiliation": "State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Fenlin", "surname": "Liu", "fullName": "Fenlin Liu", "affiliation": "State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiwu", "surname": "Shu", "fullName": "Jiwu Shu", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Youyou", "surname": "Lu", "fullName": "Youyou Lu", "affiliation": "Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tao", "surname": "Li", "fullName": "Tao Li", "affiliation": "University of Florida, Gainesville, FL", "__typename": "ArticleAuthorType" }, { "givenName": "Yang", "surname": "Hu", "fullName": "Yang Hu", "affiliation": "University of Florida, Gainesville, FL", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2018-12-01 00:00:00", "pubType": "trans", "pages": "2641-2657", "year": "2018", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/nas/2011/4509/0/4509a268", "title": "QMDS: A File System Metadata Management Service Supporting a Graph Data Model-Based Query Language", "doi": null, "abstractUrl": "/proceedings-article/nas/2011/4509a268/12OmNBfZSjG", "parentPublication": { "id": "proceedings/nas/2011/4509/0", "title": "2011 IEEE Sixth International Conference on Networking, Architecture, and Storage", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbac-pad/2015/8011/0/8011a154", "title": "COMET: Client-Oriented METadata Service for Highly Available Distributed File Systems", "doi": null, "abstractUrl": "/proceedings-article/sbac-pad/2015/8011a154/12OmNBqMDvu", "parentPublication": { "id": "proceedings/sbac-pad/2015/8011/0", "title": "2015 27th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2017/3914/0/07967207", "title": "MetaKV: A Key-Value Store for Metadata Management of Distributed Burst Buffers", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2017/07967207/12OmNvSKO1I", "parentPublication": { "id": "proceedings/ipdps/2017/3914/0", "title": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2012/4691/0/4691a025", "title": "CEFLS: A Cost-Effective File Lookup Service in a Distributed Metadata File System", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2012/4691a025/12OmNvnwVkx", "parentPublication": { "id": "proceedings/ccgrid/2012/4691/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2012/4807/0/4807a126", "title": "Clover: A Distributed File System of Expandable Metadata Service Derived from HDFS", "doi": null, "abstractUrl": "/proceedings-article/cluster/2012/4807a126/12OmNwlZu6X", "parentPublication": { "id": "proceedings/cluster/2012/4807/0", "title": "2012 IEEE International Conference on Cluster Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbac-pad/2011/4573/0/4573a064", "title": "A Metadata Cluster Based on OSD+ Devices", "doi": null, "abstractUrl": "/proceedings-article/sbac-pad/2011/4573a064/12OmNxAlA4k", "parentPublication": { "id": "proceedings/sbac-pad/2011/4573/0", "title": "Computer Architecture and High Performance Computing, Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2015/9961/0/9961a037", "title": "Research on Metadata Management Scheme of Distributed File System", "doi": null, "abstractUrl": "/proceedings-article/csa/2015/9961a037/12OmNykCcc2", "parentPublication": { "id": "proceedings/csa/2015/9961/0", "title": "2015 International Conference on Computer Science and Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2012/02/ttd2012020337", "title": "Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems", "doi": null, "abstractUrl": "/journal/td/2012/02/ttd2012020337/13rRUxbTMyC", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2017/5114/0/09926246", "title": "LocoFS: A Loosely-Coupled Metadata Service for Distributed File Systems", "doi": null, "abstractUrl": "/proceedings-article/sc/2017/09926246/1HOxzXnsb5K", "parentPublication": { "id": "proceedings/sc/2017/5114/0", "title": "SC17: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/02/08812918", "title": "A Highly Reliable Metadata Service for Large-Scale Distributed File Systems", "doi": null, "abstractUrl": "/journal/td/2020/02/08812918/1cPXNX9oYAE", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": null, "next": { "fno": "08385210", "articleId": "17D45Wuc363", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1HmgfSAArPq", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tc", "pubType": "journal", "volume": "71", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1rUNmLJLZPW", "doi": "10.1109/TC.2021.3065909", "abstract": "Temporal prefetchers are powerful because they can prefetch irregular sequences of memory accesses, but temporal prefetchers are commercially infeasible because they store large amounts of metadata in DRAM. This article presents Triage, the first temporal data prefetcher that does not require off-chip metadata. Triage builds on two insights: (1) Metadata are not equally useful, so the less useful metadata need not be saved, and (2) for irregular workloads, it is more profitable to use portions of the LLC to store metadata than data. We also introduce novel schemes to identify useful metadata, to compress metadata, and to determine the fraction of the LLC to dedicate for metadata. Using an industrial-strength simulator running irregular workloads on a single-core system, we show that at a prefetch degree of 4, Triage improves performance by 41.1 percent compared to a baseline with no prefetching, whereas BO, a state-of-the-art prefetcher that uses only on-chip metadata, sees only 10.9 percent improvement. Compared with MISB, a temporal prefetcher that uses off-chip metadata, Triage provides a design alternative that reduces memory traffic by an order of magnitude (260.8 percent extra traffic for MISB at degree 1 versus 56.9 percent for Triage), while reducing coverage by 20 percent.", "abstracts": [ { "abstractType": "Regular", "content": "Temporal prefetchers are powerful because they can prefetch irregular sequences of memory accesses, but temporal prefetchers are commercially infeasible because they store large amounts of metadata in DRAM. This article presents Triage, the first temporal data prefetcher that does not require off-chip metadata. Triage builds on two insights: (1) Metadata are not equally useful, so the less useful metadata need not be saved, and (2) for irregular workloads, it is more profitable to use portions of the LLC to store metadata than data. We also introduce novel schemes to identify useful metadata, to compress metadata, and to determine the fraction of the LLC to dedicate for metadata. Using an industrial-strength simulator running irregular workloads on a single-core system, we show that at a prefetch degree of 4, Triage improves performance by 41.1 percent compared to a baseline with no prefetching, whereas BO, a state-of-the-art prefetcher that uses only on-chip metadata, sees only 10.9 percent improvement. Compared with MISB, a temporal prefetcher that uses off-chip metadata, Triage provides a design alternative that reduces memory traffic by an order of magnitude (260.8 percent extra traffic for MISB at degree 1 versus 56.9 percent for Triage), while reducing coverage by 20 percent.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Temporal prefetchers are powerful because they can prefetch irregular sequences of memory accesses, but temporal prefetchers are commercially infeasible because they store large amounts of metadata in DRAM. This article presents Triage, the first temporal data prefetcher that does not require off-chip metadata. Triage builds on two insights: (1) Metadata are not equally useful, so the less useful metadata need not be saved, and (2) for irregular workloads, it is more profitable to use portions of the LLC to store metadata than data. We also introduce novel schemes to identify useful metadata, to compress metadata, and to determine the fraction of the LLC to dedicate for metadata. Using an industrial-strength simulator running irregular workloads on a single-core system, we show that at a prefetch degree of 4, Triage improves performance by 41.1 percent compared to a baseline with no prefetching, whereas BO, a state-of-the-art prefetcher that uses only on-chip metadata, sees only 10.9 percent improvement. Compared with MISB, a temporal prefetcher that uses off-chip metadata, Triage provides a design alternative that reduces memory traffic by an order of magnitude (260.8 percent extra traffic for MISB at degree 1 versus 56.9 percent for Triage), while reducing coverage by 20 percent.", "title": "Practical Temporal Prefetching With Compressed On-Chip Metadata", "normalizedTitle": "Practical Temporal Prefetching With Compressed On-Chip Metadata", "fno": "09376935", "hasPdf": true, "idPrefix": "tc", "keywords": [ "DRAM Chips", "Meta Data", "Storage Management", "Compressed On Chip Metadata", "DRAM", "Efficiency 10 9 Percent", "Efficiency 20 0 Percent", "Efficiency 260 8 Percent", "Efficiency 41 1 Percent", "Efficiency 56 9 Percent", "Irregular Workloads", "Off Chip Metadata", "Practical Temporal Prefetching", "Prefetch Degree", "Temporal Data Prefetcher", "Temporal Prefetcher", "Triage", "Metadata", "Prefetching", "System On Chip", "Correlation", "Organizations", "Bandwidth", "Random Access Memory", "Memory Systems", "Prefetching", "Temporal Prefetching" ], "authors": [ { "givenName": "Hao", "surname": "Wu", "fullName": "Hao Wu", "affiliation": "Computer Science, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Krishnendra", "surname": "Nathella", "fullName": "Krishnendra Nathella", "affiliation": "Research, ARM, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Matthew", "surname": "Pabst", "fullName": "Matthew Pabst", "affiliation": "Computer Science, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Dam", "surname": "Sunwoo", "fullName": "Dam Sunwoo", "affiliation": "Research, ARM, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Akanksha", "surname": "Jain", "fullName": "Akanksha Jain", "affiliation": "Computer Science, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Calvin", "surname": "Lin", "fullName": "Calvin Lin", "affiliation": "Computer Science, The University of Texas at Austin, Austin, TX, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "2858-2871", "year": "2022", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/hpca/2009/2932/0/04798232", "title": "Techniques for bandwidth-efficient prefetching of linked data structures in hybrid prefetching systems", "doi": null, "abstractUrl": "/proceedings-article/hpca/2009/04798232/12OmNAR1b1U", "parentPublication": { "id": "proceedings/hpca/2009/2932/0", "title": "2009 IEEE 15th International Symposium on High Performance Computer Architecture", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2014/6998/0/6998a623", "title": "B-Fetch: Branch Prediction Directed Prefetching for Chip-Multiprocessors", "doi": null, "abstractUrl": "/proceedings-article/micro/2014/6998a623/12OmNrIae9p", "parentPublication": { "id": "proceedings/micro/2014/6998/0", "title": "2014 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2016/5142/0/07753264", "title": "Using Provenance to boost the Metadata Prefetching in distributed storage systems", "doi": null, "abstractUrl": "/proceedings-article/iccd/2016/07753264/12OmNxI0KxK", "parentPublication": { "id": "proceedings/iccd/2016/5142/0", "title": "2016 IEEE 34th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2012/4675/0/4675a691", "title": "Miss-Correlation Folding: Encoding Per-Block Miss Correlations in Compressed DRAM for Data Prefetching", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2012/4675a691/12OmNxymoaA", "parentPublication": { "id": "proceedings/ipdps/2012/4675/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pact/2012/1182/0/07842922", "title": "Pointy: A hybrid pointer prefetcher for managed runtime systems", "doi": null, "abstractUrl": "/proceedings-article/pact/2012/07842922/12OmNyUWR9f", "parentPublication": { "id": "proceedings/pact/2012/1182/0", "title": "2012 21st International Conference on Parallel Architectures and Compilation Techniques (PACT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2014/6998/0/6998a533", "title": "Loop-Aware Memory Prefetching Using Code Block Working Sets", "doi": null, "abstractUrl": "/proceedings-article/micro/2014/6998a533/12OmNz5apFF", "parentPublication": { "id": "proceedings/micro/2014/6998/0", "title": "2014 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mi/2010/01/mmi2010010050", "title": "Making Address-Correlated Prefetching Practical", "doi": null, "abstractUrl": "/magazine/mi/2010/01/mmi2010010050/13rRUxlgy0z", "parentPublication": { "id": "mags/mi", "title": "IEEE Micro", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/03/09779921", "title": "MANA: Microarchitecting a Temporal Instruction Prefetcher", "doi": null, "abstractUrl": "/journal/tc/2023/03/09779921/1DBTMkUegE0", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2019/6669/0/08980330", "title": "Efficient Metadata Management for Irregular Data Prefetching", "doi": null, "abstractUrl": "/proceedings-article/isca/2019/08980330/1hgsJw5MwTu", "parentPublication": { "id": "proceedings/isca/2019/6669/0", "title": "2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2020/02/09177277", "title": "Harnessing Pairwise-Correlating Data Prefetching With Runahead Metadata", "doi": null, "abstractUrl": "/journal/ca/2020/02/09177277/1nnSLuod0oo", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09319522", "articleId": "1qiRRDsOtHi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09388945", "articleId": "1sn04SLdsjK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1wznUTxaKsw", "title": "Oct.", "year": "2021", "issueNum": "10", "idPrefix": "tg", "pubType": "journal", "volume": "27", "label": "Oct.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1jQNs0xudBS", "doi": "10.1109/TVCG.2020.2994954", "abstract": "The trend of rapid technology scaling is expected to make the hardware of high-performance computing (HPC) systems more susceptible to computational errors due to random bit flips. Some bit flips may cause a program to crash or have a minimal effect on the output, but others may lead to silent data corruption (SDC), i.e., undetected yet significant output errors. Classical fault injection analysis methods employ uniform sampling of random bit flips during program execution to derive a statistical resiliency profile. However, summarizing such fault injection result with sufficient detail is difficult, and understanding the behavior of the fault-corrupted program is still a challenge. In this article, we introduce SpotSDC, a visualization system to facilitate the analysis of a program's resilience to SDC. SpotSDC provides multiple perspectives at various levels of detail of the impact on the output relative to where in the source code the flipped bit occurs, which bit is flipped, and when during the execution it happens. SpotSDC also enables users to study the code protection and provide new insights to understand the behavior of a fault-injected program. Based on lessons learned, we demonstrate how what we found can improve the fault injection campaign method.", "abstracts": [ { "abstractType": "Regular", "content": "The trend of rapid technology scaling is expected to make the hardware of high-performance computing (HPC) systems more susceptible to computational errors due to random bit flips. Some bit flips may cause a program to crash or have a minimal effect on the output, but others may lead to silent data corruption (SDC), i.e., undetected yet significant output errors. Classical fault injection analysis methods employ uniform sampling of random bit flips during program execution to derive a statistical resiliency profile. However, summarizing such fault injection result with sufficient detail is difficult, and understanding the behavior of the fault-corrupted program is still a challenge. In this article, we introduce SpotSDC, a visualization system to facilitate the analysis of a program's resilience to SDC. SpotSDC provides multiple perspectives at various levels of detail of the impact on the output relative to where in the source code the flipped bit occurs, which bit is flipped, and when during the execution it happens. SpotSDC also enables users to study the code protection and provide new insights to understand the behavior of a fault-injected program. Based on lessons learned, we demonstrate how what we found can improve the fault injection campaign method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The trend of rapid technology scaling is expected to make the hardware of high-performance computing (HPC) systems more susceptible to computational errors due to random bit flips. Some bit flips may cause a program to crash or have a minimal effect on the output, but others may lead to silent data corruption (SDC), i.e., undetected yet significant output errors. Classical fault injection analysis methods employ uniform sampling of random bit flips during program execution to derive a statistical resiliency profile. However, summarizing such fault injection result with sufficient detail is difficult, and understanding the behavior of the fault-corrupted program is still a challenge. In this article, we introduce SpotSDC, a visualization system to facilitate the analysis of a program's resilience to SDC. SpotSDC provides multiple perspectives at various levels of detail of the impact on the output relative to where in the source code the flipped bit occurs, which bit is flipped, and when during the execution it happens. SpotSDC also enables users to study the code protection and provide new insights to understand the behavior of a fault-injected program. Based on lessons learned, we demonstrate how what we found can improve the fault injection campaign method.", "title": "SpotSDC: Revealing the Silent Data Corruption Propagation in High-Performance Computing Systems", "normalizedTitle": "SpotSDC: Revealing the Silent Data Corruption Propagation in High-Performance Computing Systems", "fno": "09094379", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualisation", "Fault Tolerant Computing", "Integrated Circuit Reliability", "Sampling Methods", "Transient Analysis", "Spot SDC", "Silent Data Corruption Propagation", "High Performance Computing Systems", "Rapid Technology Scaling", "Computational Errors", "Random Bit Flips", "Uniform Sampling", "Statistical Resiliency Profile", "Visualization System", "Fault Injection Campaign Method", "Fault Injection Analysis Methods", "Fault Corrupted Program", "Data Visualization", "Transient Analysis", "Resilience", "Tools", "Analytical Models", "Hardware", "Computer Crashes", "Fault Injection Sampling", "Error Propagation", "Information Visualization", "Silent Data Corruption" ], "authors": [ { "givenName": "Zhimin", "surname": "Li", "fullName": "Zhimin Li", "affiliation": "Scientific Computing and Imaging Institute, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Harshitha", "surname": "Menon", "fullName": "Harshitha Menon", "affiliation": "Lawrence Livermore National Laboratory, Livermore, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Maljovec", "fullName": "Dan Maljovec", "affiliation": "Scientific Computing and Imaging Institute, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Yarden", "surname": "Livnat", "fullName": "Yarden Livnat", "affiliation": "Scientific Computing and Imaging Institute, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Shusen", "surname": "Liu", "fullName": "Shusen Liu", "affiliation": "Lawrence Livermore National Laboratory, Livermore, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kathryn", "surname": "Mohror", "fullName": "Kathryn Mohror", "affiliation": "Lawrence Livermore National Laboratory, Livermore, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Peer-Timo", "surname": "Bremer", "fullName": "Peer-Timo Bremer", "affiliation": "Lawrence Livermore National Laboratory, Livermore, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Valerio", "surname": "Pascucci", "fullName": "Valerio Pascucci", "affiliation": "Scientific Computing and Imaging Institute, University of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "10", "pubDate": "2021-10-01 00:00:00", "pubType": "trans", "pages": "3938-3952", "year": "2021", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ccgrid/2015/8006/0/8006a271", "title": "An Efficient Silent Data Corruption Detection Method with Error-Feedback Control and Even Sampling for HPC Applications", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2015/8006a271/12OmNBqMDtD", "parentPublication": { "id": "proceedings/ccgrid/2015/8006/0", "title": "2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2016/3778/0/07559547", "title": "IPAS: Intelligent protection against silent output corruption in scientific applications", "doi": null, "abstractUrl": "/proceedings-article/cgo/2016/07559547/12OmNCvcLGl", "parentPublication": { "id": "proceedings/cgo/2016/3778/0", "title": "2016 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2011/4385/0/4385a287", "title": "Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2011/4385a287/12OmNrNh0wM", "parentPublication": { "id": "proceedings/ipdps/2011/4385/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2018/5596/0/559601a279", "title": "Modeling Input-Dependent Error Propagation in Programs", "doi": null, "abstractUrl": "/proceedings-article/dsn/2018/559601a279/12OmNvH7fgj", "parentPublication": { "id": "proceedings/dsn/2018/5596/0", "title": "2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2017/2326/0/2326a592", "title": "Detection of Silent Data Corruption in Adaptive Numerical Integration Solvers", "doi": null, "abstractUrl": "/proceedings-article/cluster/2017/2326a592/12OmNxX3uGO", "parentPublication": { "id": "proceedings/cluster/2017/2326/0", "title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2017/0542/0/0542a097", "title": "One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors", "doi": null, "abstractUrl": "/proceedings-article/dsn/2017/0542a097/12OmNyFCvOI", "parentPublication": { "id": "proceedings/dsn/2017/0542/0", "title": "2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2014/7377/0/7377a006", "title": "Fault Injection Experiments with the CLAMR Hydrodynamics Mini-App", "doi": null, "abstractUrl": "/proceedings-article/issrew/2014/7377a006/12OmNyGtjjm", "parentPublication": { "id": "proceedings/issrew/2014/7377/0", "title": "2014 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2021/8442/0/09910044", "title": "PEPPA-X: Finding Program Test Inputs to Bound Silent Data Corruption Vulnerability in HPC Applications", "doi": null, "abstractUrl": "/proceedings-article/sc/2021/09910044/1HzBFPFNfi0", "parentPublication": { "id": "proceedings/sc/2021/8442/0", "title": "SC21: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2019/2583/0/258300a862", "title": "Predicting the Silent Data Corruption Vulnerability of Instructions in Programs", "doi": null, "abstractUrl": "/proceedings-article/icpads/2019/258300a862/1h5WkSaCqwE", "parentPublication": { "id": "proceedings/icpads/2019/2583/0", "title": "2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/03/09286739", "title": "An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs", "doi": null, "abstractUrl": "/journal/tq/2022/03/09286739/1pormaMAU24", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09091324", "articleId": "1jK9L6UCoAo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09094378", "articleId": "1jQNru4p18k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04Q", "title": "Jan.", "year": "2017", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "23", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUygT7n1", "doi": "10.1109/TVCG.2016.2598826", "abstract": "Due to the intricate relationship between the pelvic organs and vital structures, such as vessels and nerves, pelvic anatomy is often considered to be complex to comprehend. In oncological pelvic surgery, a trade-off has to be made between complete tumor resection and preserving function by preventing damage to the nerves. Damage to the autonomic nerves causes undesirable post-operative side-effects such as fecal and urinal incontinence, as well as sexual dysfunction in up to 80 percent of the cases. Since these autonomic nerves are not visible in pre-operative MRI scans or during surgery, avoiding nerve damage during such a surgical procedure becomes challenging. In this work, we present visualization methods to represent context, target, and risk structures for surgical planning. We employ distance-based and occlusion management techniques in an atlas-based surgical planning tool for oncological pelvic surgery. Patient-specific pre-operative MRI scans are registered to an atlas model that includes nerve information. Through several interactive linked views, the spatial relationships and distances between the organs, tumor and risk zones are visualized to improve understanding, while avoiding occlusion. In this way, the surgeon can examine surgically relevant structures and plan the procedure before going into the operating theater, thus raising awareness of the autonomic nerve zone regions and potentially reducing post-operative complications. Furthermore, we present the results of a domain expert evaluation with surgical oncologists that demonstrates the advantages of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Due to the intricate relationship between the pelvic organs and vital structures, such as vessels and nerves, pelvic anatomy is often considered to be complex to comprehend. In oncological pelvic surgery, a trade-off has to be made between complete tumor resection and preserving function by preventing damage to the nerves. Damage to the autonomic nerves causes undesirable post-operative side-effects such as fecal and urinal incontinence, as well as sexual dysfunction in up to 80 percent of the cases. Since these autonomic nerves are not visible in pre-operative MRI scans or during surgery, avoiding nerve damage during such a surgical procedure becomes challenging. In this work, we present visualization methods to represent context, target, and risk structures for surgical planning. We employ distance-based and occlusion management techniques in an atlas-based surgical planning tool for oncological pelvic surgery. Patient-specific pre-operative MRI scans are registered to an atlas model that includes nerve information. Through several interactive linked views, the spatial relationships and distances between the organs, tumor and risk zones are visualized to improve understanding, while avoiding occlusion. In this way, the surgeon can examine surgically relevant structures and plan the procedure before going into the operating theater, thus raising awareness of the autonomic nerve zone regions and potentially reducing post-operative complications. Furthermore, we present the results of a domain expert evaluation with surgical oncologists that demonstrates the advantages of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to the intricate relationship between the pelvic organs and vital structures, such as vessels and nerves, pelvic anatomy is often considered to be complex to comprehend. In oncological pelvic surgery, a trade-off has to be made between complete tumor resection and preserving function by preventing damage to the nerves. Damage to the autonomic nerves causes undesirable post-operative side-effects such as fecal and urinal incontinence, as well as sexual dysfunction in up to 80 percent of the cases. Since these autonomic nerves are not visible in pre-operative MRI scans or during surgery, avoiding nerve damage during such a surgical procedure becomes challenging. In this work, we present visualization methods to represent context, target, and risk structures for surgical planning. We employ distance-based and occlusion management techniques in an atlas-based surgical planning tool for oncological pelvic surgery. Patient-specific pre-operative MRI scans are registered to an atlas model that includes nerve information. Through several interactive linked views, the spatial relationships and distances between the organs, tumor and risk zones are visualized to improve understanding, while avoiding occlusion. In this way, the surgeon can examine surgically relevant structures and plan the procedure before going into the operating theater, thus raising awareness of the autonomic nerve zone regions and potentially reducing post-operative complications. Furthermore, we present the results of a domain expert evaluation with surgical oncologists that demonstrates the advantages of our approach.", "title": "PelVis: Atlas-based Surgical Planning for Oncological Pelvic Surgery", "normalizedTitle": "PelVis: Atlas-based Surgical Planning for Oncological Pelvic Surgery", "fno": "07539313", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Biomedical MRI", "Cancer", "Data Visualisation", "Surgery", "Tumours", "Pel Vis", "Atlas Based Surgical Planning Tool", "Oncological Pelvic Surgery", "Pelvic Organs", "Vital Structures", "Pelvic Anatomy", "Complete Tumor Resection", "Nerve Damage Prevention", "Post Operative Side Effects", "Visualization Methods", "Context Structures", "Target Structures", "Risk Structures", "Distance Based Management Techniques", "Occlusion Management Techniques", "Patient Specific Pre Operative MRI Scans", "Nerve Information", "Surgical Oncologists", "Surgery", "Planning", "Visualization", "Tumors", "Magnetic Resonance Imaging", "Context", "Data Visualization", "Atlas", "Surgical Planning", "Medical Visualization" ], "authors": [ { "givenName": "Noeska", "surname": "Smit", "fullName": "Noeska Smit", "affiliation": "Delft University of TechnologyUniversity of Bergen", "__typename": "ArticleAuthorType" }, { "givenName": "Kai", "surname": "Lawonn", "fullName": "Kai Lawonn", "affiliation": "University of Koblenz, Landau", "__typename": "ArticleAuthorType" }, { "givenName": "Annelot", "surname": "Kraima", "fullName": "Annelot Kraima", "affiliation": "Leiden University Medical Center", "__typename": "ArticleAuthorType" }, { "givenName": "Marco", "surname": "DeRuiter", "fullName": "Marco DeRuiter", "affiliation": "Leiden University Medical Center", "__typename": "ArticleAuthorType" }, { "givenName": "Hessam", "surname": "Sokooti", "fullName": "Hessam Sokooti", "affiliation": "Leiden University Medical Center", "__typename": "ArticleAuthorType" }, { "givenName": "Stefan", "surname": "Bruckner", "fullName": "Stefan Bruckner", "affiliation": "University of Bergen", "__typename": "ArticleAuthorType" }, { "givenName": "Elmar", "surname": "Eisemann", "fullName": "Elmar Eisemann", "affiliation": "Delft University of Technology", "__typename": "ArticleAuthorType" }, { "givenName": "Anna", "surname": "Vilanova", "fullName": "Anna Vilanova", "affiliation": "Delft University of Technology", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2017-01-01 00:00:00", "pubType": "trans", "pages": "741-750", "year": "2017", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2015/9548/0/9548a496", "title": "Learning the Structure of Surgical Procedures from Operative Notes", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a496/12OmNwDSdop", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-iscmht/2017/1023/0/08338537", "title": "Utilization of image analysis in joint surgery", "doi": null, "abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338537/12OmNwtn3Ds", "parentPublication": { "id": "proceedings/iciev-iscmht/2017/1023/0", "title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a223", "title": "The Role of Semantic and Discourse Information in Learning the Structure of Surgical Procedures", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a223/12OmNzC5T4W", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1996/03/v0232", "title": "A Digital Brain Atlas for Surgical Planning, Model-Driven Segmentation, and Teaching", "doi": null, "abstractUrl": "/journal/tg/1996/03/v0232/13rRUxly8Xr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a257", "title": "Nursing Cooperation for Complex Thyroid Surgery", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a257/17D45WK5ApY", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a095", "title": "Clinical Observation and Nursing Experience of Complications in Thyroid Surgery", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a095/17D45WK5Ar3", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545105", "title": "Interactive Segmentation of Glioblastoma for Post-surgical Treatment Follow-up", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545105/17D45WWzW3K", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2022/8487/0/848700a261", "title": "Benchmarking Network Performance of Augmented Reality Based Surgical Telementoring Systems", "doi": null, "abstractUrl": "/proceedings-article/bibe/2022/848700a261/1J6hG440IDu", "parentPublication": { "id": "proceedings/bibe/2022/8487/0", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300a729", "title": "A Systematic Literature Review of Computer Support for Surgical Interventions", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300a729/1nkDnlrz6rC", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annsim/2021/375/0/09552106", "title": "Elastic Registration of Abdominal MRI Scans and RGB-D Images to Improve Surgical Planning of Breast Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/annsim/2021/09552106/1xsdFdefQ6Q", "parentPublication": { "id": "proceedings/annsim/2021/375/0", "title": "2021 Annual Modeling and Simulation Conference (ANNSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07539331", "articleId": "13rRUwjGoLJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07539322", "articleId": "13rRUNvgz4j", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1pERRCpDoGs", "title": "Aug.", "year": "5555", "issueNum": "01", "idPrefix": "ai", "pubType": "journal", "volume": "1", "label": "Aug.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1CbVpC8IS8o", "doi": "10.1109/TAI.2022.3164065", "abstract": "Deep Learning advances have made it possible to recover full 3D meshes of human models from individual images. However, extension of this notion to videos for recovering temporally coherent poses is still under-explored. A major challenge in this direction is the lack of appropriately annotated video data for learning the desired computational models. Existing human pose datasets only provide 2D or 3D skeleton joint annotations, whereas the datasets are also insufficiently recorded in constrained environments. We first contribute a technique to synthesize monocular action videos with rich 3D annotations that are suitable for learning computational models for full mesh 3D human pose recovery. Compared to the existing methods which simply &#x2018;`texture-map&#x2019;' clothes onto the 3D human pose models, our approach incorporates Physics-based realistic cloth deformations with human body movements. The generated videos cover a large variety of human actions, poses, and visual appearances, while the annotations record accurate human pose dynamics and human body surface information. Our second major contribution is an end-to-end trainable Recurrent Neural Network for full pose mesh recovery from monocular video. Using the proposed video data and a Long-Short-Term-Memory recurrent structure, our network explicitly learns to model the temporal coherence in videos and imposes geometric consistency over the recovered meshes. We establish the effectiveness of the proposed model with quantitative and qualitative analysis using the proposed and benchmark datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Deep Learning advances have made it possible to recover full 3D meshes of human models from individual images. However, extension of this notion to videos for recovering temporally coherent poses is still under-explored. A major challenge in this direction is the lack of appropriately annotated video data for learning the desired computational models. Existing human pose datasets only provide 2D or 3D skeleton joint annotations, whereas the datasets are also insufficiently recorded in constrained environments. We first contribute a technique to synthesize monocular action videos with rich 3D annotations that are suitable for learning computational models for full mesh 3D human pose recovery. Compared to the existing methods which simply &#x2018;`texture-map&#x2019;' clothes onto the 3D human pose models, our approach incorporates Physics-based realistic cloth deformations with human body movements. The generated videos cover a large variety of human actions, poses, and visual appearances, while the annotations record accurate human pose dynamics and human body surface information. Our second major contribution is an end-to-end trainable Recurrent Neural Network for full pose mesh recovery from monocular video. Using the proposed video data and a Long-Short-Term-Memory recurrent structure, our network explicitly learns to model the temporal coherence in videos and imposes geometric consistency over the recovered meshes. We establish the effectiveness of the proposed model with quantitative and qualitative analysis using the proposed and benchmark datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep Learning advances have made it possible to recover full 3D meshes of human models from individual images. However, extension of this notion to videos for recovering temporally coherent poses is still under-explored. A major challenge in this direction is the lack of appropriately annotated video data for learning the desired computational models. Existing human pose datasets only provide 2D or 3D skeleton joint annotations, whereas the datasets are also insufficiently recorded in constrained environments. We first contribute a technique to synthesize monocular action videos with rich 3D annotations that are suitable for learning computational models for full mesh 3D human pose recovery. Compared to the existing methods which simply ‘`texture-map’' clothes onto the 3D human pose models, our approach incorporates Physics-based realistic cloth deformations with human body movements. The generated videos cover a large variety of human actions, poses, and visual appearances, while the annotations record accurate human pose dynamics and human body surface information. Our second major contribution is an end-to-end trainable Recurrent Neural Network for full pose mesh recovery from monocular video. Using the proposed video data and a Long-Short-Term-Memory recurrent structure, our network explicitly learns to model the temporal coherence in videos and imposes geometric consistency over the recovered meshes. We establish the effectiveness of the proposed model with quantitative and qualitative analysis using the proposed and benchmark datasets.", "title": "Deep reconstruction of 3D human poses from video", "normalizedTitle": "Deep reconstruction of 3D human poses from video", "fno": "09745764", "hasPdf": true, "idPrefix": "ai", "keywords": [ "Three Dimensional Displays", "Solid Modeling", "Shape", "Annotations", "Data Models", "Skeleton", "Computational Modeling", "Human Pose Recovery", "3 D Human Reconstruction", "Full Mesh Recovery", "Data Synthesis" ], "authors": [ { "givenName": "Jian", "surname": "Liu", "fullName": "Jian Liu", "affiliation": "Mountain View, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Naveed", "surname": "Akhtar", "fullName": "Naveed Akhtar", "affiliation": "Computer Science and Software Engineering, The University of Western Australia, 2720 Perth, Western Australia, Australia, 6009", "__typename": "ArticleAuthorType" }, { "givenName": "Ajmal", "surname": "Mian", "fullName": "Ajmal Mian", "affiliation": "Computer Science and Software Engineering, The University of Western Australia Faculty of Engineering Computing and Mathematics, 120564 Perth, Western Australia, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-03-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "2691-4581", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457b253", "title": "Harvesting Multiple Views for Marker-Less 3D Human Pose Annotations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457b253/12OmNzvz6Fs", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/09982410", "title": "PoseBERT: A Generic Transformer Module for Temporal 3D Human Modeling", "doi": null, "abstractUrl": "/journal/tp/5555/01/09982410/1J2T4N6o4Rq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c923", "title": "CameraPose: Weakly-Supervised Monocular 3D Human Pose Estimation by Leveraging In-the-wild 2D Annotations", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c923/1L6LywSn5hC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300k0897", "title": "In the Wild Human Pose Estimation Using Explicit 2D Features and Intermediate 3D Representations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300k0897/1gyrG4eVkti", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f430", "title": "Skeleton-Aware 3D Human Shape Reconstruction From Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f430/1hVlIbqDjtC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800o4122", "title": "Learning Deep Network for Detecting 3D Object Keypoints and 6D Poses", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800o4122/1m3ojJITwuk", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b049", "title": "Temporal-Aware Self-Supervised Learning for 3D Hand Pose and Mesh Estimation in Videos", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b049/1uqGJfUS3QI", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4682", "title": "Semi-Supervised 3D Hand-Object Poses Estimation with Interactions in Time", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4682/1yeJRomvVAY", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900k0446", "title": "Model-based 3D Hand Reconstruction via Self-Supervised Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900k0446/1yeJWXqdk3u", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a042", "title": "Exemplar Fine-Tuning for 3D Human Model Fitting Towards In-the-Wild 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a042/1zWEdaIowuY", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09741345", "articleId": "1C0jiJUZI5y", "__typename": "AdjacentArticleType" }, "next": { "fno": "09750915", "articleId": "1ClSW7u42zu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GBRkqcf7m8", "doi": "10.1109/TPAMI.2022.3205910", "abstract": "There has been rapid progress recently on 3D human rendering, including novel view synthesis and pose animation, based on the advances of neural radiance fields (NeRF). However, most existing methods focus on person-specific training and their training typically requires multi-view videos. This paper deals with a new challenging task &#x2013; rendering novel views and novel poses for a person <italic>unseen</italic> in training, using only multiview <italic>still images</italic> as input without videos. For this task, we propose a simple yet surprisingly effective method to train a generalizable NeRF with multiview images as conditional input. The key ingredient is a dedicated representation combining a canonical NeRF and a volume deformation scheme. Using a canonical space enables our method to learn shared properties of human and easily generalize to different people. Volume deformation is used to connect the canonical space with input and target images and query image features for radiance and density prediction. We leverage the parametric 3D human model fitted on the input images to derive the deformation, which works quite well in practice when combined with our canonical NeRF. The experiments on both real and synthetic data with the novel view synthesis and pose animation tasks collectively demonstrate the efficacy of our method.", "abstracts": [ { "abstractType": "Regular", "content": "There has been rapid progress recently on 3D human rendering, including novel view synthesis and pose animation, based on the advances of neural radiance fields (NeRF). However, most existing methods focus on person-specific training and their training typically requires multi-view videos. This paper deals with a new challenging task &#x2013; rendering novel views and novel poses for a person <italic>unseen</italic> in training, using only multiview <italic>still images</italic> as input without videos. For this task, we propose a simple yet surprisingly effective method to train a generalizable NeRF with multiview images as conditional input. The key ingredient is a dedicated representation combining a canonical NeRF and a volume deformation scheme. Using a canonical space enables our method to learn shared properties of human and easily generalize to different people. Volume deformation is used to connect the canonical space with input and target images and query image features for radiance and density prediction. We leverage the parametric 3D human model fitted on the input images to derive the deformation, which works quite well in practice when combined with our canonical NeRF. The experiments on both real and synthetic data with the novel view synthesis and pose animation tasks collectively demonstrate the efficacy of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There has been rapid progress recently on 3D human rendering, including novel view synthesis and pose animation, based on the advances of neural radiance fields (NeRF). However, most existing methods focus on person-specific training and their training typically requires multi-view videos. This paper deals with a new challenging task – rendering novel views and novel poses for a person unseen in training, using only multiview still images as input without videos. For this task, we propose a simple yet surprisingly effective method to train a generalizable NeRF with multiview images as conditional input. The key ingredient is a dedicated representation combining a canonical NeRF and a volume deformation scheme. Using a canonical space enables our method to learn shared properties of human and easily generalize to different people. Volume deformation is used to connect the canonical space with input and target images and query image features for radiance and density prediction. We leverage the parametric 3D human model fitted on the input images to derive the deformation, which works quite well in practice when combined with our canonical NeRF. The experiments on both real and synthetic data with the novel view synthesis and pose animation tasks collectively demonstrate the efficacy of our method.", "title": "MPS-NeRF: Generalizable 3D Human Rendering From Multiview Images", "normalizedTitle": "MPS-NeRF: Generalizable 3D Human Rendering From Multiview Images", "fno": "09888037", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Rendering Computer Graphics", "Three Dimensional Displays", "Strain", "Task Analysis", "Solid Modeling", "Training", "Deformable Models", "Human Synthesis", "Neural Radiance Field", "Neural Rendering" ], "authors": [ { "givenName": "Xiangjun", "surname": "Gao", "fullName": "Xiangjun Gao", "affiliation": "Beijing Laboratory of Intelligent Information Technology, School of Computer Science, Beijing Institute of Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiaolong", "surname": "Yang", "fullName": "Jiaolong Yang", "affiliation": "Microsoft Research Asia, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jongyoo", "surname": "Kim", "fullName": "Jongyoo Kim", "affiliation": "Microsoft Research Asia, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Sida", "surname": "Peng", "fullName": "Sida Peng", "affiliation": "College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zicheng", "surname": "Liu", "fullName": "Zicheng Liu", "affiliation": "Microsoft Azure AI, Redmond, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xin", "surname": "Tong", "fullName": "Xin Tong", "affiliation": "Microsoft Research Asia, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200f845", "title": "Nerfies: Deformable Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f845/1BmL0KETWzm", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09870173", "title": "NerfCap: Human Performance Capture With Dynamic Neural Radiance Fields", "doi": null, "abstractUrl": "/journal/tg/5555/01/09870173/1GgcSqKQSM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8332", "title": "NeRF-Editing: Geometry Editing of Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8332/1H0Nn4Xgsne", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600m2872", "title": "Depth-supervised NeRF: Fewer Views and Faster Training for Free", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600m2872/1H1ieODToYw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600m2851", "title": "Deblur-NeRF: Neural Radiance Fields from Blurry Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600m2851/1H1kFc1BMLS", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f428", "title": "Point-NeRF: Point-based Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f428/1H1mrGLgvra", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d825", "title": "CLIP-NeRF: Text-and-Image Driven Manipulation of Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d825/1H1muC7wD0Q", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09909994", "title": "Recursive-NeRF: An Efficient and Dynamically Growing NeRF", "doi": null, "abstractUrl": "/journal/tg/5555/01/09909994/1Hcj8wIB6s8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h206", "title": "NeRF in the Wild: Neural Radiance Fields for Unconstrained Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h206/1yeLpJjmuwE", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900k0313", "title": "D-NeRF: Neural Radiance Fields for Dynamic Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900k0313/1yeLrBwGgik", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09878209", "articleId": "1GrP68bmAuI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09889210", "articleId": "1GDrqZanP3O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1J2T4N6o4Rq", "doi": "10.1109/TPAMI.2022.3216899", "abstract": "Training state-of-the-art models for human pose estimation in videos requires datasets with annotations that are really hard and expensive to obtain. Although transformers have been recently utilized for body pose sequence modeling, related methods rely on pseudo-ground truth to augment the currently limited training data available for learning such models. In this paper, we introduce PoseBERT, a transformer module that is fully trained on 3D Motion Capture (MoCap) data via masked modeling. It is simple, generic and versatile, as it can be plugged on top of any image-based model to transform it in a video-based model leveraging temporal information. We showcase variants of PoseBERT with different inputs varying from 3D skeleton keypoints to rotations of a 3D parametric model for either the full body (SMPL) or just the hands (MANO). Since PoseBERT training is task agnostic, the model can be applied to several tasks such as pose refinement, future pose prediction or motion completion <italic>without finetuning</italic>. Our experimental results validate that adding PoseBERT on top of various state-of-the-art pose estimation methods consistently improves their performances, while its low computational cost allows us to use it in a real-time demo for smoothly animating a robotic hand via a webcam. Test code and models are available at <uri>https://github.com/naver/posebert</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Training state-of-the-art models for human pose estimation in videos requires datasets with annotations that are really hard and expensive to obtain. Although transformers have been recently utilized for body pose sequence modeling, related methods rely on pseudo-ground truth to augment the currently limited training data available for learning such models. In this paper, we introduce PoseBERT, a transformer module that is fully trained on 3D Motion Capture (MoCap) data via masked modeling. It is simple, generic and versatile, as it can be plugged on top of any image-based model to transform it in a video-based model leveraging temporal information. We showcase variants of PoseBERT with different inputs varying from 3D skeleton keypoints to rotations of a 3D parametric model for either the full body (SMPL) or just the hands (MANO). Since PoseBERT training is task agnostic, the model can be applied to several tasks such as pose refinement, future pose prediction or motion completion <italic>without finetuning</italic>. Our experimental results validate that adding PoseBERT on top of various state-of-the-art pose estimation methods consistently improves their performances, while its low computational cost allows us to use it in a real-time demo for smoothly animating a robotic hand via a webcam. Test code and models are available at <uri>https://github.com/naver/posebert</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Training state-of-the-art models for human pose estimation in videos requires datasets with annotations that are really hard and expensive to obtain. Although transformers have been recently utilized for body pose sequence modeling, related methods rely on pseudo-ground truth to augment the currently limited training data available for learning such models. In this paper, we introduce PoseBERT, a transformer module that is fully trained on 3D Motion Capture (MoCap) data via masked modeling. It is simple, generic and versatile, as it can be plugged on top of any image-based model to transform it in a video-based model leveraging temporal information. We showcase variants of PoseBERT with different inputs varying from 3D skeleton keypoints to rotations of a 3D parametric model for either the full body (SMPL) or just the hands (MANO). Since PoseBERT training is task agnostic, the model can be applied to several tasks such as pose refinement, future pose prediction or motion completion without finetuning. Our experimental results validate that adding PoseBERT on top of various state-of-the-art pose estimation methods consistently improves their performances, while its low computational cost allows us to use it in a real-time demo for smoothly animating a robotic hand via a webcam. Test code and models are available at https://github.com/naver/posebert.", "title": "PoseBERT: A Generic Transformer Module for Temporal 3D Human Modeling", "normalizedTitle": "PoseBERT: A Generic Transformer Module for Temporal 3D Human Modeling", "fno": "09982410", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Three Dimensional Displays", "Videos", "Pose Estimation", "Solid Modeling", "Task Analysis", "Transformers", "Annotations", "Sequence Modeling", "Human Mesh Recovery", "Hand Mesh Recovery", "3 D Human Pose Estimation", "3 D Hand Pose Estimation", "Future Frame Prediction", "Transformers" ], "authors": [ { "givenName": "Fabien", "surname": "Baradel", "fullName": "Fabien Baradel", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" }, { "givenName": "Romain", "surname": "Brégier", "fullName": "Romain Brégier", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" }, { "givenName": "Thibault", "surname": "Groueix", "fullName": "Thibault Groueix", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" }, { "givenName": "Philippe", "surname": "Weinzaepfel", "fullName": "Philippe Weinzaepfel", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" }, { "givenName": "Yannis", "surname": "Kalantidis", "fullName": "Yannis Kalantidis", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" }, { "givenName": "Grégory", "surname": "Rogez", "fullName": "Grégory Rogez", "affiliation": "NAVER Labs Europe, Meylan, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icvisp/2021/0770/0/077000a242", "title": "Multi-scale spatial-temporal transformer for 3D human pose estimation", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2021/077000a242/1APq2ZEyD0k", "parentPublication": { "id": "proceedings/icvisp/2021/0770/0", "title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09749007", "title": "From Human Pose Similarity Metric to 3D Human Pose Estimator: Temporal Propagating LSTM Networks", "doi": null, "abstractUrl": "/journal/tp/2023/02/09749007/1Ciz7ePgNkQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700b271", "title": "Spatial-temporal-spectral transformer for 3D human pose estimation", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700b271/1DNDksMONfG", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09815549", "title": "Adaptive Multi-View and Temporal Fusing Transformer for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/journal/tp/2023/04/09815549/1ELg9lk0AeI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600n3137", "title": "MHFormer: Multi-Hypothesis Transformer for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3137/1H0Lj3ttsjK", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956693", "title": "End-to-end 3D Human Pose Estimation with Transformer", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956693/1IHqtGK3LXO", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10050391", "title": "Learning to Augment Poses for 3D Human Pose Estimation in Images and Videos", "doi": null, "abstractUrl": "/journal/tp/5555/01/10050391/1KYofZaXCTK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c923", "title": "CameraPose: Weakly-Supervised Monocular 3D Human Pose Estimation by Leveraging In-the-wild 2D Annotations", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c923/1L6LywSn5hC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a042", "title": "Exemplar Fine-Tuning for 3D Human Model Fitting Towards In-the-Wild 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a042/1zWEdaIowuY", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a474", "title": "SVMAC: Unsupervised 3D Human Pose Estimation from a Single Image with Single-view-multi-angle Consistency", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a474/1zWEp9unWo0", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09978641", "articleId": "1IXUlcsfUFG", "__typename": "AdjacentArticleType" }, "next": { "fno": "09982412", "articleId": "1J2T54a1tvO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYofZaXCTK", "doi": "10.1109/TPAMI.2023.3243400", "abstract": "Existing 3D human pose estimation methods often suffer inferior generalization performance to new datasets, largely due to the limited diversity of 2D-3D pose pairs in the training data. To address this problem, we present PoseAug, a novel auto-augmentation framework that learns to augment the available training poses towards greater diversity and thus enhances the generalization power of the trained 2D-to-3D pose estimator. Specifically, PoseAug introduces a novel pose augmentor that learns to adjust various geometry factors of a pose through differentiable operations. With such differentiable capacity, the augmentor can be jointly optimized with the 3D pose estimator and take the estimation error as feedback to generate more diverse and harder poses in an online manner. PoseAug is generic and handy to be applied to various 3D pose estimation models. It is also extendable to aid pose estimation from video frames. To demonstrate this, we introduce PoseAug-V, a simple yet effective method that decomposes video pose augmentation into end pose augmentation and conditioned intermediate pose generation. Extensive experiments demonstrate that PoseAug and its extension PoseAug-V bring clear improvements for frame-based and video-based 3D pose estimation on several out-of-domain 3D human pose benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "Existing 3D human pose estimation methods often suffer inferior generalization performance to new datasets, largely due to the limited diversity of 2D-3D pose pairs in the training data. To address this problem, we present PoseAug, a novel auto-augmentation framework that learns to augment the available training poses towards greater diversity and thus enhances the generalization power of the trained 2D-to-3D pose estimator. Specifically, PoseAug introduces a novel pose augmentor that learns to adjust various geometry factors of a pose through differentiable operations. With such differentiable capacity, the augmentor can be jointly optimized with the 3D pose estimator and take the estimation error as feedback to generate more diverse and harder poses in an online manner. PoseAug is generic and handy to be applied to various 3D pose estimation models. It is also extendable to aid pose estimation from video frames. To demonstrate this, we introduce PoseAug-V, a simple yet effective method that decomposes video pose augmentation into end pose augmentation and conditioned intermediate pose generation. Extensive experiments demonstrate that PoseAug and its extension PoseAug-V bring clear improvements for frame-based and video-based 3D pose estimation on several out-of-domain 3D human pose benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Existing 3D human pose estimation methods often suffer inferior generalization performance to new datasets, largely due to the limited diversity of 2D-3D pose pairs in the training data. To address this problem, we present PoseAug, a novel auto-augmentation framework that learns to augment the available training poses towards greater diversity and thus enhances the generalization power of the trained 2D-to-3D pose estimator. Specifically, PoseAug introduces a novel pose augmentor that learns to adjust various geometry factors of a pose through differentiable operations. With such differentiable capacity, the augmentor can be jointly optimized with the 3D pose estimator and take the estimation error as feedback to generate more diverse and harder poses in an online manner. PoseAug is generic and handy to be applied to various 3D pose estimation models. It is also extendable to aid pose estimation from video frames. To demonstrate this, we introduce PoseAug-V, a simple yet effective method that decomposes video pose augmentation into end pose augmentation and conditioned intermediate pose generation. Extensive experiments demonstrate that PoseAug and its extension PoseAug-V bring clear improvements for frame-based and video-based 3D pose estimation on several out-of-domain 3D human pose benchmarks.", "title": "Learning to Augment Poses for 3D Human Pose Estimation in Images and Videos", "normalizedTitle": "Learning to Augment Poses for 3D Human Pose Estimation in Images and Videos", "fno": "10050391", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Three Dimensional Displays", "Training", "Data Models", "Pose Estimation", "Training Data", "Solid Modeling", "Videos" ], "authors": [ { "givenName": "Jianfeng", "surname": "Zhang", "fullName": "Jianfeng Zhang", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Kehong", "surname": "Gong", "fullName": "Kehong Gong", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Xinchao", "surname": "Wang", "fullName": "Xinchao Wang", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Jiashi", "surname": "Feng", "fullName": "Jiashi Feng", "affiliation": "National University of Singapore, Singapore", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/3dv/2016/5407/0/5407a479", "title": "Synthesizing Training Images for Boosting Human 3D Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a479/12OmNqGRGdm", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a318", "title": "Learning to Refine Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a318/17D45Wda7gk", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g625", "title": "ElePose: Unsupervised 3D Human Pose Estimation by Predicting Camera Elevation and Learning Normalizing Flows on 2D Poses", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g625/1H0LwRRyu5O", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1018", "title": "Generalizable Human Pose Triangulation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1018/1H0O2MoT8eQ", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c923", "title": "CameraPose: Weakly-Supervised Monocular 3D Human Pose Estimation by Leveraging In-the-wild 2D Annotations", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c923/1L6LywSn5hC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f714", "title": "Kinematic-aware Hierarchical Attention Network for Human Pose Estimation in Videos", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f714/1L8qtOIQmY0", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c192", "title": "On Boosting Single-Frame 3D Human Pose Estimation via Monocular Videos", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c192/1hQqsWpHTOg", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600c524", "title": "Refining Joint Locations for Human Pose Tracking in Sports Videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600c524/1iTvfCLQfJe", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09450016", "title": "Monocular 3D Pose Estimation via Pose Grammar and Data Augmentation", "doi": null, "abstractUrl": "/journal/tp/2022/10/09450016/1uiiOHx6LWU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i571", "title": "PoseAug: A Differentiable Pose Augmentation Framework for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i571/1yeKofrFGZa", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049079", "articleId": "1KV4oUEgEus", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049697", "articleId": "1KYog7RZSUg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1AH3vTZdct2", "title": "March", "year": "2022", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1myqF3drJ1S", "doi": "10.1109/TPAMI.2020.3019139", "abstract": "We present an approach for 3D human pose estimation from monocular images. The approach consists of two steps: it first estimates a 2D pose from an image and then estimates the corresponding 3D pose. This paper focuses on the second step. Graph convolutional network (GCN) has recently become the de facto standard for human pose related tasks such as action recognition. However, in this work, we show that GCN has critical limitations when it is used for 3D pose estimation due to the inherent weight sharing scheme. The limitations are clearly exposed through a novel reformulation of GCN, in which both GCN and Fully Connected Network (FCN) are its special cases. In addition, on top of the formulation, we present <italic>locally connected network</italic> (LCN) to overcome the limitations of GCN by allocating dedicated rather than shared filters for different joints. We jointly train the LCN network with a 2D pose estimator such that it can handle inaccurate 2D poses. We evaluate our approach on two benchmark datasets and observe that LCN outperforms GCN, FCN, and the state-of-the-art methods by a large margin. More importantly, it demonstrates strong cross-dataset generalization ability because of sparse connections among body joints.", "abstracts": [ { "abstractType": "Regular", "content": "We present an approach for 3D human pose estimation from monocular images. The approach consists of two steps: it first estimates a 2D pose from an image and then estimates the corresponding 3D pose. This paper focuses on the second step. Graph convolutional network (GCN) has recently become the de facto standard for human pose related tasks such as action recognition. However, in this work, we show that GCN has critical limitations when it is used for 3D pose estimation due to the inherent weight sharing scheme. The limitations are clearly exposed through a novel reformulation of GCN, in which both GCN and Fully Connected Network (FCN) are its special cases. In addition, on top of the formulation, we present <italic>locally connected network</italic> (LCN) to overcome the limitations of GCN by allocating dedicated rather than shared filters for different joints. We jointly train the LCN network with a 2D pose estimator such that it can handle inaccurate 2D poses. We evaluate our approach on two benchmark datasets and observe that LCN outperforms GCN, FCN, and the state-of-the-art methods by a large margin. More importantly, it demonstrates strong cross-dataset generalization ability because of sparse connections among body joints.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an approach for 3D human pose estimation from monocular images. The approach consists of two steps: it first estimates a 2D pose from an image and then estimates the corresponding 3D pose. This paper focuses on the second step. Graph convolutional network (GCN) has recently become the de facto standard for human pose related tasks such as action recognition. However, in this work, we show that GCN has critical limitations when it is used for 3D pose estimation due to the inherent weight sharing scheme. The limitations are clearly exposed through a novel reformulation of GCN, in which both GCN and Fully Connected Network (FCN) are its special cases. In addition, on top of the formulation, we present locally connected network (LCN) to overcome the limitations of GCN by allocating dedicated rather than shared filters for different joints. We jointly train the LCN network with a 2D pose estimator such that it can handle inaccurate 2D poses. We evaluate our approach on two benchmark datasets and observe that LCN outperforms GCN, FCN, and the state-of-the-art methods by a large margin. More importantly, it demonstrates strong cross-dataset generalization ability because of sparse connections among body joints.", "title": "Locally Connected Network for Monocular 3D Human Pose Estimation", "normalizedTitle": "Locally Connected Network for Monocular 3D Human Pose Estimation", "fno": "09174911", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Image Representation", "Learning Artificial Intelligence", "Pose Estimation", "Locally Connected Network", "Monocular 3 D Human Pose Estimation", "Monocular Images", "Graph Convolutional Network", "GCN", "Critical Limitations", "Inherent Weight Sharing Scheme", "Fully Connected Network", "LCN Network", "Inaccurate 2 D Poses", "Sparse Connections", "Three Dimensional Displays", "Two Dimensional Displays", "Pose Estimation", "Feature Extraction", "Solid Modeling", "Training", "Task Analysis", "3 D Human Pose Estimation", "Locally Connected Network", "Graph Convolution" ], "authors": [ { "givenName": "Hai", "surname": "Ci", "fullName": "Hai Ci", "affiliation": "Department of Computer Science, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiaoxuan", "surname": "Ma", "fullName": "Xiaoxuan Ma", "affiliation": "Department of Computer Science, Peking University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chunyu", "surname": "Wang", "fullName": "Chunyu Wang", "affiliation": "Microsoft Research Asia, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yizhou", "surname": "Wang", "fullName": "Yizhou Wang", "affiliation": "Center on Frontiers of Computing Studies, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2022-03-01 00:00:00", "pubType": "trans", "pages": "1429-1442", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457f759", "title": "3D Human Pose Estimation = 2D Pose Estimation + Matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f759/12OmNAKcNOh", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851e966", "title": "Sparseness Meets Deepness: 3D Human Pose Estimation from Monocular Video", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851e966/12OmNCfjeyy", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032c621", "title": "Compositional Human Pose Regression", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032c621/12OmNqBtiU5", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2017/2610/0/261001a506", "title": "Monocular 3D Human Pose Estimation in the Wild Using Improved CNN Supervision", "doi": null, "abstractUrl": "/proceedings-article/3dv/2017/261001a506/12OmNxdDFF9", "parentPublication": { "id": "proceedings/3dv/2017/2610/0", "title": "2017 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/05/08611195", "title": "3D Human Pose Machines with Self-Supervised Learning", "doi": null, "abstractUrl": "/journal/tp/2020/05/08611195/17D45Wuc3bt", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a405", "title": "Multi-Person 3D Human Pose Estimation from Monocular Images", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a405/1ezRBMjoJxu", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c262", "title": "Optimizing Network Structure for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c262/1hQqv378v84", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c325", "title": "Monocular 3D Human Pose Estimation by Generation and Ordinal Ranking", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c325/1hVlIf7ZczK", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e341", "title": "Cross View Fusion for 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e341/1hVlLRoem40", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800a896", "title": "Deep Kinematics Analysis for Monocular 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800a896/1m3nmjQb31K", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09193980", "articleId": "1n0E7kLhBnO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09173698", "articleId": "1mtrY3UhOBG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1I6Nvxq2hxe", "title": "Dec.", "year": "2022", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ythZkR4guc", "doi": "10.1109/TPAMI.2021.3127885", "abstract": "Many attempts have been made towards combining RGB and 3D poses for the recognition of Activities of Daily Living (ADL). ADL may look very similar and often necessitate to model fine-grained details to distinguish them. Because the recent 3D ConvNets are too rigid to capture the subtle visual patterns across an action, this research direction is dominated by methods combining RGB and 3D Poses. But the cost of computing 3D poses from RGB stream is high in the absence of appropriate sensors. This limits the usage of aforementioned approaches in real-world applications requiring low latency. Then, how to best take advantage of 3D Poses for recognizing ADL? To this end, we propose an extension of a pose driven attention mechanism: Video-Pose Network (VPN), exploring two distinct directions. One is to transfer the Pose knowledge into RGB through a feature-level distillation and the other towards mimicking pose driven attention through an attention-level distillation. Finally, these two approaches are integrated into a single model, we call <italic>VPN++</italic>. It is worth noting that VPN++ exploits the pose embeddings at training via distillation but not at inference. We show that VPN++ is not only effective but also provides a high speed up and high resilience to noisy Poses. VPN++, with or without 3D Poses, outperforms the representative baselines on 4 public datasets. Code is available at <uri>https://github.com/srijandas07/vpnplusplus</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Many attempts have been made towards combining RGB and 3D poses for the recognition of Activities of Daily Living (ADL). ADL may look very similar and often necessitate to model fine-grained details to distinguish them. Because the recent 3D ConvNets are too rigid to capture the subtle visual patterns across an action, this research direction is dominated by methods combining RGB and 3D Poses. But the cost of computing 3D poses from RGB stream is high in the absence of appropriate sensors. This limits the usage of aforementioned approaches in real-world applications requiring low latency. Then, how to best take advantage of 3D Poses for recognizing ADL? To this end, we propose an extension of a pose driven attention mechanism: Video-Pose Network (VPN), exploring two distinct directions. One is to transfer the Pose knowledge into RGB through a feature-level distillation and the other towards mimicking pose driven attention through an attention-level distillation. Finally, these two approaches are integrated into a single model, we call <italic>VPN++</italic>. It is worth noting that VPN++ exploits the pose embeddings at training via distillation but not at inference. We show that VPN++ is not only effective but also provides a high speed up and high resilience to noisy Poses. VPN++, with or without 3D Poses, outperforms the representative baselines on 4 public datasets. Code is available at <uri>https://github.com/srijandas07/vpnplusplus</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many attempts have been made towards combining RGB and 3D poses for the recognition of Activities of Daily Living (ADL). ADL may look very similar and often necessitate to model fine-grained details to distinguish them. Because the recent 3D ConvNets are too rigid to capture the subtle visual patterns across an action, this research direction is dominated by methods combining RGB and 3D Poses. But the cost of computing 3D poses from RGB stream is high in the absence of appropriate sensors. This limits the usage of aforementioned approaches in real-world applications requiring low latency. Then, how to best take advantage of 3D Poses for recognizing ADL? To this end, we propose an extension of a pose driven attention mechanism: Video-Pose Network (VPN), exploring two distinct directions. One is to transfer the Pose knowledge into RGB through a feature-level distillation and the other towards mimicking pose driven attention through an attention-level distillation. Finally, these two approaches are integrated into a single model, we call VPN++. It is worth noting that VPN++ exploits the pose embeddings at training via distillation but not at inference. We show that VPN++ is not only effective but also provides a high speed up and high resilience to noisy Poses. VPN++, with or without 3D Poses, outperforms the representative baselines on 4 public datasets. Code is available at https://github.com/srijandas07/vpnplusplus.", "title": "VPN++: Rethinking Video-Pose Embeddings for Understanding Activities of Daily Living", "normalizedTitle": "VPN++: Rethinking Video-Pose Embeddings for Understanding Activities of Daily Living", "fno": "09613748", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Convolutional Neural Nets", "Image Colour Analysis", "Image Motion Analysis", "Image Recognition", "Pose Estimation", "Stereo Image Processing", "Video Signal Processing", "3 D Conv Nets", "3 D Poses", "Activities Of Daily Living Recognition", "ADL Recognition", "Attention Level Distillation", "Feature Level Distillation", "Pose Knowledge Transfer", "RGB Stream", "Video Pose Embeddings", "Video Pose Network", "VPN", "Three Dimensional Displays", "Videos", "Virtual Private Networks", "Visualization", "Skeleton", "Topology", "Task Analysis", "Trimmed Videos", "Pose", "Activities Of Daily Living", "Embedding", "Attention" ], "authors": [ { "givenName": "Srijan", "surname": "Das", "fullName": "Srijan Das", "affiliation": "Stony Brook University, Stony Brook, NY, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Rui", "surname": "Dai", "fullName": "Rui Dai", "affiliation": "Inria and Universite Cote d'Azur, Valbonne, France", "__typename": "ArticleAuthorType" }, { "givenName": "Di", "surname": "Yang", "fullName": "Di Yang", "affiliation": "Inria and Universite Cote d'Azur, Valbonne, France", "__typename": "ArticleAuthorType" }, { "givenName": "Francois", "surname": "Bremond", "fullName": "Francois Bremond", "affiliation": "Inria and Universite Cote d'Azur, Valbonne, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2022-12-01 00:00:00", "pubType": "trans", "pages": "9703-9717", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2013/5004/0/5004b376", "title": "The Research and Implementation of the VPN Gateway Based on SSL", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004b376/12OmNAlNiSV", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2013/3755/0/06755020", "title": "Development and evaluation of LISP-based instant VPN services", "doi": null, "abstractUrl": "/proceedings-article/iscc/2013/06755020/12OmNBtCCJU", "parentPublication": { "id": "proceedings/iscc/2013/3755/0", "title": "2013 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icndc/2013/3046/0/3046a070", "title": "SSL VPN System Based on Simulated Virtual NIC", "doi": null, "abstractUrl": "/proceedings-article/icndc/2013/3046a070/12OmNx8fidy", "parentPublication": { "id": "proceedings/icndc/2013/3046/0", "title": "2013 Fourth International Conference on Networking and Distributed Computing (ICNDC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/2014/8205/0/07026256", "title": "Application of VPN Technology in Multi-campus Adult Education Platform", "doi": null, "abstractUrl": "/proceedings-article/ca/2014/07026256/12OmNz2kqjh", "parentPublication": { "id": "proceedings/ca/2014/8205/0", "title": "2014 7th Conference on Control and Automation (CA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcc/2004/8601/2/01391787", "title": "Layer 1 VPN architecture and its evaluation", "doi": null, "abstractUrl": "/proceedings-article/apcc/2004/01391787/12OmNzIUfTd", "parentPublication": { "id": "proceedings/apcc/2004/8601/1", "title": "APCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewsdn/2013/2433/0/2433a013", "title": "Dynamic VPN Optimization by ALTO Guidance", "doi": null, "abstractUrl": "/proceedings-article/ewsdn/2013/2433a013/12OmNzXFoE6", "parentPublication": { "id": "proceedings/ewsdn/2013/2433/0", "title": "2013 Second European Workshop on Software Defined Networks (EWSDN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a130", "title": "Topology Design of VPN Based on Communication Performance and Server Load", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a130/1cI5XRD0rXW", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsm/2019/24/0/09012673", "title": "Scalability evaluation of VPN technologies for secure container networking", "doi": null, "abstractUrl": "/proceedings-article/cnsm/2019/09012673/1hQr1CHYzDO", "parentPublication": { "id": "proceedings/cnsm/2019/24/0", "title": "2019 15th International Conference on Network and Service Management (CNSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093575", "title": "Looking deeper into Time for Activities of Daily Living Recognition", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093575/1jPbc5503Ac", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2020/8954/0/895400a241", "title": "VPN Traffic Classification Based on Payload Length Sequence", "doi": null, "abstractUrl": "/proceedings-article/nana/2020/895400a241/1rlFcUviKe4", "parentPublication": { "id": "proceedings/nana/2020/8954/0", "title": "2020 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09591307", "articleId": "1y2FemmP5ok", "__typename": "AdjacentArticleType" }, "next": { "fno": "09645253", "articleId": "1zc6yjofBSM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNzcPAm0", "title": "April-June", "year": "2014", "issueNum": "02", "idPrefix": "th", "pubType": "journal", "volume": "7", "label": "April-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUNvgz4r", "doi": "10.1109/TOH.2013.2296312", "abstract": "Haptic stimulation can help humans learn perceptual motor skills, but the precise way in which it influences the learning process has not yet been clarified. This study investigates the role of the kinesthetic and cutaneous components of haptic feedback during the learning of a viscous curl field, taking also into account the influence of visual feedback. We present the results of an experiment in which 17 subjects were asked to make reaching movements while grasping a joystick and wearing a pair of cutaneous devices. Each device was able to provide cutaneous contact forces through a moving platform. The subjects received visual feedback about joystick's position. During the experiment, the system delivered a perturbation through (1) full haptic stimulation, (2) kinesthetic stimulation alone, (3) cutaneous stimulation alone, (4) altered visual feedback, or (5) altered visual feedback plus cutaneous stimulation. Conditions 1, 2, and 3 were also tested with the cancellation of the visual feedback of position error. Results indicate that kinesthetic stimuli played a primary role during motor adaptation to the viscous field, which is a fundamental premise to motor learning and rehabilitation. On the other hand, cutaneous stimulation alone appeared not to bring significant direct or adaptation effects, although it helped in reducing direct effects when used in addition to kinesthetic stimulation. The experimental conditions with visual cancellation of position error showed slower adaptation rates, indicating that visual feedback actively contributes to the formation of internal models. However, modest learning effects were detected when the visual information was used to render the viscous field.", "abstracts": [ { "abstractType": "Regular", "content": "Haptic stimulation can help humans learn perceptual motor skills, but the precise way in which it influences the learning process has not yet been clarified. This study investigates the role of the kinesthetic and cutaneous components of haptic feedback during the learning of a viscous curl field, taking also into account the influence of visual feedback. We present the results of an experiment in which 17 subjects were asked to make reaching movements while grasping a joystick and wearing a pair of cutaneous devices. Each device was able to provide cutaneous contact forces through a moving platform. The subjects received visual feedback about joystick's position. During the experiment, the system delivered a perturbation through (1) full haptic stimulation, (2) kinesthetic stimulation alone, (3) cutaneous stimulation alone, (4) altered visual feedback, or (5) altered visual feedback plus cutaneous stimulation. Conditions 1, 2, and 3 were also tested with the cancellation of the visual feedback of position error. Results indicate that kinesthetic stimuli played a primary role during motor adaptation to the viscous field, which is a fundamental premise to motor learning and rehabilitation. On the other hand, cutaneous stimulation alone appeared not to bring significant direct or adaptation effects, although it helped in reducing direct effects when used in addition to kinesthetic stimulation. The experimental conditions with visual cancellation of position error showed slower adaptation rates, indicating that visual feedback actively contributes to the formation of internal models. However, modest learning effects were detected when the visual information was used to render the viscous field.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Haptic stimulation can help humans learn perceptual motor skills, but the precise way in which it influences the learning process has not yet been clarified. This study investigates the role of the kinesthetic and cutaneous components of haptic feedback during the learning of a viscous curl field, taking also into account the influence of visual feedback. We present the results of an experiment in which 17 subjects were asked to make reaching movements while grasping a joystick and wearing a pair of cutaneous devices. Each device was able to provide cutaneous contact forces through a moving platform. The subjects received visual feedback about joystick's position. During the experiment, the system delivered a perturbation through (1) full haptic stimulation, (2) kinesthetic stimulation alone, (3) cutaneous stimulation alone, (4) altered visual feedback, or (5) altered visual feedback plus cutaneous stimulation. Conditions 1, 2, and 3 were also tested with the cancellation of the visual feedback of position error. Results indicate that kinesthetic stimuli played a primary role during motor adaptation to the viscous field, which is a fundamental premise to motor learning and rehabilitation. On the other hand, cutaneous stimulation alone appeared not to bring significant direct or adaptation effects, although it helped in reducing direct effects when used in addition to kinesthetic stimulation. The experimental conditions with visual cancellation of position error showed slower adaptation rates, indicating that visual feedback actively contributes to the formation of internal models. However, modest learning effects were detected when the visual information was used to render the viscous field.", "title": "Effects of Kinesthetic and Cutaneous Stimulation During the Learning of a Viscous Force Field", "normalizedTitle": "Effects of Kinesthetic and Cutaneous Stimulation During the Learning of a Viscous Force Field", "fno": "06710112", "hasPdf": true, "idPrefix": "th", "keywords": [ "Visualization", "Haptic Interfaces", "Force", "Training", "Robots", "Trajectory", "Indexes", "Visual Perturbation", "Cutaneous Stimulation", "Kinesthetic Stimulation", "Haptic Force Feedback", "Adaptation", "Dynamic Perturbation", "Rehabilitation" ], "authors": [ { "givenName": "Giulio", "surname": "Rosati", "fullName": "Giulio Rosati", "affiliation": "Dept. of Manage. & Eng., Univ. of Padua, Padua, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Fabio", "surname": "Oscari", "fullName": "Fabio Oscari", "affiliation": "Dept. of Manage. & Eng., Univ. of Padua, Padua, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Claudio", "surname": "Pacchierotti", "fullName": "Claudio Pacchierotti", "affiliation": "Dept. of Inf. Eng. & Math., Univ. of Siena, Siena, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Domenico", "surname": "Prattichizzo", "fullName": "Domenico Prattichizzo", "affiliation": "Dept. of Inf. Eng. & Math., Univ. of Siena, Siena, Italy", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2014-04-01 00:00:00", "pubType": "trans", "pages": "251-263", "year": "2014", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/haptics/2010/6821/0/05444667", "title": "Design of a novel finger haptic interface for contact and orientation display", "doi": null, "abstractUrl": "/proceedings-article/haptics/2010/05444667/12OmNAQJzQf", "parentPublication": { "id": "proceedings/haptics/2010/6821/0", "title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504744", "title": "bioSync: Wearable haptic I/O device for synchronous kinesthetic interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504744/12OmNyKJiB6", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344697", "title": "Perception of congruent facial and kinesthetic expressions of emotions", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344697/12OmNynJMEK", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2010/6821/0/05444646", "title": "Simplified design of haptic display by extending one-point kinesthetic feedback to multipoint tactile feedback", "doi": null, "abstractUrl": "/proceedings-article/haptics/2010/05444646/12OmNyvGylZ", "parentPublication": { "id": "proceedings/haptics/2010/6821/0", "title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446516", "title": "Softness-Hardness and Stickiness Feedback Using Electrical Stimulation While Touching a Virtual Object", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446516/13bd1fWcuDz", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2015/04/07161354", "title": "Enhancing the Performance of Passive Teleoperation Systems via Cutaneous Feedback", "doi": null, "abstractUrl": "/journal/th/2015/04/07161354/13rRUEgarBC", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2016/03/07452650", "title": "Non-Colocated Kinesthetic Display Limits Compliance Discrimination in the Absence of Terminal Force Cues", "doi": null, "abstractUrl": "/journal/th/2016/03/07452650/13rRUwjoNxb", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2010/02/tth2010020109", "title": "Rendering Softness: Integration of Kinesthetic and Cutaneous Information in a Haptic Device", "doi": null, "abstractUrl": "/journal/th/2010/02/tth2010020109/13rRUwwJWFX", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/04/06909076", "title": "Teleoperation of Steerable Flexible Needles by Combining Kinesthetic and Vibratory Feedback", "doi": null, "abstractUrl": "/journal/th/2014/04/06909076/13rRUxASuhN", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2012/04/tth2012040289", "title": "Cutaneous Force Feedback as a Sensory Subtraction Technique in Haptics", "doi": null, "abstractUrl": "/journal/th/2012/04/tth2012040289/13rRUxD9gXT", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06701132", "articleId": "13rRUNvyaf8", "__typename": "AdjacentArticleType" }, "next": { "fno": "06636313", "articleId": "13rRUIM2VBR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxGAL91", "title": "First Quarter", "year": "2013", "issueNum": "01", "idPrefix": "th", "pubType": "journal", "volume": "6", "label": "First Quarter", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxcKzVp", "doi": "10.1109/TOH.2012.3", "abstract": "We introduce a novel posture guidance office chair and evaluate the effectiveness of vibrotactile and visual feedback methods for guiding seated postures. For visually dominant office work such as typing on the computer, it is possible that delivering posture feedback visually may overload the visual sense while haptic feedback may be a viable alternative. We performed two experiments to compare vibrotactile and visual feedback-posture compliance and dual-task cognitive workload assessment. In the first experiment, our results showed no statistically significant difference in effectiveness between using vibrotactile and visual feedback to obtain postural compliance to a reference posture. In the second experiment, participants experienced typing performance and response time degradations from both types of feedback. However the differences in performance degradation were not statistically significant between the two feedback methods. We conclude that vibrotactile and visual feedback are similarly effective for guiding quasistatic postures in routine tasks such as seated office work.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a novel posture guidance office chair and evaluate the effectiveness of vibrotactile and visual feedback methods for guiding seated postures. For visually dominant office work such as typing on the computer, it is possible that delivering posture feedback visually may overload the visual sense while haptic feedback may be a viable alternative. We performed two experiments to compare vibrotactile and visual feedback-posture compliance and dual-task cognitive workload assessment. In the first experiment, our results showed no statistically significant difference in effectiveness between using vibrotactile and visual feedback to obtain postural compliance to a reference posture. In the second experiment, participants experienced typing performance and response time degradations from both types of feedback. However the differences in performance degradation were not statistically significant between the two feedback methods. We conclude that vibrotactile and visual feedback are similarly effective for guiding quasistatic postures in routine tasks such as seated office work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a novel posture guidance office chair and evaluate the effectiveness of vibrotactile and visual feedback methods for guiding seated postures. For visually dominant office work such as typing on the computer, it is possible that delivering posture feedback visually may overload the visual sense while haptic feedback may be a viable alternative. We performed two experiments to compare vibrotactile and visual feedback-posture compliance and dual-task cognitive workload assessment. In the first experiment, our results showed no statistically significant difference in effectiveness between using vibrotactile and visual feedback to obtain postural compliance to a reference posture. In the second experiment, participants experienced typing performance and response time degradations from both types of feedback. However the differences in performance degradation were not statistically significant between the two feedback methods. We conclude that vibrotactile and visual feedback are similarly effective for guiding quasistatic postures in routine tasks such as seated office work.", "title": "Comparison of Visual and Vibrotactile Feedback Methods for Seated Posture Guidance", "normalizedTitle": "Comparison of Visual and Vibrotactile Feedback Methods for Seated Posture Guidance", "fno": "tth2013010013", "hasPdf": true, "idPrefix": "th", "keywords": [ "Sensors", "Visualization", "Back", "Vibrations", "Haptic Interfaces", "Accuracy", "Calibration", "Human Information Processing", "Hardware Miscellaneous", "Haptic I O", "Human Factors" ], "authors": [ { "givenName": null, "surname": "Ying Zheng", "fullName": "Ying Zheng", "affiliation": "Dept. of Mech. Eng. & Mater. Sci., Yale Univ., New Haven, CT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "J. B.", "surname": "Morrell", "fullName": "J. B. Morrell", "affiliation": "Dept. of Mech. Eng. & Mater. Sci., Yale Univ., New Haven, CT, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2013-01-01 00:00:00", "pubType": "trans", "pages": "13-23", "year": "2013", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/haptics/2010/6821/0/05444633", "title": "A vibrotactile feedback approach to posture guidance", "doi": null, "abstractUrl": "/proceedings-article/haptics/2010/05444633/12OmNAo45Ki", "parentPublication": { "id": "proceedings/haptics/2010/6821/0", "title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2017/0563/0/08273612", "title": "Emotional responses of vibrotactile-thermal stimuli: Effects of constant-temperature thermal stimuli", "doi": null, "abstractUrl": "/proceedings-article/acii/2017/08273612/12OmNqMPfQu", "parentPublication": { "id": "proceedings/acii/2017/0563/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549354", "title": "Virtual alteration of body material by periodic vibrotactile feedback", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549354/12OmNvk7JY0", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892375", "title": "Experiencing guidance in 3D spaces with a vibrotactile head-mounted display", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892375/12OmNy5hRo2", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892237", "title": "Exploring the effect of vibrotactile feedback through the floor on social presence in an immersive virtual environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892237/12OmNzh5z4G", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/03/07581117", "title": "A Physics-Based Vibrotactile Feedback Library for Collision Events", "doi": null, "abstractUrl": "/journal/th/2017/03/07581117/13rRUwIF69q", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/03/07556272", "title": "Vibrotactile Compliance Feedback for Tangential Force Interaction", "doi": null, "abstractUrl": "/journal/th/2017/03/07556272/13rRUwcS1D9", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2015/03/07060731", "title": "Vibrotactile Guidance for Wayfinding of Blind Walkers", "doi": null, "abstractUrl": "/journal/th/2015/03/07060731/13rRUy2YLT9", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08642446", "title": "Modulating Fine Roughness Perception of Vibrotactile Textured Surface using Pseudo-haptic Effect", "doi": null, "abstractUrl": "/journal/tg/2019/05/08642446/17PYEjfZjoZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797956", "title": "Haptic Compass: Active Vibrotactile Feedback of Physical Object for Path Guidance", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797956/1cJ17BLEK88", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "tth2013010002", "articleId": "13rRUwInvJq", "__typename": "AdjacentArticleType" }, "next": { "fno": "tth2013010024", "articleId": "13rRUNvgza3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DGRZtSiOdy", "title": "July", "year": "2022", "issueNum": "07", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "July", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1pb9BhAe16o", "doi": "10.1109/TVCG.2020.3041341", "abstract": "Virtual reality (VR) is a valuable experimental tool for studying human movement, including the analysis of interactions during locomotion tasks for developing crowd simulation algorithms. However, these studies are generally limited to <italic>distant</italic> interactions in crowds, due to the difficulty of rendering realistic sensations of collisions in VR. In this article, we explore the use of wearable haptics to render contacts during virtual crowd navigation. We focus on the behavioral changes occurring with or without haptic rendering during a navigation task in a dense crowd, as well as on potential after-effects introduced by the use haptic rendering. Our objective is to provide recommendations for designing VR setup to study crowd navigation behavior. To the end, we designed an experiment (N=23) where participants navigated in a crowded virtual train station without, then with, and then again without haptic feedback of their collisions with virtual characters. Results show that providing haptic feedback improved the overall realism of the interaction, as participants more actively avoided collisions. We also noticed a significant after-effect in the users&#x2019; behavior when haptic rendering was once again disabled in the third part of the experiment. Nonetheless, haptic feedback did not have any significant impact on the users&#x2019; sense of presence and embodiment.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual reality (VR) is a valuable experimental tool for studying human movement, including the analysis of interactions during locomotion tasks for developing crowd simulation algorithms. However, these studies are generally limited to <italic>distant</italic> interactions in crowds, due to the difficulty of rendering realistic sensations of collisions in VR. In this article, we explore the use of wearable haptics to render contacts during virtual crowd navigation. We focus on the behavioral changes occurring with or without haptic rendering during a navigation task in a dense crowd, as well as on potential after-effects introduced by the use haptic rendering. Our objective is to provide recommendations for designing VR setup to study crowd navigation behavior. To the end, we designed an experiment (N=23) where participants navigated in a crowded virtual train station without, then with, and then again without haptic feedback of their collisions with virtual characters. Results show that providing haptic feedback improved the overall realism of the interaction, as participants more actively avoided collisions. We also noticed a significant after-effect in the users&#x2019; behavior when haptic rendering was once again disabled in the third part of the experiment. Nonetheless, haptic feedback did not have any significant impact on the users&#x2019; sense of presence and embodiment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual reality (VR) is a valuable experimental tool for studying human movement, including the analysis of interactions during locomotion tasks for developing crowd simulation algorithms. However, these studies are generally limited to distant interactions in crowds, due to the difficulty of rendering realistic sensations of collisions in VR. In this article, we explore the use of wearable haptics to render contacts during virtual crowd navigation. We focus on the behavioral changes occurring with or without haptic rendering during a navigation task in a dense crowd, as well as on potential after-effects introduced by the use haptic rendering. Our objective is to provide recommendations for designing VR setup to study crowd navigation behavior. To the end, we designed an experiment (N=23) where participants navigated in a crowded virtual train station without, then with, and then again without haptic feedback of their collisions with virtual characters. Results show that providing haptic feedback improved the overall realism of the interaction, as participants more actively avoided collisions. We also noticed a significant after-effect in the users’ behavior when haptic rendering was once again disabled in the third part of the experiment. Nonetheless, haptic feedback did not have any significant impact on the users’ sense of presence and embodiment.", "title": "Crowd Navigation in VR: Exploring Haptic Rendering of Collisions", "normalizedTitle": "Crowd Navigation in VR: Exploring Haptic Rendering of Collisions", "fno": "09273221", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Haptic Interfaces", "Rendering Computer Graphics", "Virtual Reality", "Haptic Feedback", "Actively Avoided Collisions", "Virtual Reality", "Valuable Experimental Tool", "Locomotion Tasks", "Crowd Simulation Algorithms", "Distant Interactions", "Wearable Haptics", "Virtual Crowd Navigation", "Navigation Task", "Dense Crowd", "Use Haptic Rendering", "Designing VR Setup", "Crowd Navigation Behavior", "Crowded Virtual Train Station", "Virtual Characters", "Haptic Interfaces", "Rendering Computer Graphics", "Navigation", "Task Analysis", "Solid Modeling", "Virtual Environments", "Trajectory", "Crowd", "Human Interaction", "Haptic Rendering", "Virtual Reality" ], "authors": [ { "givenName": "Florian", "surname": "Berton", "fullName": "Florian Berton", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Fabien", "surname": "Grzeskowiak", "fullName": "Fabien Grzeskowiak", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Alexandre", "surname": "Bonneau", "fullName": "Alexandre Bonneau", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Alberto", "surname": "Jovane", "fullName": "Alberto Jovane", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Marco", "surname": "Aggravi", "fullName": "Marco Aggravi", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Ludovic", "surname": "Hoyet", "fullName": "Ludovic Hoyet", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Anne-Hélène", "surname": "Olivier", "fullName": "Anne-Hélène Olivier", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Claudio", "surname": "Pacchierotti", "fullName": "Claudio Pacchierotti", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" }, { "givenName": "Julien", "surname": "Pettré", "fullName": "Julien Pettré", "affiliation": "Inria, Univ Rennes, M2S, CNRS, IRISA, Rennes, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "07", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "2589-2601", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cw/2012/4814/0/4814a157", "title": "Stable Dynamic Algorithm Based on Virtual Coupling for 6-DOF Haptic Rendering", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a157/12OmNqJ8tk6", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/2/3804b156", "title": "Realization and Application of Mass-Spring Model in Haptic Rendering System for Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804b156/12OmNqJZgGC", "parentPublication": { "id": "proceedings/icicta/2009/3804/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479948", "title": "Perceptual Rendering for Learning Haptic Skills", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479948/12OmNqJq4vK", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a025", "title": "Haptic Rendering Algorithm for Biomolecular Docking with Torque Force", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a025/12OmNrMHOlc", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2007/3005/0/30050277", "title": "Integrating Force and Tactile Rendering Into a Single VR System", "doi": null, "abstractUrl": "/proceedings-article/cw/2007/30050277/12OmNwvVryK", "parentPublication": { "id": "proceedings/cw/2007/3005/0", "title": "2007 International Conference on Cyberworlds (CW'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2004/2112/0/21120002", "title": "Haptic Rendering of Rigid Body Collisions", "doi": null, "abstractUrl": "/proceedings-article/haptics/2004/21120002/12OmNylKALD", "parentPublication": { "id": "proceedings/haptics/2004/2112/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a286", "title": "Image-Driven Haptic Rendering in Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a286/12OmNyuy9Q9", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446128", "title": "Rendering of Pressure and Textures Using Wearable Haptics in Immersive VR Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446128/13bd1eSlyt0", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/02/07577891", "title": "6-DoF Haptic Rendering Using Continuous Collision Detection between Points and Signed Distance Fields", "doi": null, "abstractUrl": "/journal/th/2017/02/07577891/13rRUxDqS8u", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2006/2754/0/04089232", "title": "A Proposal of a High Definition Haptic Rendering for Stability and Fidelity", "doi": null, "abstractUrl": "/proceedings-article/icat/2006/04089232/17D45Wc1II6", "parentPublication": { "id": "proceedings/icat/2006/2754/0", "title": "16th International Conference on Artificial Reality and Telexistence--Workshops (ICAT'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09266101", "articleId": "1oZxGnBQoZa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09247297", "articleId": "1osly2gk33q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1DGS43O03WE", "name": "ttg202207-09273221s1-supp1-3041341.avi", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202207-09273221s1-supp1-3041341.avi", "extension": "avi", "size": "97.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1JTZY9PMISI", "doi": "10.1109/TPAMI.2023.3236725", "abstract": "Attention-based neural networks, such as Transformers, have become ubiquitous in numerous applications, including computer vision, natural language processing, and time-series analysis. In all kinds of attention networks, the attention maps are crucial as they encode semantic dependencies between input tokens. However, most existing attention networks perform modeling or reasoning based on <italic>representations</italic>, wherein the <italic>attention maps</italic> of different layers are learned separately <italic>without</italic> explicit interactions. In this paper, we propose a <italic>novel</italic> and <italic>generic</italic> evolving attention mechanism, which directly models the <italic>evolution</italic> of <italic>inter-token relationships</italic> through a chain of residual convolutional modules. The major motivations are twofold. On the one hand, the attention maps in different layers share transferable knowledge, thus adding a residual connection can facilitate the information flow of inter-token relationships across layers. On the other hand, there is naturally an evolutionary trend among attention maps at different abstraction levels, so it is beneficial to exploit a dedicated convolution-based module to capture this process. Equipped with the proposed mechanism, the convolution-enhanced evolving attention networks achieve superior performance in various applications, including time-series representation, natural language understanding, machine translation, and image classification. Especially on time-series representation tasks, Evolving Attention-enhanced Dilated Convolutional (EA-DC-) Transformer outperforms state-of-the-art models significantly, achieving an average of 17&#x0025; improvement compared to the best SOTA. To the best of our knowledge, this is the first work that explicitly models the layer-wise evolution of attention maps. Our implementation is available at <italic><uri>https://github.com/pkuyym/EvolvingAttention</uri></italic>.", "abstracts": [ { "abstractType": "Regular", "content": "Attention-based neural networks, such as Transformers, have become ubiquitous in numerous applications, including computer vision, natural language processing, and time-series analysis. In all kinds of attention networks, the attention maps are crucial as they encode semantic dependencies between input tokens. However, most existing attention networks perform modeling or reasoning based on <italic>representations</italic>, wherein the <italic>attention maps</italic> of different layers are learned separately <italic>without</italic> explicit interactions. In this paper, we propose a <italic>novel</italic> and <italic>generic</italic> evolving attention mechanism, which directly models the <italic>evolution</italic> of <italic>inter-token relationships</italic> through a chain of residual convolutional modules. The major motivations are twofold. On the one hand, the attention maps in different layers share transferable knowledge, thus adding a residual connection can facilitate the information flow of inter-token relationships across layers. On the other hand, there is naturally an evolutionary trend among attention maps at different abstraction levels, so it is beneficial to exploit a dedicated convolution-based module to capture this process. Equipped with the proposed mechanism, the convolution-enhanced evolving attention networks achieve superior performance in various applications, including time-series representation, natural language understanding, machine translation, and image classification. Especially on time-series representation tasks, Evolving Attention-enhanced Dilated Convolutional (EA-DC-) Transformer outperforms state-of-the-art models significantly, achieving an average of 17&#x0025; improvement compared to the best SOTA. To the best of our knowledge, this is the first work that explicitly models the layer-wise evolution of attention maps. Our implementation is available at <italic><uri>https://github.com/pkuyym/EvolvingAttention</uri></italic>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Attention-based neural networks, such as Transformers, have become ubiquitous in numerous applications, including computer vision, natural language processing, and time-series analysis. In all kinds of attention networks, the attention maps are crucial as they encode semantic dependencies between input tokens. However, most existing attention networks perform modeling or reasoning based on representations, wherein the attention maps of different layers are learned separately without explicit interactions. In this paper, we propose a novel and generic evolving attention mechanism, which directly models the evolution of inter-token relationships through a chain of residual convolutional modules. The major motivations are twofold. On the one hand, the attention maps in different layers share transferable knowledge, thus adding a residual connection can facilitate the information flow of inter-token relationships across layers. On the other hand, there is naturally an evolutionary trend among attention maps at different abstraction levels, so it is beneficial to exploit a dedicated convolution-based module to capture this process. Equipped with the proposed mechanism, the convolution-enhanced evolving attention networks achieve superior performance in various applications, including time-series representation, natural language understanding, machine translation, and image classification. Especially on time-series representation tasks, Evolving Attention-enhanced Dilated Convolutional (EA-DC-) Transformer outperforms state-of-the-art models significantly, achieving an average of 17% improvement compared to the best SOTA. To the best of our knowledge, this is the first work that explicitly models the layer-wise evolution of attention maps. Our implementation is available at https://github.com/pkuyym/EvolvingAttention.", "title": "Convolution-enhanced Evolving Attention Networks", "normalizedTitle": "Convolution-enhanced Evolving Attention Networks", "fno": "10016752", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Transformers", "Task Analysis", "Convolution", "Neural Networks", "Machine Translation", "Time Series Analysis", "Computational Modeling", "Evolving Attention", "Network Architecture", "Representation Learning", "Time Series", "Natural Language Understanding", "Machine Translation", "Image Classification" ], "authors": [ { "givenName": "Yujing", "surname": "Wang", "fullName": "Yujing Wang", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yaming", "surname": "Yang", "fullName": "Yaming Yang", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhuo", "surname": "Li", "fullName": "Zhuo Li", "affiliation": "Department of Computer Science & Technology, Engineering Research Center of Microprocessor & System, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiangang", "surname": "Bai", "fullName": "Jiangang Bai", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Mingliang", "surname": "Zhang", "fullName": "Mingliang Zhang", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiangtai", "surname": "Li", "fullName": "Xiangtai Li", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jing", "surname": "Yu", "fullName": "Jing Yu", "affiliation": "Institute of Information EngineeringChinese Academy of Sciences", "__typename": "ArticleAuthorType" }, { "givenName": "Ce", "surname": "Zhang", "fullName": "Ce Zhang", "affiliation": "ETH Zürich", "__typename": "ArticleAuthorType" }, { "givenName": "Gao", "surname": "Huang", "fullName": "Gao Huang", "affiliation": "Department of Automation, Tsinghua University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yunhai", "surname": "Tong", "fullName": "Yunhai Tong", "affiliation": "Key Laboratory of Machine Perception, MOE, School of Intelligence Science and Technology, Peking University, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2023/05/09912362", "title": "Beyond Self-Attention: External Attention Using Two Linear Layers for Visual Tasks", "doi": null, "abstractUrl": "/journal/tp/2023/05/09912362/1HeiINuN2bm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09956847", "title": "Evaluating Edge Credibility in Evolving Noisy Social Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/09956847/1Iu2qQQqq0E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/06/10081322", "title": "How Does Attention Work in Vision Transformers? A Visual Analytics Attempt", "doi": null, "abstractUrl": "/journal/tg/2023/06/10081322/1LRbRtJhrG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10091201", "title": "GFNet: Global Filter Networks for Visual Recognition", "doi": null, "abstractUrl": "/journal/tp/5555/01/10091201/1M2IH2SFO6I", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i857", "title": "Image Inpainting With Learnable Bidirectional Attention Maps", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i857/1hQqrTkskH6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j166", "title": "Expectation-Maximization Attention Networks for Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j166/1hVlDK4Slvq", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300d285", "title": "Attention Augmented Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300d285/1hVlt6Qly3C", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800l1027", "title": "Dynamic Convolution: Attention Over Convolution Kernels", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800l1027/1m3o9047vy0", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09497754", "title": "Interaction-Aware Spatio-Temporal Pyramid Attention Networks for Action Classification", "doi": null, "abstractUrl": "/journal/tp/2022/10/09497754/1vzY8haXFE4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a782", "title": "Transformer Interpretability Beyond Attention Visualization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a782/1yeIsbbCMO4", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10016237", "articleId": "1JSl3yHnjEc", "__typename": "AdjacentArticleType" }, "next": { "fno": "10016755", "articleId": "1JTZYZSUiGc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1JYYYDGpI1q", "name": "ttp555501-010016752s1-supp1-3236725.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-010016752s1-supp1-3236725.pdf", "extension": "pdf", "size": "1.32 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNx57HSN", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "sc", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1MGxFuKt77W", "doi": "10.1109/TSC.2023.3270921", "abstract": "Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications&#x0027; power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (<italic>LEAWM</italic>) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the most feasible destination. For this, we use the variation in the electricity price at the ISPs to decide the migration paths. However, reduced power consumption at the expense of higher migration time is intolerable for real-time applications. As finding an optimal relocation is <inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathcal {NP}$_Z</tex-math></inline-formula>-Hard, we propose an <italic>Ant Colony Optimization</italic> (ACO) based bi-objective optimization technique to strike a balance between migration delay and migration power. A thorough simulation analysis of the proposed approach shows that the proposed model can reduce the migration time by <inline-formula><tex-math notation=\"LaTeX\">Z_$25\\%$_Z</tex-math></inline-formula>&#x2013;<inline-formula><tex-math notation=\"LaTeX\">Z_$30\\%$_Z</tex-math></inline-formula> and electricity cost by approximately <inline-formula><tex-math notation=\"LaTeX\">Z_$25\\%$_Z</tex-math></inline-formula> compared to the baseline.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications&#x0027; power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (<italic>LEAWM</italic>) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the most feasible destination. For this, we use the variation in the electricity price at the ISPs to decide the migration paths. However, reduced power consumption at the expense of higher migration time is intolerable for real-time applications. As finding an optimal relocation is <inline-formula><tex-math notation=\"LaTeX\">$\\mathcal {NP}$</tex-math></inline-formula>-Hard, we propose an <italic>Ant Colony Optimization</italic> (ACO) based bi-objective optimization technique to strike a balance between migration delay and migration power. A thorough simulation analysis of the proposed approach shows that the proposed model can reduce the migration time by <inline-formula><tex-math notation=\"LaTeX\">$25\\%$</tex-math></inline-formula>&#x2013;<inline-formula><tex-math notation=\"LaTeX\">$30\\%$</tex-math></inline-formula> and electricity cost by approximately <inline-formula><tex-math notation=\"LaTeX\">$25\\%$</tex-math></inline-formula> compared to the baseline.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications' power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (LEAWM) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the most feasible destination. For this, we use the variation in the electricity price at the ISPs to decide the migration paths. However, reduced power consumption at the expense of higher migration time is intolerable for real-time applications. As finding an optimal relocation is --Hard, we propose an Ant Colony Optimization (ACO) based bi-objective optimization technique to strike a balance between migration delay and migration power. A thorough simulation analysis of the proposed approach shows that the proposed model can reduce the migration time by -–- and electricity cost by approximately - compared to the baseline.", "title": "Geo-distributed Multi-tier Workload Migration over Multi-timescale Electricity Markets", "normalizedTitle": "Geo-distributed Multi-tier Workload Migration over Multi-timescale Electricity Markets", "fno": "10109840", "hasPdf": true, "idPrefix": "sc", "keywords": [ "Costs", "Cloud Computing", "Optimization", "Power Demand", "Data Centers", "Energy Consumption", "Computer Science", "Workload Migration", "Migration Delay", "Migration Power", "Ant Colony Optimization", "Multi Tier Applications" ], "authors": [ { "givenName": "Sourav Kanti", "surname": "Addya", "fullName": "Sourav Kanti Addya", "affiliation": "Department of Computer Science & Engineering, National Institute of Technology Karnatak, Surathkal, India", "__typename": "ArticleAuthorType" }, { "givenName": "Anurag", "surname": "Satpathy", "fullName": "Anurag Satpathy", "affiliation": "Department of Computer Science & Engineering, National Institute of Technology, Rourkela, India", "__typename": "ArticleAuthorType" }, { "givenName": "Bishakh Chandra", "surname": "Ghosh", "fullName": "Bishakh Chandra Ghosh", "affiliation": "Department of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, India", "__typename": "ArticleAuthorType" }, { "givenName": "Sandip", "surname": "Chakraborty", "fullName": "Sandip Chakraborty", "affiliation": "Department of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, India", "__typename": "ArticleAuthorType" }, { "givenName": "Soumya K.", "surname": "Ghosh", "fullName": "Soumya K. Ghosh", "affiliation": "Department of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, India", "__typename": "ArticleAuthorType" }, { "givenName": "Sajal K.", "surname": "Das", "fullName": "Sajal K. Das", "affiliation": "Department of Computer Science, Missouri University of Science and Technology, Rolla, MO, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1939-1374", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/isee/2006/0351/0/01650054", "title": "Computer Power Management for Enterprises A Practical Guide for Saving up to $100 per Seat Annually in Electricity", "doi": null, "abstractUrl": "/proceedings-article/isee/2006/01650054/12OmNwdL7gD", "parentPublication": { "id": "proceedings/isee/2006/0351/0", "title": "Proceedings of the 2006 IEEE International Symposium on Electronics and the Environment", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/04/09705523", "title": "Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers", "doi": null, "abstractUrl": "/journal/nt/2022/04/09705523/1AO21NkOJLq", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/02/09736935", "title": "Towards Thermal-Aware Workload Distribution in Cloud Data Centers Based on Failure Models", "doi": null, "abstractUrl": "/journal/tc/2023/02/09736935/1BN1Vb56UDK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/02/09793695", "title": "CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds", "doi": null, "abstractUrl": "/journal/sc/2023/02/09793695/1E5LxzGzHXy", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09851943", "title": "ROLLED: <underline>R</underline>acetrack Memory <underline>O</underline>ptimized <underline>L</underline>inear <underline>L</underline>ayout and <underline>E</underline>fficient <underline>D</underline>ecomposition of Decision Trees", "doi": null, "abstractUrl": "/journal/tc/2023/05/09851943/1FFHeRJbMTm", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10050403", "title": "Hybrid Signed Convolution Module With Unsigned Divide-and-Conquer Multiplier for Energy-Efficient STT-MRAM-Based AI Accelerator", "doi": null, "abstractUrl": "/journal/si/5555/01/10050403/1KYoGc3qWbe", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2022/01/08781752", "title": "Probability-Based Online Algorithm for Switch Operation of Energy Efficient Data Center", "doi": null, "abstractUrl": "/journal/cc/2022/01/08781752/1c5tcqtdQze", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09269479", "title": "Efficient Radius-Bounded Community Search in Geo-Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09269479/1p1c8tla0DK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/01/09523604", "title": "Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime", "doi": null, "abstractUrl": "/journal/nt/2022/01/09523604/1wnL9MNq6Vq", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2023/01/09582834", "title": "Latency and Energy-Aware Load Balancing in Cloud Data Centers: A Bargaining Game Based Approach", "doi": null, "abstractUrl": "/journal/cc/2023/01/09582834/1xR2SrQJAXK", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10109159", "articleId": "1MESLg3dMnC", "__typename": "AdjacentArticleType" }, "next": { "fno": "10114999", "articleId": "1MQv6b9qoSI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1M80HueHnJS", "doi": "10.1109/TVCG.2023.3265306", "abstract": "We present ANISE, a method that reconstructs a 3D&#x00A0;shape from partial observations (images or sparse point clouds) using a part-aware neural implicit shape representation. The shape is formulated as an assembly of neural implicit functions, each representing a different part instance. In contrast to previous approaches, the prediction of this representation proceeds in a coarse-to-fine manner. Our model first reconstructs a structural arrangement of the shape in the form of geometric transformations of its part instances. Conditioned on them, the model predicts part latent codes encoding their surface geometry. Reconstructions can be obtained in two ways: (i) by directly decoding the part latent codes to part implicit functions, then combining them into the final shape; or (ii) by using part latents to retrieve similar part instances in a part database and assembling them in a single shape. We demonstrate that, when performing reconstruction by decoding part representations into implicit functions, our method achieves state-of-the-art part-aware reconstruction results from both images and sparse point clouds. When reconstructing shapes by assembling parts retrieved from a dataset, our approach significantly outperforms traditional shape retrieval methods even when significantly restricting the database size. We present our results in well-known sparse point cloud reconstruction and single-view reconstruction benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "We present ANISE, a method that reconstructs a 3D&#x00A0;shape from partial observations (images or sparse point clouds) using a part-aware neural implicit shape representation. The shape is formulated as an assembly of neural implicit functions, each representing a different part instance. In contrast to previous approaches, the prediction of this representation proceeds in a coarse-to-fine manner. Our model first reconstructs a structural arrangement of the shape in the form of geometric transformations of its part instances. Conditioned on them, the model predicts part latent codes encoding their surface geometry. Reconstructions can be obtained in two ways: (i) by directly decoding the part latent codes to part implicit functions, then combining them into the final shape; or (ii) by using part latents to retrieve similar part instances in a part database and assembling them in a single shape. We demonstrate that, when performing reconstruction by decoding part representations into implicit functions, our method achieves state-of-the-art part-aware reconstruction results from both images and sparse point clouds. When reconstructing shapes by assembling parts retrieved from a dataset, our approach significantly outperforms traditional shape retrieval methods even when significantly restricting the database size. We present our results in well-known sparse point cloud reconstruction and single-view reconstruction benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present ANISE, a method that reconstructs a 3D shape from partial observations (images or sparse point clouds) using a part-aware neural implicit shape representation. The shape is formulated as an assembly of neural implicit functions, each representing a different part instance. In contrast to previous approaches, the prediction of this representation proceeds in a coarse-to-fine manner. Our model first reconstructs a structural arrangement of the shape in the form of geometric transformations of its part instances. Conditioned on them, the model predicts part latent codes encoding their surface geometry. Reconstructions can be obtained in two ways: (i) by directly decoding the part latent codes to part implicit functions, then combining them into the final shape; or (ii) by using part latents to retrieve similar part instances in a part database and assembling them in a single shape. We demonstrate that, when performing reconstruction by decoding part representations into implicit functions, our method achieves state-of-the-art part-aware reconstruction results from both images and sparse point clouds. When reconstructing shapes by assembling parts retrieved from a dataset, our approach significantly outperforms traditional shape retrieval methods even when significantly restricting the database size. We present our results in well-known sparse point cloud reconstruction and single-view reconstruction benchmarks.", "title": "ANISE: Assembly-based Neural Implicit Surface rEconstruction", "normalizedTitle": "ANISE: Assembly-based Neural Implicit Surface rEconstruction", "fno": "10093999", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Shape", "Image Reconstruction", "Codes", "Three Dimensional Displays", "Point Cloud Compression", "Surface Reconstruction", "Geometry", "3 D Shape Representations", "Neural Networks", "3 D Shape Reconstruction", "Implicit Functions", "Shape Modeling", "Single View Reconstruction" ], "authors": [ { "givenName": "Dmitry", "surname": "Petrov", "fullName": "Dmitry Petrov", "affiliation": "University of Massachusetts, Amherst, MA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Matheus", "surname": "Gadelha", "fullName": "Matheus Gadelha", "affiliation": "Adobe Research, San Jose, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Radomír", "surname": "Měch", "fullName": "Radomír Měch", "affiliation": "Adobe Research, San Jose, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Evangelos", "surname": "Kalogerakis", "fullName": "Evangelos Kalogerakis", "affiliation": "University of Massachusetts, Amherst, MA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-11", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tg/2012/09/06081858", "title": "A Curvature-Adaptive Implicit Surface Reconstruction for Irregularly Spaced Points", "doi": null, "abstractUrl": "/journal/tg/2012/09/06081858/13rRUx0xPTP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09839681", "title": "SSRNet: Scalable 3D Surface Reconstruction Network", "doi": null, "abstractUrl": "/journal/tg/5555/01/09839681/1FisL8u19du", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9301", "title": "DiGS : Divergence guided shape implicit neural representation for unoriented point clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9301/1H0KAEvXEdy", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600m2714", "title": "Neural Shape Mating: Self-Supervised Object Assembly with Adversarial Shape Priors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600m2714/1H0KKRpu8mc", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g260", "title": "Critical Regularizations for Neural Surface Reconstruction in the Wild", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g260/1H0LoryuKRy", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d835", "title": "Registering Explicit to Implicit: Towards High-Fidelity Garment mesh Reconstruction from Single Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d835/1H0Lx9QOs9i", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g270", "title": "Gradient-SDF: A Semi-Implicit Surface Representation for 3D Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g270/1H0MXW1GTN6", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e319", "title": "Recovering Fine Details for Neural Implicit Surface Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e319/1KxUSVbk6He", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e742", "title": "Implicit Surface Representations As Layers in Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e742/1hVlBZYxMe4", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b259", "title": "Neighborhood-based Neural Implicit Reconstruction from Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b259/1zWEcdiPXxK", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10091230", "articleId": "1M2IJGotwEU", "__typename": "AdjacentArticleType" }, "next": { "fno": "10097564", "articleId": "1M9lJyvWuoo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwHhp0z", "title": "Oct.-Dec.", "year": "2017", "issueNum": "04", "idPrefix": "ta", "pubType": "journal", "volume": "8", "label": "Oct.-Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwj7cnI", "doi": "10.1109/TAFFC.2017.2754365", "abstract": "It has been well documented that laughter is an important communicative and expressive signal in face-to-face conversations. Our work aims at building a laughter behavior controller for a virtual character which is able to generate upper body animations from laughter audio given as input. This controller relies on the tight correlations between laughter audio and body behaviors. A unified continuous-state statistical framework, inspired by Kalman filter, is proposed to learn the correlations between laughter audio and head/torso behavior from a recorded laughter human dataset. Due to the lack of shoulder behavior data in the recorded human dataset, a rule-based method is defined to model the correlation between laughter audio and shoulder behavior. In the synthesis step, these characterized correlations are rendered in the animation of a virtual character. To validate our controller, a subjective evaluation is conducted where participants viewed the videos of a laughing virtual character. It compares the animations of a virtual character using our controller and a state of the art method. The evaluation results show that the laughter animations computed with our controller are perceived as more natural, expressing amusement more freely and appearing more authentic than with the state of the art method.", "abstracts": [ { "abstractType": "Regular", "content": "It has been well documented that laughter is an important communicative and expressive signal in face-to-face conversations. Our work aims at building a laughter behavior controller for a virtual character which is able to generate upper body animations from laughter audio given as input. This controller relies on the tight correlations between laughter audio and body behaviors. A unified continuous-state statistical framework, inspired by Kalman filter, is proposed to learn the correlations between laughter audio and head/torso behavior from a recorded laughter human dataset. Due to the lack of shoulder behavior data in the recorded human dataset, a rule-based method is defined to model the correlation between laughter audio and shoulder behavior. In the synthesis step, these characterized correlations are rendered in the animation of a virtual character. To validate our controller, a subjective evaluation is conducted where participants viewed the videos of a laughing virtual character. It compares the animations of a virtual character using our controller and a state of the art method. The evaluation results show that the laughter animations computed with our controller are perceived as more natural, expressing amusement more freely and appearing more authentic than with the state of the art method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It has been well documented that laughter is an important communicative and expressive signal in face-to-face conversations. Our work aims at building a laughter behavior controller for a virtual character which is able to generate upper body animations from laughter audio given as input. This controller relies on the tight correlations between laughter audio and body behaviors. A unified continuous-state statistical framework, inspired by Kalman filter, is proposed to learn the correlations between laughter audio and head/torso behavior from a recorded laughter human dataset. Due to the lack of shoulder behavior data in the recorded human dataset, a rule-based method is defined to model the correlation between laughter audio and shoulder behavior. In the synthesis step, these characterized correlations are rendered in the animation of a virtual character. To validate our controller, a subjective evaluation is conducted where participants viewed the videos of a laughing virtual character. It compares the animations of a virtual character using our controller and a state of the art method. The evaluation results show that the laughter animations computed with our controller are perceived as more natural, expressing amusement more freely and appearing more authentic than with the state of the art method.", "title": "Audio-Driven Laughter Behavior Controller", "normalizedTitle": "Audio-Driven Laughter Behavior Controller", "fno": "08046117", "hasPdf": true, "idPrefix": "ta", "keywords": [ "Hidden Markov Models", "Animation", "Torso", "Correlation", "Mouth", "Lips", "Speech", "Laughter", "Audio Driven", "Data Driven", "Animation Synthesis", "Continuous State", "Kalman Filter", "Prosody", "Nonverbal Behaviors", "Virtual Character", "Statistical Framework" ], "authors": [ { "givenName": "Yu", "surname": "Ding", "fullName": "Yu Ding", "affiliation": "Department of Computer Science, University of Houston, Texas, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Jing", "surname": "Huang", "fullName": "Jing Huang", "affiliation": "School of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Catherine", "surname": "Pelachaud", "fullName": "Catherine Pelachaud", "affiliation": "ISIR-CNRS, Université Pierre et Marie Curie, Paris, France", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2017-10-01 00:00:00", "pubType": "trans", "pages": "546-558", "year": "2017", "issn": "1949-3045", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fg/2011/9140/0/05771468", "title": "Prediction-based classification for audiovisual discrimination between laughter and speech", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771468/12OmNAOsMN6", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a349", "title": "Laughter Type Recognition from Whole Body Motion", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a349/12OmNAYoKxH", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344606", "title": "GMM-based synchronization rules for HMM-based audio-visual laughter synthesis", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344606/12OmNBJNL1i", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344643", "title": "Perception of intensity incongruence in synthesized multimodal expressions of laughter", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344643/12OmNxcdG2P", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204268", "title": "Multi-modal laughter recognition in video conversations", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204268/12OmNyPQ4BR", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/04/08052511", "title": "Laughter and Tickles: Toward Novel Approaches for Emotion and Behavior Elicitation", "doi": null, "abstractUrl": "/journal/ta/2017/04/08052511/13rRUxASuEn", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/04/08046102", "title": "Audio-Facial Laughter Detection in Naturalistic Dyadic Conversations", "doi": null, "abstractUrl": "/journal/ta/2017/04/08046102/13rRUxbCbrR", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2015/02/07006762", "title": "Perception and Automatic Recognition of Laughter from Whole-Body Motion: Continuous and Categorical Perspectives", "doi": null, "abstractUrl": "/journal/ta/2015/02/07006762/13rRUyfKIG3", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0374", "title": "Speech Driven Tongue Animation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0374/1H1lUSkaTeg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09992151", "title": "Personalized Audio-Driven 3D Facial Animation Via Style-Content Disentanglement", "doi": null, "abstractUrl": "/journal/tg/5555/01/09992151/1JevBLSiUqA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08046102", "articleId": "13rRUxbCbrR", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgL1", "name": "tta201704-08046117s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/tta201704-08046117s1.zip", "extension": "zip", "size": "18 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1LUpyYLBfeo", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYouSCDkQM", "doi": "10.1109/TVCG.2023.3247101", "abstract": "The paper presents emotional voice puppetry, an audio-based facial animation approach to portray characters with vivid emotional changes. The lips motion and the surrounding facial areas are controlled by the contents of the audio, and the facial dynamics are established by category of the emotion and the intensity. Our approach is exclusive because it takes account of perceptual validity and geometry instead of pure geometric processes. Another highlight of our approach is the generalizability to multiple characters. The findings showed that training new secondary characters when the rig parameters are categorized as eye, eyebrows, nose, mouth, and signature wrinkles is significant in achieving better generalization results compared to joint training. User studies demonstrate the effectiveness of our approach both qualitatively and quantitatively. Our approach can be applicable in AR/VR and 3DUI, namely, virtual reality avatars/self-avatars, teleconferencing and in-game dialogue.", "abstracts": [ { "abstractType": "Regular", "content": "The paper presents emotional voice puppetry, an audio-based facial animation approach to portray characters with vivid emotional changes. The lips motion and the surrounding facial areas are controlled by the contents of the audio, and the facial dynamics are established by category of the emotion and the intensity. Our approach is exclusive because it takes account of perceptual validity and geometry instead of pure geometric processes. Another highlight of our approach is the generalizability to multiple characters. The findings showed that training new secondary characters when the rig parameters are categorized as eye, eyebrows, nose, mouth, and signature wrinkles is significant in achieving better generalization results compared to joint training. User studies demonstrate the effectiveness of our approach both qualitatively and quantitatively. Our approach can be applicable in AR/VR and 3DUI, namely, virtual reality avatars/self-avatars, teleconferencing and in-game dialogue.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The paper presents emotional voice puppetry, an audio-based facial animation approach to portray characters with vivid emotional changes. The lips motion and the surrounding facial areas are controlled by the contents of the audio, and the facial dynamics are established by category of the emotion and the intensity. Our approach is exclusive because it takes account of perceptual validity and geometry instead of pure geometric processes. Another highlight of our approach is the generalizability to multiple characters. The findings showed that training new secondary characters when the rig parameters are categorized as eye, eyebrows, nose, mouth, and signature wrinkles is significant in achieving better generalization results compared to joint training. User studies demonstrate the effectiveness of our approach both qualitatively and quantitatively. Our approach can be applicable in AR/VR and 3DUI, namely, virtual reality avatars/self-avatars, teleconferencing and in-game dialogue.", "title": "Emotional Voice Puppetry", "normalizedTitle": "Emotional Voice Puppetry", "fno": "10049691", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Avatars", "Computer Animation", "Computer Games", "Emotion Recognition", "Face Recognition", "Human Computer Interaction", "Teleconferencing", "Virtual Reality", "Emotional Voice Puppetry", "Facial Animation Approach", "Facial Dynamics", "Geometry", "Lips Motion", "Multiple Characters", "Perceptual Validity", "Pure Geometric Processes", "Secondary Characters", "Surrounding Facial Areas", "Vivid Emotional Changes", "Faces", "Mouth", "Three Dimensional Displays", "Lips", "Facial Animation", "Videos", "Training", "Virtual Reality", "Audio", "Emotion", "Character Animation" ], "authors": [ { "givenName": "Ye", "surname": "Pan", "fullName": "Ye Pan", "affiliation": "Shanghai Jiao Tong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ruisi", "surname": "Zhang", "fullName": "Ruisi Zhang", "affiliation": "UC San Diego, United States", "__typename": "ArticleAuthorType" }, { "givenName": "Shengran", "surname": "Cheng", "fullName": "Shengran Cheng", "affiliation": "Shanghai Jiao Tong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuai", "surname": "Tan", "fullName": "Shuai Tan", "affiliation": "Shanghai Jiao Tong University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu", "surname": "Ding", "fullName": "Yu Ding", "affiliation": "Virtual Human Group, Netease Fuxi AI Lab, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kenny", "surname": "Mitchell", "fullName": "Kenny Mitchell", "affiliation": "Roblox & Edinburgh Napier University, Scotland", "__typename": "ArticleAuthorType" }, { "givenName": "Xubo", "surname": "Yang", "fullName": "Xubo Yang", "affiliation": "Shanghai Jiao Tong University, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "2527-2535", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2002/1695/2/01048355", "title": "Mapping emotional status to facial expressions", "doi": null, "abstractUrl": "/proceedings-article/icpr/2002/01048355/12OmNBW0vFt", "parentPublication": { "id": "proceedings/icpr/2002/1695/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a132", "title": "Towards 3D Communications: Real Time Emotion Driven 3D Virtual Facial Animation", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a132/12OmNrHjqI9", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-vis/2008/3271/0/3271a135", "title": "Visualisation Tool for Representing Synthetic Facial Emotional Expressions", "doi": null, "abstractUrl": "/proceedings-article/iv-vis/2008/3271a135/12OmNvRU0qD", "parentPublication": { "id": "proceedings/iv-vis/2008/3271/0", "title": "Visualisation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2018/2335/0/233501a357", "title": "Say CHEESE: Common Human Emotional Expression Set Encoder and Its Application to Analyze Deceptive Communication", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a357/12OmNvoWUYc", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2006/2606/0/26060428", "title": "Facial Animation Using Emotional Model", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2006/26060428/12OmNwCaCrJ", "parentPublication": { "id": "proceedings/cgiv/2006/2606/0", "title": "International Conference on Computer Graphics, Imaging and Visualisation (CGIV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a107", "title": "Creating Emotional Speech for Conversational Agents", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a107/12OmNya72wB", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2009/4800/0/05349549", "title": "Perception of emotional expressions in different representations using facial feature points", "doi": null, "abstractUrl": "/proceedings-article/acii/2009/05349549/12OmNzUgdes", "parentPublication": { "id": "proceedings/acii/2009/4800/0", "title": "2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (ACII 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/viz/2009/3734/0/3734a061", "title": "Considerations for Believable Emotional Facial Expression Animation", "doi": null, "abstractUrl": "/proceedings-article/viz/2009/3734a061/12OmNzZmZrJ", "parentPublication": { "id": "proceedings/viz/2009/3734/0", "title": "Visualisation, International Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090662", "title": "Perception of Head Motion Effect on Emotional Facial Expression in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090662/1jIxmuXW5Es", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4075", "title": "Audio-Driven Emotional Video Portraits", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4075/1yeIzfSGjw4", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049716", "articleId": "1KYooSSVjsk", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049652", "articleId": "1KYoxzkht3W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBBzofT", "title": "Feb.", "year": "2019", "issueNum": "02", "idPrefix": "tm", "pubType": "journal", "volume": "18", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45WZZ7Eb", "doi": "10.1109/TMC.2018.2830359", "abstract": "Vehicular communication plays a key role in near-future automotive transport, promising features such as increased traffic safety and wireless software updates. However, vehicular communication can expose drivers&#x2019; locations and thus poses privacy risks. Many schemes have been proposed to protect privacy in vehicular communication, and their effectiveness is usually evaluated with <italic>privacy metrics</italic>. However, to the best of our knowledge, (1) different privacy metrics have never been compared to each other, and (2) it is unknown how strong the metrics are. In this paper, we evaluate and compare the strength of 41 privacy metrics in terms of four novel criteria: Privacy metrics should be monotonic, i.e., indicate decreasing privacy for increasing adversary strength; their values should be spread evenly over a large value range to support within-scenario comparability; and they should share a large portion of their value range between traffic conditions to support between-scenario comparability. We evaluate all four criteria on real and synthetic traffic with state-of-the-art adversary models and create a ranking of privacy metrics. Our results indicate that no single metric dominates across all criteria and traffic conditions. We therefore recommend to use <italic>metrics suites</italic>, i.e., combinations of privacy metrics, when evaluating new privacy-enhancing technologies.", "abstracts": [ { "abstractType": "Regular", "content": "Vehicular communication plays a key role in near-future automotive transport, promising features such as increased traffic safety and wireless software updates. However, vehicular communication can expose drivers&#x2019; locations and thus poses privacy risks. Many schemes have been proposed to protect privacy in vehicular communication, and their effectiveness is usually evaluated with <italic>privacy metrics</italic>. However, to the best of our knowledge, (1) different privacy metrics have never been compared to each other, and (2) it is unknown how strong the metrics are. In this paper, we evaluate and compare the strength of 41 privacy metrics in terms of four novel criteria: Privacy metrics should be monotonic, i.e., indicate decreasing privacy for increasing adversary strength; their values should be spread evenly over a large value range to support within-scenario comparability; and they should share a large portion of their value range between traffic conditions to support between-scenario comparability. We evaluate all four criteria on real and synthetic traffic with state-of-the-art adversary models and create a ranking of privacy metrics. Our results indicate that no single metric dominates across all criteria and traffic conditions. We therefore recommend to use <italic>metrics suites</italic>, i.e., combinations of privacy metrics, when evaluating new privacy-enhancing technologies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Vehicular communication plays a key role in near-future automotive transport, promising features such as increased traffic safety and wireless software updates. However, vehicular communication can expose drivers’ locations and thus poses privacy risks. Many schemes have been proposed to protect privacy in vehicular communication, and their effectiveness is usually evaluated with privacy metrics. However, to the best of our knowledge, (1) different privacy metrics have never been compared to each other, and (2) it is unknown how strong the metrics are. In this paper, we evaluate and compare the strength of 41 privacy metrics in terms of four novel criteria: Privacy metrics should be monotonic, i.e., indicate decreasing privacy for increasing adversary strength; their values should be spread evenly over a large value range to support within-scenario comparability; and they should share a large portion of their value range between traffic conditions to support between-scenario comparability. We evaluate all four criteria on real and synthetic traffic with state-of-the-art adversary models and create a ranking of privacy metrics. Our results indicate that no single metric dominates across all criteria and traffic conditions. We therefore recommend to use metrics suites, i.e., combinations of privacy metrics, when evaluating new privacy-enhancing technologies.", "title": "On the Strength of Privacy Metrics for Vehicular Communication", "normalizedTitle": "On the Strength of Privacy Metrics for Vehicular Communication", "fno": "08353712", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Privacy", "Measurement", "Visualization", "Entropy", "Road Transportation", "Mobile Computing", "Urban Areas", "Privacy Metrics", "Vehicular Communications", "Vehicular Networks", "Privacy", "Monotonicity", "Privacy Enhancing Technologies" ], "authors": [ { "givenName": "Yuchen", "surname": "Zhao", "fullName": "Yuchen Zhao", "affiliation": "De Montfort University, Leicester, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Isabel", "surname": "Wagner", "fullName": "Isabel Wagner", "affiliation": "De Montfort University, Leicester, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "02", "pubDate": "2019-02-01 00:00:00", "pubType": "trans", "pages": "390-403", "year": "2019", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iscc/2016/0679/0/07543747", "title": "An alternative approach to mobility analysis in vehicular ad hoc networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2016/07543747/12OmNvoFjOl", "parentPublication": { "id": "proceedings/iscc/2016/0679/0", "title": "2016 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/3/3823d139", "title": "Privacy Requirements in Vehicular Communication Systems", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823d139/12OmNyugyJb", "parentPublication": { "id": "proceedings/cse/2009/3823/3", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2017/6523/0/6523a183", "title": "Measuring Privacy in Vehicular Networks", "doi": null, "abstractUrl": "/proceedings-article/lcn/2017/6523a183/12OmNzIUfLw", "parentPublication": { "id": "proceedings/lcn/2017/6523/0", "title": "2017 IEEE 42nd Conference on Local Computer Networks (LCN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2006/04/b4055", "title": "Vehicular Communication", "doi": null, "abstractUrl": "/magazine/pc/2006/04/b4055/13rRUB6SpXQ", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2013/03/mex2013030062", "title": "A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems", "doi": null, "abstractUrl": "/magazine/ex/2013/03/mex2013030062/13rRUB7a0WX", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2014/01/msp2014010077", "title": "Driving for Big Data? Privacy Concerns in Vehicular Networking", "doi": null, "abstractUrl": "/magazine/sp/2014/01/msp2014010077/13rRUxAASRs", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2015/9933/0/9933a050", "title": "Genomic Privacy Metrics: A Systematic Comparison", "doi": null, "abstractUrl": "/proceedings-article/spw/2015/9933a050/17D45WaTkcO", "parentPublication": { "id": "proceedings/spw/2015/9933/0", "title": "2015 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2018/5580/0/558000a001", "title": "Privacy Enabled Noise Free Data Collection in Vehicular Networks", "doi": null, "abstractUrl": "/proceedings-article/mass/2018/558000a001/17D45WaTkp2", "parentPublication": { "id": "proceedings/mass/2018/5580/0", "title": "2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/01/09035391", "title": "Using Metrics Suites to Improve the Measurement of Privacy in Graphs", "doi": null, "abstractUrl": "/journal/tq/2022/01/09035391/1iaePndvbS8", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2021/0424/0/09431021", "title": "A Dynamic Mix-zone Scheme Considering Communication Delay for Location Privacy in Vehicular Networks", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2021/09431021/1tROK8ES1Us", "parentPublication": { "id": "proceedings/percom-workshops/2021/0424/0", "title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08356092", "articleId": "17D45WwsQ5O", "__typename": "AdjacentArticleType" }, "next": { "fno": "08359086", "articleId": "17D45W9KVH2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXWRVh", "name": "ttm201902-08353712s1.zip", "location": "https://www.computer.org/csdl/api/v1/extra/ttm201902-08353712s1.zip", "extension": "zip", "size": "22.2 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1yLTwXrqzLi", "title": "Jan.-Feb.", "year": "2022", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": "19", "label": "Jan.-Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1iaePndvbS8", "doi": "10.1109/TDSC.2020.2980271", "abstract": "Social graphs are widely used in research (e.g., epidemiology) and business (e.g., recommender systems). However, sharing these graphs poses privacy risks because they contain sensitive information about individuals. Graph anonymization techniques aim to protect individual users in a graph, while graph de-anonymization aims to re-identify users. The effectiveness of anonymization and de-anonymization algorithms is usually evaluated with privacy metrics. However, it is unclear how strong existing privacy metrics are when they are used in graph privacy. In this article, we study 26 privacy metrics for graph anonymization and de-anonymization and evaluate their strength in terms of three criteria: <italic>monotonicity</italic> indicates whether the metric indicates lower privacy for stronger adversaries; for within-scenario comparisons, <italic>evenness</italic> indicates whether metric values are spread evenly; and for between-scenario comparisons, <italic>shared value range</italic> indicates whether metrics use a consistent value range across scenarios. Our extensive experiments indicate that no single metric fulfills all three criteria perfectly. We therefore use methods from multi-criteria decision analysis to aggregate multiple metrics in a metrics suite, and we show that these metrics suites improve monotonicity compared to the best individual metric. This important result enables more monotonic, and thus more accurate, evaluations of new graph anonymization and de-anonymization algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Social graphs are widely used in research (e.g., epidemiology) and business (e.g., recommender systems). However, sharing these graphs poses privacy risks because they contain sensitive information about individuals. Graph anonymization techniques aim to protect individual users in a graph, while graph de-anonymization aims to re-identify users. The effectiveness of anonymization and de-anonymization algorithms is usually evaluated with privacy metrics. However, it is unclear how strong existing privacy metrics are when they are used in graph privacy. In this article, we study 26 privacy metrics for graph anonymization and de-anonymization and evaluate their strength in terms of three criteria: <italic>monotonicity</italic> indicates whether the metric indicates lower privacy for stronger adversaries; for within-scenario comparisons, <italic>evenness</italic> indicates whether metric values are spread evenly; and for between-scenario comparisons, <italic>shared value range</italic> indicates whether metrics use a consistent value range across scenarios. Our extensive experiments indicate that no single metric fulfills all three criteria perfectly. We therefore use methods from multi-criteria decision analysis to aggregate multiple metrics in a metrics suite, and we show that these metrics suites improve monotonicity compared to the best individual metric. This important result enables more monotonic, and thus more accurate, evaluations of new graph anonymization and de-anonymization algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social graphs are widely used in research (e.g., epidemiology) and business (e.g., recommender systems). However, sharing these graphs poses privacy risks because they contain sensitive information about individuals. Graph anonymization techniques aim to protect individual users in a graph, while graph de-anonymization aims to re-identify users. The effectiveness of anonymization and de-anonymization algorithms is usually evaluated with privacy metrics. However, it is unclear how strong existing privacy metrics are when they are used in graph privacy. In this article, we study 26 privacy metrics for graph anonymization and de-anonymization and evaluate their strength in terms of three criteria: monotonicity indicates whether the metric indicates lower privacy for stronger adversaries; for within-scenario comparisons, evenness indicates whether metric values are spread evenly; and for between-scenario comparisons, shared value range indicates whether metrics use a consistent value range across scenarios. Our extensive experiments indicate that no single metric fulfills all three criteria perfectly. We therefore use methods from multi-criteria decision analysis to aggregate multiple metrics in a metrics suite, and we show that these metrics suites improve monotonicity compared to the best individual metric. This important result enables more monotonic, and thus more accurate, evaluations of new graph anonymization and de-anonymization algorithms.", "title": "Using Metrics Suites to Improve the Measurement of Privacy in Graphs", "normalizedTitle": "Using Metrics Suites to Improve the Measurement of Privacy in Graphs", "fno": "09035391", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Data Privacy", "Decision Making", "Graph Theory", "Operations Research", "Metrics Suite", "Social Graphs", "Graph De Anonymization", "Privacy Risks", "Graph Anonymization", "Graph Privacy", "Privacy Metrics", "Metric Values", "Privacy Measurement", "User Reidentification", "Monotonicity", "Multicriteria Decision Analysis", "Privacy", "Data Privacy", "Current Measurement", "Area Measurement", "Entropy", "Decision Analysis", "Graph Anonymization", "Graph De Anonymization", "Privacy", "Privacy Metrics", "Monotonicity", "Metrics Suites" ], "authors": [ { "givenName": "Yuchen", "surname": "Zhao", "fullName": "Yuchen Zhao", "affiliation": "School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom", "__typename": "ArticleAuthorType" }, { "givenName": "Isabel", "surname": "Wagner", "fullName": "Isabel Wagner", "affiliation": "Cyber Security Centre, De Montfort University, Leicester, United Kingdom", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "259-274", "year": "2022", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/mass/2017/2324/0/2324a348", "title": "Preserving Graph Utility in Anonymized Social Networks? A Study on the Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/mass/2017/2324a348/12OmNrAv3FZ", "parentPublication": { "id": "proceedings/mass/2017/2324/0", "title": "2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a491", "title": "Anonymizing Graphs Against Weight-Based Attacks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a491/12OmNzRqdGz", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000b336", "title": "Sharing Uncertain Graphs Using Syntactic Private Graph Models", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000b336/14Fq0XUlVDU", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2019/02/08353712", "title": "On the Strength of Privacy Metrics for Vehicular Communication", "doi": null, "abstractUrl": "/journal/tm/2019/02/08353712/17D45WZZ7Eb", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904449", "title": "DPVisCreator: Incorporating Pattern Constraints to Privacy-preserving Visualizations via Differential Privacy", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904449/1H0GlpjfzUc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09912964", "title": "TKDA: An Improved Method for K-degree Anonymity in Social Graphs", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09912964/1HBK2OzMBTG", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09987696", "title": "Automorphism Faithfulness Metrics for Symmetric Graph Drawings", "doi": null, "abstractUrl": "/journal/tg/5555/01/09987696/1J7ROVH0hpu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/05/08966490", "title": "General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model", "doi": null, "abstractUrl": "/journal/tq/2021/05/08966490/1gNEMChWNIk", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09306906", "title": "LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy", "doi": null, "abstractUrl": "/journal/tk/2022/10/09306906/1pOZhNkFVmM", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400b335", "title": "Is Entropy enough for measuring Privacy?", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400b335/1uGZ2OqqhOg", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09035448", "articleId": "1iaePyWrTZm", "__typename": "AdjacentArticleType" }, "next": { "fno": "09035479", "articleId": "1iaeODJZARi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1A9RDZbPVuw", "name": "ttq202201-09035391s1-supp2-2980271.csv", "location": "https://www.computer.org/csdl/api/v1/extra/ttq202201-09035391s1-supp2-2980271.csv", "extension": "csv", "size": "17.6 MB", "__typename": "WebExtraType" }, { "id": "1A9RE64t1Zu", "name": "ttq202201-09035391s1-supp1-2980271.csv", "location": "https://www.computer.org/csdl/api/v1/extra/ttq202201-09035391s1-supp1-2980271.csv", "extension": "csv", "size": "3.97 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1Ecpd2MRJTy", "title": "June", "year": "2022", "issueNum": "06", "idPrefix": "ts", "pubType": "journal", "volume": "48", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1qmbqXUNfWw", "doi": "10.1109/TSE.2021.3051492", "abstract": "Infrastructure-as-code (IaC) is the DevOps practice enabling management and provisioning of infrastructure through the definition of machine-readable files, hereinafter referred to as <italic>IaC scripts</italic>. Similarly to other source code artefacts, these files may contain defects that can preclude their correct functioning. In this paper, we aim at assessing the role of <italic>product</italic> and <italic>process</italic> metrics when predicting defective IaC scripts. We propose a fully integrated machine-learning framework for IaC Defect Prediction, that allows for repository crawling, metrics collection, model building, and evaluation. To evaluate it, we analyzed 104 projects and employed five machine-learning classifiers to compare their performance in flagging suspicious defective IaC scripts. The key results of the study report <sc>Random Forest</sc> as the best-performing model, with a median AUC-PR of 0.93 and MCC of 0.80. Furthermore, at least for the collected projects, product metrics identify defective IaC scripts more accurately than process metrics. Our findings put a baseline for investigating IaC Defect Prediction and the relationship between the product and process metrics, and IaC scripts&#x2019; quality.", "abstracts": [ { "abstractType": "Regular", "content": "Infrastructure-as-code (IaC) is the DevOps practice enabling management and provisioning of infrastructure through the definition of machine-readable files, hereinafter referred to as <italic>IaC scripts</italic>. Similarly to other source code artefacts, these files may contain defects that can preclude their correct functioning. In this paper, we aim at assessing the role of <italic>product</italic> and <italic>process</italic> metrics when predicting defective IaC scripts. We propose a fully integrated machine-learning framework for IaC Defect Prediction, that allows for repository crawling, metrics collection, model building, and evaluation. To evaluate it, we analyzed 104 projects and employed five machine-learning classifiers to compare their performance in flagging suspicious defective IaC scripts. The key results of the study report <sc>Random Forest</sc> as the best-performing model, with a median AUC-PR of 0.93 and MCC of 0.80. Furthermore, at least for the collected projects, product metrics identify defective IaC scripts more accurately than process metrics. Our findings put a baseline for investigating IaC Defect Prediction and the relationship between the product and process metrics, and IaC scripts&#x2019; quality.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Infrastructure-as-code (IaC) is the DevOps practice enabling management and provisioning of infrastructure through the definition of machine-readable files, hereinafter referred to as IaC scripts. Similarly to other source code artefacts, these files may contain defects that can preclude their correct functioning. In this paper, we aim at assessing the role of product and process metrics when predicting defective IaC scripts. We propose a fully integrated machine-learning framework for IaC Defect Prediction, that allows for repository crawling, metrics collection, model building, and evaluation. To evaluate it, we analyzed 104 projects and employed five machine-learning classifiers to compare their performance in flagging suspicious defective IaC scripts. The key results of the study report Random Forest as the best-performing model, with a median AUC-PR of 0.93 and MCC of 0.80. Furthermore, at least for the collected projects, product metrics identify defective IaC scripts more accurately than process metrics. Our findings put a baseline for investigating IaC Defect Prediction and the relationship between the product and process metrics, and IaC scripts’ quality.", "title": "Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics", "normalizedTitle": "Within-Project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics", "fno": "09321740", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Learning Artificial Intelligence", "Pattern Classification", "Program Testing", "Project Management", "Software Development Management", "Software Metrics", "Software Quality", "Project Defect Prediction", "Infrastructure As Code", "Machine Readable Files", "Source Code Artefacts", "Process Metrics", "Predicting Defective Ia C Scripts", "Fully Integrated Machine Learning Framework", "Ia C Defect Prediction", "Metrics Collection", "Machine Learning Classifiers", "Suspicious Defective Ia C Scripts", "Collected Projects", "Product Metrics", "Measurement", "Software", "Predictive Models", "Machine Learning", "Radon", "Cloud Computing", "Task Analysis", "Infrastructure As Code", "Defect Prediction", "Empirical Software Engineering" ], "authors": [ { "givenName": "Stefano", "surname": "Dalla Palma", "fullName": "Stefano Dalla Palma", "affiliation": "Jheronimous Academy of Data Science, Tilburg University, Tilburg, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Dario", "surname": "Di Nucci", "fullName": "Dario Di Nucci", "affiliation": "Jheronimous Academy of Data Science, Tilburg University, Tilburg, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Fabio", "surname": "Palomba", "fullName": "Fabio Palomba", "affiliation": "Software Engineering (SeSa) Lab, University of Salerno, Fisciano, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Damian A.", "surname": "Tamburri", "fullName": "Damian A. Tamburri", "affiliation": "Jheronimous Academy of Data Science, Eindhoven University of Technology, Eindhoven, The Netherlands", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "06", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "2086-2104", "year": "2022", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icst/2018/5012/0/501201a034", "title": "Characterizing Defective Configuration Scripts Used for Continuous Deployment", "doi": null, "abstractUrl": "/proceedings-article/icst/2018/501201a034/12OmNBK5m8u", "parentPublication": { "id": "proceedings/icst/2018/5012/0", "title": "2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2018/5012/0/501201a434", "title": "Anti-Patterns in Infrastructure as Code", "doi": null, "abstractUrl": "/proceedings-article/icst/2018/501201a434/12OmNvjgWtO", "parentPublication": { "id": "proceedings/icst/2018/5012/0", "title": "2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2013/5056/0/5056a259", "title": "Evaluating Software Product Metrics with Synthetic Defect Data", "doi": null, "abstractUrl": "/proceedings-article/esem/2013/5056a259/12OmNwcCIMc", "parentPublication": { "id": "proceedings/esem/2013/5056/0", "title": "2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2016/3601/0/3601a051", "title": "A Study of Redundant Metrics in Defect Prediction Datasets", "doi": null, "abstractUrl": "/proceedings-article/issrew/2016/3601a051/12OmNzaQokd", "parentPublication": { "id": "proceedings/issrew/2016/3601/0", "title": "2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a414", "title": "Poster: Defect Prediction Metrics for Infrastructure as Code Scripts in DevOps", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a414/13bd1eOELLu", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a476", "title": "Characteristics of Defective Infrastructure as Code Scripts in DevOps", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a476/13bd1eY1x3x", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100a752", "title": "Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100a752/1pK5lH3pAvC", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2021/03/09388795", "title": "Different Kind of Smells: Security Smells in Infrastructure as Code Scripts", "doi": null, "abstractUrl": "/magazine/sp/2021/03/09388795/1smZZjvjjgs", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2021/9630/0/963000a511", "title": "Enhancing Just-in-Time Defect Prediction Using Change Request-based Metrics", "doi": null, "abstractUrl": "/proceedings-article/saner/2021/963000a511/1twfqRkNuik", "parentPublication": { "id": "proceedings/saner/2021/9630/0", "title": "2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09632376", "title": "Revisiting the Impact of Dependency Network Metrics on Software Defect Prediction", "doi": null, "abstractUrl": "/journal/ts/2022/12/09632376/1yYPqdzi9Ve", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09316225", "articleId": "1qazxidoQQ8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09325916", "articleId": "1qpv8QyD1p6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1LUpyYLBfeo", "title": "May", "year": "2023", "issueNum": "05", "idPrefix": "tg", "pubType": "journal", "volume": "29", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KYoAxyw5c4", "doi": "10.1109/TVCG.2023.3247113", "abstract": "In this paper, we explore how virtual replicas can enhance Mixed Reality (MR) remote collaboration with a 3D reconstruction of the task space. People in different locations may need to work together remotely on complicated tasks. For example, a local user could follow a remote expert's instructions to complete a physical task. However, it could be challenging for the local user to fully understand the remote expert's intentions without effective spatial referencing and action demonstration. In this research, we investigate how virtual replicas can work as a spatial communication cue to improve MR remote collaboration. This approach segments the foreground manipulable objects in the local environment and creates corresponding virtual replicas of physical task objects. The remote user can then manipulate these virtual replicas to explain the task and guide their partner. This enables the local user to rapidly and accurately understand the remote expert's intentions and instructions. Our user study with an object assembly task found that using virtual replica manipulation was more efficient than using 3D annotation drawing in an MR remote collaboration scenario. We report and discuss the findings and limitations of our system and study, and present directions for future research.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we explore how virtual replicas can enhance Mixed Reality (MR) remote collaboration with a 3D reconstruction of the task space. People in different locations may need to work together remotely on complicated tasks. For example, a local user could follow a remote expert's instructions to complete a physical task. However, it could be challenging for the local user to fully understand the remote expert's intentions without effective spatial referencing and action demonstration. In this research, we investigate how virtual replicas can work as a spatial communication cue to improve MR remote collaboration. This approach segments the foreground manipulable objects in the local environment and creates corresponding virtual replicas of physical task objects. The remote user can then manipulate these virtual replicas to explain the task and guide their partner. This enables the local user to rapidly and accurately understand the remote expert's intentions and instructions. Our user study with an object assembly task found that using virtual replica manipulation was more efficient than using 3D annotation drawing in an MR remote collaboration scenario. We report and discuss the findings and limitations of our system and study, and present directions for future research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we explore how virtual replicas can enhance Mixed Reality (MR) remote collaboration with a 3D reconstruction of the task space. People in different locations may need to work together remotely on complicated tasks. For example, a local user could follow a remote expert's instructions to complete a physical task. However, it could be challenging for the local user to fully understand the remote expert's intentions without effective spatial referencing and action demonstration. In this research, we investigate how virtual replicas can work as a spatial communication cue to improve MR remote collaboration. This approach segments the foreground manipulable objects in the local environment and creates corresponding virtual replicas of physical task objects. The remote user can then manipulate these virtual replicas to explain the task and guide their partner. This enables the local user to rapidly and accurately understand the remote expert's intentions and instructions. Our user study with an object assembly task found that using virtual replica manipulation was more efficient than using 3D annotation drawing in an MR remote collaboration scenario. We report and discuss the findings and limitations of our system and study, and present directions for future research.", "title": "Using Virtual Replicas to Improve Mixed Reality Remote Collaboration", "normalizedTitle": "Using Virtual Replicas to Improve Mixed Reality Remote Collaboration", "fno": "10049700", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Groupware", "Virtual Reality", "3 D Annotation Drawing", "3 D Reconstruction", "Action Demonstration", "Effective Spatial Referencing", "Local User", "Mixed Reality Remote Collaboration", "MR Remote Collaboration Scenario", "Object Assembly Task", "Physical Task Objects", "Remote Expert", "Remote User", "Task Space", "Virtual Replica Manipulation", "Virtual Replicas", "Three Dimensional Displays", "Collaboration", "Task Analysis", "Cameras", "Solid Modeling", "Annotations", "Resists", "Mixed Reality", "Remote Collaboration", "Virtual Replica" ], "authors": [ { "givenName": "Huayuan", "surname": "Tian", "fullName": "Huayuan Tian", "affiliation": "University of South Australia, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Gun A.", "surname": "Lee", "fullName": "Gun A. Lee", "affiliation": "University of South Australia, Australia", "__typename": "ArticleAuthorType" }, { "givenName": "Huidong", "surname": "Bai", "fullName": "Huidong Bai", "affiliation": "University of Auckland, New Zealand", "__typename": "ArticleAuthorType" }, { "givenName": "Mark", "surname": "Billinghurst", "fullName": "Mark Billinghurst", "affiliation": "University of South Australia, Australia", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2023-05-01 00:00:00", "pubType": "trans", "pages": "2785-2795", "year": "2023", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2010/9343/0/05643588", "title": "Augmentation of check in/out model for remote collaboration with Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643588/12OmNC4eSy7", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2012/4651/0/4651a663", "title": "Instruction for Remote MR Cooperative Work with Captured Still Worker's View Video", "doi": null, "abstractUrl": "/proceedings-article/aina/2012/4651a663/12OmNxdDFSs", "parentPublication": { "id": "proceedings/aina/2012/4651/0", "title": "2012 IEEE 26th International Conference on Advanced Information Networking and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2008/1971/0/04480753", "title": "Symmetric Model of Remote Collaborative MR Using Tangible Replicas", "doi": null, "abstractUrl": "/proceedings-article/vr/2008/04480753/12OmNyL0TDr", "parentPublication": { "id": "proceedings/vr/2008/1971/0", "title": "IEEE Virtual Reality 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a064", "title": "[POSTER] Remote Mixed Reality System Supporting Interactions with Virtualized Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a064/12OmNzJbQY0", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798024", "title": "Head Pointer or Eye Gaze: Which Helps More in MR Remote Collaboration?", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798024/1cJ0MmguvG8", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798128", "title": "Supporting Visual Annotation Cues in a Live 360 Panorama-based Mixed Reality Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798128/1cJ1aXJnUyI", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a393", "title": "Wearable RemoteFusion: A Mixed Reality Remote Collaboration System with Local Eye Gaze and Remote Hand Gesture Sharing", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a393/1gysjIlsYus", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a022", "title": "Merging Live and Static 360 Panoramas Inside a 3D Scene for Mixed Reality Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a022/1gysn0YPLm8", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a091", "title": "An MR Remote Collaborative Platform Based on 3D CAD Models for Training in Industry", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a091/1gysneD006s", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a104", "title": "Integrating AR and VR for Mobile Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a104/1gysoJbmNEI", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10049660", "articleId": "1KYoqi0DQK4", "__typename": "AdjacentArticleType" }, "next": { "fno": "10049680", "articleId": "1KYolEFtr6U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyxXlpb", "title": "Jan.-June", "year": "2020", "issueNum": "01", "idPrefix": "ca", "pubType": "journal", "volume": "19", "label": "Jan.-June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1keqGxRHR7y", "doi": "10.1109/LCA.2020.2992644", "abstract": "Spin Torque Transfer Magnetic RAM (STT-MRAM) is a promising Non-Volatile Memory (NVM) technology achieving high density, low leakage power, and relatively small read/write delays. It provides a solution to improve the performance and to mitigate the leakage power consumption compared to SRAM-based processors. However, the process heterogeneity and the sophisticated back-end-of-line (BEOL) structure make it difficult to integrate the STT-MRAM in two-dimensional integrated circuits (2D ICs). In this article, we implement a RISC-V-based processor with STT-MRAM using a heterogeneous 3D integration methodology. Compared with the SRAM-based 2D counterpart, the MRAM-based 3D IC provides up to 17.55 percent silicon area saving, together with either 34.74 percent performance gain or 13.90 percent energy reduction.", "abstracts": [ { "abstractType": "Regular", "content": "Spin Torque Transfer Magnetic RAM (STT-MRAM) is a promising Non-Volatile Memory (NVM) technology achieving high density, low leakage power, and relatively small read/write delays. It provides a solution to improve the performance and to mitigate the leakage power consumption compared to SRAM-based processors. However, the process heterogeneity and the sophisticated back-end-of-line (BEOL) structure make it difficult to integrate the STT-MRAM in two-dimensional integrated circuits (2D ICs). In this article, we implement a RISC-V-based processor with STT-MRAM using a heterogeneous 3D integration methodology. Compared with the SRAM-based 2D counterpart, the MRAM-based 3D IC provides up to 17.55 percent silicon area saving, together with either 34.74 percent performance gain or 13.90 percent energy reduction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spin Torque Transfer Magnetic RAM (STT-MRAM) is a promising Non-Volatile Memory (NVM) technology achieving high density, low leakage power, and relatively small read/write delays. It provides a solution to improve the performance and to mitigate the leakage power consumption compared to SRAM-based processors. However, the process heterogeneity and the sophisticated back-end-of-line (BEOL) structure make it difficult to integrate the STT-MRAM in two-dimensional integrated circuits (2D ICs). In this article, we implement a RISC-V-based processor with STT-MRAM using a heterogeneous 3D integration methodology. Compared with the SRAM-based 2D counterpart, the MRAM-based 3D IC provides up to 17.55 percent silicon area saving, together with either 34.74 percent performance gain or 13.90 percent energy reduction.", "title": "Heterogeneous 3D Integration for a RISC-V System With STT-MRAM", "normalizedTitle": "Heterogeneous 3D Integration for a RISC-V System With STT-MRAM", "fno": "09086777", "hasPdf": true, "idPrefix": "ca", "keywords": [ "Low Power Electronics", "MRAM Devices", "Power Consumption", "Reduced Instruction Set Computing", "Three Dimensional Integrated Circuits", "STT MRAM", "Two Dimensional Integrated Circuits", "RISC V Based Processor", "Heterogeneous 3 D Integration Methodology", "MRAM Based 3 D IC", "RISC V System", "Spin Torque Transfer Magnetic RAM", "Non Volatile Memory Technology", "Low Leakage Power", "Leakage Power Consumption", "Process Heterogeneity", "Sophisticated Back End Of Line Structure", "Three Dimensional Displays", "Integrated Circuits", "Two Dimensional Displays", "Random Access Memory", "Routing", "Arrays", "Pins", "Three Dimensional Integration", "Physical Design", "Non Volatile Memory", "Cache Memory" ], "authors": [ { "givenName": "Lingjun", "surname": "Zhu", "fullName": "Lingjun Zhu", "affiliation": "Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Lennart", "surname": "Bamberg", "fullName": "Lennart Bamberg", "affiliation": "Institute of Electrodynamics and Microelectronics (ITEM), University of Bremen, Bremen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Anthony", "surname": "Agnesina", "fullName": "Anthony Agnesina", "affiliation": "Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Francky", "surname": "Catthoor", "fullName": "Francky Catthoor", "affiliation": "IMEC, Leuven, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Dragomir", "surname": "Milojevic", "fullName": "Dragomir Milojevic", "affiliation": "IMEC, Leuven, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Manu", "surname": "Komalan", "fullName": "Manu Komalan", "affiliation": "IMEC, Leuven, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Julien", "surname": "Ryckaert", "fullName": "Julien Ryckaert", "affiliation": "IMEC, Leuven, Belgium", "__typename": "ArticleAuthorType" }, { "givenName": "Alberto", "surname": "Garcia-Ortiz", "fullName": "Alberto Garcia-Ortiz", "affiliation": "Institute of Electrodynamics and Microelectronics (ITEM), University of Bremen, Bremen, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Sung Kyu", "surname": "Lim", "fullName": "Sung Kyu Lim", "affiliation": "Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2020-01-01 00:00:00", "pubType": "letters", "pages": "51-54", "year": "2020", "issn": "1556-6056", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/idt/2014/8200/0/07038589", "title": "Integration of STT-MRAM model into CACTI simulator", "doi": null, "abstractUrl": "/proceedings-article/idt/2014/07038589/12OmNBt3qok", "parentPublication": { "id": "proceedings/idt/2014/8200/0", "title": "2014 9th International Design & Test Symposium (IDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2015/7166/0/07357096", "title": "Immediate sleep: Reducing energy impact of peripheral circuits in STT-MRAM caches", "doi": null, "abstractUrl": "/proceedings-article/iccd/2015/07357096/12OmNwFRpb3", "parentPublication": { "id": "proceedings/iccd/2015/7166/0", "title": "2015 33rd IEEE International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nanoarch/2017/6037/0/08053704", "title": "A novel SRAM — STT-MRAM hybrid cache implementation improving cache performance", "doi": null, "abstractUrl": "/proceedings-article/nanoarch/2017/08053704/12OmNwpGgGE", "parentPublication": { "id": "proceedings/nanoarch/2017/6037/0", "title": "2017 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2015/9969/0/9969a035", "title": "Performance and Energy Optimization on MPSoCs by Enabling STT-MRAM LUTs", "doi": null, "abstractUrl": "/proceedings-article/fccm/2015/9969a035/12OmNxWuiqO", "parentPublication": { "id": "proceedings/fccm/2015/9969/0", "title": "2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/inis/2017/1356/0/1356a061", "title": "STT-MRAM for Low Power Access for Read-Intensive Parallel Deep-Learning Architectures", "doi": null, "abstractUrl": "/proceedings-article/inis/2017/1356a061/12OmNzUPpkg", "parentPublication": { "id": "proceedings/inis/2017/1356/0", "title": "2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vts/2017/4482/0/07928937", "title": "Leveraging Systematic Unidirectional Error-Detecting Codes for fast STT-MRAM cache", "doi": null, "abstractUrl": "/proceedings-article/vts/2017/07928937/12OmNzmcllH", "parentPublication": { "id": "proceedings/vts/2017/4482/0", "title": "2017 IEEE 35th VLSI Test Symposium (VTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2017/03/07547297", "title": "Pseudo-Differential Sensing Framework for STT-MRAM: A Cross-Layer Perspective", "doi": null, "abstractUrl": "/journal/tc/2017/03/07547297/13rRUwh80u2", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2019/03/08489928", "title": "TA-LRW: A Replacement Policy for Error Rate Reduction in STT-MRAM Caches", "doi": null, "abstractUrl": "/journal/tc/2019/03/08489928/17D45VsBU3S", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09893369", "title": "Rethinking DRAM&#x0027;s Page Mode With STT-MRAM", "doi": null, "abstractUrl": "/journal/tc/2023/05/09893369/1GGLLejHf5S", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2021/10/09526872", "title": "Designing Efficient and High-Performance AI Accelerators With Customized STT-MRAM", "doi": null, "abstractUrl": "/journal/si/2021/10/09526872/1wzrXZNaHRu", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09061012", "articleId": "1jrROEY9vFu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09072482", "articleId": "1keqGHxcFPO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1xlvIBjDUyc", "title": "Nov.", "year": "2021", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "43", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1jE1GK6vdWo", "doi": "10.1109/TPAMI.2020.2992222", "abstract": "Relations amongst entities play a central role in image understanding. Due to the complexity of modeling (<italic>subject</italic>, <italic>predicate</italic>, <italic>object</italic>) relation triplets, it is crucial to develop a method that can not only recognize seen relations, but also generalize to unseen cases. Inspired by a previously proposed visual translation embedding model, or VTransE <xref ref-type=\"bibr\" rid=\"ref1\">[1]</xref> , we propose a context-augmented translation embedding model that can capture both common and rare relations. The previous VTransE model maps entities and predicates into a low-dimensional embedding vector space where the predicate is interpreted as a translation vector between the embedded features of the bounding box regions of the <italic>subject</italic> and the <italic>object</italic>. Our model additionally incorporates the contextual information captured by the bounding box of the <italic>union</italic> of the subject and the object, and learns the embeddings guided by the constraint <italic>predicate</italic> <inline-formula><tex-math notation=\"LaTeX\">Z_$\\approx$_Z</tex-math></inline-formula> <italic>union</italic> (<italic>subject</italic>, <italic>object</italic>) <inline-formula><tex-math notation=\"LaTeX\">Z_$-$_Z</tex-math></inline-formula> <italic>subject</italic> <inline-formula><tex-math notation=\"LaTeX\">Z_$-$_Z</tex-math></inline-formula> <italic>object</italic>. In a comprehensive evaluation on multiple challenging benchmarks, our approach outperforms previous translation-based models and comes close to or exceeds the state of the art across a range of settings, from small-scale to large-scale datasets, from common to previously unseen relations. It also achieves promising results for the recently introduced task of scene graph generation.", "abstracts": [ { "abstractType": "Regular", "content": "Relations amongst entities play a central role in image understanding. Due to the complexity of modeling (<italic>subject</italic>, <italic>predicate</italic>, <italic>object</italic>) relation triplets, it is crucial to develop a method that can not only recognize seen relations, but also generalize to unseen cases. Inspired by a previously proposed visual translation embedding model, or VTransE <xref ref-type=\"bibr\" rid=\"ref1\">[1]</xref> , we propose a context-augmented translation embedding model that can capture both common and rare relations. The previous VTransE model maps entities and predicates into a low-dimensional embedding vector space where the predicate is interpreted as a translation vector between the embedded features of the bounding box regions of the <italic>subject</italic> and the <italic>object</italic>. Our model additionally incorporates the contextual information captured by the bounding box of the <italic>union</italic> of the subject and the object, and learns the embeddings guided by the constraint <italic>predicate</italic> <inline-formula><tex-math notation=\"LaTeX\">$\\approx$</tex-math><alternatives><mml:math><mml:mo>&#x2248;</mml:mo></mml:math><inline-graphic xlink:href=\"hung-ieq1-2992222.gif\"/></alternatives></inline-formula> <italic>union</italic> (<italic>subject</italic>, <italic>object</italic>) <inline-formula><tex-math notation=\"LaTeX\">$-$</tex-math><alternatives><mml:math><mml:mo>-</mml:mo></mml:math><inline-graphic xlink:href=\"hung-ieq2-2992222.gif\"/></alternatives></inline-formula> <italic>subject</italic> <inline-formula><tex-math notation=\"LaTeX\">$-$</tex-math><alternatives><mml:math><mml:mo>-</mml:mo></mml:math><inline-graphic xlink:href=\"hung-ieq3-2992222.gif\"/></alternatives></inline-formula> <italic>object</italic>. In a comprehensive evaluation on multiple challenging benchmarks, our approach outperforms previous translation-based models and comes close to or exceeds the state of the art across a range of settings, from small-scale to large-scale datasets, from common to previously unseen relations. It also achieves promising results for the recently introduced task of scene graph generation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Relations amongst entities play a central role in image understanding. Due to the complexity of modeling (subject, predicate, object) relation triplets, it is crucial to develop a method that can not only recognize seen relations, but also generalize to unseen cases. Inspired by a previously proposed visual translation embedding model, or VTransE [1] , we propose a context-augmented translation embedding model that can capture both common and rare relations. The previous VTransE model maps entities and predicates into a low-dimensional embedding vector space where the predicate is interpreted as a translation vector between the embedded features of the bounding box regions of the subject and the object. Our model additionally incorporates the contextual information captured by the bounding box of the union of the subject and the object, and learns the embeddings guided by the constraint predicate - union (subject, object) - subject - object. In a comprehensive evaluation on multiple challenging benchmarks, our approach outperforms previous translation-based models and comes close to or exceeds the state of the art across a range of settings, from small-scale to large-scale datasets, from common to previously unseen relations. It also achieves promising results for the recently introduced task of scene graph generation.", "title": "Contextual Translation Embedding for Visual Relationship Detection and Scene Graph Generation", "normalizedTitle": "Contextual Translation Embedding for Visual Relationship Detection and Scene Graph Generation", "fno": "09085893", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Feature Extraction", "Graph Theory", "Object Detection", "Visual Relationship Detection", "Scene Graph Generation", "Visual Translation Embedding Model", "Context Augmented Translation Embedding Model", "Common Relations", "Rare Relations", "V Trans E Model", "Low Dimensional Embedding Vector Space", "Translation Vector", "Contextual Information", "Image Understanding", "Relation Triplet Modeling", "Bounding Box Region Embedded Features", "Constraint Predicate", "Visualization", "Feature Extraction", "Task Analysis", "Training", "Semantics", "Bicycles", "Image Edge Detection", "Visual Relationship Detection", "Scene Graph Generation", "Scene Understanding" ], "authors": [ { "givenName": "Zih-Siou", "surname": "Hung", "fullName": "Zih-Siou Hung", "affiliation": "Computer Science Department, University of Illinois at Urbana-Champaign, Urbana, IL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Arun", "surname": "Mallya", "fullName": "Arun Mallya", "affiliation": "Nvidia Research, Santa Clara, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Svetlana", "surname": "Lazebnik", "fullName": "Svetlana Lazebnik", "affiliation": "Computer Science Department, University of Illinois at Urbana-Champaign, Urbana, IL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2021-11-01 00:00:00", "pubType": "trans", "pages": "3820-3832", "year": "2021", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tc/2023/06/09927425", "title": "A Privacy-Preserving Comparison Protocol", "doi": null, "abstractUrl": "/journal/tc/2023/06/09927425/1HJuLchrDsA", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/09976297", "title": "Exploring Memory Access Similarity to Improve Irregular Application Performance for Distributed Hybrid Memory Systems", "doi": null, "abstractUrl": "/journal/td/2023/03/09976297/1IWfP8p5MQ0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/05/10082870", "title": "Congestion Control for Datacenter Networks: A Control-Theoretic Approach", "doi": null, "abstractUrl": "/journal/td/2023/05/10082870/1LRbYqKSRvW", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09040652", "title": "Fastest Path Query Answering using Time-Dependent Hop-Labeling in Road Network", "doi": null, "abstractUrl": "/journal/tk/2022/01/09040652/1iiwVUuWSVa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/03/09112322", "title": "Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models", "doi": null, "abstractUrl": "/journal/sc/2022/03/09112322/1kwiidLDgty", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09250607", "title": "Enumerating Maximum Cliques in Massive Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/09/09250607/1oxjS6MBaA8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09367012", "title": "iFlowGAN: An Invertible Flow-Based Generative Adversarial Network for Unsupervised Image-to-Image Translation", "doi": null, "abstractUrl": "/journal/tp/2022/08/09367012/1rDQXw8mKnC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/03/09361107", "title": "A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels", "doi": null, "abstractUrl": "/journal/sc/2022/03/09361107/1rsepNK8KLC", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09456991", "title": "A Clinical Dataset and Various Baselines for Chromosome Instance Segmentation", "doi": null, "abstractUrl": "/journal/tb/2022/01/09456991/1utV0kh5nA4", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/04/09664291", "title": "EHTask: Recognizing User Tasks From Eye and Head Movements in Immersive Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2023/04/09664291/1zHDIPIlNBe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09085944", "articleId": "1jE1Hu1xUzu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09097411", "articleId": "1jZ5VEjlq1i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1IRhD73QTpC", "title": "Jan.", "year": "2023", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ADJdtRWkNO", "doi": "10.1109/TPAMI.2022.3147570", "abstract": "Face portrait line drawing is a unique style of art which is highly abstract and expressive. However, due to its high semantic constraints, many existing methods learn to generate portrait drawings using paired training data, which is costly and time-consuming to obtain. In this paper, we propose a novel method to automatically transform face photos to portrait drawings using unpaired training data with two new features; i.e., our method can (1) learn to generate high quality portrait drawings in multiple styles using a single network and (2) generate portrait drawings in a &#x201C;new style&#x201D; unseen in the training data. To achieve these benefits, we (1) propose a novel quality metric for portrait drawings which is learned from human perception, and (2) introduce a quality loss to guide the network toward generating better looking portrait drawings. We observe that existing unpaired translation methods such as CycleGAN tend to embed invisible reconstruction information indiscriminately in the whole drawings due to significant information imbalance between the photo and portrait drawing domains, which leads to important facial features missing. To address this problem, we propose a novel asymmetric cycle mapping that enforces the reconstruction information to be visible and only embedded in the selected facial regions. Along with localized discriminators for important facial regions, our method well preserves all important facial features in the generated drawings. Generator dissection further explains that our model learns to incorporate face semantic information during drawing generation. Extensive experiments including a user study show that our model outperforms state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Face portrait line drawing is a unique style of art which is highly abstract and expressive. However, due to its high semantic constraints, many existing methods learn to generate portrait drawings using paired training data, which is costly and time-consuming to obtain. In this paper, we propose a novel method to automatically transform face photos to portrait drawings using unpaired training data with two new features; i.e., our method can (1) learn to generate high quality portrait drawings in multiple styles using a single network and (2) generate portrait drawings in a &#x201C;new style&#x201D; unseen in the training data. To achieve these benefits, we (1) propose a novel quality metric for portrait drawings which is learned from human perception, and (2) introduce a quality loss to guide the network toward generating better looking portrait drawings. We observe that existing unpaired translation methods such as CycleGAN tend to embed invisible reconstruction information indiscriminately in the whole drawings due to significant information imbalance between the photo and portrait drawing domains, which leads to important facial features missing. To address this problem, we propose a novel asymmetric cycle mapping that enforces the reconstruction information to be visible and only embedded in the selected facial regions. Along with localized discriminators for important facial regions, our method well preserves all important facial features in the generated drawings. Generator dissection further explains that our model learns to incorporate face semantic information during drawing generation. Extensive experiments including a user study show that our model outperforms state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Face portrait line drawing is a unique style of art which is highly abstract and expressive. However, due to its high semantic constraints, many existing methods learn to generate portrait drawings using paired training data, which is costly and time-consuming to obtain. In this paper, we propose a novel method to automatically transform face photos to portrait drawings using unpaired training data with two new features; i.e., our method can (1) learn to generate high quality portrait drawings in multiple styles using a single network and (2) generate portrait drawings in a “new style” unseen in the training data. To achieve these benefits, we (1) propose a novel quality metric for portrait drawings which is learned from human perception, and (2) introduce a quality loss to guide the network toward generating better looking portrait drawings. We observe that existing unpaired translation methods such as CycleGAN tend to embed invisible reconstruction information indiscriminately in the whole drawings due to significant information imbalance between the photo and portrait drawing domains, which leads to important facial features missing. To address this problem, we propose a novel asymmetric cycle mapping that enforces the reconstruction information to be visible and only embedded in the selected facial regions. Along with localized discriminators for important facial regions, our method well preserves all important facial features in the generated drawings. Generator dissection further explains that our model learns to incorporate face semantic information during drawing generation. Extensive experiments including a user study show that our model outperforms state-of-the-art methods.", "title": "Quality Metric Guided Portrait Line Drawing Generation From Unpaired Training Data", "normalizedTitle": "Quality Metric Guided Portrait Line Drawing Generation From Unpaired Training Data", "fno": "09699090", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Art", "Face Recognition", "Feature Extraction", "Learning Artificial Intelligence", "Face Portrait Line Drawing", "Generated Drawings", "High Quality Portrait Drawings", "Important Facial Features", "Looking Portrait Drawings", "Paired Training Data", "Portrait Drawing Domains", "Quality Metric Guided Portrait Line Drawing Generation", "Unpaired Training Data", "Unpaired Translation Methods", "Training Data", "Faces", "Measurement", "Facial Features", "Training", "Semantics", "Generators", "Face Portrait", "Drawing", "Style Transfer", "Unpaired Image Translation", "Generative Adversarial Network", "Quality Metric" ], "authors": [ { "givenName": "Ran", "surname": "Yi", "fullName": "Ran Yi", "affiliation": "Department of Computer Science and Technology, BNRist, MOE-Key Laboratory of Pervasive Computing, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong-Jin", "surname": "Liu", "fullName": "Yong-Jin Liu", "affiliation": "Department of Computer Science and Technology, BNRist, MOE-Key Laboratory of Pervasive Computing, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu-Kun", "surname": "Lai", "fullName": "Yu-Kun Lai", "affiliation": "School of Computer Science and Informatics, Cardiff University, Cardiff, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Paul L.", "surname": "Rosin", "fullName": "Paul L. Rosin", "affiliation": "School of Computer Science and Informatics, Cardiff University, Cardiff, U.K.", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "905-918", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fg/2008/2153/0/04813367", "title": "Emotionally aware automated portrait painting demonstration", "doi": null, "abstractUrl": "/proceedings-article/fg/2008/04813367/12OmNxFJXLv", "parentPublication": { "id": "proceedings/fg/2008/2153/0", "title": "2008 8th IEEE International Conference on Automatic Face & Gesture Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2016/2305/0/2305a156", "title": "Artist-Drawing Inspired Automatic Sketch Portrait Rendering", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a156/12OmNylsZOF", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900a666", "title": "Unpaired Face Restoration via Learnable Cross-Quality Shift", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900a666/1G56Pg7qwSc", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09982378", "title": "Appearance-preserved Portrait-to-anime Translation via Proxy-guided Domain Adaptation", "doi": null, "abstractUrl": "/journal/tg/5555/01/09982378/1J2T8H9Y2Ws", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a652", "title": "Everyone is a Cartoonist: Selfie Cartoonization with Attentive Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a652/1cdOKjcIyB2", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300k0735", "title": "APDrawingGAN: Generating Artistic Portrait Drawings From Face Photos With Hierarchical GANs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300k0735/1gyrZWezqyk", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09069416", "title": "Line Drawings for Face Portraits From Photos Using Global and Local Structure Based GANs", "doi": null, "abstractUrl": "/journal/tp/2021/10/09069416/1j4FNWwfNtK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i214", "title": "Unpaired Portrait Drawing Generation via Asymmetric Cycle Mapping", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i214/1m3ncKO9WqQ", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2021/4989/0/09455949", "title": "Multi-Style Artistic Portrait Drawing Generation", "doi": null, "abstractUrl": "/proceedings-article/icmew/2021/09455949/1uCgn6EsRLG", "parentPublication": { "id": "proceedings/icmew/2021/4989/0", "title": "2021 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a386", "title": "MUSE: Textual Attributes Guided Portrait Painting Generation", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a386/1xPsqHV0JQ4", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09669083", "articleId": "1zTfWdgENFK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09726868", "articleId": "1BrwkXHiM24", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IRhIBwhq9i", "name": "ttp202301-09699090s1-supp1-3147570.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202301-09699090s1-supp1-3147570.pdf", "extension": "pdf", "size": "81.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1KsRWKKVV7i", "title": "March", "year": "2023", "issueNum": "03", "idPrefix": "tp", "pubType": "journal", "volume": "45", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ErlhDR4iI0", "doi": "10.1109/TPAMI.2022.3185644", "abstract": "With rapid development of 3D scanning technology, 3D point cloud based research and applications are becoming more popular. However, major difficulties are still exist which affect the performance of point cloud utilization. Such difficulties include lack of local adjacency information, non-uniform point density, and control of point numbers. In this paper, we propose a two-step intrinsic and isotropic (I&#x0026;I) resampling framework to address the challenge of these three major difficulties. The efficient intrinsic control provides geodesic measurement for a point cloud to improve local region detection and avoids redundant geodesic calculation. Then the geometrically-optimized resampling uses a geometric update process to optimize a point cloud into an isotropic or adaptively-isotropic one. The point cloud density can be adjusted to global uniform (isotropic) or local uniform with geometric feature keeping (being adaptively isotropic). The point cloud number can be controlled based on application requirement or user-specification. Experiments show that our point cloud resampling framework achieves outstanding performance in different applications: point cloud simplification, mesh reconstruction and shape registration. We provide the implementation codes of our resampling method at <uri>https://github.com/vvvwo/II-resampling</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "With rapid development of 3D scanning technology, 3D point cloud based research and applications are becoming more popular. However, major difficulties are still exist which affect the performance of point cloud utilization. Such difficulties include lack of local adjacency information, non-uniform point density, and control of point numbers. In this paper, we propose a two-step intrinsic and isotropic (I&#x0026;I) resampling framework to address the challenge of these three major difficulties. The efficient intrinsic control provides geodesic measurement for a point cloud to improve local region detection and avoids redundant geodesic calculation. Then the geometrically-optimized resampling uses a geometric update process to optimize a point cloud into an isotropic or adaptively-isotropic one. The point cloud density can be adjusted to global uniform (isotropic) or local uniform with geometric feature keeping (being adaptively isotropic). The point cloud number can be controlled based on application requirement or user-specification. Experiments show that our point cloud resampling framework achieves outstanding performance in different applications: point cloud simplification, mesh reconstruction and shape registration. We provide the implementation codes of our resampling method at <uri>https://github.com/vvvwo/II-resampling</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With rapid development of 3D scanning technology, 3D point cloud based research and applications are becoming more popular. However, major difficulties are still exist which affect the performance of point cloud utilization. Such difficulties include lack of local adjacency information, non-uniform point density, and control of point numbers. In this paper, we propose a two-step intrinsic and isotropic (I&I) resampling framework to address the challenge of these three major difficulties. The efficient intrinsic control provides geodesic measurement for a point cloud to improve local region detection and avoids redundant geodesic calculation. Then the geometrically-optimized resampling uses a geometric update process to optimize a point cloud into an isotropic or adaptively-isotropic one. The point cloud density can be adjusted to global uniform (isotropic) or local uniform with geometric feature keeping (being adaptively isotropic). The point cloud number can be controlled based on application requirement or user-specification. Experiments show that our point cloud resampling framework achieves outstanding performance in different applications: point cloud simplification, mesh reconstruction and shape registration. We provide the implementation codes of our resampling method at https://github.com/vvvwo/II-resampling.", "title": "Intrinsic and Isotropic Resampling for 3D Point Clouds", "normalizedTitle": "Intrinsic and Isotropic Resampling for 3D Point Clouds", "fno": "09804752", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Cloud Computing", "Feature Extraction", "Image Reconstruction", "Image Registration", "Mesh Generation", "Solid Modelling", "3 D Point Clouds", "3 D Scanning Technology", "Adaptively Isotropic", "Efficient Intrinsic Control", "Geometrically Optimized Resampling", "Isotropic Isotropic", "Local Uniform", "Nonuniform Point Density", "Point Cloud Density", "Point Cloud Number", "Point Cloud Simplification", "Point Cloud Utilization", "Point Numbers", "Point Cloud Compression", "Three Dimensional Displays", "Optimization", "Level Measurement", "Surface Fitting", "Costs", "Shape", "Isotropic Resampling", "Intrinsic Resampling", "Point Cloud Simplification", "Mesh Reconstruction", "Shape Registration" ], "authors": [ { "givenName": "Chenlei", "surname": "Lv", "fullName": "Chenlei Lv", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Weisi", "surname": "Lin", "fullName": "Weisi Lin", "affiliation": "School of Computer Science and Engineering, Nanyang Technological University, Singapore", "__typename": "ArticleAuthorType" }, { "givenName": "Baoquan", "surname": "Zhao", "fullName": "Baoquan Zhao", "affiliation": "School of Artificial Intelligent, Sun Yat-sen University, Guangzhou, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "3274-3291", "year": "2023", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/sibgrapi/2012/4829/0/4829a126", "title": "Efficient HPR-Based Rendering of Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2012/4829a126/12OmNzIUfWI", "parentPublication": { "id": "proceedings/sibgrapi/2012/4829/0", "title": "2012 25th SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b265", "title": "An axis extract method for rotational parts based on point cloud normal lines", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b265/1BBz9AW1P1u", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200h437", "title": "CPFN: Cascaded Primitive Fitting Networks for High-Resolution Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200h437/1BmGd2vDvIA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09775211", "title": "Deep Point Set Resampling via Gradient Fields", "doi": null, "abstractUrl": "/journal/tp/2023/03/09775211/1Dqh2PmIooM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8920", "title": "Surface Representation for Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8920/1H1jmGGv0eQ", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g305", "title": "Reconstructing Surfaces for Sparse Point Clouds with On-Surface Priors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g305/1H1jpDpUMPS", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600p5314", "title": "Shape-invariant 3D Adversarial Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600p5314/1H1kgWOeU2Q", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a216", "title": "Automated Reconstruction of 3D Open Surfaces from Sparse Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a216/1J7WhkwWdAA", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10024001", "title": "AGConv: Adaptive Graph Convolution on 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/5555/01/10024001/1K9spf0w0Ug", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a940", "title": "NeeDrop: Self-supervised Shape Representation from Sparse Point Clouds using Needle Dropping", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a940/1zWEezCujxC", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09804810", "articleId": "1ErliVI1Pri", "__typename": "AdjacentArticleType" }, "next": { "fno": "09786676", "articleId": "1DQPynfsjiE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNBsLPeT", "title": "July-Sept.", "year": "2016", "issueNum": "03", "idPrefix": "th", "pubType": "journal", "volume": "9", "label": "July-Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxDqS8t", "doi": "10.1109/TOH.2016.2537803", "abstract": "Piezoelectric motors offer an attractive alternative to electromagnetic actuators in portable haptic interfaces: they are compact, have a high force-to-volume ratio, and can operate with limited or no gearing. However, the choice of a piezoelectric motor type is not obvious due to differences in performance characteristics. We present our evaluation of two commercial, operationally different, piezoelectric motors acting as actuators in two kinesthetic haptic grippers, a walking quasi-static motor and a traveling wave ultrasonic motor. We evaluate each gripper's ability to display common virtual objects including springs, dampers, and rigid walls, and conclude that the walking quasi-static motor is superior at low velocities. However, for applications where high velocity is required, traveling wave ultrasonic motors are a better option.", "abstracts": [ { "abstractType": "Regular", "content": "Piezoelectric motors offer an attractive alternative to electromagnetic actuators in portable haptic interfaces: they are compact, have a high force-to-volume ratio, and can operate with limited or no gearing. However, the choice of a piezoelectric motor type is not obvious due to differences in performance characteristics. We present our evaluation of two commercial, operationally different, piezoelectric motors acting as actuators in two kinesthetic haptic grippers, a walking quasi-static motor and a traveling wave ultrasonic motor. We evaluate each gripper's ability to display common virtual objects including springs, dampers, and rigid walls, and conclude that the walking quasi-static motor is superior at low velocities. However, for applications where high velocity is required, traveling wave ultrasonic motors are a better option.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Piezoelectric motors offer an attractive alternative to electromagnetic actuators in portable haptic interfaces: they are compact, have a high force-to-volume ratio, and can operate with limited or no gearing. However, the choice of a piezoelectric motor type is not obvious due to differences in performance characteristics. We present our evaluation of two commercial, operationally different, piezoelectric motors acting as actuators in two kinesthetic haptic grippers, a walking quasi-static motor and a traveling wave ultrasonic motor. We evaluate each gripper's ability to display common virtual objects including springs, dampers, and rigid walls, and conclude that the walking quasi-static motor is superior at low velocities. However, for applications where high velocity is required, traveling wave ultrasonic motors are a better option.", "title": "Comparison of Walking and Traveling-Wave Piezoelectric Motors as Actuators in Kinesthetic Haptic Devices", "normalizedTitle": "Comparison of Walking and Traveling-Wave Piezoelectric Motors as Actuators in Kinesthetic Haptic Devices", "fno": "07444168", "hasPdf": true, "idPrefix": "th", "keywords": [ "Grippers", "Thumb", "Force", "Piezoelectric Transducers", "Haptic Interfaces", "Legged Locomotion", "Haptic Gripper", "Piezoelectric", "Walking Motor", "Traveling Wave Motor", "Actuator" ], "authors": [ { "givenName": "Pontus", "surname": "Olsson", "fullName": "Pontus Olsson", "affiliation": "Department of Information Technology, Uppsala University, Uppsala, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Fredrik", "surname": "Nysjö", "fullName": "Fredrik Nysjö", "affiliation": "Department of Information Technology, Uppsala University, Uppsala, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Ingrid B.", "surname": "Carlbom", "fullName": "Ingrid B. Carlbom", "affiliation": "Department of Information Technology, Uppsala University, Uppsala, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Stefan", "surname": "Johansson", "fullName": "Stefan Johansson", "affiliation": "Department of Engineering Sciences, Uppsala University, Uppsala, Sweden", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "03", "pubDate": "2016-07-01 00:00:00", "pubType": "trans", "pages": "427-431", "year": "2016", "issn": "1939-1412", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cerma/2009/3799/0/3799a402", "title": "Characterization of a Piezoelectric Ultrasonic Linear Motor for Braille Displays", "doi": null, "abstractUrl": "/proceedings-article/cerma/2009/3799a402/12OmNAS9zy3", "parentPublication": { "id": "proceedings/cerma/2009/3799/0", "title": "Electronics, Robotics and Automotive Mechanics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b045", "title": "Design and Fabrication of a Novel PZT Films Based Piezoelectric Micromachined Ultrasonic Transducers", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b045/12OmNBSBkil", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccce/2014/7635/0/7635a036", "title": "Parameter Optimization for Piezoelectric Micro-energy Harvesting System", "doi": null, "abstractUrl": "/proceedings-article/iccce/2014/7635a036/12OmNBZHihh", "parentPublication": { "id": "proceedings/iccce/2014/7635/0", "title": "2014 International Conference on Computer & Communication Engineering (ICCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/1/00912889", "title": "Micro-positioning of linear piezoelectric motors based on a learning nonlinear PID controller", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00912889/12OmNscOUjb", "parentPublication": { "id": "proceedings/cdc/2000/6638/1", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/3/4296f004", "title": "Theoretical Design and Experiment of a Plate Type Multi-degree-of-freedom Piezoelectric Motor", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296f004/12OmNvjyxLg", "parentPublication": { "id": "proceedings/icmtma/2011/4296/3", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icqnm/2009/3524/0/3524a081", "title": "Micromotor of Less Than 1 mm^3 Volume for In Vivo Medical Procedures", "doi": null, "abstractUrl": "/proceedings-article/icqnm/2009/3524a081/12OmNwHQBac", "parentPublication": { "id": "proceedings/icqnm/2009/3524/0", "title": "Quantum, Nano, and Micro Technologies, First International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031c371", "title": "The Mechanical Performance of Piezoelectric Fiber Composite Actuators", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031c371/12OmNx4yvqY", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2012/0430/0/06386342", "title": "Design of a grasp force adaptive control system with tactile and slip perception", "doi": null, "abstractUrl": "/proceedings-article/case/2012/06386342/12OmNyv7msR", "parentPublication": { "id": "proceedings/case/2012/0430/0", "title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2016/3071/0/3071a874", "title": "A Novel Ultrasonic Motor Driven by Circumferential Ridge Waves", "doi": null, "abstractUrl": "/proceedings-article/is3c/2016/3071a874/12OmNzTH0HR", "parentPublication": { "id": "proceedings/is3c/2016/3071/0", "title": "2016 International Symposium on Computer, Consumer and Control (IS3C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2021/2172/0/217200a442", "title": "Research Progress and Development Direction of Structural Optimization and Modeling of traveling Wave Rotating Ultrasonic Motor", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2021/217200a442/1ANLx6q8Dx6", "parentPublication": { "id": "proceedings/wcmeim/2021/2172/0", "title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "07491268", "articleId": "13rRUxE04tM", "__typename": "AdjacentArticleType" }, "next": { "fno": "07420727", "articleId": "13rRUxBa56g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1LM6Vit90is", "title": "April", "year": "2023", "issueNum": "02", "idPrefix": "ai", "pubType": "journal", "volume": "4", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1CHsEUX81mU", "doi": "10.1109/TAI.2022.3168038", "abstract": "The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision since the perturbation to each pixel is relatively large. To achieve imperceptible and sparse adversarial attacks, this article formulates a bi-objective constrained optimization problem, simultaneously minimizing the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{0}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2}$_Z</tex-math></inline-formula> distances to the original image, and proposes a dual-population-based constrained evolutionary algorithm to solve it. The proposed method solves the optimization problem by evolving two populations, where one population is responsible for finding feasible solutions (i.e., successful attacks) and the other one is to minimize both the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{0}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2}$_Z</tex-math></inline-formula> distances. Moreover, a population initialization strategy and two genetic operators are customized to accelerate the convergence speed. Experimental results indicate that the proposed method can achieve high success rates with low attack costs, and strikes a better balance between the <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{0}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2}$_Z</tex-math></inline-formula> distances than state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision since the perturbation to each pixel is relatively large. To achieve imperceptible and sparse adversarial attacks, this article formulates a bi-objective constrained optimization problem, simultaneously minimizing the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{0}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2}$</tex-math></inline-formula> distances to the original image, and proposes a dual-population-based constrained evolutionary algorithm to solve it. The proposed method solves the optimization problem by evolving two populations, where one population is responsible for finding feasible solutions (i.e., successful attacks) and the other one is to minimize both the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{0}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2}$</tex-math></inline-formula> distances. Moreover, a population initialization strategy and two genetic operators are customized to accelerate the convergence speed. Experimental results indicate that the proposed method can achieve high success rates with low attack costs, and strikes a better balance between the <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{0}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$\\ell _{2}$</tex-math></inline-formula> distances than state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision since the perturbation to each pixel is relatively large. To achieve imperceptible and sparse adversarial attacks, this article formulates a bi-objective constrained optimization problem, simultaneously minimizing the - and - distances to the original image, and proposes a dual-population-based constrained evolutionary algorithm to solve it. The proposed method solves the optimization problem by evolving two populations, where one population is responsible for finding feasible solutions (i.e., successful attacks) and the other one is to minimize both the - and - distances. Moreover, a population initialization strategy and two genetic operators are customized to accelerate the convergence speed. Experimental results indicate that the proposed method can achieve high success rates with low attack costs, and strikes a better balance between the - and - distances than state-of-the-art methods.", "title": "Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm", "normalizedTitle": "Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm", "fno": "09760177", "hasPdf": true, "idPrefix": "ai", "keywords": [ "Computer Crime", "Genetic Algorithms", "Image Processing", "Bi Objective Constrained Optimization Problem", "Convergence Speed", "Dual Population Based Constrained Evolutionary Algorithm", "Generated Adversarial Examples", "Genetic Operators", "Imperceptible Attacks", "Population Initialization Strategy", "Sparse Adversarial Attacks", "Perturbation Methods", "Optimization", "Evolutionary Computation", "Statistics", "Sociology", "Costs", "Task Analysis", "Constrained Multiobjective Optimization", "Evolutionary Computation", "Imperceptible Adversarial Examples", "Sparse Adversarial Attacks" ], "authors": [ { "givenName": "Ye", "surname": "Tian", "fullName": "Ye Tian", "affiliation": "Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, Institutes of Physical Science and Information Technology, Anhui University, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jingwen", "surname": "Pan", "fullName": "Jingwen Pan", "affiliation": "School of Computer Science and Technology, Anhui University, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shangshang", "surname": "Yang", "fullName": "Shangshang Yang", "affiliation": "School of Computer Science and Technology, Anhui University, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xingyi", "surname": "Zhang", "fullName": "Xingyi Zhang", "affiliation": "Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Artificial Intelligence, Anhui University, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shuping", "surname": "He", "fullName": "Shuping He", "affiliation": "Anhui Engineering Laboratory of Human–Robot Integration System and Intelligent Equipment, School of Electrical Engineering and Automation, Anhui University, Hefei, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yaochu", "surname": "Jin", "fullName": "Yaochu Jin", "affiliation": "Faculty of Technology, Bielefeld University, Bielefeld, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "268-281", "year": "2023", "issn": "2691-4581", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tq/2018/02/07469381", "title": "On the Efficiency of FHE-Based Private Queries", "doi": null, "abstractUrl": "/journal/tq/2018/02/07469381/13rRUEgarkQ", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/04/08325531", "title": "Memory Efficient Max Flow for Multi-Label Submodular MRFs", "doi": null, "abstractUrl": "/journal/tp/2019/04/08325531/13rRUyogGBv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/02/08214273", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _0$_Z</tex-math></inline-formula>TV: A Sparse Optimization Method for Impulse Noise Image Restoration", "doi": null, "abstractUrl": "/journal/tp/2019/02/08214273/17D45WIXbPe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09893402", "title": "Structured Sparse Non-negative Matrix Factorization with <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{2,0}$_Z</tex-math></inline-formula>-Norm", "doi": null, "abstractUrl": "/journal/tk/5555/01/09893402/1GGLdY0vH0c", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09894678", "title": "Scalable Distributed Data Anonymization for Large Datasets", "doi": null, "abstractUrl": "/journal/bd/5555/01/09894678/1GNoUMQbuQ8", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10018284", "title": "Bidirectional String Anchors for Improved Text Indexing and Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$K$_Z</tex-math></inline-formula> Similarity Search", "doi": null, "abstractUrl": "/journal/tk/5555/01/10018284/1JYYXitocWQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10076835", "title": "Learning Rates for Nonconvex Pairwise Learning", "doi": null, "abstractUrl": "/journal/tp/5555/01/10076835/1LFPZOSnzhK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10102661", "title": "An Optimal Algorithm for Finding Champions in Tournament Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10102661/1MkXTlc0Noc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09354530", "title": "The Fastest <inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1,\\infty }$_Z</tex-math></inline-formula> Prox in the West", "doi": null, "abstractUrl": "/journal/tp/2022/07/09354530/1reXhVJz6eI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09448409", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\ell _{1}$_Z</tex-math></inline-formula>-Norm Quantile Regression Screening Rule via the Dual Circumscribed Sphere", "doi": null, "abstractUrl": "/journal/tp/2022/10/09448409/1ugE4OYu2Xu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09699409", "articleId": "1ADJimXQt0Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "09762063", "articleId": "1CMrqSyVYTC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1DqhdWqxQgU", "title": "June", "year": "2022", "issueNum": "06", "idPrefix": "si", "pubType": "journal", "volume": "30", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1CnxPa7I1gc", "doi": "10.1109/TVLSI.2022.3161847", "abstract": "The von Neumann bottleneck has significantly increased the energy consumption of processing units and memory systems, especially in data-intensive computations such as the correlation parameter, which is being used in medical research, financial market analysis, biometrics, etc. Recently, memristor-enabled in-memory processing has gained tremendous research attraction to extenuate the von Neumann bottleneck as it processes operands at the location of storage, which obviates the need to transfer data between memory and the processing units. Hence, in this article, an innovative memristor crossbar-based architecture computing correlation parameter in-memory (CoCoPIM) has been proposed to accelerate correlation coefficient computations. Three different applications such as computing correlation between electrocardiogram (ECG) signals, faces, and H1N1 models were implemented based on the architecture. To evaluate the architecture, Neurosim was modified to support data mapping and computation steps, whereas Micro Architectural and System Simulator (MARSS) and multicore power, area, and timing (McPAT) were used to evaluate the von Neumann machine. In these applications, it was found that CoCoPIM was <inline-formula> <tex-math notation=\"LaTeX\">Z_$41.04\\times $_Z</tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">Z_$66.5\\times $_Z</tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">Z_$67\\times $_Z</tex-math></inline-formula>, and <inline-formula> <tex-math notation=\"LaTeX\">Z_$33.2\\times $_Z</tex-math></inline-formula> times energy-efficient against a four-core out-of-order processor in performing the respective tasks. It also achieved a speedup of <inline-formula> <tex-math notation=\"LaTeX\">Z_$143.5\\times $_Z</tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">Z_$52.5\\times $_Z</tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">Z_$52.5\\times $_Z</tex-math></inline-formula>, and <inline-formula> <tex-math notation=\"LaTeX\">Z_$597\\times $_Z</tex-math></inline-formula> times against the same von Neumann machine (multicore processor) for the respective tasks.", "abstracts": [ { "abstractType": "Regular", "content": "The von Neumann bottleneck has significantly increased the energy consumption of processing units and memory systems, especially in data-intensive computations such as the correlation parameter, which is being used in medical research, financial market analysis, biometrics, etc. Recently, memristor-enabled in-memory processing has gained tremendous research attraction to extenuate the von Neumann bottleneck as it processes operands at the location of storage, which obviates the need to transfer data between memory and the processing units. Hence, in this article, an innovative memristor crossbar-based architecture computing correlation parameter in-memory (CoCoPIM) has been proposed to accelerate correlation coefficient computations. Three different applications such as computing correlation between electrocardiogram (ECG) signals, faces, and H1N1 models were implemented based on the architecture. To evaluate the architecture, Neurosim was modified to support data mapping and computation steps, whereas Micro Architectural and System Simulator (MARSS) and multicore power, area, and timing (McPAT) were used to evaluate the von Neumann machine. In these applications, it was found that CoCoPIM was <inline-formula> <tex-math notation=\"LaTeX\">$41.04\\times $ </tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">$66.5\\times $ </tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">$67\\times $ </tex-math></inline-formula>, and <inline-formula> <tex-math notation=\"LaTeX\">$33.2\\times $ </tex-math></inline-formula> times energy-efficient against a four-core out-of-order processor in performing the respective tasks. It also achieved a speedup of <inline-formula> <tex-math notation=\"LaTeX\">$143.5\\times $ </tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">$52.5\\times $ </tex-math></inline-formula>, <inline-formula> <tex-math notation=\"LaTeX\">$52.5\\times $ </tex-math></inline-formula>, and <inline-formula> <tex-math notation=\"LaTeX\">$597\\times $ </tex-math></inline-formula> times against the same von Neumann machine (multicore processor) for the respective tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The von Neumann bottleneck has significantly increased the energy consumption of processing units and memory systems, especially in data-intensive computations such as the correlation parameter, which is being used in medical research, financial market analysis, biometrics, etc. Recently, memristor-enabled in-memory processing has gained tremendous research attraction to extenuate the von Neumann bottleneck as it processes operands at the location of storage, which obviates the need to transfer data between memory and the processing units. Hence, in this article, an innovative memristor crossbar-based architecture computing correlation parameter in-memory (CoCoPIM) has been proposed to accelerate correlation coefficient computations. Three different applications such as computing correlation between electrocardiogram (ECG) signals, faces, and H1N1 models were implemented based on the architecture. To evaluate the architecture, Neurosim was modified to support data mapping and computation steps, whereas Micro Architectural and System Simulator (MARSS) and multicore power, area, and timing (McPAT) were used to evaluate the von Neumann machine. In these applications, it was found that CoCoPIM was -, -, -, and - times energy-efficient against a four-core out-of-order processor in performing the respective tasks. It also achieved a speedup of -, -, -, and - times against the same von Neumann machine (multicore processor) for the respective tasks.", "title": "Memristors Enabled Computing Correlation Parameter In-Memory System: A Potential Alternative to Von Neumann Architecture", "normalizedTitle": "Memristors Enabled Computing Correlation Parameter In-Memory System: A Potential Alternative to Von Neumann Architecture", "fno": "09751236", "hasPdf": true, "idPrefix": "si", "keywords": [ "Computer Architecture", "Data Analysis", "Electrocardiography", "Memristors", "Microprocessor Chips", "Multiprocessing Systems", "Power Aware Computing", "Von Neumann Machine", "Energy Efficiency", "In Memory System", "Von Neumann Architecture", "Energy Consumption", "Data Intensive Computations", "Medical Research", "Financial Market Analysis", "Memristor Enabled In Memory Processing", "Correlation Coefficient Computations", "Data Mapping", "Multicore Processor", "Micro Architectural And System Simulator", "MARSS", "H 1 N 1 Models", "Innovative Memristor Crossbar Based Architecture", "Electrocardiogram Signals", "ECG", "Multicore Power Area And Timing", "Mc PAT", "Computing Correlation Parameter In Memory System", "Co Co PIM", "Memristors", "Computer Architecture", "Correlation", "Arithmetic", "Electrocardiography", "Computational Modeling", "Task Analysis", "Crossbar", "Memristor", "Pearson Correlation Coefficient PCC", "Processing In Memory PIM" ], "authors": [ { "givenName": "Souvik", "surname": "Kundu", "fullName": "Souvik Kundu", "affiliation": "Department of Electrical and Electronics Engineering, BITS-Pilani, Hyderabad Campus, Hyderabad, India", "__typename": "ArticleAuthorType" }, { "givenName": "Priyanka B.", "surname": "Ganganaik", "fullName": "Priyanka B. Ganganaik", "affiliation": "Department of Electrical and Electronics Engineering, BITS-Pilani, Hyderabad Campus, Hyderabad, India", "__typename": "ArticleAuthorType" }, { "givenName": "Jeffry", "surname": "Louis", "fullName": "Jeffry Louis", "affiliation": "Department of Electrical and Electronics Engineering, BITS-Pilani, Hyderabad Campus, Hyderabad, India", "__typename": "ArticleAuthorType" }, { "givenName": "Hemanth", "surname": "Chalamalasetty", "fullName": "Hemanth Chalamalasetty", "affiliation": "Department of Electrical and Electronics Engineering, BITS-Pilani, Hyderabad Campus, Hyderabad, India", "__typename": "ArticleAuthorType" }, { "givenName": "BVVSN Prabhakar", "surname": "Rao", "fullName": "BVVSN Prabhakar Rao", "affiliation": "Department of Electrical and Electronics Engineering, BITS-Pilani, Hyderabad Campus, Hyderabad, India", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "06", "pubDate": "2022-06-01 00:00:00", "pubType": "trans", "pages": "755-768", "year": "2022", "issn": "1063-8210", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2023/03/09786656", "title": "Logarithmic Schatten-<inline-formula><tex-math notation=\"LaTeX\">Z_$p$_Z</tex-math></inline-formula> Norm Minimization for Tensorial Multi-View Subspace Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/03/09786656/1DQPxlTv7lS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09816369", "title": "Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT", "doi": null, "abstractUrl": "/journal/tq/5555/01/09816369/1EMV8T2kRFu", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/03/09827923", "title": "PMNS for Efficient Arithmetic and Small Memory Cost", "doi": null, "abstractUrl": "/journal/ec/2022/03/09827923/1EWSBFUfd6M", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/06/09927425", "title": "A Privacy-Preserving Comparison Protocol", "doi": null, "abstractUrl": "/journal/tc/2023/06/09927425/1HJuLchrDsA", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/09976229", "title": "CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things", "doi": null, "abstractUrl": "/journal/tc/5555/01/09976229/1IWfNRR1Wb6", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10008070", "title": "Cohesive Subgraph Discovery over Uncertain Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10008070/1JInEtdlgfm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10093038", "title": "Privacy-Preserving and Byzantine-Robust Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/10093038/1M61YImr8dO", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10121476", "title": "Efficient Maximal Biclique Enumeration on Large Uncertain Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10121476/1MYNFoG81ws", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2020/06/08976264", "title": "Algorithms for Inversion Mod &#x3C;inline-formula&#x3E;&#x3C;tex-math notation=&#x22;LaTeX&#x22;&#x3E;Z_$p^k$_Z&#x3C;/tex-math&#x3E;&#x3C;/inline-formula&#x3E;", "doi": null, "abstractUrl": "/journal/tc/2020/06/08976264/1h0W7qmGRHO", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2020/11/09179010", "title": "Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption", "doi": null, "abstractUrl": "/journal/si/2020/11/09179010/1mDpvhCa3rW", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09732903", "articleId": "1BD8K9ZosSc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09760704", "articleId": "1CJ7A4V5Ecg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Iz0MCWUJhe", "doi": "10.1109/TKDE.2022.3219096", "abstract": "A <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core is the special cohesive subgraph where each vertex has at least <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> degree. It is widely used in graph mining applications such as community detection, visualization, and clique discovery. Because dynamic graphs frequently evolve, obtaining their <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-cores via decomposition is inefficient. Instead, previous studies proposed various methods for updating <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-cores based on inserted (removed) edges. Unfortunately, the parallelism of existing approaches is limited due to their theoretical constraints. To further improve the parallelism of maintenance algorithms, we refine the <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-core maintenance theorem and propose two effective parallel methods to update <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-cores for insertion and removal cases. Experimental results show that our methods outperform the state-of-the-art algorithms on real-world graphs by one order of magnitude.", "abstracts": [ { "abstractType": "Regular", "content": "A <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-core is the special cohesive subgraph where each vertex has at least <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> degree. It is widely used in graph mining applications such as community detection, visualization, and clique discovery. Because dynamic graphs frequently evolve, obtaining their <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-cores via decomposition is inefficient. Instead, previous studies proposed various methods for updating <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-cores based on inserted (removed) edges. Unfortunately, the parallelism of existing approaches is limited due to their theoretical constraints. To further improve the parallelism of maintenance algorithms, we refine the <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-core maintenance theorem and propose two effective parallel methods to update <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-cores for insertion and removal cases. Experimental results show that our methods outperform the state-of-the-art algorithms on real-world graphs by one order of magnitude.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A --core is the special cohesive subgraph where each vertex has at least - degree. It is widely used in graph mining applications such as community detection, visualization, and clique discovery. Because dynamic graphs frequently evolve, obtaining their --cores via decomposition is inefficient. Instead, previous studies proposed various methods for updating --cores based on inserted (removed) edges. Unfortunately, the parallelism of existing approaches is limited due to their theoretical constraints. To further improve the parallelism of maintenance algorithms, we refine the --core maintenance theorem and propose two effective parallel methods to update --cores for insertion and removal cases. Experimental results show that our methods outperform the state-of-the-art algorithms on real-world graphs by one order of magnitude.", "title": "Parallel Core Maintenance of Dynamic Graphs", "normalizedTitle": "Parallel Core Maintenance of Dynamic Graphs", "fno": "09963545", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Maintenance Engineering", "Parallel Algorithms", "Image Edge Detection", "Indexes", "Costs", "Color", "Partitioning Algorithms", "<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$k-$_Z</tex-math> </inline-formula>core", "Core Decomposition", "Core Maintenance" ], "authors": [ { "givenName": "Wen", "surname": "Bai", "fullName": "Wen Bai", "affiliation": "School of Computer Science, South China Normal University, Guangzou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yuncheng", "surname": "Jiang", "fullName": "Yuncheng Jiang", "affiliation": "School of Computer Science, South China Normal University, Guangzou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yong", "surname": "Tang", "fullName": "Yong Tang", "affiliation": "School of Computer Science, South China Normal University, Guangzou, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yayang", "surname": "Li", "fullName": "Yayang Li", "affiliation": "School of Computer Science, South China Normal University, Guangzou, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-15", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tc/2023/03/09774034", "title": "Exploring Truss Maintenance in Fully Dynamic Graphs: A Mixed Structure-Based Approach", "doi": null, "abstractUrl": "/journal/tc/2023/03/09774034/1DjDrsbt0yY", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09860045", "title": "Searching Personalized <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-wing in Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09860045/1FUYx502pJC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10008070", "title": "Cohesive Subgraph Discovery over Uncertain Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10008070/1JInEtdlgfm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10025375", "title": "Maximal Clique Search in Weighted Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10025375/1KcfWWSjp4s", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09199134", "title": "Computing K-Cores in Large Uncertain Graphs: An Index-Based Optimal Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09199134/1naBq7vTUIw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09272333", "title": "Index-Based Intimate-Core Community Search in Large Weighted Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/09/09272333/1p4vZDGlyeY", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09452800", "title": "Core Decomposition on Uncertain Graphs Revisited", "doi": null, "abstractUrl": "/journal/tk/2023/01/09452800/1ulCu0Hdqs8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09534476", "title": "Discovering Significant Communities on Bipartite Graphs: An Index-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2023/03/09534476/1wLbitNpdle", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/01/09518384", "title": "A Coverage-Aware Distributed <italic>k</italic>-Connectivity Maintenance Algorithm for Arbitrarily Large <italic>k</italic> in Mobile Sensor Networks", "doi": null, "abstractUrl": "/journal/nt/2022/01/09518384/1wc8PfV57DG", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09665221", "title": "An Efficient Index-Based Approach to Distributed Set Reachability on Small-World Graphs", "doi": null, "abstractUrl": "/journal/td/2022/10/09665221/1zJiQNKABEs", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09961144", "articleId": "1IxvRpQWaZ2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09963576", "articleId": "1Iz0NhWOD4Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1IAFFW4Ifmg", "name": "ttk555501-09963545s1-supp1-3219096.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk555501-09963545s1-supp1-3219096.pdf", "extension": "pdf", "size": "166 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwCsdFw", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tk", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1LIN5YpM6HK", "doi": "10.1109/TKDE.2023.3243177", "abstract": "With the urbanization and development of infrastructure, the community search over road networks has become increasingly important in many real applications such as urban/city planning, social study on local communities, and community recommendations by real estate agencies. In this paper, we propose a novel problem, namely <italic>top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> community similarity search</italic> (<inline-formula><tex-math notation=\"LaTeX\">Z_$Top\\text{-}kCS^{2}$_Z</tex-math></inline-formula>) over road networks, which efficiently and effectively obtains <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> spatial communities that are the most similar to a given query community in road-network graphs. In order to efficiently and effectively tackle the <inline-formula><tex-math notation=\"LaTeX\">Z_$Top\\text{-}kCS^{2}$_Z</tex-math></inline-formula> problem, in this paper, we will design an effective similarity measure between spatial communities, and propose a framework for retrieving <inline-formula><tex-math notation=\"LaTeX\">Z_$Top\\text{-}kCS^{2}$_Z</tex-math></inline-formula> query answers, which integrates offline pre-processing and online computation phases. Moreover, we also consider a variant, namely <italic>continuous top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> community similarity search</italic> (<inline-formula><tex-math notation=\"LaTeX\">Z_$CTop\\text{-}kCS^{2}$_Z</tex-math></inline-formula>), where the query community continuously moves along a query line segment. We develop an efficient algorithm to split query line segment into intervals, incrementally obtain similar candidate communities for each interval, and refine actual <inline-formula><tex-math notation=\"LaTeX\">Z_$CTop\\text{-}kCS^{2}$_Z</tex-math></inline-formula> query answers. Extensive experiments have been conducted on real and synthetic data sets to confirm the efficiency and effectiveness of our proposed <inline-formula><tex-math notation=\"LaTeX\">Z_$Top\\text{-}kCS^{2}$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$CTop\\text{-}kCS^{2}$_Z</tex-math></inline-formula> approaches under various parameter settings.", "abstracts": [ { "abstractType": "Regular", "content": "With the urbanization and development of infrastructure, the community search over road networks has become increasingly important in many real applications such as urban/city planning, social study on local communities, and community recommendations by real estate agencies. In this paper, we propose a novel problem, namely <italic>top-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> community similarity search</italic> (<inline-formula><tex-math notation=\"LaTeX\">$Top\\text{-}kCS^{2}$</tex-math></inline-formula>) over road networks, which efficiently and effectively obtains <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> spatial communities that are the most similar to a given query community in road-network graphs. In order to efficiently and effectively tackle the <inline-formula><tex-math notation=\"LaTeX\">$Top\\text{-}kCS^{2}$</tex-math></inline-formula> problem, in this paper, we will design an effective similarity measure between spatial communities, and propose a framework for retrieving <inline-formula><tex-math notation=\"LaTeX\">$Top\\text{-}kCS^{2}$</tex-math></inline-formula> query answers, which integrates offline pre-processing and online computation phases. Moreover, we also consider a variant, namely <italic>continuous top-<inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula> community similarity search</italic> (<inline-formula><tex-math notation=\"LaTeX\">$CTop\\text{-}kCS^{2}$</tex-math></inline-formula>), where the query community continuously moves along a query line segment. We develop an efficient algorithm to split query line segment into intervals, incrementally obtain similar candidate communities for each interval, and refine actual <inline-formula><tex-math notation=\"LaTeX\">$CTop\\text{-}kCS^{2}$</tex-math></inline-formula> query answers. Extensive experiments have been conducted on real and synthetic data sets to confirm the efficiency and effectiveness of our proposed <inline-formula><tex-math notation=\"LaTeX\">$Top\\text{-}kCS^{2}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$CTop\\text{-}kCS^{2}$</tex-math></inline-formula> approaches under various parameter settings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the urbanization and development of infrastructure, the community search over road networks has become increasingly important in many real applications such as urban/city planning, social study on local communities, and community recommendations by real estate agencies. In this paper, we propose a novel problem, namely top-- community similarity search (-) over road networks, which efficiently and effectively obtains - spatial communities that are the most similar to a given query community in road-network graphs. In order to efficiently and effectively tackle the - problem, in this paper, we will design an effective similarity measure between spatial communities, and propose a framework for retrieving - query answers, which integrates offline pre-processing and online computation phases. Moreover, we also consider a variant, namely continuous top-- community similarity search (-), where the query community continuously moves along a query line segment. We develop an efficient algorithm to split query line segment into intervals, incrementally obtain similar candidate communities for each interval, and refine actual - query answers. Extensive experiments have been conducted on real and synthetic data sets to confirm the efficiency and effectiveness of our proposed - and - approaches under various parameter settings.", "title": "Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula> Community Similarity Search Over Large-Scale Road Networks", "normalizedTitle": "Top-- Community Similarity Search Over Large-Scale Road Networks", "fno": "10078319", "hasPdf": true, "idPrefix": "tk", "keywords": [ "Roads", "Lenses", "Data Visualization", "Planning", "Search Problems", "Motion Pictures", "Urban Areas", "top-<inline-formula xmlns:ali=\"http://www.niso.org/schemas/ali/1.0/\" xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"> <tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math> </inline-formula> community similarity search", "Road Network Graph" ], "authors": [ { "givenName": "Niranjan", "surname": "Rai", "fullName": "Niranjan Rai", "affiliation": "Department of Computer Science, Kent State University, Kent, OH, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xiang", "surname": "Lian", "fullName": "Xiang Lian", "affiliation": "Department of Computer Science, Kent State University, Kent, OH, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "1041-4347", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2015/04/06800081", "title": "The <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi g}$_Z</tex-math></inline-formula>-Good-Neighbor Conditional Diagnosability of <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi k}$_Z</tex-math></inline-formula>-Ary <inline-formula><tex-math notation=\"LaTeX\">Z_${\\schmi n}$_Z</tex-math></inline-formula>-Cubes under the PMC Model and MM Model", "doi": null, "abstractUrl": "/journal/td/2015/04/06800081/13rRUyeCka1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2019/04/08641433", "title": "A 13-bit 8-kS/s <inline-formula> <tex-math notation=\"LaTeX\">Z_$\\Delta$_Z</tex-math></inline-formula>&#x2013;<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\Sigma$_Z</tex-math></inline-formula> Readout IC Using ZCB Integrators With an Embedded Resistive Sensor Achieving 1.05-pJ/Conversion Step and a 65-dB PSRR", "doi": null, "abstractUrl": "/journal/si/2019/04/08641433/17D45WUj917", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09756312", "title": "Continuous <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Regret Minimization Queries: A Dynamic Coreset Approach", "doi": null, "abstractUrl": "/journal/tk/2023/06/09756312/1CvQcl7WKu4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09860045", "title": "Searching Personalized <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-wing in Bipartite Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09860045/1FUYx502pJC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09894070", "title": "mCore <inline-formula><tex-math notation=\"LaTeX\">Z_$+$_Z</tex-math></inline-formula>: A Real-Time Design Achieving <inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim 500~\\mu$_Z</tex-math></inline-formula> s Scheduling for 5G MU-MIMO Systems", "doi": null, "abstractUrl": "/journal/tm/5555/01/09894070/1GIqn6CnOY8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/09904485", "title": "An Improvement on &#x201C;CryptCloud<inline-formula><tex-math notation=\"LaTeX\">Z_$^{+}$_Z</tex-math></inline-formula>: Secure and Expressive Data Access Control for Cloud Storage&#x201D;", "doi": null, "abstractUrl": "/journal/sc/5555/01/09904485/1H0G1yMr7rO", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09944955", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$kt$_Z</tex-math></inline-formula>-Safety: Graph Release via <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Anonymity and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>-Closeness", "doi": null, "abstractUrl": "/journal/tk/5555/01/09944955/1IbM9dSufYI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10018284", "title": "Bidirectional String Anchors for Improved Text Indexing and Top-<inline-formula><tex-math notation=\"LaTeX\">Z_$K$_Z</tex-math></inline-formula> Similarity Search", "doi": null, "abstractUrl": "/journal/tk/5555/01/10018284/1JYYXitocWQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10043711", "title": "Differential Fault Attack on Rasta and <inline-formula><tex-math notation=\"LaTeX\">Z_$\\text{FiLIP}_{\\text{DSM}}$_Z</tex-math></inline-formula>", "doi": null, "abstractUrl": "/journal/tc/5555/01/10043711/1KJsqF2jobe", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10108909", "title": "A 0.3-V 8.5-<inline-formula> <tex-math notation=\"LaTeX\">Z_$\\mu $_Z</tex-math> </inline-formula>A Bulk-Driven OTA", "doi": null, "abstractUrl": "/journal/si/5555/01/10108909/1MDGl5NnAmA", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10068302", "articleId": "1LtR4x6gwpO", "__typename": "AdjacentArticleType" }, "next": { "fno": "10091894", "articleId": "1M4mW99cDMQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1LKs2ldjizC", "name": "ttk555501-010078319s1-supp1-3243177.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttk555501-010078319s1-supp1-3243177.pdf", "extension": "pdf", "size": "991 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxVV62k", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "su", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1LxaR4vPy5G", "doi": "10.1109/TSUSC.2023.3252595", "abstract": "Provisioning cloud native services via containers has been regarded as a promising way to promote the cloud elasticity. A container may simultaneously sustain multiple services with a number of different communication sessions. It is of great importance to predict them for fine-grain system management. However, this is a non-trivial task as the session traffics are all invisible. The only thing we can get is the container network interface usage as the total traffic of all coexisting sessions. In this paper, we propose a machine learning based session level traffic prediction framework called X-Rayer, to predict respective session traffics from the network interface usage. Via a sliding-window based ensemble empirical mode decomposition algorithm, X-Rayer first accurately predicts the interface usage, which is then decomposed into session traffics by an invented ConvGRU formed by convolutional neural network and gated recurrent unit. Specially, the spatial-temporal correlations of the interface usages are abstracted via an attention strategy and explored for accurate session traffic decomposition. Through extensive trace-driven experiments, we show that our X-Rayer provides more accurate results by decreasing the average RMSE in the interface usage prediction by <inline-formula><tex-math notation=\"LaTeX\">Z_$33.25\\%$_Z</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">Z_$33.71\\%$_Z</tex-math></inline-formula>, and session traffic estimation by <inline-formula><tex-math notation=\"LaTeX\">Z_$18.05\\%$_Z</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">Z_$27.04\\%$_Z</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">Z_$21.91\\%$_Z</tex-math></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">Z_$16.43\\%$_Z</tex-math></inline-formula>, compared to state-of-the-art approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Provisioning cloud native services via containers has been regarded as a promising way to promote the cloud elasticity. A container may simultaneously sustain multiple services with a number of different communication sessions. It is of great importance to predict them for fine-grain system management. However, this is a non-trivial task as the session traffics are all invisible. The only thing we can get is the container network interface usage as the total traffic of all coexisting sessions. In this paper, we propose a machine learning based session level traffic prediction framework called X-Rayer, to predict respective session traffics from the network interface usage. Via a sliding-window based ensemble empirical mode decomposition algorithm, X-Rayer first accurately predicts the interface usage, which is then decomposed into session traffics by an invented ConvGRU formed by convolutional neural network and gated recurrent unit. Specially, the spatial-temporal correlations of the interface usages are abstracted via an attention strategy and explored for accurate session traffic decomposition. Through extensive trace-driven experiments, we show that our X-Rayer provides more accurate results by decreasing the average RMSE in the interface usage prediction by <inline-formula><tex-math notation=\"LaTeX\">$33.25\\%$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$33.71\\%$</tex-math></inline-formula>, and session traffic estimation by <inline-formula><tex-math notation=\"LaTeX\">$18.05\\%$</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">$27.04\\%$</tex-math></inline-formula>, <inline-formula><tex-math notation=\"LaTeX\">$21.91\\%$</tex-math></inline-formula>, and <inline-formula><tex-math notation=\"LaTeX\">$16.43\\%$</tex-math></inline-formula>, compared to state-of-the-art approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Provisioning cloud native services via containers has been regarded as a promising way to promote the cloud elasticity. A container may simultaneously sustain multiple services with a number of different communication sessions. It is of great importance to predict them for fine-grain system management. However, this is a non-trivial task as the session traffics are all invisible. The only thing we can get is the container network interface usage as the total traffic of all coexisting sessions. In this paper, we propose a machine learning based session level traffic prediction framework called X-Rayer, to predict respective session traffics from the network interface usage. Via a sliding-window based ensemble empirical mode decomposition algorithm, X-Rayer first accurately predicts the interface usage, which is then decomposed into session traffics by an invented ConvGRU formed by convolutional neural network and gated recurrent unit. Specially, the spatial-temporal correlations of the interface usages are abstracted via an attention strategy and explored for accurate session traffic decomposition. Through extensive trace-driven experiments, we show that our X-Rayer provides more accurate results by decreasing the average RMSE in the interface usage prediction by - and -, and session traffic estimation by -, -, -, and -, compared to state-of-the-art approaches.", "title": "Container Session Level Traffic Prediction from Network Interface Usage", "normalizedTitle": "Container Session Level Traffic Prediction from Network Interface Usage", "fno": "10071951", "hasPdf": true, "idPrefix": "su", "keywords": [ "Containers", "Correlation", "Runtime", "Network Interfaces", "Market Research", "Predictive Models", "Monitoring", "Container Network", "Flow Prediction", "Session Level Traffic" ], "authors": [ { "givenName": "Lin", "surname": "Gu", "fullName": "Lin Gu", "affiliation": "National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Honghao", "surname": "Xu", "fullName": "Honghao Xu", "affiliation": "National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ziyuan", "surname": "Li", "fullName": "Ziyuan Li", "affiliation": "Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zirui", "surname": "Chen", "fullName": "Zirui Chen", "affiliation": "Huazhong University of Science and Technology, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hai", "surname": "Jin", "fullName": "Hai Jin", "affiliation": "National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "2377-3782", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/td/2022/12/09815150", "title": "TriangleKV: Reducing Write Stalls and Write Amplification in LSM-Tree Based KV Stores With Triangle Container in NVM", "doi": null, "abstractUrl": "/journal/td/2022/12/09815150/1EJBwt5msJG", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2023/02/09900301", "title": "Secure Inter-Container Communications Using XDP/eBPF", "doi": null, "abstractUrl": "/journal/nt/2023/02/09900301/1GSnuFlqNAA", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/09980572", "title": "Achieving High Availability in Inter-DC WAN Traffic Engineering", "doi": null, "abstractUrl": "/journal/nt/5555/01/09980572/1J2T00A5VqU", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10004027", "title": "A Lightweight and Accurate Spatial-Temporal Transformer for Traffic Forecasting", "doi": null, "abstractUrl": "/journal/tk/5555/01/10004027/1JwLmIsagV2", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10050403", "title": "Hybrid Signed Convolution Module With Unsigned Divide-and-Conquer Multiplier for Energy-Efficient STT-MRAM-Based AI Accelerator", "doi": null, "abstractUrl": "/journal/si/5555/01/10050403/1KYoGc3qWbe", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2023/04/10036482", "title": "Test Data Compression for Transparent-Scan Sequences", "doi": null, "abstractUrl": "/journal/si/2023/04/10036482/1KxPXOB1Ogg", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10061543", "title": "Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees", "doi": null, "abstractUrl": "/journal/tq/5555/01/10061543/1Lk41G2LAQM", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10064188", "title": "CGF: A Category Guidance Based PM<inline-formula><tex-math notation=\"LaTeX\">Z_$_{2.5}$_Z</tex-math></inline-formula> Sequence Forecasting Training Framework", "doi": null, "abstractUrl": "/journal/tk/5555/01/10064188/1LlCT5sJVvy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/5555/01/10113797", "title": "Single Exact Single Approximate Adders and Single Exact Dual Approximate Adders", "doi": null, "abstractUrl": "/journal/si/5555/01/10113797/1MNbOtwxcLm", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09451590", "title": "Conceptual Metaphor and Graphical Convention Influence the Interpretation of Line Graphs", "doi": null, "abstractUrl": "/journal/tg/2022/02/09451590/1ujXLK9Vgac", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10068787", "articleId": "1LvvVHGOi1a", "__typename": "AdjacentArticleType" }, "next": { "fno": "10077424", "articleId": "1LFPZxgGj1C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zKXryr0JDG", "title": "Feb.", "year": "2022", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1ujXLK9Vgac", "doi": "10.1109/TVCG.2021.3088343", "abstract": "Many metaphors in language reflect conceptual metaphors that structure thought. In line with metaphorical expressions such as &#x2018;high number&#x2019;, experiments show that people associate larger numbers with upward space. Consistent with this metaphor, high numbers are conventionally depicted in high positions on the <inline-formula><tex-math notation=\"LaTeX\">Z_$y$_Z</tex-math></inline-formula>-axis of line graphs. People also associate good and bad (emotional valence) with upward and downward locations, in line with metaphorical expressions such as &#x2018;uplifting&#x2019; and &#x2018;down in the dumps&#x2019;. Graphs depicting good quantities (e.g., vacation days) are consistent with graphical convention and the valence metaphor, because &#x2018;more&#x2019; of the good quantity is represented by higher <inline-formula><tex-math notation=\"LaTeX\">Z_$y$_Z</tex-math></inline-formula>-axis positions. In contrast, graphs depicting bad quantities (e.g., murders) are consistent with graphical convention, but not the valence metaphor, because more of the bad quantity is represented by higher (rather than lower) <inline-formula><tex-math notation=\"LaTeX\">Z_$y$_Z</tex-math></inline-formula>-axis positions. We conducted two experiments (<italic>N</italic> = 300 per experiment) where participants answered questions about line graphs depicting good and bad quantities. For some graphs, we inverted the conventional axis ordering of numbers. Line graphs that aligned (versus misaligned) with valence metaphors (up = good) were easier to interpret, but this beneficial effect did not outweigh the adverse effect of inverting the axis numbering. Line graphs depicting good (versus bad) quantities were easier to interpret, as were graphs that depicted quantity using the <inline-formula><tex-math notation=\"LaTeX\">Z_$x$_Z</tex-math></inline-formula>-axis (versus <inline-formula><tex-math notation=\"LaTeX\">Z_$y$_Z</tex-math></inline-formula>-axis). Our results suggest that conceptual metaphors matter for the interpretation of line graphs. However, designers of line graphs are warned against subverting graphical convention to align with conceptual metaphors.", "abstracts": [ { "abstractType": "Regular", "content": "Many metaphors in language reflect conceptual metaphors that structure thought. In line with metaphorical expressions such as &#x2018;high number&#x2019;, experiments show that people associate larger numbers with upward space. Consistent with this metaphor, high numbers are conventionally depicted in high positions on the <inline-formula><tex-math notation=\"LaTeX\">$y$</tex-math><alternatives><mml:math><mml:mi>y</mml:mi></mml:math><inline-graphic xlink:href=\"woodin-ieq1-3088343.gif\"/></alternatives></inline-formula>-axis of line graphs. People also associate good and bad (emotional valence) with upward and downward locations, in line with metaphorical expressions such as &#x2018;uplifting&#x2019; and &#x2018;down in the dumps&#x2019;. Graphs depicting good quantities (e.g., vacation days) are consistent with graphical convention and the valence metaphor, because &#x2018;more&#x2019; of the good quantity is represented by higher <inline-formula><tex-math notation=\"LaTeX\">$y$</tex-math><alternatives><mml:math><mml:mi>y</mml:mi></mml:math><inline-graphic xlink:href=\"woodin-ieq2-3088343.gif\"/></alternatives></inline-formula>-axis positions. In contrast, graphs depicting bad quantities (e.g., murders) are consistent with graphical convention, but not the valence metaphor, because more of the bad quantity is represented by higher (rather than lower) <inline-formula><tex-math notation=\"LaTeX\">$y$</tex-math><alternatives><mml:math><mml:mi>y</mml:mi></mml:math><inline-graphic xlink:href=\"woodin-ieq3-3088343.gif\"/></alternatives></inline-formula>-axis positions. We conducted two experiments (<italic>N</italic> = 300 per experiment) where participants answered questions about line graphs depicting good and bad quantities. For some graphs, we inverted the conventional axis ordering of numbers. Line graphs that aligned (versus misaligned) with valence metaphors (up = good) were easier to interpret, but this beneficial effect did not outweigh the adverse effect of inverting the axis numbering. Line graphs depicting good (versus bad) quantities were easier to interpret, as were graphs that depicted quantity using the <inline-formula><tex-math notation=\"LaTeX\">$x$</tex-math><alternatives><mml:math><mml:mi>x</mml:mi></mml:math><inline-graphic xlink:href=\"woodin-ieq4-3088343.gif\"/></alternatives></inline-formula>-axis (versus <inline-formula><tex-math notation=\"LaTeX\">$y$</tex-math><alternatives><mml:math><mml:mi>y</mml:mi></mml:math><inline-graphic xlink:href=\"woodin-ieq5-3088343.gif\"/></alternatives></inline-formula>-axis). Our results suggest that conceptual metaphors matter for the interpretation of line graphs. However, designers of line graphs are warned against subverting graphical convention to align with conceptual metaphors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many metaphors in language reflect conceptual metaphors that structure thought. In line with metaphorical expressions such as ‘high number’, experiments show that people associate larger numbers with upward space. Consistent with this metaphor, high numbers are conventionally depicted in high positions on the --axis of line graphs. People also associate good and bad (emotional valence) with upward and downward locations, in line with metaphorical expressions such as ‘uplifting’ and ‘down in the dumps’. Graphs depicting good quantities (e.g., vacation days) are consistent with graphical convention and the valence metaphor, because ‘more’ of the good quantity is represented by higher --axis positions. In contrast, graphs depicting bad quantities (e.g., murders) are consistent with graphical convention, but not the valence metaphor, because more of the bad quantity is represented by higher (rather than lower) --axis positions. We conducted two experiments (N = 300 per experiment) where participants answered questions about line graphs depicting good and bad quantities. For some graphs, we inverted the conventional axis ordering of numbers. Line graphs that aligned (versus misaligned) with valence metaphors (up = good) were easier to interpret, but this beneficial effect did not outweigh the adverse effect of inverting the axis numbering. Line graphs depicting good (versus bad) quantities were easier to interpret, as were graphs that depicted quantity using the --axis (versus --axis). Our results suggest that conceptual metaphors matter for the interpretation of line graphs. However, designers of line graphs are warned against subverting graphical convention to align with conceptual metaphors.", "title": "Conceptual Metaphor and Graphical Convention Influence the Interpretation of Line Graphs", "normalizedTitle": "Conceptual Metaphor and Graphical Convention Influence the Interpretation of Line Graphs", "fno": "09451590", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Graph Theory", "Conceptual Metaphor", "Graphical Convention Influence", "Line Graphs", "Metaphorical Expressions", "Valence Metaphor", "Yy Axis Positions", "Emotional Valence", "Data Visualization", "Linguistics", "Cognitive Science", "Visualization", "Psychology", "Market Research", "Random Sequences", "Conceptual Metaphor Theory", "More Is Up", "Mental Number Line", "Cognition", "Linguistics", "Emotional Valence", "Line Graph", "Axis Reversal", "Handedness", "Empirical Evaluation" ], "authors": [ { "givenName": "Greg", "surname": "Woodin", "fullName": "Greg Woodin", "affiliation": "Department of English Language and Linguistics, University of Birmingham, Birmingham, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Bodo", "surname": "Winter", "fullName": "Bodo Winter", "affiliation": "Department of English Language and Linguistics, University of Birmingham, Birmingham, U.K.", "__typename": "ArticleAuthorType" }, { "givenName": "Lace", "surname": "Padilla", "fullName": "Lace Padilla", "affiliation": "Spatial Perception, Applied Cognition & Education Lab, University of California Merced, Merced, CA, USA", "__typename": "ArticleAuthorType" } ], "replicability": { "isEnabled": true, "codeDownloadUrl": "https://github.com/GregWoodin/dataviz.git", "codeRepositoryUrl": "https://github.com/GregWoodin/dataviz", "__typename": "ArticleReplicabilityType" }, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2022-02-01 00:00:00", "pubType": "trans", "pages": "1209-1221", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tk/2023/05/09712197", "title": "Fast LDP-MST: An Efficient Density-Peak-Based Clustering Method for Large-Size Datasets", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712197/1AUkecqbRok", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/11/09099372", "title": "On Heterogeneous Sensing Capability for Distributed Rendezvous in Cognitive Radio Networks", "doi": null, "abstractUrl": "/journal/tm/2021/11/09099372/1k7oCRHzGAE", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/11/09104933", "title": "Low-Complexity Learning for Dynamic Spectrum Access in Multi-User Multi-Channel Networks", "doi": null, "abstractUrl": "/journal/tm/2021/11/09104933/1kj0Od0mbM4", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/10/09194366", "title": "A Novel Measurement for Network Reliability", "doi": null, "abstractUrl": "/journal/tc/2021/10/09194366/1n0EqDZV3X2", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09210070", "title": "Periodic Communities Mining in Temporal Networks: Concepts and Algorithms", "doi": null, "abstractUrl": "/journal/tk/2022/08/09210070/1nxQ8MeuyY0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09269479", "title": "Efficient Radius-Bounded Community Search in Geo-Social Networks", "doi": null, "abstractUrl": "/journal/tk/2022/09/09269479/1p1c8tla0DK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09492838", "title": "Maximum Signed <inline-formula><tex-math notation=\"LaTeX\">Z_$\\theta$_Z</tex-math></inline-formula>-Clique Identification in Large Signed Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/02/09492838/1vq0EU6lrAA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09534476", "title": "Discovering Significant Communities on Bipartite Graphs: An Index-Based Approach", "doi": null, "abstractUrl": "/journal/tk/2023/03/09534476/1wLbitNpdle", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/07/09609537", "title": "Hamiltonian Paths of <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-ary <inline-formula><tex-math notation=\"LaTeX\">Z_$n$_Z</tex-math></inline-formula>-cubes Avoiding Faulty Links and Passing Through Prescribed Linear Forests", "doi": null, "abstractUrl": "/journal/td/2022/07/09609537/1yoxLa2YFO0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09662190", "title": "Higher-Order Truss Decomposition in Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/04/09662190/1zzl2ZAAVvq", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09143503", "articleId": "1lxmsQXZ36U", "__typename": "AdjacentArticleType" }, "next": { "fno": "09149790", "articleId": "1lNXFpGivV6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zTg0T4fO9y", "name": "ttg202202-09451590s1-supp1-3088343.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202202-09451590s1-supp1-3088343.pdf", "extension": "pdf", "size": "5.1 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1Fz3ebZZCbS", "title": "Sept.", "year": "2022", "issueNum": "09", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Sept.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1tuvzMfndhS", "doi": "10.1109/TPAMI.2021.3078577", "abstract": "With the remarkable recent progress on learning deep generative models, it becomes increasingly interesting to develop models for <italic>controllable</italic> image synthesis from <italic>reconfigurable</italic> structured inputs. This paper focuses on a recently emerged task, <italic>layout-to-image</italic>, whose goal is to learn generative models for synthesizing photo-realistic images from a spatial layout (i.e., object bounding boxes configured in an image lattice) and its style codes (i.e., structural and appearance variations encoded by latent vectors). This paper first proposes an intuitive paradigm for the task, <italic>layout-to-mask-to-image</italic>, which learns to unfold object masks in a weakly-supervised way based on an input layout and object style codes. The layout-to-mask component deeply interacts with layers in the generator network to bridge the gap between an input layout and synthesized images. Then, this paper presents a method built on Generative Adversarial Networks (GANs) for the proposed layout-to-mask-to-image synthesis with layout and style control at both image and object levels. The controllability is realized by a proposed novel <italic>Instance-Sensitive and Layout-Aware Normalization</italic> (ISLA-Norm) scheme. A layout semi-supervised version of the proposed method is further developed without sacrificing performance. In experiments, the proposed method is tested in the COCO-Stuff dataset and the Visual Genome dataset with state-of-the-art performance obtained.", "abstracts": [ { "abstractType": "Regular", "content": "With the remarkable recent progress on learning deep generative models, it becomes increasingly interesting to develop models for <italic>controllable</italic> image synthesis from <italic>reconfigurable</italic> structured inputs. This paper focuses on a recently emerged task, <italic>layout-to-image</italic>, whose goal is to learn generative models for synthesizing photo-realistic images from a spatial layout (i.e., object bounding boxes configured in an image lattice) and its style codes (i.e., structural and appearance variations encoded by latent vectors). This paper first proposes an intuitive paradigm for the task, <italic>layout-to-mask-to-image</italic>, which learns to unfold object masks in a weakly-supervised way based on an input layout and object style codes. The layout-to-mask component deeply interacts with layers in the generator network to bridge the gap between an input layout and synthesized images. Then, this paper presents a method built on Generative Adversarial Networks (GANs) for the proposed layout-to-mask-to-image synthesis with layout and style control at both image and object levels. The controllability is realized by a proposed novel <italic>Instance-Sensitive and Layout-Aware Normalization</italic> (ISLA-Norm) scheme. A layout semi-supervised version of the proposed method is further developed without sacrificing performance. In experiments, the proposed method is tested in the COCO-Stuff dataset and the Visual Genome dataset with state-of-the-art performance obtained.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the remarkable recent progress on learning deep generative models, it becomes increasingly interesting to develop models for controllable image synthesis from reconfigurable structured inputs. This paper focuses on a recently emerged task, layout-to-image, whose goal is to learn generative models for synthesizing photo-realistic images from a spatial layout (i.e., object bounding boxes configured in an image lattice) and its style codes (i.e., structural and appearance variations encoded by latent vectors). This paper first proposes an intuitive paradigm for the task, layout-to-mask-to-image, which learns to unfold object masks in a weakly-supervised way based on an input layout and object style codes. The layout-to-mask component deeply interacts with layers in the generator network to bridge the gap between an input layout and synthesized images. Then, this paper presents a method built on Generative Adversarial Networks (GANs) for the proposed layout-to-mask-to-image synthesis with layout and style control at both image and object levels. The controllability is realized by a proposed novel Instance-Sensitive and Layout-Aware Normalization (ISLA-Norm) scheme. A layout semi-supervised version of the proposed method is further developed without sacrificing performance. In experiments, the proposed method is tested in the COCO-Stuff dataset and the Visual Genome dataset with state-of-the-art performance obtained.", "title": "Learning Layout and Style Reconfigurable GANs for Controllable Image Synthesis", "normalizedTitle": "Learning Layout and Style Reconfigurable GANs for Controllable Image Synthesis", "fno": "09427066", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Genomics", "Learning Artificial Intelligence", "Realistic Images", "Style Reconfigurable GA Ns", "Controllable Image Synthesis", "Remarkable Recent Progress", "Deep Generative Models", "Reconfigurable Structured Inputs", "Recently Emerged Task", "Layout To Image", "Photo Realistic Images", "Spatial Layout", "Object Bounding Boxes", "Image Lattice", "Style Codes", "Structural Appearance Variations", "Object Masks", "Layout To Mask Component", "Generator Network", "Generative Adversarial Networks", "Layout To Mask To Image Synthesis", "Style Control", "Controllability", "Layout Aware Normalization Scheme", "Layout Semisupervised Version", "Layout", "Image Synthesis", "Generators", "Snow", "Task Analysis", "Training", "Fasteners", "Image Synthesis", "Layout To Image", "Layout To Mask To Image", "Deep Generative Learning", "GAN", "ISLA Norm" ], "authors": [ { "givenName": "Wei", "surname": "Sun", "fullName": "Wei Sun", "affiliation": "Department of Electrical and Computer Engineering and the Visual Narrative Initiative, North Carolina State University, Raleigh, NC, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Tianfu", "surname": "Wu", "fullName": "Tianfu Wu", "affiliation": "Department of Electrical and Computer Engineering and the Visual Narrative Initiative, North Carolina State University, Raleigh, NC, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "09", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "5070-5087", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200j244", "title": "Semi-Supervised Single-Stage Controllable GANs for Conditional Fine-Grained Image Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200j244/1BmEpkJDh9S", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3799", "title": "Image Synthesis from Layout with Locality-Aware Mask Adaption", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3799/1BmGJmzmBTq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09794591", "title": "Semantic Layout Manipulation With High-Resolution Sparse Attention", "doi": null, "abstractUrl": "/journal/tp/2023/03/09794591/1Eb14834UiQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h773", "title": "Interactive Image Synthesis with Panoptic Layout Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h773/1H1mlrOB1Wo", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/06/09968154", "title": "GH-Feat: Learning Versatile Generative Hierarchical Features From GANs", "doi": null, "abstractUrl": "/journal/tp/2023/06/09968154/1IKD8njpVcI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/9.346E89", "title": "SLI-pSp: Injecting Multi-Scale Spatial Layout in pSp", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/9.346E89/1KxUFdbv6ve", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0530", "title": "Image Synthesis From Reconfigurable Layout and Style", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0530/1hVlpxVSLMA", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412647", "title": "Mask-based Style-Controlled Image Synthesis Using a Mask Style Encoder", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412647/1tmjpKdJTA4", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c139", "title": "Controllable and Progressive Image Extrapolation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c139/1uqGke0JaNy", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5044", "title": "Context-Aware Layout to Image Generation with Enhanced Object Appearance", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5044/1yeJYCrbxPa", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09387612", "articleId": "1smCWTVRghq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09405430", "articleId": "1sP16sJ7CCs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1FnqTVYetzy", "doi": "10.1109/TPAMI.2022.3194555", "abstract": "In recent years, sparse voxel-based methods have become the state-of-the-arts for 3D semantic segmentation of indoor scenes, thanks to the powerful 3D CNNs. Nevertheless, being oblivious to the underlying geometry, voxel-based methods suffer from ambiguous features on spatially close objects and struggle with handling complex and irregular geometries due to the lack of geodesic information. In view of this, we present Voxel-Mesh Network (VMNet), a novel 3D deep architecture that operates on the voxel and mesh representations leveraging both the Euclidean and geodesic information. Intuitively, the Euclidean information extracted from voxels can offer contextual cues representing interactions between nearby objects, while the geodesic information extracted from meshes can help separate objects that are spatially close but have disconnected surfaces. To incorporate such information from the two domains, we design an intra-domain attentive module for effective feature aggregation and an inter-domain attentive module for adaptive feature fusion. Experimental results validate the effectiveness of VMNet: specifically, on the challenging ScanNet dataset for large-scale segmentation of indoor scenes, it outperforms the state-of-the-art SparseConvNet and MinkowskiNet (74.6&#x0025; vs 72.5&#x0025; and 73.6&#x0025; in mIoU) with a simpler network structure (17M vs 30M and 38M parameters).", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, sparse voxel-based methods have become the state-of-the-arts for 3D semantic segmentation of indoor scenes, thanks to the powerful 3D CNNs. Nevertheless, being oblivious to the underlying geometry, voxel-based methods suffer from ambiguous features on spatially close objects and struggle with handling complex and irregular geometries due to the lack of geodesic information. In view of this, we present Voxel-Mesh Network (VMNet), a novel 3D deep architecture that operates on the voxel and mesh representations leveraging both the Euclidean and geodesic information. Intuitively, the Euclidean information extracted from voxels can offer contextual cues representing interactions between nearby objects, while the geodesic information extracted from meshes can help separate objects that are spatially close but have disconnected surfaces. To incorporate such information from the two domains, we design an intra-domain attentive module for effective feature aggregation and an inter-domain attentive module for adaptive feature fusion. Experimental results validate the effectiveness of VMNet: specifically, on the challenging ScanNet dataset for large-scale segmentation of indoor scenes, it outperforms the state-of-the-art SparseConvNet and MinkowskiNet (74.6&#x0025; vs 72.5&#x0025; and 73.6&#x0025; in mIoU) with a simpler network structure (17M vs 30M and 38M parameters).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, sparse voxel-based methods have become the state-of-the-arts for 3D semantic segmentation of indoor scenes, thanks to the powerful 3D CNNs. Nevertheless, being oblivious to the underlying geometry, voxel-based methods suffer from ambiguous features on spatially close objects and struggle with handling complex and irregular geometries due to the lack of geodesic information. In view of this, we present Voxel-Mesh Network (VMNet), a novel 3D deep architecture that operates on the voxel and mesh representations leveraging both the Euclidean and geodesic information. Intuitively, the Euclidean information extracted from voxels can offer contextual cues representing interactions between nearby objects, while the geodesic information extracted from meshes can help separate objects that are spatially close but have disconnected surfaces. To incorporate such information from the two domains, we design an intra-domain attentive module for effective feature aggregation and an inter-domain attentive module for adaptive feature fusion. Experimental results validate the effectiveness of VMNet: specifically, on the challenging ScanNet dataset for large-scale segmentation of indoor scenes, it outperforms the state-of-the-art SparseConvNet and MinkowskiNet (74.6% vs 72.5% and 73.6% in mIoU) with a simpler network structure (17M vs 30M and 38M parameters).", "title": "Voxel-Mesh Network for Geodesic-Aware 3D Semantic Segmentation of Indoor Scenes", "normalizedTitle": "Voxel-Mesh Network for Geodesic-Aware 3D Semantic Segmentation of Indoor Scenes", "fno": "09844250", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Three Dimensional Displays", "Semantics", "Convolution", "Feature Extraction", "Surface Reconstruction", "Image Reconstruction", "Geometry", "Geodesic Information", "Mesh Segmentation", "Point Cloud Semantic Segmentation", "3 D Scene Understanding" ], "authors": [ { "givenName": "Zeyu", "surname": "Hu", "fullName": "Zeyu Hu", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Xuyang", "surname": "Bai", "fullName": "Xuyang Bai", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Jiaxiang", "surname": "Shang", "fullName": "Jiaxiang Shang", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Runze", "surname": "Zhang", "fullName": "Runze Zhang", "affiliation": "Tencent Lightspeed & Quantum Studios, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiayu", "surname": "Dong", "fullName": "Jiayu Dong", "affiliation": "Tencent Lightspeed & Quantum Studios, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xin", "surname": "Wang", "fullName": "Xin Wang", "affiliation": "Tencent Lightspeed & Quantum Studios, China", "__typename": "ArticleAuthorType" }, { "givenName": "Guangyuan", "surname": "Sun", "fullName": "Guangyuan Sun", "affiliation": "Tencent Lightspeed & Quantum Studios, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hongbo", "surname": "Fu", "fullName": "Hongbo Fu", "affiliation": "School of Creative Media, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Chiew-Lan", "surname": "Tai", "fullName": "Chiew-Lan Tai", "affiliation": "Hong Kong University of Science and Technology, Hong Kong", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-07-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/candar/2014/4152/0/4152a367", "title": "A Memory Efficient Parallel Method for Voxel-Based Multiview Stereo", "doi": null, "abstractUrl": "/proceedings-article/candar/2014/4152a367/12OmNAJDBw6", "parentPublication": { "id": "proceedings/candar/2014/4152/0", "title": "2014 Second International Symposium on Computing and Networking (CANDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948407", "title": "Delta Voxel Cone Tracing", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948407/12OmNxG1yH8", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457c432", "title": "ScanNet: Richly-Annotated 3D Reconstructions of Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457c432/12OmNyRg4C5", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/05/06605689", "title": "Geodesic Mapping for Dynamic Surface Alignment", "doi": null, "abstractUrl": "/journal/tp/2014/05/06605689/13rRUNvPLaQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2002/04/i0433", "title": "Computational Surface Flattening: A Voxel-Based Approach", "doi": null, "abstractUrl": "/journal/tp/2002/04/i0433/13rRUxASucv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5468", "title": "VMNet: Voxel-Mesh Network for Geodesic-Aware 3D Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5468/1BmH3hKR7Dq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09969571", "title": "Vox-Surf: Voxel-Based Implicit Surface Representation", "doi": null, "abstractUrl": "/journal/tg/5555/01/09969571/1IMidH7hZhC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800b628", "title": "HVNet: Hybrid Voxel Network for LiDAR Based 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800b628/1m3nB7kyCKQ", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/09339892", "title": "Digital Surface Regularization With Guarantees", "doi": null, "abstractUrl": "/journal/tg/2021/06/09339892/1qLhYrSA4ve", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceic/2020/8573/0/857300a199", "title": "Algorithm realization and application of geodesic", "doi": null, "abstractUrl": "/proceedings-article/icceic/2020/857300a199/1rCguSbHGOA", "parentPublication": { "id": "proceedings/icceic/2020/8573/0", "title": "2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09815121", "articleId": "1EJBgB03GY8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09847357", "articleId": "1FvJpNIySZi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1Fp5QsKhBS0", "name": "ttp555501-09844250s1-supp1-3194555.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-09844250s1-supp1-3194555.pdf", "extension": "pdf", "size": "5.96 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzmclnV", "title": "Feb.", "year": "2014", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUEgs2M2", "doi": "10.1109/TVCG.2013.115", "abstract": "We introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral angles, and guarantees geometric fidelity. Moreover, the method is combinatoric so its implementation enables rapid mesh construction. These meshes are structured in a way that also allows grading, to reduce element counts in regions of homogeneity. Additionally, we provide proofs showing that both element quality and geometric fidelity are bounded using this approach.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral angles, and guarantees geometric fidelity. Moreover, the method is combinatoric so its implementation enables rapid mesh construction. These meshes are structured in a way that also allows grading, to reduce element counts in regions of homogeneity. Additionally, we provide proofs showing that both element quality and geometric fidelity are bounded using this approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral angles, and guarantees geometric fidelity. Moreover, the method is combinatoric so its implementation enables rapid mesh construction. These meshes are structured in a way that also allows grading, to reduce element counts in regions of homogeneity. Additionally, we provide proofs showing that both element quality and geometric fidelity are bounded using this approach.", "title": "Lattice Cleaving: A Multimaterial Tetrahedral Meshing Algorithm with Guarantees", "normalizedTitle": "Lattice Cleaving: A Multimaterial Tetrahedral Meshing Algorithm with Guarantees", "fno": "ttg2014020223", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Lattices", "Materials", "Topology", "Geometry", "Finite Element Analysis", "Joining Processes", "Biological System Modeling", "Adaptive Meshing", "Lattices", "Materials", "Topology", "Geometry", "Finite Element Analysis", "Joining Processes", "Biological System Modeling", "Guaranteed Meshing", "Tetrahedral Meshing", "Multimaterial", "Multilabel", "Biomedical", "Conformal Meshing", "Watertight", "Mesh Quality" ], "authors": [ { "givenName": "Jonathan", "surname": "Bronson", "fullName": "Jonathan Bronson", "affiliation": "Sch. of Comput., Univ. of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Joshua A.", "surname": "Levine", "fullName": "Joshua A. Levine", "affiliation": "Sch. of Comput., Univ. of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ross", "surname": "Whitaker", "fullName": "Ross Whitaker", "affiliation": "Sch. of Comput., Univ. of Utah, Salt Lake City, UT, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2014-02-01 00:00:00", "pubType": "trans", "pages": "223-237", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2015/6775/0/6775a103", "title": "Multiscale Tetrahedral Meshes for FEM Simulations of Esophageal Injury", "doi": null, "abstractUrl": "/proceedings-article/cbms/2015/6775a103/12OmNBAIANq", "parentPublication": { "id": "proceedings/cbms/2015/6775/0", "title": "2015 IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2008/3494/2/3494b414", "title": "A Tetrahedral Mesh Generation Algorithm from Medical Images", "doi": null, "abstractUrl": "/proceedings-article/isise/2008/3494b414/12OmNBUS7cC", "parentPublication": { "id": "proceedings/isise/2008/3494/2", "title": "2008 International Symposium on Information Science and Engineering (ISISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2016/5081/0/07943387", "title": "Tetrahedral Mesh Segmentation Based on Quality Criteria", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2016/07943387/12OmNwM6A1x", "parentPublication": { "id": "proceedings/pdcat/2016/5081/0", "title": "2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2018/5114/0/511401a534", "title": "Optimization of Tetrahedral Lattice Structure under Multiple Loading Conditions", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2018/511401a534/12OmNwudQQX", "parentPublication": { "id": "proceedings/icmtma/2018/5114/0", "title": "2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498chopra", "title": "TetFusion: An Algorithm For Rapid Tetrahedral Mesh Simplification", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498chopra/12OmNyQphf1", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/02/v0370", "title": "Fracturing Rigid Materials", "doi": null, "abstractUrl": "/journal/tg/2007/02/v0370/13rRUwfZC07", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v1229", "title": "Interactive Point-Based Rendering of Higher-Order Tetrahedral Data", "doi": null, "abstractUrl": "/journal/tg/2006/05/v1229/13rRUwvBy8O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1727", "title": "Interactive Isosurface Ray Tracing of Time-Varying Tetrahedral Volumes", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1727/13rRUxZRbnV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a091", "title": "Ray-traced Shell Traversal of Tetrahedral Meshes for Direct Volume Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a091/1yXu8XEUCFq", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2014020211", "articleId": "13rRUy3xY2P", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2014020238", "articleId": "13rRUypp57F", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "17ShDTXFgJ7", "name": "ttg2014020223s1.png", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2014020223s1.png", "extension": "png", "size": "379 kB", "__typename": "WebExtraType" }, { "id": "17ShDTXFgJ6", "name": "ttg2014020223s2.png", "location": "https://www.computer.org/csdl/api/v1/extra/ttg2014020223s2.png", "extension": "png", "size": "302 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNBqdrhX", "title": "April", "year": "2004", "issueNum": "04", "idPrefix": "tp", "pubType": "journal", "volume": "26", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyYjKbp", "doi": "10.1109/TPAMI.2004.1265861", "abstract": "Abstract—Arguably the most important decision to be made when developing an object recognition algorithm is selecting the scene measurements or features on which to base the algorithm. In appearance-based object recognition, the features are chosen to be the pixel intensity values in an image of the object. These pixel intensities correspond directly to the radiance of light emitted from the object along certain rays in space. The set of all such radiance values over all possible rays is known as the plenoptic function or light-field. In this paper, we develop a theory of appearance-based object recognition from light-fields. This theory leads directly to an algorithm for face recognition across pose that uses as many images of the face as are available, from one upwards. All of the pixels, whichever image they come from, are treated equally and used to estimate the (eigen) light-field of the object. The eigen light-field is then used as the set of features on which to base recognition, analogously to how the pixel intensities are used in appearance-based face and object recognition.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract—Arguably the most important decision to be made when developing an object recognition algorithm is selecting the scene measurements or features on which to base the algorithm. In appearance-based object recognition, the features are chosen to be the pixel intensity values in an image of the object. These pixel intensities correspond directly to the radiance of light emitted from the object along certain rays in space. The set of all such radiance values over all possible rays is known as the plenoptic function or light-field. In this paper, we develop a theory of appearance-based object recognition from light-fields. This theory leads directly to an algorithm for face recognition across pose that uses as many images of the face as are available, from one upwards. All of the pixels, whichever image they come from, are treated equally and used to estimate the (eigen) light-field of the object. The eigen light-field is then used as the set of features on which to base recognition, analogously to how the pixel intensities are used in appearance-based face and object recognition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract—Arguably the most important decision to be made when developing an object recognition algorithm is selecting the scene measurements or features on which to base the algorithm. In appearance-based object recognition, the features are chosen to be the pixel intensity values in an image of the object. These pixel intensities correspond directly to the radiance of light emitted from the object along certain rays in space. The set of all such radiance values over all possible rays is known as the plenoptic function or light-field. In this paper, we develop a theory of appearance-based object recognition from light-fields. This theory leads directly to an algorithm for face recognition across pose that uses as many images of the face as are available, from one upwards. All of the pixels, whichever image they come from, are treated equally and used to estimate the (eigen) light-field of the object. The eigen light-field is then used as the set of features on which to base recognition, analogously to how the pixel intensities are used in appearance-based face and object recognition.", "title": "Appearance-Based Face Recognition and Light-Fields", "normalizedTitle": "Appearance-Based Face Recognition and Light-Fields", "fno": "i0449", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Appearance Based Object Recognition", "Face Recognition", "Light Fields", "Eigen Light Fields", "Face Recognition Across Pose" ], "authors": [ { "givenName": "Ralph", "surname": "Gross", "fullName": "Ralph Gross", "affiliation": "IEEE", "__typename": "ArticleAuthorType" }, { "givenName": "Iain", "surname": "Matthews", "fullName": "Iain Matthews", "affiliation": "IEEE", "__typename": "ArticleAuthorType" }, { "givenName": "Simon", "surname": "Baker", "fullName": "Simon Baker", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "04", "pubDate": "2004-04-01 00:00:00", "pubType": "trans", "pages": "449-465", "year": "2004", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0434", "articleId": "13rRUyeTVj5", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0466", "articleId": "13rRUxNEqR7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvqEvRo", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Befc7QugjS", "doi": "10.1109/TVCG.2022.3153514", "abstract": "Network graphs are common visualization charts. They often appear in the form of bitmaps in papers, web pages, magazine prints, and designer sketches. People often want to modify network graphs because of their poor design, but it is difficult to obtain their underlying data. In this paper, we present VividGraph, a pipeline for automatically extracting and redesigning network graphs from static images. We propose using convolutional neural networks to solve the problem of network graph data extraction. Our method is robust to hand-drawn graphs, blurred graph images, and large graph images. We also present a network graph classification module to make it effective for directed graphs. We propose two evaluation methods to demonstrate the effectiveness of our approach. It can be used to quickly transform designer sketches, extract underlying data from existing network graphs, and interactively redesign poorly designed network graphs.", "abstracts": [ { "abstractType": "Regular", "content": "Network graphs are common visualization charts. They often appear in the form of bitmaps in papers, web pages, magazine prints, and designer sketches. People often want to modify network graphs because of their poor design, but it is difficult to obtain their underlying data. In this paper, we present VividGraph, a pipeline for automatically extracting and redesigning network graphs from static images. We propose using convolutional neural networks to solve the problem of network graph data extraction. Our method is robust to hand-drawn graphs, blurred graph images, and large graph images. We also present a network graph classification module to make it effective for directed graphs. We propose two evaluation methods to demonstrate the effectiveness of our approach. It can be used to quickly transform designer sketches, extract underlying data from existing network graphs, and interactively redesign poorly designed network graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network graphs are common visualization charts. They often appear in the form of bitmaps in papers, web pages, magazine prints, and designer sketches. People often want to modify network graphs because of their poor design, but it is difficult to obtain their underlying data. In this paper, we present VividGraph, a pipeline for automatically extracting and redesigning network graphs from static images. We propose using convolutional neural networks to solve the problem of network graph data extraction. Our method is robust to hand-drawn graphs, blurred graph images, and large graph images. We also present a network graph classification module to make it effective for directed graphs. We propose two evaluation methods to demonstrate the effectiveness of our approach. It can be used to quickly transform designer sketches, extract underlying data from existing network graphs, and interactively redesign poorly designed network graphs.", "title": "VividGraph: Learning to Extract and Redesign Network Graphs from Visualization Images", "normalizedTitle": "VividGraph: Learning to Extract and Redesign Network Graphs from Visualization Images", "fno": "09720180", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Mining", "Semantics", "Image Color Analysis", "Image Segmentation", "Data Visualization", "Pipelines", "Image Edge Detection", "Information Visualization", "Network Graph", "Data Extraction", "Chart Recognition", "Semantic Segmentation", "Redesign" ], "authors": [ { "givenName": "Sicheng", "surname": "Song", "fullName": "Sicheng Song", "affiliation": "School of Computer Science and Technology, East China Normal University, 12655 Shanghai, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chenhui", "surname": "Li", "fullName": "Chenhui Li", "affiliation": "School of Computer Science and Technology, East China Normal University, 12655 Shanghai, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yujing", "surname": "Sun", "fullName": "Yujing Sun", "affiliation": "School of Computer Science and Technology, East China Normal University, 12655 Shanghai, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Changbo", "surname": "Wang", "fullName": "Changbo Wang", "affiliation": "School of Computer Science and Technology, East China Normal University, 12655 Shanghai, Shanghai, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-02-01 00:00:00", "pubType": "trans", "pages": "1-1", "year": "5555", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2017/3800/0/3800a968", "title": "Online Detection of Anomalous Heterogeneous Graphs with Streaming Edges", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a968/12OmNCxL9QI", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2013/4797/0/06596126", "title": "Smooth bundling of large streaming and sequence graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596126/12OmNscfI0r", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720b071", "title": "Video Summarization via Segments Summary Graphs", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720b071/12OmNvxbhKS", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143a521", "title": "Incremental Anomaly Detection in Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143a521/12OmNxE2mRX", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icppw/2014/5615/0/5615a149", "title": "Flow Graph Designer: A Tool for Designing and Analyzing Intel® Threading Building Blocks Flow Graphs", "doi": null, "abstractUrl": "/proceedings-article/icppw/2014/5615a149/12OmNyQGRYJ", "parentPublication": { "id": "proceedings/icppw/2014/5615/0", "title": "2014 43nd International Conference on Parallel Processing Workshops (ICCPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2016/4152/0/07904268", "title": "Finding SCCs in Real-World Graphs on External Memory: A Task-Based Approach", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2016/07904268/12OmNzdoMP9", "parentPublication": { "id": "proceedings/ispdc/2016/4152/0", "title": "2016 15th International Symposium on Parallel and Distributed Computing (ISPDC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/11/06812198", "title": "Visual Adjacency Lists for Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tg/2014/11/06812198/13rRUxcbnCs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/06/08617746", "title": "Graphoto: Aesthetically Pleasing Charts for Casual Information Visualization", "doi": null, "abstractUrl": "/magazine/cg/2018/06/08617746/17D45Xbl4Oc", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a219", "title": "MinerLSD: Efficient Local Pattern Mining on Attributed Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a219/18jXy2pmyR2", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09966829", "title": "GraphDecoder: Recovering Diverse Network Graphs from Visualization Images via Attention-Aware Learning", "doi": null, "abstractUrl": "/journal/tg/5555/01/09966829/1IIYlkz8kkE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09720214", "articleId": "1BefbMXPO3C", "__typename": "AdjacentArticleType" }, "next": { "fno": "09721643", "articleId": "1BhzmWFFD9K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1BfU9JIY45W", "name": "ttg555501-09720180s1-supp2-3153514.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-09720180s1-supp2-3153514.mp4", "extension": "mp4", "size": "91.5 MB", "__typename": "WebExtraType" }, { "id": "1BfU9WuDjRS", "name": "ttg555501-09720180s1-supp1-3153514.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg555501-09720180s1-supp1-3153514.pdf", "extension": "pdf", "size": "2.31 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNwswg8l", "title": "March", "year": "2009", "issueNum": "03", "idPrefix": "co", "pubType": "magazine", "volume": "42", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUxlgy70", "doi": "10.1109/MC.2009.82", "abstract": "ISSSs provide an exciting opportunity to extend previous information-seeking and interactive information retrieval evaluation models and create a research community that embraces diverse methods and broader participation.", "abstracts": [ { "abstractType": "Regular", "content": "ISSSs provide an exciting opportunity to extend previous information-seeking and interactive information retrieval evaluation models and create a research community that embraces diverse methods and broader participation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "ISSSs provide an exciting opportunity to extend previous information-seeking and interactive information retrieval evaluation models and create a research community that embraces diverse methods and broader participation.", "title": "Evaluation Challenges and Directions for Information-Seeking Support Systems", "normalizedTitle": "Evaluation Challenges and Directions for Information-Seeking Support Systems", "fno": "mco2009030060", "hasPdf": true, "idPrefix": "co", "keywords": [ "Information Retrieval", "Information Seeking Support Systems", "ISS Ss", "Evaluation Design" ], "authors": [ { "givenName": "Diane", "surname": "Kelly", "fullName": "Diane Kelly", "affiliation": "University of North Carolina at Chapel Hill", "__typename": "ArticleAuthorType" }, { "givenName": "Susan", "surname": "Dumais", "fullName": "Susan Dumais", "affiliation": "Microsoft Research", "__typename": "ArticleAuthorType" }, { "givenName": "Jan O.", "surname": "Pedersen", "fullName": "Jan O. Pedersen", "affiliation": "A9.com", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2009-03-01 00:00:00", "pubType": "mags", "pages": "60-66", "year": "2009", "issn": "0018-9162", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/3/3304c155", "title": "Describing the Information Seeking Behavior: An Investigation on Comparing Learning Models", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304c155/12OmNscfI2o", "parentPublication": { "id": "proceedings/icnc/2008/3304/3", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/1/3801a626", "title": "DBLP-SSE: A DBLP Search Support Engine", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801a626/12OmNvDqsDc", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/1", "title": "2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2000/0680/0/06800586", "title": "Evaluation of Different Visualizations of Web Search Results", "doi": null, "abstractUrl": "/proceedings-article/dexa/2000/06800586/12OmNvsm6yN", "parentPublication": { "id": "proceedings/dexa/2000/0680/0", "title": "Proceedings 11th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsnc/2008/3371/0/3371a365", "title": "Capturing User Contexts: Dynamic Profiling for Information Seeking Tasks", "doi": null, "abstractUrl": "/proceedings-article/icsnc/2008/3371a365/12OmNx38vUP", "parentPublication": { "id": "proceedings/icsnc/2008/3371/0", "title": "2008 3rd International Conference on Systems and Networks Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wise/2001/1393/1/13931321", "title": "A Cognitive Study of Information Seeking Processes in the WWW: The Effects of Searcher's Knowledge and Experience", "doi": null, "abstractUrl": "/proceedings-article/wise/2001/13931321/12OmNyuPL8R", "parentPublication": { "id": "proceedings/wise/2001/1393/1", "title": "Proceedings of 2nd International Conference on Web Information Systems Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2005/2397/0/23970110", "title": "Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970110/12OmNzV70ku", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030033", "title": "Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030033/13rRUwwJWIu", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030030", "title": "Information-Seeking Support Systems", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030030/13rRUy3xYe0", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2014/03/mco2014030022", "title": "Collaborative Information Seeking [Guest editors' introduction]", "doi": null, "abstractUrl": "/magazine/co/2014/03/mco2014030022/13rRUy3xYee", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030047", "title": "Collaborative Information Seeking", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030047/13rRUyekJ0S", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mco2009030052", "articleId": "13rRUx0xPDu", "__typename": "AdjacentArticleType" }, "next": { "fno": "mco2009030067", "articleId": "13rRUEgs2wD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwswg8l", "title": "March", "year": "2009", "issueNum": "03", "idPrefix": "co", "pubType": "magazine", "volume": "42", "label": "March", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUyekJ0S", "doi": "10.1109/MC.2009.73", "abstract": "An examination of the roles and dimensions of collaborative search reveals new opportunities for information-seeking support tools.", "abstracts": [ { "abstractType": "Regular", "content": "An examination of the roles and dimensions of collaborative search reveals new opportunities for information-seeking support tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An examination of the roles and dimensions of collaborative search reveals new opportunities for information-seeking support tools.", "title": "Collaborative Information Seeking", "normalizedTitle": "Collaborative Information Seeking", "fno": "mco2009030047", "hasPdf": true, "idPrefix": "co", "keywords": [ "Information Seeking Support Systems", "Search" ], "authors": [ { "givenName": "Gene", "surname": "Golovchinsky", "fullName": "Gene Golovchinsky", "affiliation": "FX Palo Alto Laboratory", "__typename": "ArticleAuthorType" }, { "givenName": "Pernilla", "surname": "Qvarfordt", "fullName": "Pernilla Qvarfordt", "affiliation": "FX Palo Alto Laboratory", "__typename": "ArticleAuthorType" }, { "givenName": "Jeremy", "surname": "Pickens", "fullName": "Jeremy Pickens", "affiliation": "FX Palo Alto Laboratory", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "03", "pubDate": "2009-03-01 00:00:00", "pubType": "mags", "pages": "47-51", "year": "2009", "issn": "0018-9162", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/3/3304c155", "title": "Describing the Information Seeking Behavior: An Investigation on Comparing Learning Models", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304c155/12OmNscfI2o", "parentPublication": { "id": "proceedings/icnc/2008/3304/3", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/colcom/2006/0428/0/04207527", "title": "Synchronous Collaborative Information Retrieval with Relevance Feedback", "doi": null, "abstractUrl": "/proceedings-article/colcom/2006/04207527/12OmNwErpAR", "parentPublication": { "id": "proceedings/colcom/2006/0428/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsnc/2008/3371/0/3371a365", "title": "Capturing User Contexts: Dynamic Profiling for Information Seeking Tasks", "doi": null, "abstractUrl": "/proceedings-article/icsnc/2008/3371a365/12OmNx38vUP", "parentPublication": { "id": "proceedings/icsnc/2008/3371/0", "title": "2008 3rd International Conference on Systems and Networks Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07870993", "title": "Supporting Collaborative Information Seeking in Online Community Engagement", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07870993/12OmNxFsmnV", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030042", "title": "Information Seeking Can Be Social", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030042/13rRUwj7cn2", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030033", "title": "Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030033/13rRUwwJWIu", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030060", "title": "Evaluation Challenges and Directions for Information-Seeking Support Systems", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030060/13rRUxlgy70", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2009/03/mco2009030030", "title": "Information-Seeking Support Systems", "doi": null, "abstractUrl": "/magazine/co/2009/03/mco2009030030/13rRUy3xYe0", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2014/03/mco2014030022", "title": "Collaborative Information Seeking [Guest editors' introduction]", "doi": null, "abstractUrl": "/magazine/co/2014/03/mco2014030022/13rRUy3xYee", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2014/03/mco2014030038", "title": "Investigating Collaborative Sensemaking Behavior in Collaborative Information Seeking", "doi": null, "abstractUrl": "/magazine/co/2014/03/mco2014030038/13rRUyv53J7", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "mco2009030042", "articleId": "13rRUwj7cn2", "__typename": "AdjacentArticleType" }, "next": { "fno": "mco2009030052", "articleId": "13rRUx0xPDu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1zKXryr0JDG", "title": "Feb.", "year": "2022", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1y11cQpf9nO", "doi": "10.1109/TVCG.2021.3122388", "abstract": "Embedding high-dimensional data onto a low-dimensional manifold is of both theoretical and practical value. In this article, we propose to combine deep neural networks (DNN) with mathematics-guided embedding rules for high-dimensional data embedding. We introduce a generic deep embedding network (DEN) framework, which is able to learn a parametric mapping from high-dimensional space to low-dimensional space, guided by well-established objectives such as Kullback-Leibler (KL) divergence minimization. We further propose a recursive strategy, called deep recursive embedding (DRE), to make use of the latent data representations for boosted embedding performance. We exemplify the flexibility of DRE by different architectures and loss functions, and benchmarked our method against the two most popular embedding methods, namely, t-distributed stochastic neighbor embedding (t-SNE) and uniform manifold approximation and projection (UMAP). The proposed DRE method can map out-of-sample data and scale to extremely large datasets. Experiments on a range of public datasets demonstrated improved embedding performance in terms of local and global structure preservation, compared with other state-of-the-art embedding methods. Code is available at <uri>https://github.com/tao-aimi/DeepRecursiveEmbedding</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Embedding high-dimensional data onto a low-dimensional manifold is of both theoretical and practical value. In this article, we propose to combine deep neural networks (DNN) with mathematics-guided embedding rules for high-dimensional data embedding. We introduce a generic deep embedding network (DEN) framework, which is able to learn a parametric mapping from high-dimensional space to low-dimensional space, guided by well-established objectives such as Kullback-Leibler (KL) divergence minimization. We further propose a recursive strategy, called deep recursive embedding (DRE), to make use of the latent data representations for boosted embedding performance. We exemplify the flexibility of DRE by different architectures and loss functions, and benchmarked our method against the two most popular embedding methods, namely, t-distributed stochastic neighbor embedding (t-SNE) and uniform manifold approximation and projection (UMAP). The proposed DRE method can map out-of-sample data and scale to extremely large datasets. Experiments on a range of public datasets demonstrated improved embedding performance in terms of local and global structure preservation, compared with other state-of-the-art embedding methods. Code is available at <uri>https://github.com/tao-aimi/DeepRecursiveEmbedding</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Embedding high-dimensional data onto a low-dimensional manifold is of both theoretical and practical value. In this article, we propose to combine deep neural networks (DNN) with mathematics-guided embedding rules for high-dimensional data embedding. We introduce a generic deep embedding network (DEN) framework, which is able to learn a parametric mapping from high-dimensional space to low-dimensional space, guided by well-established objectives such as Kullback-Leibler (KL) divergence minimization. We further propose a recursive strategy, called deep recursive embedding (DRE), to make use of the latent data representations for boosted embedding performance. We exemplify the flexibility of DRE by different architectures and loss functions, and benchmarked our method against the two most popular embedding methods, namely, t-distributed stochastic neighbor embedding (t-SNE) and uniform manifold approximation and projection (UMAP). The proposed DRE method can map out-of-sample data and scale to extremely large datasets. Experiments on a range of public datasets demonstrated improved embedding performance in terms of local and global structure preservation, compared with other state-of-the-art embedding methods. Code is available at https://github.com/tao-aimi/DeepRecursiveEmbedding.", "title": "Deep Recursive Embedding for High-Dimensional Data", "normalizedTitle": "Deep Recursive Embedding for High-Dimensional Data", "fno": "09585419", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Handling", "Data Structures", "Deep Learning Artificial Intelligence", "Minimisation", "Stochastic Processes", "Uniform Manifold Approximation And Projection", "T Distributed Stochastic Neighbor Embedding", "Generic Deep Embedding Network", "Deep Recursive Embedding", "Out Of Sample Data", "Latent Data Representations", "Kullback Leibler Divergence Minimization", "High Dimensional Data Embedding", "Mathematics Guided Embedding Rules", "Deep Neural Networks", "Data Visualization", "Feature Extraction", "Training", "Manifolds", "Unsupervised Learning", "Standards", "Tools", "T Distributed Stochastic Neighbor Embedding", "Uniform Manifold Approximation And Projection", "Deep Embedding Network", "Deep Recursive Embedding", "Unsupervised Learning" ], "authors": [ { "givenName": "Zixia", "surname": "Zhou", "fullName": "Zixia Zhou", "affiliation": "Department of Electronic Engineering, Fudan University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xinrui", "surname": "Zu", "fullName": "Xinrui Zu", "affiliation": "Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS), University of Twente, Enschede, NB, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Yuanyuan", "surname": "Wang", "fullName": "Yuanyuan Wang", "affiliation": "Department of Electronic Engineering, Fudan University, Shanghai, China", "__typename": "ArticleAuthorType" }, { "givenName": "Boudewijn P. F.", "surname": "Lelieveldt", "fullName": "Boudewijn P. F. Lelieveldt", "affiliation": "Department of Radiology, Division of Image Processing, Leiden University Medical Center, Leiden, ZA, The Netherlands", "__typename": "ArticleAuthorType" }, { "givenName": "Qian", "surname": "Tao", "fullName": "Qian Tao", "affiliation": "Department of Imaging Physics, Delft University of Technology, Delft, CJ, The Netherlands", "__typename": "ArticleAuthorType" } ], "replicability": { "isEnabled": true, "codeDownloadUrl": "https://github.com/tao-aimi/DeepRecursiveEmbedding.git", "codeRepositoryUrl": "https://github.com/tao-aimi/DeepRecursiveEmbedding", "__typename": "ArticleReplicabilityType" }, "showBuyMe": false, "showRecommendedArticles": true, "isOpenAccess": true, "issueNum": "02", "pubDate": "2022-02-01 00:00:00", "pubType": "trans", "pages": "1237-1248", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2016/5910/0/07836739", "title": "Regression on High-Dimensional Inputs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836739/12OmNBtl1xC", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2018/3649/0/364901a066", "title": "ANE: Network Embedding via Adversarial Autoencoders", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2018/364901a066/12OmNqAU6qu", "parentPublication": { "id": "proceedings/bigcomp/2018/3649/0", "title": "2018 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a434", "title": "High-Dimensional Multimodal Distribution Embedding", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a434/12OmNqC2uZh", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a523", "title": "High-Dimensional Density Estimation for Data Mining Tasks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a523/12OmNwogh5t", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457g221", "title": "Fried Binary Embedding for High-Dimensional Visual Features", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g221/12OmNyrZLCP", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a487", "title": "Nonlinear Manifold Embedding on Keyword Spotting Using t-SNE", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a487/12OmNzlUKGo", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09815143", "title": "Hyperbolic Embedding of Attributed and Directed Networks", "doi": null, "abstractUrl": "/journal/tk/5555/01/09815143/1EJBePXOX9C", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412900", "title": "q-SNE: Visualizing Data using q-Gaussian Distributed Stochastic Neighbor Embedding", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412900/1tmhROYroSA", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413131", "title": "N2D: (Not Too) Deep Clustering via Clustering the Local Manifold of an Autoencoded Embedding", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413131/1tmizVx9ldu", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09528952", "title": "GeodesicEmbedding (GE): A High-Dimensional Embedding Approach for Fast Geodesic Distance Queries", "doi": null, "abstractUrl": "/journal/tg/2022/12/09528952/1wB2yxXmZYA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09149790", "articleId": "1lNXFpGivV6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09018202", "articleId": "1hN4BrDSVHi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwpGgK8", "title": "Dec.", "year": "2014", "issueNum": "12", "idPrefix": "tg", "pubType": "journal", "volume": "20", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwInvB8", "doi": "10.1109/TVCG.2014.2346998", "abstract": "In his book Multimedia Learning [7], Richard Mayer asserts that viewers learn best from imagery that provides them with cues to help them organize new information into the correct knowledge structures. Designers have long been exploiting the Gestalt laws of visual grouping to deliver viewers those cues using visual hierarchy, often communicating structures much more complex than the simple organizations studied in psychological research. Unfortunately, designers are largely practical in their work, and have not paused to build a complex theory of structural communication. If we are to build a tool to help novices create effective and well structured visuals, we need a better understanding of how to create them. Our work takes a first step toward addressing this lack, studying how five of the many grouping cues (proximity, color similarity, common region, connectivity, and alignment) can be effectively combined to communicate structured text and imagery from real world examples. To measure the effectiveness of this structural communication, we applied a digital version of card sorting, a method widely used in anthropology and cognitive science to extract cognitive structures. We then used tree edit distance to measure the difference between perceived and communicated structures. Our most significant findings are: 1) with careful design, complex structure can be communicated clearly; 2) communicating complex structure is best done with multiple reinforcing grouping cues; 3) common region (use of containers such as boxes) is particularly effective at communicating structure; and 4) alignment is a weak structural communicator.", "abstracts": [ { "abstractType": "Regular", "content": "In his book Multimedia Learning [7], Richard Mayer asserts that viewers learn best from imagery that provides them with cues to help them organize new information into the correct knowledge structures. Designers have long been exploiting the Gestalt laws of visual grouping to deliver viewers those cues using visual hierarchy, often communicating structures much more complex than the simple organizations studied in psychological research. Unfortunately, designers are largely practical in their work, and have not paused to build a complex theory of structural communication. If we are to build a tool to help novices create effective and well structured visuals, we need a better understanding of how to create them. Our work takes a first step toward addressing this lack, studying how five of the many grouping cues (proximity, color similarity, common region, connectivity, and alignment) can be effectively combined to communicate structured text and imagery from real world examples. To measure the effectiveness of this structural communication, we applied a digital version of card sorting, a method widely used in anthropology and cognitive science to extract cognitive structures. We then used tree edit distance to measure the difference between perceived and communicated structures. Our most significant findings are: 1) with careful design, complex structure can be communicated clearly; 2) communicating complex structure is best done with multiple reinforcing grouping cues; 3) common region (use of containers such as boxes) is particularly effective at communicating structure; and 4) alignment is a weak structural communicator.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In his book Multimedia Learning [7], Richard Mayer asserts that viewers learn best from imagery that provides them with cues to help them organize new information into the correct knowledge structures. Designers have long been exploiting the Gestalt laws of visual grouping to deliver viewers those cues using visual hierarchy, often communicating structures much more complex than the simple organizations studied in psychological research. Unfortunately, designers are largely practical in their work, and have not paused to build a complex theory of structural communication. If we are to build a tool to help novices create effective and well structured visuals, we need a better understanding of how to create them. Our work takes a first step toward addressing this lack, studying how five of the many grouping cues (proximity, color similarity, common region, connectivity, and alignment) can be effectively combined to communicate structured text and imagery from real world examples. To measure the effectiveness of this structural communication, we applied a digital version of card sorting, a method widely used in anthropology and cognitive science to extract cognitive structures. We then used tree edit distance to measure the difference between perceived and communicated structures. Our most significant findings are: 1) with careful design, complex structure can be communicated clearly; 2) communicating complex structure is best done with multiple reinforcing grouping cues; 3) common region (use of containers such as boxes) is particularly effective at communicating structure; and 4) alignment is a weak structural communicator.", "title": "Reinforcing Visual Grouping Cues to Communicate Complex Informational Structure", "normalizedTitle": "Reinforcing Visual Grouping Cues to Communicate Complex Informational Structure", "fno": "06875960", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Information Analysis", "Psychology", "Multimedia Communication", "Color Analysis", "Image Color Analysis", "Visual Communication", "Visual Grouping", "Visual Hierarchy", "Gestalt Principles", "Perception" ], "authors": [ { "givenName": "Juhee", "surname": "Bae", "fullName": "Juhee Bae", "affiliation": ", North Carolina State University", "__typename": "ArticleAuthorType" }, { "givenName": "Benjamin", "surname": "Watson", "fullName": "Benjamin Watson", "affiliation": ", North Carolina State University", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2014-12-01 00:00:00", "pubType": "trans", "pages": "1973-1982", "year": "2014", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icme/2013/0015/0/06607433", "title": "Social grouping for target handover in multi-view video", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607433/12OmNqFJhMY", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2008/2339/0/04562974", "title": "Investigating how and when perceptual organization cues improve boundary detection in natural images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2008/04562974/12OmNx7XH4I", "parentPublication": { "id": "proceedings/cvprw/2008/2339/0", "title": "2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6275/0/00577132", "title": "A computer implementation of psychoacoustic grouping rules", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00577132/12OmNx8Oupp", "parentPublication": { "id": "proceedings/icpr/1994/6275/0", "title": "12th IAPR International Conference on Pattern Recognition, 1994", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2009/4519/0/05234642", "title": "A hierarchy grouping model based on gestalt perceptual cues", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2009/05234642/12OmNxHJ9uB", "parentPublication": { "id": "proceedings/iccsit/2009/4519/0", "title": "Computer Science and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670c729", "title": "Demystifying Insider Threat: Language-Action Cues in Group Dynamics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670c729/12OmNy50gj5", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b680", "title": "Learning to Combine Mid-Level Cues for Object Proposal Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b680/12OmNyfdOZk", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/249P2B48", "title": "Improving multi-target tracking via social grouping", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/249P2B48/12OmNzA6GRs", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/02/i0173", "title": "Segmentation Given Partial Grouping Constraints", "doi": null, "abstractUrl": "/journal/tp/2004/02/i0173/13rRUwIF6eN", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/01/06678333", "title": "Reorienting Driver Attention with Dynamic Tactile Cues", "doi": null, "abstractUrl": "/journal/th/2014/01/06678333/13rRUx0geA1", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1998/02/i0168", "title": "A Generic Grouping Algorithm and Its Quantitative Analysis", "doi": null, "abstractUrl": "/journal/tp/1998/02/i0168/13rRUxcKzWf", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "06875906", "articleId": "13rRUyYjK5i", "__typename": "AdjacentArticleType" }, "next": { "fno": "06876017", "articleId": "13rRUyY294D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNyvY9o5", "title": "February", "year": "2011", "issueNum": "02", "idPrefix": "tg", "pubType": "journal", "volume": "17", "label": "February", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUwcAqqb", "doi": "10.1109/TVCG.2010.96", "abstract": "Conventional beam tracing can be used for solving global illumination problems. It is an efficient algorithm and performs very well when implemented on the GPU. This allows us to apply the algorithm in a novel way to the problem of radio wave propagation. The simulation of radio waves is conceptually analogous to the problem of light transport. We use a custom, parallel rasterization pipeline for creation and evaluation of the beams. We implement a subset of a standard 3D rasterization pipeline entirely on the GPU, supporting 2D and 3D frame buffers for output. Our algorithm can provide a detailed description of complex radio channel characteristics like propagation losses and the spread of arriving signals over time (delay spread). Those are essential for the planning of communication systems required by mobile network operators. For validation, we compare our simulation results with measurements from a real-world network. Furthermore, we account for characteristics of different propagation environments and estimate the influence of unknown components like traffic or vegetation by adapting model parameters to measurements.", "abstracts": [ { "abstractType": "Regular", "content": "Conventional beam tracing can be used for solving global illumination problems. It is an efficient algorithm and performs very well when implemented on the GPU. This allows us to apply the algorithm in a novel way to the problem of radio wave propagation. The simulation of radio waves is conceptually analogous to the problem of light transport. We use a custom, parallel rasterization pipeline for creation and evaluation of the beams. We implement a subset of a standard 3D rasterization pipeline entirely on the GPU, supporting 2D and 3D frame buffers for output. Our algorithm can provide a detailed description of complex radio channel characteristics like propagation losses and the spread of arriving signals over time (delay spread). Those are essential for the planning of communication systems required by mobile network operators. For validation, we compare our simulation results with measurements from a real-world network. Furthermore, we account for characteristics of different propagation environments and estimate the influence of unknown components like traffic or vegetation by adapting model parameters to measurements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Conventional beam tracing can be used for solving global illumination problems. It is an efficient algorithm and performs very well when implemented on the GPU. This allows us to apply the algorithm in a novel way to the problem of radio wave propagation. The simulation of radio waves is conceptually analogous to the problem of light transport. We use a custom, parallel rasterization pipeline for creation and evaluation of the beams. We implement a subset of a standard 3D rasterization pipeline entirely on the GPU, supporting 2D and 3D frame buffers for output. Our algorithm can provide a detailed description of complex radio channel characteristics like propagation losses and the spread of arriving signals over time (delay spread). Those are essential for the planning of communication systems required by mobile network operators. For validation, we compare our simulation results with measurements from a real-world network. Furthermore, we account for characteristics of different propagation environments and estimate the influence of unknown components like traffic or vegetation by adapting model parameters to measurements.", "title": "Efficient Rasterization for Outdoor Radio Wave Propagation", "normalizedTitle": "Efficient Rasterization for Outdoor Radio Wave Propagation", "fno": "ttg2011020159", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Ray Tracing", "Rendering", "Electromagnetic Propagation" ], "authors": [ { "givenName": "Arne", "surname": "Schmitz", "fullName": "Arne Schmitz", "affiliation": "RWTH-Aachen, Aachen", "__typename": "ArticleAuthorType" }, { "givenName": "Tobias", "surname": "Rick", "fullName": "Tobias Rick", "affiliation": "RWTH-Aachen, Aachen", "__typename": "ArticleAuthorType" }, { "givenName": "Thomas", "surname": "Karolski", "fullName": "Thomas Karolski", "affiliation": "RWTH-Aachen, Aachen", "__typename": "ArticleAuthorType" }, { "givenName": "Torsten", "surname": "Kuhlen", "fullName": "Torsten Kuhlen", "affiliation": "RWTH-Aachen, Aachen", "__typename": "ArticleAuthorType" }, { "givenName": "Leif", "surname": "Kobbelt", "fullName": "Leif Kobbelt", "affiliation": "RWTH Aachen University, Aachen", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2011-02-01 00:00:00", "pubType": "trans", "pages": "159-170", "year": "2011", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/fie/2003/7961/1/01263385", "title": "A 2-d indoor radio propagation modeling by using MATLAB for classroom instruction", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01263385/12OmNBWi6Ja", "parentPublication": { "id": "proceedings/fie/2003/7961/1", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ausctw/2005/9007/0/01624263", "title": "Neural network prediction of radio propagation", "doi": null, "abstractUrl": "/proceedings-article/ausctw/2005/01624263/12OmNs59JU6", "parentPublication": { "id": "proceedings/ausctw/2005/9007/0", "title": "Proceedings. 6th Australian Communications Theory Workshop 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsnc/2009/3775/0/3775a006", "title": "The Optimal Radio Propagation Model in VANET", "doi": null, "abstractUrl": "/proceedings-article/icsnc/2009/3775a006/12OmNxcdFY5", "parentPublication": { "id": "proceedings/icsnc/2009/3775/0", "title": "Systems and Networks Communication, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2009/3575/0/3575a272", "title": "On Estimation Algorithm for Radio Communication Distance along Rough Surface", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575a272/12OmNyOq55W", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2007/1520/0/04381565", "title": "Improving MANET Simulation Results - Deploying Realistic Mobility and Radio Wave Propagation Models", "doi": null, "abstractUrl": "/proceedings-article/iscc/2007/04381565/12OmNzdoMiI", "parentPublication": { "id": "proceedings/iscc/2007/1520/0", "title": "2007 12th IEEE Symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmc/2010/3989/1/3989a428", "title": "Study on a Sea Radio-Wave Propagation Loss Model", "doi": null, "abstractUrl": "/proceedings-article/cmc/2010/3989a428/12OmNzmLxSM", "parentPublication": { "id": "proceedings/cmc/2010/3989/1", "title": "Communications and Mobile Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/07/08356687", "title": "A Voxel-Based Rendering Pipeline for Large 3D Line Sets", "doi": null, "abstractUrl": "/journal/tg/2019/07/08356687/13rRUwInvJn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2007/06/mcg2007060036", "title": "Exploring a Boeing 777: Ray Tracing Large-Scale CAD Data", "doi": null, "abstractUrl": "/magazine/cg/2007/06/mcg2007060036/13rRUxC0SGw", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2022/1332/0/09687297", "title": "Radio Propagation Extrapolation by Using Multiple Separated Propagation Paths Estimated by Radio Map", "doi": null, "abstractUrl": "/proceedings-article/icoin/2022/09687297/1AtQbzfhD6E", "parentPublication": { "id": "proceedings/icoin/2022/1332/0", "title": "2022 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2021/4854/0/485400a237", "title": "Research on Radio Propagation Model Based on VHF Band", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2021/485400a237/1wB6SQ8fY4g", "parentPublication": { "id": "proceedings/icitbs/2021/4854/0", "title": "2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttg2011020146", "articleId": "13rRUxBrGgT", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttg2011020171", "articleId": "13rRUx0xPTN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxwWoNz", "title": "June", "year": "2002", "issueNum": "06", "idPrefix": "tp", "pubType": "journal", "volume": "24", "label": "June", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUzphDyR", "doi": "10.1109/TPAMI.2002.1008389", "abstract": "We propose a method for text retrieval from document images without the use of OCR. Documents are segmented into character objects. Image features, namely, the Vertical Traverse Density (VTD) and Horizontal Traverse Density (HTD), are extracted. An n-gram based document vector is constructed for each document based on these features. Text similarity between documents is then measured by calculating the dot product of the document vectors. Testing with seven corpora of imaged textual documents in English and Chinese as well as images from UW1 database confirms the validity of the proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a method for text retrieval from document images without the use of OCR. Documents are segmented into character objects. Image features, namely, the Vertical Traverse Density (VTD) and Horizontal Traverse Density (HTD), are extracted. An n-gram based document vector is constructed for each document based on these features. Text similarity between documents is then measured by calculating the dot product of the document vectors. Testing with seven corpora of imaged textual documents in English and Chinese as well as images from UW1 database confirms the validity of the proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a method for text retrieval from document images without the use of OCR. Documents are segmented into character objects. Image features, namely, the Vertical Traverse Density (VTD) and Horizontal Traverse Density (HTD), are extracted. An n-gram based document vector is constructed for each document based on these features. Text similarity between documents is then measured by calculating the dot product of the document vectors. Testing with seven corpora of imaged textual documents in English and Chinese as well as images from UW1 database confirms the validity of the proposed method.", "title": "Imaged Document Text Retrieval Without OCR", "normalizedTitle": "Imaged Document Text Retrieval Without OCR", "fno": "i0838", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Document Image Analysis", "Document Vector", "Text Similarity", "Textretrieval" ], "authors": [ { "givenName": "Chew Lim", "surname": "Tan", "fullName": "Chew Lim Tan", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Weihua", "surname": "Huang", "fullName": "Weihua Huang", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Zhaohui", "surname": "Yu", "fullName": "Zhaohui Yu", "affiliation": null, "__typename": "ArticleAuthorType" }, { "givenName": "Yi", "surname": "Xu", "fullName": "Yi Xu", "affiliation": null, "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": false, "isOpenAccess": false, "issueNum": "06", "pubDate": "2002-06-01 00:00:00", "pubType": "trans", "pages": "838-844", "year": "2002", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [], "adjacentArticles": { "previous": { "fno": "i0824", "articleId": "13rRUxYrbVF", "__typename": "AdjacentArticleType" }, "next": { "fno": "i0844", "articleId": "13rRUwIF6eM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1GrP91HemEo", "doi": "10.1109/TDSC.2022.3204535", "abstract": "Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting spectrum sensing data falsification (SSDF) attacks. However, the amount of data needed to train models and the scenario privacy concerns limit the applicability of centralized ML/DL. Federated learning (FL) addresses these drawbacks but is vulnerable to adversarial participants and attacks. The literature has proposed countermeasures, but more effort is required to evaluate the performance of FL detecting SSDF attacks and their robustness against adversaries. Thus, the first contribution of this work is to create an FL-oriented dataset modeling the behavior of resource-constrained spectrum sensors affected by SSDF attacks. The second contribution is a pool of experiments analyzing the robustness of FL models according to <italic>i)</italic> three families of sensors, <italic>ii)</italic> eight SSDF attacks, <italic>iii)</italic> four FL scenarios dealing with anomaly detection and binary classification, <italic>iv)</italic> up to 33&#x0025; of participants implementing data and model poisoning attacks, and <italic>v)</italic> four aggregation functions acting as anti-adversarial mechanisms. In conclusion, FL achieves promising performance when detecting SSDF attacks. Without anti-adversarial mechanisms, FL models are particularly vulnerable with <inline-formula><tex-math notation=\"LaTeX\">Z_$&gt;$_Z</tex-math></inline-formula>16&#x0025; of adversaries. Coordinate-wise-median is the best mitigation for anomaly detection, but binary classifiers are still affected with <inline-formula><tex-math notation=\"LaTeX\">Z_$&gt;$_Z</tex-math></inline-formula>33&#x0025; of adversaries.", "abstracts": [ { "abstractType": "Regular", "content": "Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting spectrum sensing data falsification (SSDF) attacks. However, the amount of data needed to train models and the scenario privacy concerns limit the applicability of centralized ML/DL. Federated learning (FL) addresses these drawbacks but is vulnerable to adversarial participants and attacks. The literature has proposed countermeasures, but more effort is required to evaluate the performance of FL detecting SSDF attacks and their robustness against adversaries. Thus, the first contribution of this work is to create an FL-oriented dataset modeling the behavior of resource-constrained spectrum sensors affected by SSDF attacks. The second contribution is a pool of experiments analyzing the robustness of FL models according to <italic>i)</italic> three families of sensors, <italic>ii)</italic> eight SSDF attacks, <italic>iii)</italic> four FL scenarios dealing with anomaly detection and binary classification, <italic>iv)</italic> up to 33&#x0025; of participants implementing data and model poisoning attacks, and <italic>v)</italic> four aggregation functions acting as anti-adversarial mechanisms. In conclusion, FL achieves promising performance when detecting SSDF attacks. Without anti-adversarial mechanisms, FL models are particularly vulnerable with <inline-formula><tex-math notation=\"LaTeX\">$&gt;$</tex-math></inline-formula>16&#x0025; of adversaries. Coordinate-wise-median is the best mitigation for anomaly detection, but binary classifiers are still affected with <inline-formula><tex-math notation=\"LaTeX\">$&gt;$</tex-math></inline-formula>33&#x0025; of adversaries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting spectrum sensing data falsification (SSDF) attacks. However, the amount of data needed to train models and the scenario privacy concerns limit the applicability of centralized ML/DL. Federated learning (FL) addresses these drawbacks but is vulnerable to adversarial participants and attacks. The literature has proposed countermeasures, but more effort is required to evaluate the performance of FL detecting SSDF attacks and their robustness against adversaries. Thus, the first contribution of this work is to create an FL-oriented dataset modeling the behavior of resource-constrained spectrum sensors affected by SSDF attacks. The second contribution is a pool of experiments analyzing the robustness of FL models according to i) three families of sensors, ii) eight SSDF attacks, iii) four FL scenarios dealing with anomaly detection and binary classification, iv) up to 33% of participants implementing data and model poisoning attacks, and v) four aggregation functions acting as anti-adversarial mechanisms. In conclusion, FL achieves promising performance when detecting SSDF attacks. Without anti-adversarial mechanisms, FL models are particularly vulnerable with -16% of adversaries. Coordinate-wise-median is the best mitigation for anomaly detection, but binary classifiers are still affected with -33% of adversaries.", "title": "Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors", "normalizedTitle": "Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors", "fno": "09878222", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Sensors", "Fingerprint Recognition", "Data Models", "Behavioral Sciences", "Sensor Phenomena And Characterization", "Robustness", "Crowdsensing", "Adversarial Attacks", "Cyberattacks", "Federated Learning", "Fingerprinting", "Resource Constrained Devices", "Robustness" ], "authors": [ { "givenName": "Pedro Miguel", "surname": "Sánchez Sánchez", "fullName": "Pedro Miguel Sánchez Sánchez", "affiliation": "Department of Information and Communications Engineering, University of Murcia, Murcia, Spain", "__typename": "ArticleAuthorType" }, { "givenName": "Alberto Huertas", "surname": "Celdrán", "fullName": "Alberto Huertas Celdrán", "affiliation": "Communication Systems Group (CSG) at the Department of Informatics (IfI), University of Zurich UZH, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Timo", "surname": "Schenk", "fullName": "Timo Schenk", "affiliation": "Communication Systems Group (CSG) at the Department of Informatics (IfI), University of Zurich UZH, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Adrian Lars Benjamin", "surname": "Iten", "fullName": "Adrian Lars Benjamin Iten", "affiliation": "Communication Systems Group (CSG) at the Department of Informatics (IfI), University of Zurich UZH, Zürich, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Gérôme", "surname": "Bovet", "fullName": "Gérôme Bovet", "affiliation": "Cyber-Defence Campus within armasuisse Science & Technology, Thun, Switzerland", "__typename": "ArticleAuthorType" }, { "givenName": "Gregorio Martínez", "surname": "Pérez", "fullName": "Gregorio Martínez Pérez", "affiliation": "Department of Information and Communications Engineering, University of Murcia, Murcia, Spain", "__typename": "ArticleAuthorType" }, { "givenName": "Burkhard", "surname": "Stiller", "fullName": "Burkhard Stiller", "affiliation": "Communication Systems Group (CSG) at the Department of Informatics (IfI), University of Zurich UZH, Zürich, Switzerland", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-09-01 00:00:00", "pubType": "trans", "pages": "1-12", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/bd/5555/01/09809786", "title": "MarS-FL: Enabling Competitors to Collaborate in Federated Learning", "doi": null, "abstractUrl": "/journal/bd/5555/01/09809786/1EzDKm6BgSQ", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09928211", "title": "FewM-HGCL&#x00A0;:&#x00A0;Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/09928211/1HJuUzzFey4", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/09976297", "title": "Exploring Memory Access Similarity to Improve Irregular Application Performance for Distributed Hybrid Memory Systems", "doi": null, "abstractUrl": "/journal/td/2023/03/09976297/1IWfP8p5MQ0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/10018536", "title": "FedMDS: An Efficient Model Discrepancy-Aware Semi-Asynchronous Clustered Federated Learning Framework", "doi": null, "abstractUrl": "/journal/td/2023/03/10018536/1K0DHUawdkk", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2023/5719/0/10074277", "title": "Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks", "doi": null, "abstractUrl": "/proceedings-article/icnc/2023/10074277/1LKwJYGS7Oo", "parentPublication": { "id": "proceedings/icnc/2023/5719/0", "title": "2023 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10059228", "title": "CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors", "doi": null, "abstractUrl": "/journal/tq/5555/01/10059228/1LiKRxn4dCE", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10093038", "title": "Privacy-Preserving and Byzantine-Robust Federated Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/10093038/1M61YImr8dO", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/10/09664296", "title": "Blockchain Assisted Decentralized Federated Learning (BLADE-FL): Performance Analysis and Resource Allocation", "doi": null, "abstractUrl": "/journal/td/2022/10/09664296/1zHDLnUSPgA", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09647969", "title": "Flexible Clustered Federated Learning for Client-Level Data Distribution Shift", "doi": null, "abstractUrl": "/journal/td/2022/11/09647969/1ziKk2OmMkU", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09650669", "title": "LoMar: A Local Defense Against Poisoning Attack on Federated Learning", "doi": null, "abstractUrl": "/journal/tq/2023/01/09650669/1zkp2xp5tWU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09878094", "articleId": "1GrP8LSNRny", "__typename": "AdjacentArticleType" }, "next": { "fno": "09880537", "articleId": "1Gtu8iEWn96", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwdL7lQ", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tm", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Idr41RFHkk", "doi": "10.1109/TMC.2022.3221463", "abstract": "Microphone has been widely integrated into mobile devices to provide physical basis for human-device voice interaction. However, the microphone may be spitefully invoked by malicious <italic>mobile applications</italic>(apps) with arousing security and privacy concerns. In this work, to explore the issue of illegal microphone access, we develop spiteful apps through native and injection development to access the microphone viciously on a series of mobile devices. The results demonstrate that baleful apps could enable the microphone arbitrarily without any hint. To combat the unauthorized microphone access behavior, we design a <italic>microphone illegal access detection</italic>(MicDet) scheme by constructing a request-response time model using the Unix time stamps of voice icon touched and microphone invoked. Through conducting numerical analysis and hypothesis testing to effectively verify the request-response pattern of app&#x0027;s normal access, we detect illegal access by analyzing whether the touch operation matches the normal pattern. For friendly user experience, we design an intuitive floating window to alert users by displaying the name of the app that illegally accessed the microphone once the illegal behavior is detected. Finally, we apply our scheme to different mobile devices and test several apps, the experimental results show that the MicDet scheme achieves a high detection accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Microphone has been widely integrated into mobile devices to provide physical basis for human-device voice interaction. However, the microphone may be spitefully invoked by malicious <italic>mobile applications</italic>(apps) with arousing security and privacy concerns. In this work, to explore the issue of illegal microphone access, we develop spiteful apps through native and injection development to access the microphone viciously on a series of mobile devices. The results demonstrate that baleful apps could enable the microphone arbitrarily without any hint. To combat the unauthorized microphone access behavior, we design a <italic>microphone illegal access detection</italic>(MicDet) scheme by constructing a request-response time model using the Unix time stamps of voice icon touched and microphone invoked. Through conducting numerical analysis and hypothesis testing to effectively verify the request-response pattern of app&#x0027;s normal access, we detect illegal access by analyzing whether the touch operation matches the normal pattern. For friendly user experience, we design an intuitive floating window to alert users by displaying the name of the app that illegally accessed the microphone once the illegal behavior is detected. Finally, we apply our scheme to different mobile devices and test several apps, the experimental results show that the MicDet scheme achieves a high detection accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microphone has been widely integrated into mobile devices to provide physical basis for human-device voice interaction. However, the microphone may be spitefully invoked by malicious mobile applications(apps) with arousing security and privacy concerns. In this work, to explore the issue of illegal microphone access, we develop spiteful apps through native and injection development to access the microphone viciously on a series of mobile devices. The results demonstrate that baleful apps could enable the microphone arbitrarily without any hint. To combat the unauthorized microphone access behavior, we design a microphone illegal access detection(MicDet) scheme by constructing a request-response time model using the Unix time stamps of voice icon touched and microphone invoked. Through conducting numerical analysis and hypothesis testing to effectively verify the request-response pattern of app's normal access, we detect illegal access by analyzing whether the touch operation matches the normal pattern. For friendly user experience, we design an intuitive floating window to alert users by displaying the name of the app that illegally accessed the microphone once the illegal behavior is detected. Finally, we apply our scheme to different mobile devices and test several apps, the experimental results show that the MicDet scheme achieves a high detection accuracy.", "title": "Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices", "normalizedTitle": "Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices", "fno": "09946438", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Microphones", "Behavioral Sciences", "Smart Phones", "Bars", "Authorization", "Operating Systems", "Security", "Eavesdropping Attack Detection", "Mobile Applications", "Mobile Devices", "Microphone Access" ], "authors": [ { "givenName": "Wenbin", "surname": "Huang", "fullName": "Wenbin Huang", "affiliation": "Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Wenjuan", "surname": "Tang", "fullName": "Wenjuan Tang", "affiliation": "Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hanyuan", "surname": "Chen", "fullName": "Hanyuan Chen", "affiliation": "Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Hongbo", "surname": "Jiang", "fullName": "Hongbo Jiang", "affiliation": "Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yaoxue", "surname": "Zhang", "fullName": "Yaoxue Zhang", "affiliation": "Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "1-16", "year": "5555", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/malware/2015/0317/0/07413694", "title": "Targeted DoS on android: how to disable android in 10 seconds or less", "doi": null, "abstractUrl": "/proceedings-article/malware/2015/07413694/12OmNCvcLII", "parentPublication": { "id": "proceedings/malware/2015/0317/0", "title": "2015 10th International Conference on Malicious and Unwanted Software (MALWARE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/host/2018/4731/0/08383887", "title": "Zero-permission acoustic cross-device tracking", "doi": null, "abstractUrl": "/proceedings-article/host/2018/08383887/12OmNz2C1xm", "parentPublication": { "id": "proceedings/host/2018/4731/0", "title": "2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2021/0825/0/082500a307", "title": "User Addiction Behavior Towards Online Mobile Games Influences In Apps Purchase Behavior", "doi": null, "abstractUrl": "/proceedings-article/taai/2021/082500a307/1DBZDGolq36", "parentPublication": { "id": "proceedings/taai/2021/0825/0", "title": "2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2022/6679/0/667900a232", "title": "Automated Detection of TalkBack Interactive Accessibility Failures in Android Applications", "doi": null, "abstractUrl": "/proceedings-article/icst/2022/667900a232/1E2wHfDleFO", "parentPublication": { "id": "proceedings/icst/2022/6679/0", "title": "2022 IEEE Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2022/9519/0/951900a414", "title": "Modeling Disengaged Guessing Behavior in a Vocabulary Learning App using Student, Item, and Session Characteristics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2022/951900a414/1FUUaKF1ke4", "parentPublication": { "id": "proceedings/icalt/2022/9519/0", "title": "2022 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09937064", "title": "Visual Exploration of Machine Learning Model Behavior with Hierarchical Surrogate Rule Sets", "doi": null, "abstractUrl": "/journal/tg/5555/01/09937064/1I05Bh36uZy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/09976297", "title": "Exploring Memory Access Similarity to Improve Irregular Application Performance for Distributed Hybrid Memory Systems", "doi": null, "abstractUrl": "/journal/td/2023/03/09976297/1IWfP8p5MQ0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2022/5490/0/10086036", "title": "Perception of Multimodal Hedges in Communicative Behavior of a Companion Robot", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2022/10086036/1M6683gWeNq", "parentPublication": { "id": "proceedings/aciiw/2022/5490/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/06/08943271", "title": "A Smart Framework for Fine-Grained Microphone Acoustic Permission Management", "doi": null, "abstractUrl": "/journal/tq/2021/06/08943271/1g3bjWDifwA", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2023/01/09392254", "title": "Secure Voice Interactions With Smart Devices", "doi": null, "abstractUrl": "/journal/tm/2023/01/09392254/1sq7sa0uKgo", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09944948", "articleId": "1IbMb0GzL8c", "__typename": "AdjacentArticleType" }, "next": { "fno": "09946433", "articleId": "1Idr4qOFydW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwdL7lQ", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tm", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KnSnQeg0P6", "doi": "10.1109/TMC.2023.3241206", "abstract": "Cellular Internet card (IC) as a new business model emerges, which penetrates rapidly and holds the potential to foster a great business market. However, with the explosive growth of IC users, the user churn problem becomes severe, affecting the IC business significantly, while there is lacking appropriate techniques in the literature to deal with the issue. In this paper, we take the lead to study one large-scale data set from a provincial network operator of China, which contains about 4 million IC users and 22 million traditional card (TC) users. We first justify the IC user churn issue with data, and categorize the user churning reasons. Then, we shed light on understanding user portraits, which is the building block to enable efficient model design. Particularly, we conduct a systematical analytics on usage data by studying the difference of two types of users, examining the impact of user properties, and characterizing the user Internet using behaviors. Finally, by using the IC user portraits and usage patterns, we propose an <underline>IC</underline> user <underline>C</underline>hurn <underline>P</underline>rediction model, named <italic>ICCP</italic>, which consists of a feature extraction component and a learning-based churn prediction architecture design. For feature extraction, both the static portrait features and temporal sequential features are captured. In the learning architecture, we devise the principal component analysis (PCA) block and the embedding/transformer layers to learn the respective information of two types of features, which are collectively fed into the classification multilayer perceptron layer (MPL) for churn prediction. A reference implementation of <italic>ICCP</italic> is conducted within the telecom system and extensive experiments corroborate the efficiency of <italic>ICCP</italic>.", "abstracts": [ { "abstractType": "Regular", "content": "Cellular Internet card (IC) as a new business model emerges, which penetrates rapidly and holds the potential to foster a great business market. However, with the explosive growth of IC users, the user churn problem becomes severe, affecting the IC business significantly, while there is lacking appropriate techniques in the literature to deal with the issue. In this paper, we take the lead to study one large-scale data set from a provincial network operator of China, which contains about 4 million IC users and 22 million traditional card (TC) users. We first justify the IC user churn issue with data, and categorize the user churning reasons. Then, we shed light on understanding user portraits, which is the building block to enable efficient model design. Particularly, we conduct a systematical analytics on usage data by studying the difference of two types of users, examining the impact of user properties, and characterizing the user Internet using behaviors. Finally, by using the IC user portraits and usage patterns, we propose an <underline>IC</underline> user <underline>C</underline>hurn <underline>P</underline>rediction model, named <italic>ICCP</italic>, which consists of a feature extraction component and a learning-based churn prediction architecture design. For feature extraction, both the static portrait features and temporal sequential features are captured. In the learning architecture, we devise the principal component analysis (PCA) block and the embedding/transformer layers to learn the respective information of two types of features, which are collectively fed into the classification multilayer perceptron layer (MPL) for churn prediction. A reference implementation of <italic>ICCP</italic> is conducted within the telecom system and extensive experiments corroborate the efficiency of <italic>ICCP</italic>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cellular Internet card (IC) as a new business model emerges, which penetrates rapidly and holds the potential to foster a great business market. However, with the explosive growth of IC users, the user churn problem becomes severe, affecting the IC business significantly, while there is lacking appropriate techniques in the literature to deal with the issue. In this paper, we take the lead to study one large-scale data set from a provincial network operator of China, which contains about 4 million IC users and 22 million traditional card (TC) users. We first justify the IC user churn issue with data, and categorize the user churning reasons. Then, we shed light on understanding user portraits, which is the building block to enable efficient model design. Particularly, we conduct a systematical analytics on usage data by studying the difference of two types of users, examining the impact of user properties, and characterizing the user Internet using behaviors. Finally, by using the IC user portraits and usage patterns, we propose an IC user Churn Prediction model, named ICCP, which consists of a feature extraction component and a learning-based churn prediction architecture design. For feature extraction, both the static portrait features and temporal sequential features are captured. In the learning architecture, we devise the principal component analysis (PCA) block and the embedding/transformer layers to learn the respective information of two types of features, which are collectively fed into the classification multilayer perceptron layer (MPL) for churn prediction. A reference implementation of ICCP is conducted within the telecom system and extensive experiments corroborate the efficiency of ICCP.", "title": "Characterizing Internet Card User Portraits for Efficient Churn Prediction Model Design", "normalizedTitle": "Characterizing Internet Card User Portraits for Efficient Churn Prediction Model Design", "fno": "10032660", "hasPdf": true, "idPrefix": "tm", "keywords": [ "Integrated Circuit Modeling", "Business", "Feature Extraction", "Predictive Models", "Internet", "Data Models", "Behavioral Sciences", "Cellular Network", "Internet Card", "User Portraits", "Uesr Behaviors", "Churn Prediction" ], "authors": [ { "givenName": "Fan", "surname": "Wu", "fullName": "Fan Wu", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Feng", "surname": "Lyu", "fullName": "Feng Lyu", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ju", "surname": "Ren", "fullName": "Ju Ren", "affiliation": "Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Peng", "surname": "Yang", "fullName": "Peng Yang", "affiliation": "School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kai", "surname": "Qian", "fullName": "Kai Qian", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shijie", "surname": "Gao", "fullName": "Shijie Gao", "affiliation": "School of Computer Science and Engineering, Central South University, Changsha, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yaoxue", "surname": "Zhang", "fullName": "Yaoxue Zhang", "affiliation": "Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-01-01 00:00:00", "pubType": "trans", "pages": "1-17", "year": "5555", "issn": "1536-1233", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07363888", "title": "Enterprise subscription churn prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363888/12OmNAOKnRC", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2013/4777/0/4777a115", "title": "A Dynamic Transfer Ensemble Model for Customer Churn Prediction", "doi": null, "abstractUrl": "/proceedings-article/bife/2013/4777a115/12OmNApu5IU", "parentPublication": { "id": "proceedings/bife/2013/4777/0", "title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258400", "title": "Customer churn prediction in an internet service provider", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258400/17D45XwUAJf", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09827970", "title": "Disentangled Modeling of Social Homophily and Influence for Social Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/06/09827970/1EWSt4m2Eq4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09928211", "title": "FewM-HGCL&#x00A0;:&#x00A0;Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning", "doi": null, "abstractUrl": "/journal/tq/5555/01/09928211/1HJuUzzFey4", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09942347", "title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$\\mathrm{W^{2}}$_Z</tex-math></inline-formula>Parking: A Data-Driven Win-Win Contract Parking Sharing Mechanism Under Both Supply and Demand Uncertainties", "doi": null, "abstractUrl": "/journal/tk/5555/01/09942347/1I8NJU8SBfW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09942345", "title": "MOTO: Mobility-Aware Online Task Offloading with Adaptive Load Balancing in Small-Cell MEC", "doi": null, "abstractUrl": "/journal/tm/5555/01/09942345/1I8NT3ZqjjW", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500b563", "title": "Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500b563/1LFM5lEgBAk", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103818", "title": "A Customer Churn Prediction Model Based on XGBoost and MLP", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103818/1kesFMtUMZG", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09109662", "title": "ChOracle: A Unified Statistical Framework for Churn Prediction", "doi": null, "abstractUrl": "/journal/tk/2022/04/09109662/1kpEsLSEthK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10032570", "articleId": "1KnSnFKNNdu", "__typename": "AdjacentArticleType" }, "next": { "fno": "10032572", "articleId": "1KnSo08vYiI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1LM6Z41TsXK", "doi": "10.1109/TDSC.2023.3261328", "abstract": "Behavior recognition plays an essential role in numerous behavior-driven applications (<italic>e</italic>.<italic>g</italic>., virtual reality and smart home) and even in the security-critical applications (<italic>e</italic>.<italic>g</italic>., security surveillance and elder healthcare). Recently, WiFi-based behavior recognition (WBR) technique stands out among many behavior recognition techniques due to its advantages of being non-intrusive, device-free, and ubiquitous. However, existing WBR research mainly focuses on improving the recognition precision, while rarely studying the security aspects. In this paper, we reveal that WBR systems are vulnerable to manipulating physical signals. For instance, our observation shows that WiFi signals can be changed by jamming signals. By exploiting the vulnerability, we propose two approaches to generate physically online adversarial samples to perform untargeted attack and targeted attack, respectively. The effectiveness of these attacks are extensively evaluated over four real-world WBR systems. The experiment results show that our attack approaches can achieve 80&#x0025; and 60&#x0025; success rates for untargeted attack and targeted attack in physical world, respectively. We also show that our attack approaches can be generalized to other WiFi-based sensing applications, such as user authentication.", "abstracts": [ { "abstractType": "Regular", "content": "Behavior recognition plays an essential role in numerous behavior-driven applications (<italic>e</italic>.<italic>g</italic>., virtual reality and smart home) and even in the security-critical applications (<italic>e</italic>.<italic>g</italic>., security surveillance and elder healthcare). Recently, WiFi-based behavior recognition (WBR) technique stands out among many behavior recognition techniques due to its advantages of being non-intrusive, device-free, and ubiquitous. However, existing WBR research mainly focuses on improving the recognition precision, while rarely studying the security aspects. In this paper, we reveal that WBR systems are vulnerable to manipulating physical signals. For instance, our observation shows that WiFi signals can be changed by jamming signals. By exploiting the vulnerability, we propose two approaches to generate physically online adversarial samples to perform untargeted attack and targeted attack, respectively. The effectiveness of these attacks are extensively evaluated over four real-world WBR systems. The experiment results show that our attack approaches can achieve 80&#x0025; and 60&#x0025; success rates for untargeted attack and targeted attack in physical world, respectively. We also show that our attack approaches can be generalized to other WiFi-based sensing applications, such as user authentication.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Behavior recognition plays an essential role in numerous behavior-driven applications (e.g., virtual reality and smart home) and even in the security-critical applications (e.g., security surveillance and elder healthcare). Recently, WiFi-based behavior recognition (WBR) technique stands out among many behavior recognition techniques due to its advantages of being non-intrusive, device-free, and ubiquitous. However, existing WBR research mainly focuses on improving the recognition precision, while rarely studying the security aspects. In this paper, we reveal that WBR systems are vulnerable to manipulating physical signals. For instance, our observation shows that WiFi signals can be changed by jamming signals. By exploiting the vulnerability, we propose two approaches to generate physically online adversarial samples to perform untargeted attack and targeted attack, respectively. The effectiveness of these attacks are extensively evaluated over four real-world WBR systems. The experiment results show that our attack approaches can achieve 80% and 60% success rates for untargeted attack and targeted attack in physical world, respectively. We also show that our attack approaches can be generalized to other WiFi-based sensing applications, such as user authentication.", "title": "Time to Think the Security of WiFi-Based Behavior Recognition Systems", "normalizedTitle": "Time to Think the Security of WiFi-Based Behavior Recognition Systems", "fno": "10080971", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Behavioral Sciences", "Jamming", "Security", "Protocols", "Wireless Fidelity", "Transmitters", "Feature Extraction", "Adversarial Sample", "Behavior Recognition", "Genetic Algorithm", "Wi Fi" ], "authors": [ { "givenName": "Jianwei", "surname": "Liu", "fullName": "Jianwei Liu", "affiliation": "Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yinghui", "surname": "He", "fullName": "Yinghui He", "affiliation": "Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Chaowei", "surname": "Xiao", "fullName": "Chaowei Xiao", "affiliation": "Nvidia Research and Arizona State University, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Jinsong", "surname": "Han", "fullName": "Jinsong Han", "affiliation": "School of Cyber Science and Technology, Zhejiang University, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kui", "surname": "Ren", "fullName": "Kui Ren", "affiliation": "School of Cyber Science and Technology, Zhejiang University, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-03-01 00:00:00", "pubType": "trans", "pages": "1-14", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/snsp/2018/7413/0/741300a302", "title": "WIFI Security Certification through Device Information", "doi": null, "abstractUrl": "/proceedings-article/snsp/2018/741300a302/17D45XeKgvj", "parentPublication": { "id": "proceedings/snsp/2018/7413/0", "title": "2018 International Conference on Sensor Networks and Signal Processing (SNSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09684968", "title": "Behavior Privacy Preserving in RF Sensing", "doi": null, "abstractUrl": "/journal/tq/2023/01/09684968/1Ai9zi2ao7u", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09730055", "title": "Hybrid-Fidelity: Utilizing IEEE 802.11 MIMO for Practical Aggregation of LiFi and WiFi", "doi": null, "abstractUrl": "/journal/tm/5555/01/09730055/1BzQ2R83jyM", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2022/9641/0/964100a095", "title": "CTJammer: A Cross-Technology Reactive Jammer towards Unlicensed LTE", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2022/964100a095/1ErrbrkOpoY", "parentPublication": { "id": "proceedings/iotdi/2022/9641/0", "title": "2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09942345", "title": "MOTO: Mobility-Aware Online Task Offloading with Adaptive Load Balancing in Small-Cell MEC", "doi": null, "abstractUrl": "/journal/tm/5555/01/09942345/1I8NT3ZqjjW", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2023/6268/0/10048984", "title": "Abnormal human behavior detection based on VAE-LSTM hybrid model in WiFi CSI with PCA", "doi": null, "abstractUrl": "/proceedings-article/icoin/2023/10048984/1KYsAhooZa0", "parentPublication": { "id": "proceedings/icoin/2023/6268/0", "title": "2023 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/5555/01/10025620", "title": "Toward Multi-User Authentication Using WiFi Signals", "doi": null, "abstractUrl": "/journal/nt/5555/01/10025620/1KcfWmhtCoM", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/02/08884151", "title": "DeepWiFi: Cognitive WiFi with Deep Learning", "doi": null, "abstractUrl": "/journal/tm/2021/02/08884151/1fjdIGCKd6E", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2019/2977/0/297700a001", "title": "A Security Assessment for Consumer WiFi Drones", "doi": null, "abstractUrl": "/proceedings-article/icii/2019/297700a001/1jXvl0SIqk0", "parentPublication": { "id": "proceedings/icii/2019/2977/0", "title": "2019 IEEE International Conference on Industrial Internet (ICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2020/4716/0/09156194", "title": "Performing WiFi Sensing with Off-the-shelf Smartphones", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2020/09156194/1m1jCZgeZO0", "parentPublication": { "id": "proceedings/percom-workshops/2020/4716/0", "title": "2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10081086", "articleId": "1LM6YXiUISY", "__typename": "AdjacentArticleType" }, "next": { "fno": "10080996", "articleId": "1LM6ZbsS2cw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNxvwoOe", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "ts", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1MwAu1wj4Oc", "doi": "10.1109/TSE.2023.3269081", "abstract": "Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and often expressed in higher-level languages or frameworks. State machines have been the go-to language to model behavior for decades, but recently, behavior trees have gained attention among roboticists. Originally designed to model autonomous actors in computer games, behavior trees offer an extensible tree-based representation of missions and are claimed to support modular design and code reuse. Although several implementations of behavior trees are in use, little is known about their usage and scope in the real world. How do concepts offered by behavior trees relate to traditional languages, such as state machines? How are concepts in behavior trees and state machines used in actual applications? This paper is a study of the key language concepts in behavior trees as realized in domain-specific languages (DSLs), internal and external DSLs offered as libraries, and their use in open-source robotic applications supported by the Robot Operating System (ROS). We analyze behavior-tree DSLs and compare them to the standard language for behavior models in robotics: state machines. We identify DSLs for both behavior-modeling languages, and we analyze five in-depth. We mine open-source repositories for robotic applications that use the analyzed DSLs and analyze their usage. We identify similarities between behavior trees and state machines in terms of language design and the concepts offered to accommodate the needs of the robotics domain. We observed that the usage of behavior-tree DSLs in open-source projects is increasing rapidly. We observed similar usage patterns at model structure and at code reuse in the behavior-tree and state-machine models within the mined open-source projects. We contribute all extracted models as a dataset, hoping to inspire the community to use and further develop behavior trees, associated tools, and analysis techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and often expressed in higher-level languages or frameworks. State machines have been the go-to language to model behavior for decades, but recently, behavior trees have gained attention among roboticists. Originally designed to model autonomous actors in computer games, behavior trees offer an extensible tree-based representation of missions and are claimed to support modular design and code reuse. Although several implementations of behavior trees are in use, little is known about their usage and scope in the real world. How do concepts offered by behavior trees relate to traditional languages, such as state machines? How are concepts in behavior trees and state machines used in actual applications? This paper is a study of the key language concepts in behavior trees as realized in domain-specific languages (DSLs), internal and external DSLs offered as libraries, and their use in open-source robotic applications supported by the Robot Operating System (ROS). We analyze behavior-tree DSLs and compare them to the standard language for behavior models in robotics: state machines. We identify DSLs for both behavior-modeling languages, and we analyze five in-depth. We mine open-source repositories for robotic applications that use the analyzed DSLs and analyze their usage. We identify similarities between behavior trees and state machines in terms of language design and the concepts offered to accommodate the needs of the robotics domain. We observed that the usage of behavior-tree DSLs in open-source projects is increasing rapidly. We observed similar usage patterns at model structure and at code reuse in the behavior-tree and state-machine models within the mined open-source projects. We contribute all extracted models as a dataset, hoping to inspire the community to use and further develop behavior trees, associated tools, and analysis techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and often expressed in higher-level languages or frameworks. State machines have been the go-to language to model behavior for decades, but recently, behavior trees have gained attention among roboticists. Originally designed to model autonomous actors in computer games, behavior trees offer an extensible tree-based representation of missions and are claimed to support modular design and code reuse. Although several implementations of behavior trees are in use, little is known about their usage and scope in the real world. How do concepts offered by behavior trees relate to traditional languages, such as state machines? How are concepts in behavior trees and state machines used in actual applications? This paper is a study of the key language concepts in behavior trees as realized in domain-specific languages (DSLs), internal and external DSLs offered as libraries, and their use in open-source robotic applications supported by the Robot Operating System (ROS). We analyze behavior-tree DSLs and compare them to the standard language for behavior models in robotics: state machines. We identify DSLs for both behavior-modeling languages, and we analyze five in-depth. We mine open-source repositories for robotic applications that use the analyzed DSLs and analyze their usage. We identify similarities between behavior trees and state machines in terms of language design and the concepts offered to accommodate the needs of the robotics domain. We observed that the usage of behavior-tree DSLs in open-source projects is increasing rapidly. We observed similar usage patterns at model structure and at code reuse in the behavior-tree and state-machine models within the mined open-source projects. We contribute all extracted models as a dataset, hoping to inspire the community to use and further develop behavior trees, associated tools, and analysis techniques.", "title": "Behavior Trees and State Machines in Robotics Applications", "normalizedTitle": "Behavior Trees and State Machines in Robotics Applications", "fno": "10106642", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Behavioral Sciences", "DSL", "Robots", "Robot Kinematics", "Analytical Models", "Libraries", "Task Analysis", "Behavior Trees", "State Machines", "Robotics Applications", "Usage Patterns", "Exploratory Empirical Study" ], "authors": [ { "givenName": "Razan", "surname": "Ghzouli", "fullName": "Razan Ghzouli", "affiliation": "Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden", "__typename": "ArticleAuthorType" }, { "givenName": "Thorsten", "surname": "Berger", "fullName": "Thorsten Berger", "affiliation": "Faculty of Computer Science, Ruhr University Bochum, Bochum, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Einar Broch", "surname": "Johnsen", "fullName": "Einar Broch Johnsen", "affiliation": "Department of Informatics, University of Oslo, Oslo, Norway", "__typename": "ArticleAuthorType" }, { "givenName": "Andrzej", "surname": "Wasowski", "fullName": "Andrzej Wasowski", "affiliation": "Software Development Group, IT University of Copenhagen, Copenhagen, Denmark", "__typename": "ArticleAuthorType" }, { "givenName": "Swaib", "surname": "Dragule", "fullName": "Swaib Dragule", "affiliation": "Department of Computer Science and Engineering, Chalmers University of Technology Department of Computer Science and Engineering, Goteborg, Sweden", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-24", "year": "5555", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/edoc/2007/2891/0/28910169", "title": "Adding Behavior to Models", "doi": null, "abstractUrl": "/proceedings-article/edoc/2007/28910169/12OmNBbJTnt", "parentPublication": { "id": "proceedings/edoc/2007/2891/0", "title": "11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2006/2671/0/26710115", "title": "RTR-Trees for Space Robotics Behavior Simulation and Visualization", "doi": null, "abstractUrl": "/proceedings-article/cw/2006/26710115/12OmNqFJhEq", "parentPublication": { "id": "proceedings/cw/2006/2671/0", "title": "2006 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsnw/2010/7729/0/05542620", "title": "A translation of State Machines to temporal fault trees", "doi": null, "abstractUrl": "/proceedings-article/dsnw/2010/05542620/12OmNrIrPeq", "parentPublication": { "id": "proceedings/dsnw/2010/7729/0", "title": "Dependable Systems and Networks Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aihas/1994/6440/0/00390503", "title": "Hierarchical, concurrent state machines for behavior modeling and scenario control", "doi": null, "abstractUrl": "/proceedings-article/aihas/1994/00390503/12OmNyywxAz", "parentPublication": { "id": "proceedings/aihas/1994/6440/0", "title": "Fifth Annual Conference on AI, and Planning in High Autonomy Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a190", "title": "On the Appropriateness of Domain-Specific Languages Derived from Different Metamodels", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a190/12OmNz4SOE5", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hase/1997/7971/0/79710094", "title": "Verifying Fault-Tolerant Behavior of State Machines", "doi": null, "abstractUrl": "/proceedings-article/hase/1997/79710094/12OmNzYwc9m", "parentPublication": { "id": "proceedings/hase/1997/7971/0", "title": "Proceedings 1997 High-Assurance Engineering Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ica/2022/6936/0/693600a006", "title": "GORITE: A BDI Realisation of Behavior Trees", "doi": null, "abstractUrl": "/proceedings-article/ica/2022/693600a006/1JvaJ44YwXm", "parentPublication": { "id": "proceedings/ica/2022/6936/0", "title": "2022 IEEE International Conference on Agents (ICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsa-c/2023/6459/0/645900a187", "title": "Towards a Product Line Architecture for Digital Twins", "doi": null, "abstractUrl": "/proceedings-article/icsa-c/2023/645900a187/1MBDf7GAk7u", "parentPublication": { "id": "proceedings/icsa-c/2023/6459/0", "title": "2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsos-c/2020/8414/0/09196470", "title": "A Deep Domain-Specific Model Framework for Self-Reproducing Robotic Control Systems", "doi": null, "abstractUrl": "/proceedings-article/acsos-c/2020/09196470/1n90SdVmhkA", "parentPublication": { "id": "proceedings/acsos-c/2020/8414/0", "title": "2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2020/9532/0/09226336", "title": "Visualizing Multi-dimensional State Spaces Using Selective Abstraction", "doi": null, "abstractUrl": "/proceedings-article/seaa/2020/09226336/1nYsVzRj4qc", "parentPublication": { "id": "proceedings/seaa/2020/9532/0", "title": "2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10103177", "articleId": "1MpWUtj7Rwk", "__typename": "AdjacentArticleType" }, "next": { "fno": "10107709", "articleId": "1MDFCbQt0NG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNwc3wwx", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tq", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1HJuUzzFey4", "doi": "10.1109/TDSC.2022.3216902", "abstract": "Malware variant attacks have been becoming serious threats in the Internet ecosystem. However, prior arts on malware variants detection over-rely on the supervised learning methods to identify the malware variants using a large number of labeled samples, resulting in their inability to detect the few-shot malware without sufficient samples and ground-truth labels. In this paper, we propose FewM-HGCL, a self-supervised <underline>Few</underline>-shot <underline>M</underline>alware variants detection framework based on <underline>H</underline>eterogeneous <underline>G</underline>raph <underline>C</underline>ontrastive <underline>L</underline>earning, which models the execution behavior of each malware variant as a heterogeneous graph and performs graph instance-based discrimination. Particularly, FewM-HGCL first models the execution behavior of each malware variant with a fine-grained attribute heterogeneous graph, which effectively depicts the interactive relationships between malware objects&#x00A0;(<italic>e.g.</italic>, API, process, etc). Then three types of heterogeneous graph data augmentations are proposed, <italic>i.e.</italic>, API attribute masking, interaction enhancing, and meth-path sampling, to generate more robust positive and negative samples for each instance, incorporating semantic prior or structural prior, respectively. Afterward, FewM-HGCL utilizes heterogeneous graph contrastive learning to empower graph attention networks&#x00A0;(GATs) to learn the graph-level representations for few-shot malware variants in a self-supervised manner. Experimental results show that the proposed FewM-HGCL on diverse datasets can achieve 70.47&#x0025;<inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim$_Z</tex-math></inline-formula>98.65&#x0025; accuracy, which are 0.45&#x0025;<inline-formula><tex-math notation=\"LaTeX\">Z_$\\sim$_Z</tex-math></inline-formula>8.46&#x0025; improvements over previous state-of-the-art methods on the few-shot malware variants detection tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Malware variant attacks have been becoming serious threats in the Internet ecosystem. However, prior arts on malware variants detection over-rely on the supervised learning methods to identify the malware variants using a large number of labeled samples, resulting in their inability to detect the few-shot malware without sufficient samples and ground-truth labels. In this paper, we propose FewM-HGCL, a self-supervised <underline>Few</underline>-shot <underline>M</underline>alware variants detection framework based on <underline>H</underline>eterogeneous <underline>G</underline>raph <underline>C</underline>ontrastive <underline>L</underline>earning, which models the execution behavior of each malware variant as a heterogeneous graph and performs graph instance-based discrimination. Particularly, FewM-HGCL first models the execution behavior of each malware variant with a fine-grained attribute heterogeneous graph, which effectively depicts the interactive relationships between malware objects&#x00A0;(<italic>e.g.</italic>, API, process, etc). Then three types of heterogeneous graph data augmentations are proposed, <italic>i.e.</italic>, API attribute masking, interaction enhancing, and meth-path sampling, to generate more robust positive and negative samples for each instance, incorporating semantic prior or structural prior, respectively. Afterward, FewM-HGCL utilizes heterogeneous graph contrastive learning to empower graph attention networks&#x00A0;(GATs) to learn the graph-level representations for few-shot malware variants in a self-supervised manner. Experimental results show that the proposed FewM-HGCL on diverse datasets can achieve 70.47&#x0025;<inline-formula><tex-math notation=\"LaTeX\">$\\sim$</tex-math></inline-formula>98.65&#x0025; accuracy, which are 0.45&#x0025;<inline-formula><tex-math notation=\"LaTeX\">$\\sim$</tex-math></inline-formula>8.46&#x0025; improvements over previous state-of-the-art methods on the few-shot malware variants detection tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Malware variant attacks have been becoming serious threats in the Internet ecosystem. However, prior arts on malware variants detection over-rely on the supervised learning methods to identify the malware variants using a large number of labeled samples, resulting in their inability to detect the few-shot malware without sufficient samples and ground-truth labels. In this paper, we propose FewM-HGCL, a self-supervised Few-shot Malware variants detection framework based on Heterogeneous Graph Contrastive Learning, which models the execution behavior of each malware variant as a heterogeneous graph and performs graph instance-based discrimination. Particularly, FewM-HGCL first models the execution behavior of each malware variant with a fine-grained attribute heterogeneous graph, which effectively depicts the interactive relationships between malware objects (e.g., API, process, etc). Then three types of heterogeneous graph data augmentations are proposed, i.e., API attribute masking, interaction enhancing, and meth-path sampling, to generate more robust positive and negative samples for each instance, incorporating semantic prior or structural prior, respectively. Afterward, FewM-HGCL utilizes heterogeneous graph contrastive learning to empower graph attention networks (GATs) to learn the graph-level representations for few-shot malware variants in a self-supervised manner. Experimental results show that the proposed FewM-HGCL on diverse datasets can achieve 70.47%-98.65% accuracy, which are 0.45%-8.46% improvements over previous state-of-the-art methods on the few-shot malware variants detection tasks.", "title": "FewM-HGCL&#x00A0;:&#x00A0;Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning", "normalizedTitle": "FewM-HGCL : Few-Shot Malware Variants Detection Via Heterogeneous Graph Contrastive Learning", "fno": "09928211", "hasPdf": true, "idPrefix": "tq", "keywords": [ "Malware", "Task Analysis", "Feature Extraction", "Supervised Learning", "Semantics", "Behavioral Sciences", "Training", "Contrastive Learning", "Few Shot Malware Variants Detection", "Graph Embedding", "Heterogeneous Graph Data Augmentation", "Self Supervised Learning" ], "authors": [ { "givenName": "Chen", "surname": "Liu", "fullName": "Chen Liu", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Bo", "surname": "Li", "fullName": "Bo Li", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jun", "surname": "Zhao", "fullName": "Jun Zhao", "affiliation": "School of Information Science and Engineering, Shandong Normal University, Jinan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ziyang", "surname": "Zhen", "fullName": "Ziyang Zhen", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xudong", "surname": "Liu", "fullName": "Xudong Liu", "affiliation": "School of Computer Science and Engineering, Beihang University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qunshi", "surname": "Zhang", "fullName": "Qunshi Zhang", "affiliation": "Beijing Ruihang Zhizhen Technology Co., Ltd, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-10-01 00:00:00", "pubType": "trans", "pages": "1-18", "year": "5555", "issn": "1545-5971", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ctc/2014/8825/0/8825a044", "title": "Mining Malware to Detect Variants", "doi": null, "abstractUrl": "/proceedings-article/ctc/2014/8825a044/12OmNBQkx76", "parentPublication": { "id": "proceedings/ctc/2014/8825/0", "title": "2014 Fifth Cybercrime and Trustworthy Computing Conference (CTC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588867", "title": "Needleman-Wunsch and Smith-Waterman Algorithms for Identifying Viral Polymorphic Malware Variants", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588867/12OmNCesr3I", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0", "title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/malware/2017/1436/0/08323965", "title": "Predicting signatures of future malware variants", "doi": null, "abstractUrl": "/proceedings-article/malware/2017/08323965/12OmNvjgWmK", "parentPublication": { "id": "proceedings/malware/2017/1436/0", "title": "2017 12th International Conference on Malicious and Unwanted Software (MALWARE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nswctc/2010/4011/2/4011b032", "title": "Malware Variants Identification Based on Byte Frequency", "doi": null, "abstractUrl": "/proceedings-article/nswctc/2010/4011b032/12OmNwnYG1Q", "parentPublication": { "id": "proceedings/nswctc/2010/4011/2", "title": "Networks Security, Wireless Communications and Trusted Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2014/6513/0/6513a406", "title": "Detect Android Malware Variants Using Component Based Topology Graph", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2014/6513a406/12OmNynsbBz", "parentPublication": { "id": "proceedings/trustcom/2014/6513/0", "title": "2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pac/2018/8442/0/844200a121", "title": "Malware Variants Detection Using Behavior Destructive Features", "doi": null, "abstractUrl": "/proceedings-article/pac/2018/844200a121/17D45Xctto9", "parentPublication": { "id": "proceedings/pac/2018/8442/0", "title": "2018 IEEE Symposium on Privacy-Aware Computing (PAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09913030", "title": "MalPro: Learning on Process-Aware Behaviors for Malware Detection", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09913030/1HBKlLeaPOE", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a451", "title": "Multi-view Representation Learning from Malware to Defend Against Adversarial Variants", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a451/1KBqXleDboY", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020797", "title": "Unsupervised Learning Approaches for Construction of Malware Families", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020797/1KfT0yQ8PwQ", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a175", "title": "Mal-Bert-GCN: Malware Detection by Combining Bert and GCN", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a175/1LFMagjfyhy", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09927474", "articleId": "1HJuUcRKPo4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09928405", "articleId": "1HJuUINUyM8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1MrBvRmoH0k", "title": "April", "year": "2023", "issueNum": "04", "idPrefix": "ts", "pubType": "journal", "volume": "49", "label": "April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1Ixw0ySXhTy", "doi": "10.1109/TSE.2022.3224053", "abstract": "For most Open Source Software (OSS) projects, issues and Pull-requests (PR) are the primary means by which stakeholders of a project report and discuss software problems and code changes, and their descriptions are important for people to understand them. To help ensure the informational quality of issue/PR descriptions, GitHub introduced the <italic>issue/PR template</italic> feature, which pre-populates the description for anyone trying to open a new issue/PR. To better understand this feature, we report on a large-scale, mixed-methods empirical study of templates that explores contents, impacts, and perceptions. Our results show that templates typically contain elements to greet contributors, explain project guidelines, and collect relevant information. After template adoption, the monthly volume of incoming issues and PRs decreases, and issues have fewer monthly discussion comments and longer resolution duration. Although both contributors and maintainers positively rated the usefulness of templates from various aspects, they also reported challenges in using templates (e.g., excessive and irrelevant information request) and suggested potential improvements of the template feature (e.g., better user interaction and advanced automation). This work contributes to the informed use and targeted improvement of templates to enhance OSS practitioners&#x2019; collaboration and interaction.", "abstracts": [ { "abstractType": "Regular", "content": "For most Open Source Software (OSS) projects, issues and Pull-requests (PR) are the primary means by which stakeholders of a project report and discuss software problems and code changes, and their descriptions are important for people to understand them. To help ensure the informational quality of issue/PR descriptions, GitHub introduced the <italic>issue/PR template</italic> feature, which pre-populates the description for anyone trying to open a new issue/PR. To better understand this feature, we report on a large-scale, mixed-methods empirical study of templates that explores contents, impacts, and perceptions. Our results show that templates typically contain elements to greet contributors, explain project guidelines, and collect relevant information. After template adoption, the monthly volume of incoming issues and PRs decreases, and issues have fewer monthly discussion comments and longer resolution duration. Although both contributors and maintainers positively rated the usefulness of templates from various aspects, they also reported challenges in using templates (e.g., excessive and irrelevant information request) and suggested potential improvements of the template feature (e.g., better user interaction and advanced automation). This work contributes to the informed use and targeted improvement of templates to enhance OSS practitioners&#x2019; collaboration and interaction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For most Open Source Software (OSS) projects, issues and Pull-requests (PR) are the primary means by which stakeholders of a project report and discuss software problems and code changes, and their descriptions are important for people to understand them. To help ensure the informational quality of issue/PR descriptions, GitHub introduced the issue/PR template feature, which pre-populates the description for anyone trying to open a new issue/PR. To better understand this feature, we report on a large-scale, mixed-methods empirical study of templates that explores contents, impacts, and perceptions. Our results show that templates typically contain elements to greet contributors, explain project guidelines, and collect relevant information. After template adoption, the monthly volume of incoming issues and PRs decreases, and issues have fewer monthly discussion comments and longer resolution duration. Although both contributors and maintainers positively rated the usefulness of templates from various aspects, they also reported challenges in using templates (e.g., excessive and irrelevant information request) and suggested potential improvements of the template feature (e.g., better user interaction and advanced automation). This work contributes to the informed use and targeted improvement of templates to enhance OSS practitioners’ collaboration and interaction.", "title": "To Follow or Not to Follow: Understanding <italic>Issue/Pull-Request Templates</italic> on GitHub", "normalizedTitle": "To Follow or Not to Follow: Understanding Issue/Pull-Request Templates on GitHub", "fno": "09961906", "hasPdf": true, "idPrefix": "ts", "keywords": [ "Project Management", "Public Domain Software", "Code Changes", "Excessive Information Request", "Git Hub", "Incoming Issues", "Informational Quality", "Irrelevant Information Request", "Mixed Methods Empirical Study", "Open Source Software Projects", "Project Guidelines", "Project Report", "Pull Requests", "Software Problems", "Template Adoption", "Template Feature", "Codes", "Software Development Management", "Computer Bugs", "Guidelines", "Documentation", "Collaboration", "Behavioral Sciences", "Git Hub", "Issue Template", "Open Source Software", "Pull Request Template" ], "authors": [ { "givenName": "Zhixing", "surname": "Li", "fullName": "Zhixing Li", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yue", "surname": "Yu", "fullName": "Yue Yu", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tao", "surname": "Wang", "fullName": "Tao Wang", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yan", "surname": "Lei", "fullName": "Yan Lei", "affiliation": "School of Big Data and Software Engineering, Chongqing University, Chongqing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ying", "surname": "Wang", "fullName": "Ying Wang", "affiliation": "Software College, Northeasthern University, Shenyang, Liaoning, China", "__typename": "ArticleAuthorType" }, { "givenName": "Huaimin", "surname": "Wang", "fullName": "Huaimin Wang", "affiliation": "College of Computer, National University of Defense Technology, Changsha, Hunan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "04", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "2530-2544", "year": "2023", "issn": "0098-5589", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/msr/2015/5594/0/5594a367", "title": "Wait for It: Determinants of Pull Request Evaluation Latency on GitHub", "doi": null, "abstractUrl": "/proceedings-article/msr/2015/5594a367/12OmNBqMDhn", "parentPublication": { "id": "proceedings/msr/2015/5594/0", "title": "2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2016/4121/0/4121a283", "title": "Requirements Elicitation and Derivation of Security Policy Templates—An Industrial Case Study", "doi": null, "abstractUrl": "/proceedings-article/re/2016/4121a283/12OmNvSKNDl", "parentPublication": { "id": "proceedings/re/2016/4121/0", "title": "2016 IEEE 24th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2013/2144/1/2144a207", "title": "A Controlled Experiment to Assess the Effectiveness of Eight Use Case Templates", "doi": null, "abstractUrl": "/proceedings-article/apsec/2013/2144a207/12OmNxymo9v", "parentPublication": { "id": "proceedings/apsec/2013/2144/1", "title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2022/9303/0/930300a112", "title": "Between JIRA and GitHub: ASFBot and its Influence on Human Comments in Issue Trackers", "doi": null, "abstractUrl": "/proceedings-article/msr/2022/930300a112/1Eo5QvjjIJO", "parentPublication": { "id": "proceedings/msr/2022/9303/0", "title": "2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2018/1970/0/197000a375", "title": "Predicting Which Pull Requests Will Get Reopened in GitHub", "doi": null, "abstractUrl": "/proceedings-article/apsec/2018/197000a375/1b66obe175S", "parentPublication": { "id": "proceedings/apsec/2018/1970/0", "title": "2018 25th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2019/3094/0/309400a286", "title": "Do as I Do, Not as I Say: Do Contribution Guidelines Match the GitHub Contribution Process?", "doi": null, "abstractUrl": "/proceedings-article/icsme/2019/309400a286/1fHlFXK91VS", "parentPublication": { "id": "proceedings/icsme/2019/3094/0", "title": "2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/06/08721092", "title": "A Large Scale Study of Long-Time Contributor Prediction for GitHub Projects", "doi": null, "abstractUrl": "/journal/ts/2021/06/08721092/1mq8n2C4RH2", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2022/01/09273270", "title": "Analyzing First Contributions on GitHub: What Do Newcomers Do?", "doi": null, "abstractUrl": "/magazine/so/2022/01/09273270/1pb9xmhIKLS", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2020/7122/0/712200a116", "title": "An empirical study of the first contributions of developers to open source projects on GitHub", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2020/712200a116/1pcSHSoZWes", "parentPublication": { "id": "proceedings/icse-companion/2020/7122/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/botse/2021/4468/0/446800a021", "title": "Identifying bot activity in GitHub pull request and issue comments", "doi": null, "abstractUrl": "/proceedings-article/botse/2021/446800a021/1v2QlznhKqQ", "parentPublication": { "id": "proceedings/botse/2021/4468/0", "title": "2021 IEEE/ACM Third International Workshop on Bots in Software Engineering (BotSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09960830", "articleId": "1Ixw0IRKPsc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09961946", "articleId": "1Ixw0qwDKnK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "12OmNvTBB8e", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tc", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1MNbTs1XcIM", "doi": "10.1109/TC.2023.3272288", "abstract": "To ensure the performance of large-scale datacenters, operators need to monitor up to tens of millions of various-type KPIs, e.g., CPU utilization, memory utilization. For each KPI, it is crucial but challenging to detect outliers that deviate from its historical patterns or the patterns of other KPIs in the same period. In this work, we propose <italic>OutSpot</italic>, an unsupervised outlier detection framework that integrates hierarchical agglomerative clustering (HAC) with conditional variational autoencoder (CVAE), which significantly improves computational efficiency and comprehensively learns the above two patterns. Additionally, two simple yet effective techniques, soft threshold and median filter, are applied to precisely determine outlier KPIs. Using two real-world datasets collected from the datacenters owned by a top-tier global short video service provider and a top-tier domestic operator,respectively. It demonstrates that <italic>OutSpot</italic> achieves the best F1 score of 0.95 and 0.91, AUC of 0.99 and 0.99 on the two datasets, significantly outperforming seven baseline outlier detection methods.", "abstracts": [ { "abstractType": "Regular", "content": "To ensure the performance of large-scale datacenters, operators need to monitor up to tens of millions of various-type KPIs, e.g., CPU utilization, memory utilization. For each KPI, it is crucial but challenging to detect outliers that deviate from its historical patterns or the patterns of other KPIs in the same period. In this work, we propose <italic>OutSpot</italic>, an unsupervised outlier detection framework that integrates hierarchical agglomerative clustering (HAC) with conditional variational autoencoder (CVAE), which significantly improves computational efficiency and comprehensively learns the above two patterns. Additionally, two simple yet effective techniques, soft threshold and median filter, are applied to precisely determine outlier KPIs. Using two real-world datasets collected from the datacenters owned by a top-tier global short video service provider and a top-tier domestic operator,respectively. It demonstrates that <italic>OutSpot</italic> achieves the best F1 score of 0.95 and 0.91, AUC of 0.99 and 0.99 on the two datasets, significantly outperforming seven baseline outlier detection methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To ensure the performance of large-scale datacenters, operators need to monitor up to tens of millions of various-type KPIs, e.g., CPU utilization, memory utilization. For each KPI, it is crucial but challenging to detect outliers that deviate from its historical patterns or the patterns of other KPIs in the same period. In this work, we propose OutSpot, an unsupervised outlier detection framework that integrates hierarchical agglomerative clustering (HAC) with conditional variational autoencoder (CVAE), which significantly improves computational efficiency and comprehensively learns the above two patterns. Additionally, two simple yet effective techniques, soft threshold and median filter, are applied to precisely determine outlier KPIs. Using two real-world datasets collected from the datacenters owned by a top-tier global short video service provider and a top-tier domestic operator,respectively. It demonstrates that OutSpot achieves the best F1 score of 0.95 and 0.91, AUC of 0.99 and 0.99 on the two datasets, significantly outperforming seven baseline outlier detection methods.", "title": "Efficient and Robust KPI Outlier Detection for Large-Scale Datacenters", "normalizedTitle": "Efficient and Robust KPI Outlier Detection for Large-Scale Datacenters", "fno": "10113794", "hasPdf": true, "idPrefix": "tc", "keywords": [ "Time Series Analysis", "Anomaly Detection", "Behavioral Sciences", "Monitoring", "Computational Modeling", "Training", "Sun", "AI Ops", "Deep Generative Model", "KPI", "Outlier Detection" ], "authors": [ { "givenName": "Yongqian", "surname": "Sun", "fullName": "Yongqian Sun", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Daguo", "surname": "Cheng", "fullName": "Daguo Cheng", "affiliation": "Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tiankai", "surname": "Yang", "fullName": "Tiankai Yang", "affiliation": "Viterbi School of Engineering, University of Southern California, CA, United Stated", "__typename": "ArticleAuthorType" }, { "givenName": "Yuhe", "surname": "Ji", "fullName": "Yuhe Ji", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Shenglin", "surname": "Zhang", "fullName": "Shenglin Zhang", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Man", "surname": "Zhu", "fullName": "Man Zhu", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Xiao", "surname": "Xiong", "fullName": "Xiao Xiong", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Qiliang", "surname": "Fan", "fullName": "Qiliang Fan", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Minghan", "surname": "Liang", "fullName": "Minghan Liang", "affiliation": "College of Software, Nankai University, Tianjin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Dan", "surname": "Pei", "fullName": "Dan Pei", "affiliation": "Department of Computer Science, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tianchi", "surname": "Ma", "fullName": "Tianchi Ma", "affiliation": "Kuaishou Technology, Beijing, China", "__typename": "ArticleAuthorType" }, { "givenName": "Yu", "surname": "Chen", "fullName": "Yu Chen", "affiliation": "Kuaishou Technology, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-04-01 00:00:00", "pubType": "trans", "pages": "1-13", "year": "5555", "issn": "0018-9340", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tp/2023/03/09816125", "title": "<italic>E<inline-formula><tex-math notation=\"LaTeX\">Z_$^{3}$_Z</tex-math></inline-formula>Outlier:</italic> a Self-Supervised Framework for Unsupervised Deep Outlier Detection", "doi": null, "abstractUrl": "/journal/tp/2023/03/09816125/1EMV4w3EOUU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09841025", "title": "Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems", "doi": null, "abstractUrl": "/journal/tq/5555/01/09841025/1Fk7k4lJRWU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d038", "title": "Robust and Explainable Autoencoders for Unsupervised Time Series Outlier Detection", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d038/1FwFhaOOpzi", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2022/8143/0/814300a109", "title": "TS-InvarNet: Anomaly Detection and Localization based on Tempo-spatial KPI Invariants in Distributed Services", "doi": null, "abstractUrl": "/proceedings-article/icws/2022/814300a109/1GIuzX11Kww", "parentPublication": { "id": "proceedings/icws/2022/8143/0", "title": "2022 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2021/8442/0/09910054", "title": "Characterization and Prediction of Deep Learning Workloads in Large-Scale GPU Datacenters", "doi": null, "abstractUrl": "/proceedings-article/sc/2021/09910054/1HzBEP6F3Ik", "parentPublication": { "id": "proceedings/sc/2021/8442/0", "title": "SC21: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2023/03/09976297", "title": "Exploring Memory Access Similarity to Improve Irregular Application Performance for Distributed Hybrid Memory Systems", "doi": null, "abstractUrl": "/journal/td/2023/03/09976297/1IWfP8p5MQ0", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2018/6808/0/08710885", "title": "Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2018/08710885/1axfHQiMSw8", "parentPublication": { "id": "proceedings/ipccc/2018/6808/0", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2019/2616/0/261600a240", "title": "Outlier Removal for the Reliable Condition Monitoring of Telecommunication Services", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2019/261600a240/1iff308COvC", "parentPublication": { "id": "proceedings/pdcat/2019/2616/0", "title": "2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/04/09373923", "title": "Detecting Outlier Machine Instances Through Gaussian Mixture Variational Autoencoder With One Dimensional CNN", "doi": null, "abstractUrl": "/journal/tc/2022/04/09373923/1rPto8xukBq", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2020/8954/0/895400a229", "title": "Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networks", "doi": null, "abstractUrl": "/proceedings-article/nana/2020/895400a229/1rlFa9ywsr6", "parentPublication": { "id": "proceedings/nana/2020/8954/0", "title": "2020 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10113786", "articleId": "1MNbTaZscAE", "__typename": "AdjacentArticleType" }, "next": { "fno": "10113796", "articleId": "1MNbTzIg6Z2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1CdAifRDMY0", "title": "March-April", "year": "2022", "issueNum": "02", "idPrefix": "tb", "pubType": "journal", "volume": "19", "label": "March-April", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1nuwhaK3I2c", "doi": "10.1109/TCBB.2020.3027207", "abstract": "Tree reconciliation is a general framework for investigating the mutual influence between gene and species trees according to the <italic>parsimony principle</italic>, that is, to each evolutionary event a cost is assigned and the goal is to find a reconciliation of minimum total cost. The resulting optimization problem is known as the <italic>reconciliation problem</italic>. Usually, the considered events are: <italic>co-divergence</italic>, gene <italic>Duplication</italic>, <italic>horizontal gene Transfer</italic>, and gene <italic>Loss</italic> (DTL model), while in a more conservative setting, gene transfers are not allowed (DL model). The reconciliation problem requires, in the DL model, time linear in the dimension of the two trees and at least quadratic time in the DTL model. Hence, it is reasonable to argue that the introduction of horizontal gene transfers increases the complexity of the problem. Instead, we introduce horizontal gene transfers with some constraints and prove that the problem is still linear in the dimension of the trees. Namely, we allow gene transfers of length bounded by <inline-formula><tex-math notation=\"LaTeX\">Z_$k=2$_Z</tex-math></inline-formula>, on the basis of the observation that transfers are more likely to occur between closely related species than between distantly related ones. Then we extend the same reasonings to the case in which <inline-formula><tex-math notation=\"LaTeX\">Z_$k&#x003E;2$_Z</tex-math></inline-formula> under additional constrains. In this paper we study also another problem related to the reconciliation one, that is optimally rooting one of the two trees when it is not, and also for it we prove similar results. The relevance of this contribution lies in showing that, in the transit from the DL to the DTL model, the computational time does not increase suddenly to quadratic but remains linear in the case when gene transfers are very short (i.e., happening between very close genes).", "abstracts": [ { "abstractType": "Regular", "content": "Tree reconciliation is a general framework for investigating the mutual influence between gene and species trees according to the <italic>parsimony principle</italic>, that is, to each evolutionary event a cost is assigned and the goal is to find a reconciliation of minimum total cost. The resulting optimization problem is known as the <italic>reconciliation problem</italic>. Usually, the considered events are: <italic>co-divergence</italic>, gene <italic>Duplication</italic>, <italic>horizontal gene Transfer</italic>, and gene <italic>Loss</italic> (DTL model), while in a more conservative setting, gene transfers are not allowed (DL model). The reconciliation problem requires, in the DL model, time linear in the dimension of the two trees and at least quadratic time in the DTL model. Hence, it is reasonable to argue that the introduction of horizontal gene transfers increases the complexity of the problem. Instead, we introduce horizontal gene transfers with some constraints and prove that the problem is still linear in the dimension of the trees. Namely, we allow gene transfers of length bounded by <inline-formula><tex-math notation=\"LaTeX\">$k=2$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"vocca-ieq1-3027207.gif\"/></alternatives></inline-formula>, on the basis of the observation that transfers are more likely to occur between closely related species than between distantly related ones. Then we extend the same reasonings to the case in which <inline-formula><tex-math notation=\"LaTeX\">$k&#x003E;2$</tex-math><alternatives><mml:math><mml:mrow><mml:mi>k</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href=\"vocca-ieq2-3027207.gif\"/></alternatives></inline-formula> under additional constrains. In this paper we study also another problem related to the reconciliation one, that is optimally rooting one of the two trees when it is not, and also for it we prove similar results. The relevance of this contribution lies in showing that, in the transit from the DL to the DTL model, the computational time does not increase suddenly to quadratic but remains linear in the case when gene transfers are very short (i.e., happening between very close genes).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tree reconciliation is a general framework for investigating the mutual influence between gene and species trees according to the parsimony principle, that is, to each evolutionary event a cost is assigned and the goal is to find a reconciliation of minimum total cost. The resulting optimization problem is known as the reconciliation problem. Usually, the considered events are: co-divergence, gene Duplication, horizontal gene Transfer, and gene Loss (DTL model), while in a more conservative setting, gene transfers are not allowed (DL model). The reconciliation problem requires, in the DL model, time linear in the dimension of the two trees and at least quadratic time in the DTL model. Hence, it is reasonable to argue that the introduction of horizontal gene transfers increases the complexity of the problem. Instead, we introduce horizontal gene transfers with some constraints and prove that the problem is still linear in the dimension of the trees. Namely, we allow gene transfers of length bounded by -, on the basis of the observation that transfers are more likely to occur between closely related species than between distantly related ones. Then we extend the same reasonings to the case in which - under additional constrains. In this paper we study also another problem related to the reconciliation one, that is optimally rooting one of the two trees when it is not, and also for it we prove similar results. The relevance of this contribution lies in showing that, in the transit from the DL to the DTL model, the computational time does not increase suddenly to quadratic but remains linear in the case when gene transfers are very short (i.e., happening between very close genes).", "title": "Linear Time Reconciliation With Bounded Transfers of Genes", "normalizedTitle": "Linear Time Reconciliation With Bounded Transfers of Genes", "fno": "09207859", "hasPdf": true, "idPrefix": "tb", "keywords": [ "Vegetation", "Computational Modeling", "Labeling", "Optimization", "Complexity Theory", "Cognition", "Biological System Modeling", "Co Phylogeny", "Reconciliations", "Rooting" ], "authors": [ { "givenName": "Daniele", "surname": "Tavernelli", "fullName": "Daniele Tavernelli", "affiliation": "Department of Computer Science, University of Rome ”Sapienza”, Rome, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Tiziana", "surname": "Calamoneri", "fullName": "Tiziana Calamoneri", "affiliation": "Department of Computer Science, University of Rome ”Sapienza”, Rome, Italy", "__typename": "ArticleAuthorType" }, { "givenName": "Paola", "surname": "Vocca", "fullName": "Paola Vocca", "affiliation": "Department of Humanities, Communication and Tourism of University of Tuscia, University of Tusciavia di Santa Maria in Gradi n°4, Viterbo, Italy", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2022-03-01 00:00:00", "pubType": "trans", "pages": "1009-1017", "year": "2022", "issn": "1545-5963", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "trans/tb/2014/03/06702461", "title": "Effect of Incomplete Lineage Sorting On Tree-Reconciliation-Based Inference of Gene Duplication", "doi": null, "abstractUrl": "/journal/tb/2014/03/06702461/13rRUEgs2Ah", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/04/07937862", "title": "Exact Algorithms for Duplication-Transfer-Loss Reconciliation with Non-Binary Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2019/04/07937862/13rRUNvyarT", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/03/07364179", "title": "On the Complexity of Duplication-Transfer-Loss Reconciliation with Non-Binary Gene Trees", "doi": null, "abstractUrl": "/journal/tb/2017/03/07364179/13rRUwInvdy", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/05/ttb2012051515", "title": "Simultaneous Identification of Duplications, Losses, and Lateral Gene Transfers", "doi": null, "abstractUrl": "/journal/tb/2012/05/ttb2012051515/13rRUy0qnEI", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/07959594", "title": "Gene Tree Construction and Correction Using SuperTree and Reconciliation", "doi": null, "abstractUrl": "/journal/tb/2018/05/07959594/14dcDXLXNjM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/07933200", "title": "Inferring Gene-Species Assignments in the Presence of Horizontal Gene Transfer", "doi": null, "abstractUrl": "/journal/tb/2018/05/07933200/14dcDYg3h6G", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08382181", "title": "An Integrated Reconciliation Framework for Domain, Gene, and Species Level Evolution", "doi": null, "abstractUrl": "/journal/tb/2019/01/08382181/17D45W9KVFu", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2018/5488/0/08621558", "title": "Inferring time-consistent and well-supported horizontal gene transfers", "doi": null, "abstractUrl": "/proceedings-article/bibm/2018/08621558/17D45Xi9rWz", "parentPublication": { "id": "proceedings/bibm/2018/5488/0", "title": "2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/08723596", "title": "The Unconstrained Diameters of the Duplication-Loss Cost and the Loss Cost", "doi": null, "abstractUrl": "/journal/tb/2021/06/08723596/1aqKPHfa8IU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/08840923", "title": "Reconciliation Reconsidered: In Search of a Most Representative Reconciliation in the Duplication-Transfer-Loss Model", "doi": null, "abstractUrl": "/journal/tb/2021/06/08840923/1doNtaoM95C", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09206088", "articleId": "1npxykVK0us", "__typename": "AdjacentArticleType" }, "next": { "fno": "09226060", "articleId": "1nWJCw1HbgY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1yeDpGtSWLm", "title": "Dec.", "year": "2021", "issueNum": "12", "idPrefix": "tp", "pubType": "journal", "volume": "43", "label": "Dec.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1scDnUQn6JW", "doi": "10.1109/TPAMI.2021.3068154", "abstract": "Stochastic gradient descent (SGD) has become the method of choice for training highly complex and nonconvex models since it can not only recover good solutions to minimize training errors but also generalize well. Computational and statistical properties are separately studied to understand the behavior of SGD in the literature. However, there is a lacking study to jointly consider the computational and statistical properties in a nonconvex learning setting. In this paper, we develop novel learning rates of SGD for nonconvex learning by presenting <italic>high-probability</italic> bounds for both computational and statistical errors. We show that the complexity of SGD iterates grows in a controllable manner with respect to the iteration number, which sheds insights on how an implicit regularization can be achieved by tuning the number of passes to balance the computational and statistical errors. As a byproduct, we also slightly refine the existing studies on the uniform convergence of gradients by showing its connection to Rademacher chaos complexities.", "abstracts": [ { "abstractType": "Regular", "content": "Stochastic gradient descent (SGD) has become the method of choice for training highly complex and nonconvex models since it can not only recover good solutions to minimize training errors but also generalize well. Computational and statistical properties are separately studied to understand the behavior of SGD in the literature. However, there is a lacking study to jointly consider the computational and statistical properties in a nonconvex learning setting. In this paper, we develop novel learning rates of SGD for nonconvex learning by presenting <italic>high-probability</italic> bounds for both computational and statistical errors. We show that the complexity of SGD iterates grows in a controllable manner with respect to the iteration number, which sheds insights on how an implicit regularization can be achieved by tuning the number of passes to balance the computational and statistical errors. As a byproduct, we also slightly refine the existing studies on the uniform convergence of gradients by showing its connection to Rademacher chaos complexities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stochastic gradient descent (SGD) has become the method of choice for training highly complex and nonconvex models since it can not only recover good solutions to minimize training errors but also generalize well. Computational and statistical properties are separately studied to understand the behavior of SGD in the literature. However, there is a lacking study to jointly consider the computational and statistical properties in a nonconvex learning setting. In this paper, we develop novel learning rates of SGD for nonconvex learning by presenting high-probability bounds for both computational and statistical errors. We show that the complexity of SGD iterates grows in a controllable manner with respect to the iteration number, which sheds insights on how an implicit regularization can be achieved by tuning the number of passes to balance the computational and statistical errors. As a byproduct, we also slightly refine the existing studies on the uniform convergence of gradients by showing its connection to Rademacher chaos complexities.", "title": "Learning Rates for Stochastic Gradient Descent With Nonconvex Objectives", "normalizedTitle": "Learning Rates for Stochastic Gradient Descent With Nonconvex Objectives", "fno": "09384328", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Chaos", "Concave Programming", "Gradient Methods", "Learning Artificial Intelligence", "Probability", "Stochastic Programming", "Statistical Properties", "Computational Properties", "Nonconvex Learning Setting", "Learning Rates", "High Probability Bounds", "Statistical Errors", "SGD Iterates", "Computational Errors", "Rademacher Chaos Complexities", "Stochastic Gradient Descent", "Nonconvex Objectives", "Complex Models", "Training Errors", "Complexity Theory", "Training Data", "Convergence", "Statistics", "Behavioral Sciences", "Computational Modeling", "Stochastic Processes", "Stochastic Gradient Descent", "Learning Rates", "Nonconvex Optimization", "Early Stopping" ], "authors": [ { "givenName": "Yunwen", "surname": "Lei", "fullName": "Yunwen Lei", "affiliation": "Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Ke", "surname": "Tang", "fullName": "Ke Tang", "affiliation": "Department of Computer Science and Engineering, Guangdong Key Laboratory of Brain-Inspired Intelligent Computation, Southern University of Science and Technology, Shenzhen, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "12", "pubDate": "2021-12-01 00:00:00", "pubType": "trans", "pages": "4505-4511", "year": "2021", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpp/2017/1042/0/1042a011", "title": "An Efficient, Distributed Stochastic Gradient Descent Algorithm for Deep-Learning Applications", "doi": null, "abstractUrl": "/proceedings-article/icpp/2017/1042a011/12OmNvqmULS", "parentPublication": { "id": "proceedings/icpp/2017/1042/0", "title": "2017 46th International Conference on Parallel Processing (ICPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2016/2140/0/2140a873", "title": "High Performance Parallel Stochastic Gradient Descent in Shared Memory", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2016/2140a873/12OmNwHQBcg", "parentPublication": { "id": "proceedings/ipdps/2016/2140/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2017/4892/0/08192502", "title": "Understanding and optimizing asynchronous low-precision stochastic gradient descent", "doi": null, "abstractUrl": "/proceedings-article/isca/2017/08192502/12OmNyqiaRb", "parentPublication": { "id": "proceedings/isca/2017/4892/0", "title": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2018/4368/0/436801a224", "title": "Semantics-Preserving Parallelization of Stochastic Gradient Descent", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2018/436801a224/12OmNzVoBEB", "parentPublication": { "id": "proceedings/ipdps/2018/4368/0", "title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109a424", "title": "Fast Training of Object Detection Using Stochastic Gradient Descent", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a424/12OmNzd7bjw", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/5555/01/09805356", "title": "Parallel Fractional Stochastic Gradient Descent with Adaptive Learning for Recommender Systems", "doi": null, "abstractUrl": "/journal/td/5555/01/09805356/1ErlrfTRsTm", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10076835", "title": "Learning Rates for Nonconvex Pairwise Learning", "doi": null, "abstractUrl": "/journal/tp/5555/01/10076835/1LFPZOSnzhK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006054", "title": "MindTheStep-AsyncPSGD: Adaptive Asynchronous Parallel Stochastic Gradient Descent", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006054/1hJscE05L1K", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378178", "title": "Communication-Efficient Local Stochastic Gradient Descent for Scalable Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378178/1s64pU6rQe4", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2021/1683/0/168300a285", "title": "Adaptive Alternating Stochastic Gradient Descent Algorithms for Large-Scale Latent Factor Analysis", "doi": null, "abstractUrl": "/proceedings-article/scc/2021/168300a285/1yymyAuWwqA", "parentPublication": { "id": "proceedings/scc/2021/1683/0", "title": "2021 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09115277", "articleId": "1kzBYHJhAgE", "__typename": "AdjacentArticleType" }, "next": { "fno": "09366345", "articleId": "1rCc09r8NVu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1yeDu08LOda", "name": "ttp202112-09384328s1-supp1-3068154.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202112-09384328s1-supp1-3068154.pdf", "extension": "pdf", "size": "308 kB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1CdAOlsos6Y", "title": "May", "year": "2022", "issueNum": "05", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "May", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1pg8t3V4Ico", "doi": "10.1109/TPAMI.2020.3042298", "abstract": "How to effectively fuse temporal information from consecutive frames remains to be a non-trivial problem in video super-resolution (SR), since most existing fusion strategies (direct fusion, slow fusion, or 3D convolution) either fail to make full use of temporal information or cost too much calculation. To this end, we propose a novel progressive fusion network for video SR, in which frames are processed in a way of progressive separation and fusion for the thorough utilization of spatio-temporal information. We particularly incorporate multi-scale structure and hybrid convolutions into the network to capture a wide range of dependencies. We further propose a non-local operation to extract long-range spatio-temporal correlations directly, taking place of traditional motion estimation and motion compensation (ME&#x0026;MC). This design relieves the complicated ME&#x0026;MC algorithms, but enjoys better performance than various ME&#x0026;MC schemes. Finally, we improve generative adversarial training for video SR to avoid temporal artifacts such as flickering and ghosting. In particular, we propose a frame variation loss with a single-sequence training method to generate more realistic and temporally consistent videos. Extensive experiments on public datasets show the superiority of our method over state-of-the-art methods in terms of performance and complexity. Our code is available at <uri>https://github.com/psychopa4/MSHPFNL</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "How to effectively fuse temporal information from consecutive frames remains to be a non-trivial problem in video super-resolution (SR), since most existing fusion strategies (direct fusion, slow fusion, or 3D convolution) either fail to make full use of temporal information or cost too much calculation. To this end, we propose a novel progressive fusion network for video SR, in which frames are processed in a way of progressive separation and fusion for the thorough utilization of spatio-temporal information. We particularly incorporate multi-scale structure and hybrid convolutions into the network to capture a wide range of dependencies. We further propose a non-local operation to extract long-range spatio-temporal correlations directly, taking place of traditional motion estimation and motion compensation (ME&#x0026;MC). This design relieves the complicated ME&#x0026;MC algorithms, but enjoys better performance than various ME&#x0026;MC schemes. Finally, we improve generative adversarial training for video SR to avoid temporal artifacts such as flickering and ghosting. In particular, we propose a frame variation loss with a single-sequence training method to generate more realistic and temporally consistent videos. Extensive experiments on public datasets show the superiority of our method over state-of-the-art methods in terms of performance and complexity. Our code is available at <uri>https://github.com/psychopa4/MSHPFNL</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "How to effectively fuse temporal information from consecutive frames remains to be a non-trivial problem in video super-resolution (SR), since most existing fusion strategies (direct fusion, slow fusion, or 3D convolution) either fail to make full use of temporal information or cost too much calculation. To this end, we propose a novel progressive fusion network for video SR, in which frames are processed in a way of progressive separation and fusion for the thorough utilization of spatio-temporal information. We particularly incorporate multi-scale structure and hybrid convolutions into the network to capture a wide range of dependencies. We further propose a non-local operation to extract long-range spatio-temporal correlations directly, taking place of traditional motion estimation and motion compensation (ME&MC). This design relieves the complicated ME&MC algorithms, but enjoys better performance than various ME&MC schemes. Finally, we improve generative adversarial training for video SR to avoid temporal artifacts such as flickering and ghosting. In particular, we propose a frame variation loss with a single-sequence training method to generate more realistic and temporally consistent videos. Extensive experiments on public datasets show the superiority of our method over state-of-the-art methods in terms of performance and complexity. Our code is available at https://github.com/psychopa4/MSHPFNL.", "title": "A Progressive Fusion Generative Adversarial Network for Realistic and Consistent Video Super-Resolution", "normalizedTitle": "A Progressive Fusion Generative Adversarial Network for Realistic and Consistent Video Super-Resolution", "fno": "09279273", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Training", "Convolution", "Three Dimensional Displays", "Image Reconstruction", "Gallium Nitride", "Neural Networks", "Generative Adversarial Networks", "Convolutional Neural Network", "Video Super Resolution", "Spatio Temporal Correlation", "Progressive Fusion", "Generative Adversarial Network" ], "authors": [ { "givenName": "Peng", "surname": "Yi", "fullName": "Peng Yi", "affiliation": "National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Zhongyuan", "surname": "Wang", "fullName": "Zhongyuan Wang", "affiliation": "National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Kui", "surname": "Jiang", "fullName": "Kui Jiang", "affiliation": "National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Junjun", "surname": "Jiang", "fullName": "Junjun Jiang", "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China", "__typename": "ArticleAuthorType" }, { "givenName": "Tao", "surname": "Lu", "fullName": "Tao Lu", "affiliation": "School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiayi", "surname": "Ma", "fullName": "Jiayi Ma", "affiliation": "Electronic Information School, Wuhan University, Wuhan, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "05", "pubDate": "2022-05-01 00:00:00", "pubType": "trans", "pages": "2264-2280", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545119", "title": "Global and Local Consistent Age Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545119/17D45WaTkgS", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a085", "title": "SR-GAN: Semantic Rectifying Generative Adversarial Network for Zero-shot Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a085/1cdOFENHcMU", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aike/2019/1488/0/148800a289", "title": "Realistic Data Synthesis Using Enhanced Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/aike/2019/148800a289/1ckrzXV9yKI", "parentPublication": { "id": "proceedings/aike/2019/1488/0", "title": "2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300d106", "title": "Progressive Fusion Video Super-Resolution Network via Exploiting Non-Local Spatio-Temporal Correlations", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300d106/1hVlyqOKEVy", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d599", "title": "Frequency Separation for Real-World Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d599/1i5mH5rN1UA", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b814", "title": "Exemplar Guided Face Image Super-Resolution Without Facial Landmarks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b814/1iTveowyDuM", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102972", "title": "Multiresolution Mixture Generative Adversarial Network For Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102972/1kwrfPvRRkI", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151093", "title": "Unsupervised Single Image Super-Resolution Network (USISResNet) for Real-World Data Using Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151093/1lPH5eaPgA0", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150661", "title": "Real-World Super-Resolution using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150661/1lPH66Ff2HS", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150306", "title": "Latent Fingerprint Image Enhancement Based on Progressive Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150306/1lPHiGvS7Vm", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09242263", "articleId": "1oijqE4UVeU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09311398", "articleId": "1pYWGQi1oY0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1CdAQzS79Bu", "name": "ttp202205-09279273s1-supp2-3042298.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202205-09279273s1-supp2-3042298.mp4", "extension": "mp4", "size": "37.9 MB", "__typename": "WebExtraType" }, { "id": "1CdAR3ONnpu", "name": "ttp202205-09279273s1-supp1-3042298.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202205-09279273s1-supp1-3042298.mp4", "extension": "mp4", "size": "32.4 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "1zBamVZHyne", "title": "Jan.", "year": "2022", "issueNum": "01", "idPrefix": "tg", "pubType": "journal", "volume": "28", "label": "Jan.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1xic3zJwVwI", "doi": "10.1109/TVCG.2021.3114870", "abstract": "Embeddings of high-dimensional data are widely used to explore data, to verify analysis results, and to communicate information. Their explanation, in particular with respect to the input attributes, is often difficult. With linear projects like PCA the axes can still be annotated meaningfully. With non-linear projections this is no longer possible and alternative strategies such as attribute-based color coding are required. In this paper, we review existing augmentation techniques and discuss their limitations. We present the Non-Linear Embeddings Surveyor (NoLiES) that combines a novel augmentation strategy for projected data (rangesets) with interactive analysis in a small multiples setting. Rangesets use a set-based visualization approach for binned attribute values that enable the user to quickly observe structure and detect outliers. We detail the link between algebraic topology and rangesets and demonstrate the utility of NoLiES in case studies with various challenges (complex attribute value distribution, many attributes, many data points) and a real-world application to understand latent features of matrix completion in thermodynamics.", "abstracts": [ { "abstractType": "Regular", "content": "Embeddings of high-dimensional data are widely used to explore data, to verify analysis results, and to communicate information. Their explanation, in particular with respect to the input attributes, is often difficult. With linear projects like PCA the axes can still be annotated meaningfully. With non-linear projections this is no longer possible and alternative strategies such as attribute-based color coding are required. In this paper, we review existing augmentation techniques and discuss their limitations. We present the Non-Linear Embeddings Surveyor (NoLiES) that combines a novel augmentation strategy for projected data (rangesets) with interactive analysis in a small multiples setting. Rangesets use a set-based visualization approach for binned attribute values that enable the user to quickly observe structure and detect outliers. We detail the link between algebraic topology and rangesets and demonstrate the utility of NoLiES in case studies with various challenges (complex attribute value distribution, many attributes, many data points) and a real-world application to understand latent features of matrix completion in thermodynamics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Embeddings of high-dimensional data are widely used to explore data, to verify analysis results, and to communicate information. Their explanation, in particular with respect to the input attributes, is often difficult. With linear projects like PCA the axes can still be annotated meaningfully. With non-linear projections this is no longer possible and alternative strategies such as attribute-based color coding are required. In this paper, we review existing augmentation techniques and discuss their limitations. We present the Non-Linear Embeddings Surveyor (NoLiES) that combines a novel augmentation strategy for projected data (rangesets) with interactive analysis in a small multiples setting. Rangesets use a set-based visualization approach for binned attribute values that enable the user to quickly observe structure and detect outliers. We detail the link between algebraic topology and rangesets and demonstrate the utility of NoLiES in case studies with various challenges (complex attribute value distribution, many attributes, many data points) and a real-world application to understand latent features of matrix completion in thermodynamics.", "title": "Attribute-based Explanation of Non-Linear Embeddings of High-Dimensional Data", "normalizedTitle": "Attribute-based Explanation of Non-Linear Embeddings of High-Dimensional Data", "fno": "09552929", "hasPdf": true, "idPrefix": "tg", "keywords": [ "Data Visualization", "Visualization", "Task Analysis", "Data Analysis", "Topology", "Image Color Analysis", "Dimensionality Reduction", "Embedding", "Augmented Projections", "Point Set Contours", "Explainable Artificial Intelligence" ], "authors": [ { "givenName": "Jan-Tobias", "surname": "Sohns", "fullName": "Jan-Tobias Sohns", "affiliation": "Visual Information Analysis group at TU Kaiserslautern, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Michaela", "surname": "Schmitt", "fullName": "Michaela Schmitt", "affiliation": "Visual Information Analysis group at TU Kaiserslautern, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Fabian", "surname": "Jirasek", "fullName": "Fabian Jirasek", "affiliation": "Laboratory of Engineering Thermodynamics (LTD) at TU Kaiserslautern, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Hans", "surname": "Hasse", "fullName": "Hans Hasse", "affiliation": "Laboratory of Engineering Thermodynamics (LTD) at TU Kaiserslautern, Germany", "__typename": "ArticleAuthorType" }, { "givenName": "Heike", "surname": "Leitte", "fullName": "Heike Leitte", "affiliation": "Visual Information Analysis group at TU Kaiserslautern, Germany", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2022-01-01 00:00:00", "pubType": "trans", "pages": "540-550", "year": "2022", "issn": "1077-2626", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2003/2055/0/20550016", "title": "Visualization of Labeled Data Using Linear Transformations", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550016/12OmNyQGRZi", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/04/v0459", "title": "Robust Linear Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tg/2004/04/v0459/13rRUxBJhFl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a011", "title": "Incorporating Texture Information into Dimensionality Reduction for High-Dimensional Images", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a011/1E2wiOFBEbe", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903343", "title": "RankAxis: Towards a Systematic Combination of Projection and Ranking in Multi-Attribute Data Exploration", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903343/1GZooOkjYzK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09930144", "title": "Out of the Plane: Flower Vs. Star Glyphs to Support High-Dimensional Exploration in Two-Dimensional Embeddings", "doi": null, "abstractUrl": "/journal/tg/5555/01/09930144/1HMOX2J2VMY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300b783", "title": "Triplet-Aware Scene Graph Embeddings", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300b783/1i5mEq1Ubfy", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09128033", "title": "Interpretation of Structural Preservation in Low-Dimensional Embeddings", "doi": null, "abstractUrl": "/journal/tk/2022/05/09128033/1l3u8JV5SP6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/08/09301222", "title": "<italic>embComp</italic>: Visual Interactive Comparison of Vector Embeddings", "doi": null, "abstractUrl": "/journal/tg/2022/08/09301222/1pK0Opgn59m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2020/9153/0/915300a007", "title": "Bio-inspired Structure Identification in Language Embeddings", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2020/915300a007/1pZ0Xs0EEqk", "parentPublication": { "id": "proceedings/vis4dh/2020/9153/0", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377769", "title": "Towards Tabular Embeddings, Training the Relational Models", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377769/1s64KLHTXHi", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09552226", "articleId": "1xicaXrIayI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09552206", "articleId": "1xic9jxItoI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1zBaLr248De", "name": "ttg202201-09552929s1-supp2-3114870.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552929s1-supp2-3114870.pdf", "extension": "pdf", "size": "11.8 MB", "__typename": "WebExtraType" }, { "id": "1zBaLB1ItA4", "name": "ttg202201-09552929s1-supp1-3114870.mp4", "location": "https://www.computer.org/csdl/api/v1/extra/ttg202201-09552929s1-supp1-3114870.mp4", "extension": "mp4", "size": "30.8 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxvO04X", "title": "PrePrints", "year": "5555", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": null, "label": "PrePrints", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1KxPVE9pkxG", "doi": "10.1109/TPAMI.2023.3242709", "abstract": "Existing image-based rendering methods usually adopt depth-based image warping operation to synthesize novel views. In this paper, we reason the essential limitations of the traditional warping operation to be the limited neighborhood and only distance-based interpolation weights. To this end, we propose <italic>content-aware warping</italic>, which adaptively learns the interpolation weights for pixels of a relatively large neighborhood from their contextual information via a lightweight neural network. Based on this learnable warping module, we propose a new end-to-end learning-based framework for novel view synthesis from a set of input source views, in which two additional modules, namely confidence-based blending and feature-assistant spatial refinement, are naturally proposed to handle the occlusion issue and capture the spatial correlation among pixels of the synthesized view, respectively. Besides, we also propose a weight-smoothness loss term to regularize the network. Experimental results on light field datasets with wide baselines and multi-view datasets show that the proposed method significantly outperforms state-of-the-art methods both quantitatively and visually. The source code will be publicly available at <uri>https://github.com/MantangGuo/CW4VS</uri>.", "abstracts": [ { "abstractType": "Regular", "content": "Existing image-based rendering methods usually adopt depth-based image warping operation to synthesize novel views. In this paper, we reason the essential limitations of the traditional warping operation to be the limited neighborhood and only distance-based interpolation weights. To this end, we propose <italic>content-aware warping</italic>, which adaptively learns the interpolation weights for pixels of a relatively large neighborhood from their contextual information via a lightweight neural network. Based on this learnable warping module, we propose a new end-to-end learning-based framework for novel view synthesis from a set of input source views, in which two additional modules, namely confidence-based blending and feature-assistant spatial refinement, are naturally proposed to handle the occlusion issue and capture the spatial correlation among pixels of the synthesized view, respectively. Besides, we also propose a weight-smoothness loss term to regularize the network. Experimental results on light field datasets with wide baselines and multi-view datasets show that the proposed method significantly outperforms state-of-the-art methods both quantitatively and visually. The source code will be publicly available at <uri>https://github.com/MantangGuo/CW4VS</uri>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Existing image-based rendering methods usually adopt depth-based image warping operation to synthesize novel views. In this paper, we reason the essential limitations of the traditional warping operation to be the limited neighborhood and only distance-based interpolation weights. To this end, we propose content-aware warping, which adaptively learns the interpolation weights for pixels of a relatively large neighborhood from their contextual information via a lightweight neural network. Based on this learnable warping module, we propose a new end-to-end learning-based framework for novel view synthesis from a set of input source views, in which two additional modules, namely confidence-based blending and feature-assistant spatial refinement, are naturally proposed to handle the occlusion issue and capture the spatial correlation among pixels of the synthesized view, respectively. Besides, we also propose a weight-smoothness loss term to regularize the network. Experimental results on light field datasets with wide baselines and multi-view datasets show that the proposed method significantly outperforms state-of-the-art methods both quantitatively and visually. The source code will be publicly available at https://github.com/MantangGuo/CW4VS.", "title": "Content-aware Warping for View Synthesis", "normalizedTitle": "Content-aware Warping for View Synthesis", "fno": "10038566", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Interpolation", "Image Reconstruction", "Learning Systems", "Rendering Computer Graphics", "Neural Networks", "Light Fields", "Estimation", "View Synthesis", "Light Field", "Deep Learning", "Image Warping", "Depth Disparity" ], "authors": [ { "givenName": "Mantang", "surname": "Guo", "fullName": "Mantang Guo", "affiliation": "Department of Computer Science, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Junhui", "surname": "Hou", "fullName": "Junhui Hou", "affiliation": "Department of Computer Science, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Jing", "surname": "Jin", "fullName": "Jing Jin", "affiliation": "Department of Computer Science, City University of Hong Kong, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Hui", "surname": "Liu", "fullName": "Hui Liu", "affiliation": "School of Computing & Information Sciences, Caritas Institute of Higher Education, Hong Kong", "__typename": "ArticleAuthorType" }, { "givenName": "Huanqiang", "surname": "Zeng", "fullName": "Huanqiang Zeng", "affiliation": "School of Information Science and Engineering, Huaqiao University, Xiamen, China", "__typename": "ArticleAuthorType" }, { "givenName": "Jiwen", "surname": "Lu", "fullName": "Jiwen Lu", "affiliation": "Department of Automation, Tsinghua University, Beijing, China", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2023-02-01 00:00:00", "pubType": "trans", "pages": "1-18", "year": "5555", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/icip/1994/6952/1/00413331", "title": "An image warping approach to image sequence interpolation", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413331/12OmNBhHtcm", "parentPublication": { "id": "proceedings/icip/1994/6952/3", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1999/0149/1/01491388", "title": "Interpolating View and Scene Motion by Dynamic View Morphing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1999/01491388/12OmNwfKjap", "parentPublication": { "id": "proceedings/cvpr/1999/0149/2", "title": "Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dimpvt/2012/4873/0/4873a270", "title": "Uncalibrated View Synthesis with Homography Interpolation", "doi": null, "abstractUrl": "/proceedings-article/3dimpvt/2012/4873a270/12OmNy2agZT", "parentPublication": { "id": "proceedings/3dimpvt/2012/4873/0", "title": "2012 Second International Conference on 3D Imaging, Modeling, Processing, Visualization & Transmission", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/2/02530672", "title": "Virtual View Synthesis from Uncalibrated Stereo Cameras", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02530672/12OmNzC5SPA", "parentPublication": { "id": "proceedings/icmcs/1999/0253/2", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1995/02/mcg1995020037", "title": "Image Warping with Scattered Data Interpolation", "doi": null, "abstractUrl": "/magazine/cg/1995/02/mcg1995020037/13rRUB6SpR2", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09928218", "title": "Metameric Inpainting for Image Warping", "doi": null, "abstractUrl": "/journal/tg/5555/01/09928218/1HJuJYF342Y", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/06/09931981", "title": "NeX360: Real-Time All-Around View Synthesis With Neural Basis Expansion", "doi": null, "abstractUrl": "/journal/tp/2023/06/09931981/1HQ85VfOvkI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1997/7761/0/00582124", "title": "Parametric warping for motion estimation", "doi": null, "abstractUrl": "/proceedings-article/dcc/1997/00582124/1dPod9utbMs", "parentPublication": { "id": "proceedings/dcc/1997/7761/0", "title": "Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2020/1485/0/09106041", "title": "A Benchmark of Light Field View Interpolation Methods", "doi": null, "abstractUrl": "/proceedings-article/icmew/2020/09106041/1kwqyUmJPIk", "parentPublication": { "id": "proceedings/icmew/2020/1485/0", "title": "2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428254", "title": "BWIN: A Bilateral Warping Method for Video Frame Interpolation", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428254/1uim3aLZCZq", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "10036136", "articleId": "1KsSqwx1dhC", "__typename": "AdjacentArticleType" }, "next": { "fno": "10038534", "articleId": "1KxPVQu6GXu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1KzA09OATOE", "name": "ttp555501-010038566s1-supp1-3242709.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp555501-010038566s1-supp1-3242709.pdf", "extension": "pdf", "size": "26.9 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNxA3Z0G", "title": "Feb.", "year": "2019", "issueNum": "02", "idPrefix": "td", "pubType": "journal", "volume": "30", "label": "Feb.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "17D45XuDNFo", "doi": "10.1109/TPDS.2018.2859932", "abstract": "An effective data compressor is becoming increasingly critical to today&#x0027;s scientific research, and many lossy compressors are developed in the context of absolute error bounds. Based on physical/chemical definitions of simulation fields or multiresolution demand, however, many scientific applications need to compress the data with a pointwise relative error bound (i.e., the smaller the data value, the smaller the compression error to tolerate). To this end, we propose two optimized lossy compression strategies under a state-of-the-art three-staged compression framework (prediction + quantization + entropy-encoding). The first strategy (called block-based strategy) splits the data set into many small blocks and computes an absolute error bound for each block, so it is particularly suitable for the data with relatively high consecutiveness in space. The second strategy (called multi-threshold-based strategy) splits the whole value range into multiple groups with exponentially increasing thresholds and performs the compression in each group separately, which is particularly suitable for the data with a relatively large value range and spiky value changes. We implement the two strategies rigorously and evaluate them comprehensively by using two scientific applications which both require lossy compression with point-wise relative error bound. Experiments show that the two strategies exhibit the best compression qualities on different types of data sets respectively. The compression ratio of our lossy compressor is higher than that of other state-of-the-art compressors by 17.2&#x2013;618 percent on the climate simulation data and 30&#x2013;210 percent on the N-body simulation data, with the same relative error bound and without degradation of the overall visualization effect of the entire data.", "abstracts": [ { "abstractType": "Regular", "content": "An effective data compressor is becoming increasingly critical to today&#x0027;s scientific research, and many lossy compressors are developed in the context of absolute error bounds. Based on physical/chemical definitions of simulation fields or multiresolution demand, however, many scientific applications need to compress the data with a pointwise relative error bound (i.e., the smaller the data value, the smaller the compression error to tolerate). To this end, we propose two optimized lossy compression strategies under a state-of-the-art three-staged compression framework (prediction + quantization + entropy-encoding). The first strategy (called block-based strategy) splits the data set into many small blocks and computes an absolute error bound for each block, so it is particularly suitable for the data with relatively high consecutiveness in space. The second strategy (called multi-threshold-based strategy) splits the whole value range into multiple groups with exponentially increasing thresholds and performs the compression in each group separately, which is particularly suitable for the data with a relatively large value range and spiky value changes. We implement the two strategies rigorously and evaluate them comprehensively by using two scientific applications which both require lossy compression with point-wise relative error bound. Experiments show that the two strategies exhibit the best compression qualities on different types of data sets respectively. The compression ratio of our lossy compressor is higher than that of other state-of-the-art compressors by 17.2&#x2013;618 percent on the climate simulation data and 30&#x2013;210 percent on the N-body simulation data, with the same relative error bound and without degradation of the overall visualization effect of the entire data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An effective data compressor is becoming increasingly critical to today's scientific research, and many lossy compressors are developed in the context of absolute error bounds. Based on physical/chemical definitions of simulation fields or multiresolution demand, however, many scientific applications need to compress the data with a pointwise relative error bound (i.e., the smaller the data value, the smaller the compression error to tolerate). To this end, we propose two optimized lossy compression strategies under a state-of-the-art three-staged compression framework (prediction + quantization + entropy-encoding). The first strategy (called block-based strategy) splits the data set into many small blocks and computes an absolute error bound for each block, so it is particularly suitable for the data with relatively high consecutiveness in space. The second strategy (called multi-threshold-based strategy) splits the whole value range into multiple groups with exponentially increasing thresholds and performs the compression in each group separately, which is particularly suitable for the data with a relatively large value range and spiky value changes. We implement the two strategies rigorously and evaluate them comprehensively by using two scientific applications which both require lossy compression with point-wise relative error bound. Experiments show that the two strategies exhibit the best compression qualities on different types of data sets respectively. The compression ratio of our lossy compressor is higher than that of other state-of-the-art compressors by 17.2–618 percent on the climate simulation data and 30–210 percent on the N-body simulation data, with the same relative error bound and without degradation of the overall visualization effect of the entire data.", "title": "Efficient Lossy Compression for Scientific Data Based on Pointwise Relative Error Bound", "normalizedTitle": "Efficient Lossy Compression for Scientific Data Based on Pointwise Relative Error Bound", "fno": "08421751", "hasPdf": true, "idPrefix": "td", "keywords": [ "Data Models", "Quantization Signal", "Meteorology", "Computational Modeling", "Error Correction", "Wavelet Transforms", "Lossy Compression", "Science Data", "High Performance Computing", "Relative Error Bound" ], "authors": [ { "givenName": "Sheng", "surname": "Di", "fullName": "Sheng Di", "affiliation": "Mathematics and Computer Science (MCS) Division, Argonne National Laboratory, Lemont, IL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Dingwen", "surname": "Tao", "fullName": "Dingwen Tao", "affiliation": "Department of Computer Science, University of Alabama, Tuscaloosa, AL, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Xin", "surname": "Liang", "fullName": "Xin Liang", "affiliation": "Computer Science Department, University of California, Riverside, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Franck", "surname": "Cappello", "fullName": "Franck Cappello", "affiliation": "Mathematics and Computer Science (MCS) Division, Argonne National Laboratory, Lemont, IL, USA", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "02", "pubDate": "2019-02-01 00:00:00", "pubType": "trans", "pages": "331-345", "year": "2019", "issn": "1045-9219", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2017/2715/0/08258504", "title": "Understanding the impact of lossy compressions on IoT smart farm analytics", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258504/17D45VWpMzA", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2018/8319/0/831900a179", "title": "An Efficient Transformation Scheme for Lossy Data Compression with Point-Wise Relative Error Bound", "doi": null, "abstractUrl": "/proceedings-article/cluster/2018/831900a179/17D45W2Wyz4", "parentPublication": { "id": "proceedings/cluster/2018/8319/0", "title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2018/8319/0/831900a314", "title": "Fixed-PSNR Lossy Compression for Scientific Data", "doi": null, "abstractUrl": "/proceedings-article/cluster/2018/831900a314/17D45WYQJ7B", "parentPublication": { "id": "proceedings/cluster/2018/8319/0", "title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09844293", "title": "Optimizing Error-Bounded Lossy Compression for Scientific Data With Diverse Constraints", "doi": null, "abstractUrl": "/journal/td/2022/12/09844293/1Fnr0Jwge9W", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a892", "title": "Dynamic Quality Metric Oriented Error Bounded Lossy Compression for Scientific Datasets", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a892/1I0bT6kfcas", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020345", "title": "Towards Guaranteeing Error Bound in DCT-based Lossy Compression", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020345/1KfSYuOtYaI", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msst/2019/3920/0/392000a065", "title": "Accelerating Relative-error Bounded Lossy Compression for HPC datasets with Precomputation-Based Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/msst/2019/392000a065/1eEUKLdkoV2", "parentPublication": { "id": "proceedings/msst/2019/3920/0", "title": "2019 35th Symposium on Mass Storage Systems and Technologies (MSST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/07/08989806", "title": "Performance Optimization for Relative-Error-Bounded Lossy Compression on Scientific Data", "doi": null, "abstractUrl": "/journal/td/2020/07/08989806/1hlpwaAlRGE", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139812", "title": "FRaZ: A Generic High-Fidelity Fixed-Ratio Lossy Compression Framework for Scientific Floating-point Data", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139812/1lss8nVQuis", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/drbsd-7/2021/8672/0/867200a047", "title": "Exploring Lossy Compressibility through Statistical Correlations of Scientific Datasets", "doi": null, "abstractUrl": "/proceedings-article/drbsd-7/2021/867200a047/1zHIxDorB1C", "parentPublication": { "id": "proceedings/drbsd-7/2021/8672/0", "title": "2021 7th International Workshop on Data Analysis and Reduction for Big Scientific Data (DRBSD-7)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "08428449", "articleId": "17D45Vw15xo", "__typename": "AdjacentArticleType" }, "next": { "fno": "08434315", "articleId": "17D45VsBU3T", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }
{ "issue": { "id": "1Hcio5iMQBW", "title": "Nov.", "year": "2022", "issueNum": "11", "idPrefix": "tp", "pubType": "journal", "volume": "44", "label": "Nov.", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "1wkrnHyoWAw", "doi": "10.1109/TPAMI.2021.3106790", "abstract": "Most image super-resolution (SR) methods are developed on synthetic low-resolution (LR) and high-resolution (HR) image pairs that are constructed by a predetermined operation, e.g., bicubic downsampling. As existing methods typically learn an inverse mapping of the specific function, they produce blurry results when applied to real-world images whose exact formulation is different and unknown. Therefore, several methods attempt to synthesize much more diverse LR samples or learn a realistic downsampling model. However, due to restrictive assumptions on the downsampling process, they are still biased and less generalizable. This study proposes a novel method to simulate an unknown downsampling process without imposing restrictive prior knowledge. We propose a generalizable low-frequency loss (LFL) in the adversarial training framework to imitate the distribution of target LR images without using any paired examples. Furthermore, we design an adaptive data loss (ADL) for the downsampler, which can be adaptively learned and updated from the data during the training loops. Extensive experiments validate that our downsampling model can facilitate existing SR methods to perform more accurate reconstructions on various synthetic and real-world examples than the conventional approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Most image super-resolution (SR) methods are developed on synthetic low-resolution (LR) and high-resolution (HR) image pairs that are constructed by a predetermined operation, e.g., bicubic downsampling. As existing methods typically learn an inverse mapping of the specific function, they produce blurry results when applied to real-world images whose exact formulation is different and unknown. Therefore, several methods attempt to synthesize much more diverse LR samples or learn a realistic downsampling model. However, due to restrictive assumptions on the downsampling process, they are still biased and less generalizable. This study proposes a novel method to simulate an unknown downsampling process without imposing restrictive prior knowledge. We propose a generalizable low-frequency loss (LFL) in the adversarial training framework to imitate the distribution of target LR images without using any paired examples. Furthermore, we design an adaptive data loss (ADL) for the downsampler, which can be adaptively learned and updated from the data during the training loops. Extensive experiments validate that our downsampling model can facilitate existing SR methods to perform more accurate reconstructions on various synthetic and real-world examples than the conventional approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most image super-resolution (SR) methods are developed on synthetic low-resolution (LR) and high-resolution (HR) image pairs that are constructed by a predetermined operation, e.g., bicubic downsampling. As existing methods typically learn an inverse mapping of the specific function, they produce blurry results when applied to real-world images whose exact formulation is different and unknown. Therefore, several methods attempt to synthesize much more diverse LR samples or learn a realistic downsampling model. However, due to restrictive assumptions on the downsampling process, they are still biased and less generalizable. This study proposes a novel method to simulate an unknown downsampling process without imposing restrictive prior knowledge. We propose a generalizable low-frequency loss (LFL) in the adversarial training framework to imitate the distribution of target LR images without using any paired examples. Furthermore, we design an adaptive data loss (ADL) for the downsampler, which can be adaptively learned and updated from the data during the training loops. Extensive experiments validate that our downsampling model can facilitate existing SR methods to perform more accurate reconstructions on various synthetic and real-world examples than the conventional approaches.", "title": "Toward Real-World Super-Resolution via Adaptive Downsampling Models", "normalizedTitle": "Toward Real-World Super-Resolution via Adaptive Downsampling Models", "fno": "09521710", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Image Enhancement", "Image Reconstruction", "Image Resolution", "Image Restoration", "Image Sampling", "Image Sensors", "Learning Artificial Intelligence", "Real World Examples", "Toward Real World Super Resolution", "Adaptive Downsampling Models", "Image Super Resolution Methods", "Low Resolution", "Bicubic Downsampling", "Inverse Mapping", "Specific Function", "Blurry Results", "Real World Images Whose Exact Formulation", "Methods Attempt", "Diverse LR Samples", "Realistic Downsampling Model", "Restrictive Assumptions", "Unknown Downsampling Process", "Restrictive Prior Knowledge", "Generalizable Low Frequency Loss", "Target LR Images", "Paired Examples", "Adaptive Data Loss", "Downsampler", "SR Methods", "Kernel", "Training", "Superresolution", "Image Reconstruction", "Unsupervised Learning", "Degradation", "Adaptation Models", "Image Super Resolution", "Image Downsampling", "Unsupervised Learning" ], "authors": [ { "givenName": "Sanghyun", "surname": "Son", "fullName": "Sanghyun Son", "affiliation": "Department of ECE & ASRI, Seoul National University, Seoul, Korea", "__typename": "ArticleAuthorType" }, { "givenName": "Jaeha", "surname": "Kim", "fullName": "Jaeha Kim", "affiliation": "Department of ECE & ASRI, Seoul National University, Seoul, Korea", "__typename": "ArticleAuthorType" }, { "givenName": "Wei-Sheng", "surname": "Lai", "fullName": "Wei-Sheng Lai", "affiliation": "Google, Mountain View, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Ming-Hsuan", "surname": "Yang", "fullName": "Ming-Hsuan Yang", "affiliation": "Google, Mountain View, CA, USA", "__typename": "ArticleAuthorType" }, { "givenName": "Kyoung Mu", "surname": "Lee", "fullName": "Kyoung Mu Lee", "affiliation": "Department of ECE & ASRI, Seoul National University, Seoul, Korea", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "11", "pubDate": "2022-11-01 00:00:00", "pubType": "trans", "pages": "8657-8670", "year": "2022", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/wacvw/2022/5824/0/582400a449", "title": "Semantic Segmentation Guided Real-World Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2022/582400a449/1B12vhpWlKE", "parentPublication": { "id": "proceedings/wacvw/2022/5824/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/2.812E303", "title": "Unsupervised Real-World Super-Resolution: A Domain Adaptation Perspective", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/2.812E303/1BmFGpRsZrO", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e791", "title": "Deep Blind Video Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e791/1BmJBhycJ7W", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a266", "title": "Image Super-Resolution Based on Frequency Division Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a266/1GNti8D7m1O", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f657", "title": "Dual Adversarial Adaptation for Cross-Device Real-World Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f657/1H1mbY6HpCw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2022/6382/0/09959415", "title": "Real Image Super-Resolution using GAN through modeling of LR and HR process", "doi": null, "abstractUrl": "/proceedings-article/avss/2022/09959415/1Iz5efqebmM", "parentPublication": { "id": "proceedings/avss/2022/6382/0", "title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151093", "title": "Unsupervised Single Image Super-Resolution Network (USISResNet) for Real-World Data Using Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151093/1lPH5eaPgA0", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b589", "title": "Benefiting from Bicubically Down-Sampled Images for Learning Real-World Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b589/1uqGKozhR8k", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b983", "title": "Simple and Efficient Unpaired Real-world Super-Resolution using Image Statistics", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b983/1yNi1a2z3Ne", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a453", "title": "KernelNet: A Blind Super-Resolution Kernel Estimation Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a453/1yVzRwbSFYk", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "09568738", "articleId": "1xDLFq0cJxK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09573466", "articleId": "1xH5DisLLsQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [ { "id": "1HYqBTmpKq4", "name": "ttp202211-09521710s1-supp1-3106790.pdf", "location": "https://www.computer.org/csdl/api/v1/extra/ttp202211-09521710s1-supp1-3106790.pdf", "extension": "pdf", "size": "4.67 MB", "__typename": "WebExtraType" } ], "articleVideos": [] }
{ "issue": { "id": "12OmNzmclnS", "title": "January", "year": "2012", "issueNum": "01", "idPrefix": "tp", "pubType": "journal", "volume": "34", "label": "January", "downloadables": { "hasCover": false, "__typename": "PeriodicalIssueDownloadablesType" }, "__typename": "PeriodicalIssue" }, "article": { "id": "13rRUy0HYSJ", "doi": "10.1109/TPAMI.2011.107", "abstract": "Given the size and confidence of pairwise local orderings, angular embedding (AE) finds a global ordering with a near-global optimal eigensolution. As a quadratic criterion in the complex domain, AE is remarkably robust to outliers, unlike its real domain counterpart LS, the least squares embedding. Our comparative study of LS and AE reveals that AE's robustness is due not to the particular choice of the criterion, but to the choice of representation in the complex domain. When the embedding is encoded in the angular space, we not only have a nonconvex error function that delivers robustness, but also have a Hermitian graph Laplacian that completely determines the optimum and delivers efficiency. The high quality of embedding by AE in the presence of outliers can hardly be matched by LS, its corresponding L₝ norm formulation, or their bounded versions. These results suggest that the key to overcoming outliers lies not with additionally imposing constraints on the embedding solution, but with adaptively penalizing inconsistency between measurements themselves. AE thus significantly advances statistical ranking methods by removing the impact of outliers directly without explicit inconsistency characterization, and advances spectral clustering methods by covering the entire size-confidence measurement space and providing an ordered cluster organization.", "abstracts": [ { "abstractType": "Regular", "content": "Given the size and confidence of pairwise local orderings, angular embedding (AE) finds a global ordering with a near-global optimal eigensolution. As a quadratic criterion in the complex domain, AE is remarkably robust to outliers, unlike its real domain counterpart LS, the least squares embedding. Our comparative study of LS and AE reveals that AE's robustness is due not to the particular choice of the criterion, but to the choice of representation in the complex domain. When the embedding is encoded in the angular space, we not only have a nonconvex error function that delivers robustness, but also have a Hermitian graph Laplacian that completely determines the optimum and delivers efficiency. The high quality of embedding by AE in the presence of outliers can hardly be matched by LS, its corresponding L₝ norm formulation, or their bounded versions. These results suggest that the key to overcoming outliers lies not with additionally imposing constraints on the embedding solution, but with adaptively penalizing inconsistency between measurements themselves. AE thus significantly advances statistical ranking methods by removing the impact of outliers directly without explicit inconsistency characterization, and advances spectral clustering methods by covering the entire size-confidence measurement space and providing an ordered cluster organization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Given the size and confidence of pairwise local orderings, angular embedding (AE) finds a global ordering with a near-global optimal eigensolution. As a quadratic criterion in the complex domain, AE is remarkably robust to outliers, unlike its real domain counterpart LS, the least squares embedding. Our comparative study of LS and AE reveals that AE's robustness is due not to the particular choice of the criterion, but to the choice of representation in the complex domain. When the embedding is encoded in the angular space, we not only have a nonconvex error function that delivers robustness, but also have a Hermitian graph Laplacian that completely determines the optimum and delivers efficiency. The high quality of embedding by AE in the presence of outliers can hardly be matched by LS, its corresponding L₝ norm formulation, or their bounded versions. These results suggest that the key to overcoming outliers lies not with additionally imposing constraints on the embedding solution, but with adaptively penalizing inconsistency between measurements themselves. AE thus significantly advances statistical ranking methods by removing the impact of outliers directly without explicit inconsistency characterization, and advances spectral clustering methods by covering the entire size-confidence measurement space and providing an ordered cluster organization.", "title": "Angular Embedding: A Robust Quadratic Criterion", "normalizedTitle": "Angular Embedding: A Robust Quadratic Criterion", "fno": "ttp2012010158", "hasPdf": true, "idPrefix": "tp", "keywords": [ "Least Squares Methods", "Spectral Methods", "Graph Algorithms", "Constrained Optimization", "Linear Programming", "Statistical Computing", "Clustering", "Modeling And Recovery Of Physical Attributes" ], "authors": [ { "givenName": "Stella X.", "surname": "Yu", "fullName": "Stella X. Yu", "affiliation": "Boston College, Chestnut Hill", "__typename": "ArticleAuthorType" } ], "replicability": null, "showBuyMe": true, "showRecommendedArticles": true, "isOpenAccess": false, "issueNum": "01", "pubDate": "2012-01-01 00:00:00", "pubType": "trans", "pages": "158-173", "year": "2012", "issn": "0162-8828", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "recommendedArticles": [ { "id": "proceedings/cifer/1995/2145/0/00495226", "title": "Robust neural networks", "doi": null, "abstractUrl": "/proceedings-article/cifer/1995/00495226/12OmNAY79lF", "parentPublication": { "id": "proceedings/cifer/1995/2145/0", "title": "Proceedings of 1995 Conference on Computational Intelligence for Financial Engineering (CIFEr)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2006/2746/0/274600758", "title": "Blind Detection for Additive Embedding Using Underdetermined ICA", "doi": null, "abstractUrl": "/proceedings-article/ism/2006/274600758/12OmNAq3hIJ", "parentPublication": { "id": "proceedings/ism/2006/2746/0", "title": "Eighth IEEE International Symposium on Multimedia (ISM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459186", "title": "Robust multilinear principal component analysis", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459186/12OmNCdk2JG", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/1/3563a827", "title": "A Robust Blob Detection and Delineation Method", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563a827/12OmNvD8Rz5", "parentPublication": { "id": "proceedings/ettandgrs/2008/3563/1", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2010/4286/1/4286a422", "title": "Concentration Prediction of 4-CBA Based on Local Weighted LS-SVM", "doi": null, "abstractUrl": "/proceedings-article/icdma/2010/4286a422/12OmNvkpkTv", "parentPublication": { "id": "proceedings/icdma/2010/4286/1", "title": "2010 International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/2/3305b197", "title": "Robust and Stable Locally Linear Embedding", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305b197/12OmNwtWfRT", "parentPublication": { "id": "fskd/2008/3305/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206673", "title": "Angular embedding: From jarring intensity differences to perceived luminance", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206673/12OmNyUWR1q", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/08/ttp2011081561", "title": "Maximum Correntropy Criterion for Robust Face Recognition", "doi": null, "abstractUrl": "/journal/tp/2011/08/ttp2011081561/13rRUyfKIEl", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545239", "title": "Robust and Flexible Graph-based Semi-supervised Embedding", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545239/17D45VTRoyt", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b448", "title": "Robust Meta Network Embedding Against Adversarial Attacks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b448/1r54zQNMgc8", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "adjacentArticles": { "previous": { "fno": "ttp2012010144", "articleId": "13rRUILLkwu", "__typename": "AdjacentArticleType" }, "next": { "fno": "ttp2012010174", "articleId": "13rRUynHukp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "webExtras": [], "articleVideos": [] }