data
dict
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvmowMi", "doi": "10.1109/VAST.2014.7042509", "title": "MovementFinder: Visual analytics of origin-destination patterns from geo-tagged social media", "normalizedTitle": "MovementFinder: Visual analytics of origin-destination patterns from geo-tagged social media", "abstract": "Geo-tagged social media data can be viewed as sampling of people's trajectories in daily life. It consists of people's movements and embeds the semantics of movements. However, it is challenging to reveal patterns from the sparse and irregular sampling data. We proposed an interactive multi-filter visualization approach to analyze the spatial-temporal movement pattern in people's daily life. People's trajectories are visualized on the map with multiple functional layers. With our visual analytics tools, users are able to drill down to details, with the awareness of the origin-destination flow patterns of spatial, temporal, and semantic meaning.", "abstracts": [ { "abstractType": "Regular", "content": "Geo-tagged social media data can be viewed as sampling of people's trajectories in daily life. It consists of people's movements and embeds the semantics of movements. However, it is challenging to reveal patterns from the sparse and irregular sampling data. We proposed an interactive multi-filter visualization approach to analyze the spatial-temporal movement pattern in people's daily life. People's trajectories are visualized on the map with multiple functional layers. With our visual analytics tools, users are able to drill down to details, with the awareness of the origin-destination flow patterns of spatial, temporal, and semantic meaning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geo-tagged social media data can be viewed as sampling of people's trajectories in daily life. It consists of people's movements and embeds the semantics of movements. However, it is challenging to reveal patterns from the sparse and irregular sampling data. We proposed an interactive multi-filter visualization approach to analyze the spatial-temporal movement pattern in people's daily life. People's trajectories are visualized on the map with multiple functional layers. With our visual analytics tools, users are able to drill down to details, with the awareness of the origin-destination flow patterns of spatial, temporal, and semantic meaning.", "fno": "07042509", "keywords": [ "Data Visualisation", "Geography", "Information Filters", "Social Networking Online", "Movement Finder", "Visual Analytics", "Origin Destination Flow Patterns", "Geo Tagged Social Media", "People Trajectory Sampling", "People Movements", "Movement Semantics", "Interactive Multifilter Visualization Approach", "Spatial Temporal Movement Pattern Analysis", "People Trajectory Visualization", "Functional Layers", "Media", "Visual Analytics", "Educational Institutions", "Trajectory", "Semantics", "Filtering", "Data Visualization" ], "authors": [ { "affiliation": "Peking University", "fullName": "Siming Chen", "givenName": "Siming", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University", "fullName": "Cong Guo", "givenName": "Cong", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Tianjin University", "fullName": "Jiawan Zhang", "givenName": "Jiawan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University", "fullName": "Xiaolong Luke Zhang", "givenName": "Xiaolong Luke", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "239-240", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042508", "articleId": "12OmNxzMnLL", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042510", "articleId": "12OmNBgz4CP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mdm/2018/4133/0/413301a135", "title": "Origin-Destination Trajectory Diversity Analysis: Efficient Top-k Diversified Search", "doi": null, "abstractUrl": "/proceedings-article/mdm/2018/413301a135/12OmNrAMF5c", "parentPublication": { "id": "proceedings/mdm/2018/4133/0", "title": "2018 19th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156362", "title": "Analyzing delays in trajectories", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156362/12OmNylsZUZ", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192688", "title": "Interactive Visual Discovering of Movement Patterns from Sparsely Sampled Geo-tagged Social Media Data", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192688/13rRUxASu0O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2018/7325/0/732500a342", "title": "Visual Analytics Interface for Time Series Data Based on Trajectory Manipulation", "doi": null, "abstractUrl": "/proceedings-article/wi/2018/732500a342/17D45WODasq", "parentPublication": { "id": "proceedings/wi/2018/7325/0", "title": "2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258062", "title": "Travel purpose inference with GPS trajectories, POIs, and geo-tagged social media data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258062/17D45WYQJ81", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a085", "title": "Let's Get Personal: Exploring the Design of Personalized Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a085/1J6hbZrS4dG", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2023/5378/0/10099298", "title": "PreActo: Efficient Cross-Camera Object Tracking System in Video Analytics Edge Computing", "doi": null, "abstractUrl": "/proceedings-article/percom/2023/10099298/1MrG8HKt6GA", "parentPublication": { "id": "proceedings/percom/2023/5378/0", "title": "2023 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a174", "title": "Visual Analytics of Taxi Trajectory Data via Topical Sub-trajectories", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a174/1cMF7meccAo", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a378", "title": "RoseTrajVis: Visual Analytics of Trajectories with Rose Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a378/1rSRa9dXxDO", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a054", "title": "VisuaLeague: Visual Analytics of Multiple Games", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a054/1y4oI1vKfmg", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwHz03N", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzRqdFc", "doi": "10.1109/ICDM.2017.82", "title": "A Probabilistic Geographical Aspect-Opinion Model for Geo-Tagged Microblogs", "normalizedTitle": "A Probabilistic Geographical Aspect-Opinion Model for Geo-Tagged Microblogs", "abstract": "Due to the rapid increase in the number of users owning location-based devices, there is a considerable amount of geo-tagged data available on social media websites, such as Twitter and Facebook. This geo-tagged data can be useful in a variety of ways to extract location-specific information, as well as to comprehend the variation of information across different geographical regions. A lot of techniques have been proposed for extracting location-based information from social media, but none of these techniques aim to utilize an important characteristic of this data, which is the presence of aspects and their opinions, expressed by the users on these platforms. In this paper, we propose Geographic Aspect Opinion model (GASPOP), a probabilistic model that jointly discovers the variation of aspect and opinion, that correspond to different topics across various geographical regions from geo-tagged social media data. It incorporates the syntactic features of text in the generative process to differentiate aspect and opinion words from general background words. The user-based modeling of topics, also enables it to determine the interest distribution of various users. Furthermore, our model can be used to predict the location of different tweets based on their text. We evaluated our model on Twitter data, and our experimental results show that GASPOP can jointly discover latent aspect and opinion words for different topics across latent geographical regions. Moreover, a quantitative analysis of GASPOP using widely used evaluation metrics shows that it outperforms the state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Due to the rapid increase in the number of users owning location-based devices, there is a considerable amount of geo-tagged data available on social media websites, such as Twitter and Facebook. This geo-tagged data can be useful in a variety of ways to extract location-specific information, as well as to comprehend the variation of information across different geographical regions. A lot of techniques have been proposed for extracting location-based information from social media, but none of these techniques aim to utilize an important characteristic of this data, which is the presence of aspects and their opinions, expressed by the users on these platforms. In this paper, we propose Geographic Aspect Opinion model (GASPOP), a probabilistic model that jointly discovers the variation of aspect and opinion, that correspond to different topics across various geographical regions from geo-tagged social media data. It incorporates the syntactic features of text in the generative process to differentiate aspect and opinion words from general background words. The user-based modeling of topics, also enables it to determine the interest distribution of various users. Furthermore, our model can be used to predict the location of different tweets based on their text. We evaluated our model on Twitter data, and our experimental results show that GASPOP can jointly discover latent aspect and opinion words for different topics across latent geographical regions. Moreover, a quantitative analysis of GASPOP using widely used evaluation metrics shows that it outperforms the state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to the rapid increase in the number of users owning location-based devices, there is a considerable amount of geo-tagged data available on social media websites, such as Twitter and Facebook. This geo-tagged data can be useful in a variety of ways to extract location-specific information, as well as to comprehend the variation of information across different geographical regions. A lot of techniques have been proposed for extracting location-based information from social media, but none of these techniques aim to utilize an important characteristic of this data, which is the presence of aspects and their opinions, expressed by the users on these platforms. In this paper, we propose Geographic Aspect Opinion model (GASPOP), a probabilistic model that jointly discovers the variation of aspect and opinion, that correspond to different topics across various geographical regions from geo-tagged social media data. It incorporates the syntactic features of text in the generative process to differentiate aspect and opinion words from general background words. The user-based modeling of topics, also enables it to determine the interest distribution of various users. Furthermore, our model can be used to predict the location of different tweets based on their text. We evaluated our model on Twitter data, and our experimental results show that GASPOP can jointly discover latent aspect and opinion words for different topics across latent geographical regions. Moreover, a quantitative analysis of GASPOP using widely used evaluation metrics shows that it outperforms the state-of-the-art methods.", "fno": "3835a721", "keywords": [ "Data Mining", "Location Based Services", "Mobile Computing", "Probability", "Social Networking Online", "Web Sites", "Opinion Words", "General Background Words", "Twitter Data", "GASPOP", "Latent Aspect", "Latent Geographical Regions", "Probabilistic Geographical Aspect Opinion Model", "Geo Tagged Microblogs", "Location Based Devices", "Social Media Websites", "Geo Tagged Data", "Location Specific Information", "Geographic Aspect Opinion Model", "Probabilistic Model", "Social Media Data", "Geographical Regions", "Location Extractions", "Data Mining", "Data Models", "Twitter", "Probabilistic Logic", "Voting", "Facebook", "Microblogs", "Probabilistic Models", "Aspect Mining", "Opinion Mining", "Topic Modeling" ], "authors": [ { "affiliation": null, "fullName": "Aman Ahuja", "givenName": "Aman", "surname": "Ahuja", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Wei", "givenName": "Wei", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Lu", "givenName": "Wei", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kathleen M. Carley", "givenName": "Kathleen M.", "surname": "Carley", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chandan K. Reddy", "givenName": "Chandan K.", "surname": "Reddy", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "721-726", "year": "2017", "issn": "2374-8486", "isbn": "978-1-5386-3835-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3835a715", "articleId": "12OmNzG4gzI", "__typename": "AdjacentArticleType" }, "next": { "fno": "3835a727", "articleId": "12OmNCzb9zN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2015/7964/0/07113290", "title": "Finding top-k local users in geo-tagged social media data", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113290/12OmNC2fGvK", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2012/2027/0/06266441", "title": "Trip Mining and Recommendation from Geo-tagged Photos", "doi": null, "abstractUrl": "/proceedings-article/icmew/2012/06266441/12OmNroij5o", "parentPublication": { "id": "proceedings/icmew/2012/2027/0", "title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607658", "title": "Recommending personalized scenic itinerarywith geo-tagged photos", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607658/12OmNvDZEZO", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113324", "title": "SAR: A sentiment-aspect-region model for user preference analysis in geo-tagged reviews", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113324/12OmNwEJ10q", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2017/3932/0/07962439", "title": "Finding Influential Local Users with Similar Interest from Geo-Tagged Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2017/07962439/12OmNwFicXK", "parentPublication": { "id": "proceedings/mdm/2017/3932/0", "title": "2017 18th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a191", "title": "Location-Based Temporal Burst Detection Using Outlier Factors in Geo-Tagged Tweets", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a191/12OmNyen1rX", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2016/2622/0/07584919", "title": "Clustering Geo-tagged Tweets for Advanced Big Data Analytics", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2016/07584919/12OmNyqRnf2", "parentPublication": { "id": "proceedings/bigdata-congress/2016/2622/0", "title": "2016 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/07/07431995", "title": "CMiner: Opinion Extraction and Summarization for Chinese Microblogs", "doi": null, "abstractUrl": "/journal/tk/2016/07/07431995/13rRUx0xPJb", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2018/5321/0/08499062", "title": "Spatial Coverage Measurement of Geo- Tagged Visual Data: A Database Approach", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499062/17D45XfSEUu", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006302", "title": "Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006302/1hJrXAY20HC", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxuXcDG", "title": "2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012)", "acronym": "srds", "groupId": "1000628", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNCbCrYq", "doi": "10.1109/SRDS.2012.19", "title": "Detecting Anomalous User Behaviors in Workflow-Driven Web Applications", "normalizedTitle": "Detecting Anomalous User Behaviors in Workflow-Driven Web Applications", "abstract": "Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline violation, which stems from privilege misuse in scenarios where business logic and policies are too complex to be accurately defined and enforced. Both threats can lead to sequences of web requests that deviate from typical user behaviors. The objective of this paper is to detect anomalous user behaviors based on the sequence of their requests within a web session. We first decompose web sessions into workflows based on their data objects. In doing so, the detection of anomalous sessions is reduced to detection of anomalous workflows. Next, we apply a hidden Markov model (HMM) to characterize workflows on a per-object basis. In this model, the implicit business logic involved in this object defines the unobserved states of the Markov process, where the web requests are observations. To derive more robust HMMs, we extend the object-specific approach to an object-cluster approach, where objects with similar workflows are clustered and HMM models are derived on a per-cluster basis. We evaluate our models using two real systems, including an open source web application and a large web-based electronic medical record system. The results show that our approach can detect anomalous web sessions and lend evidence to suggest that the clustering approach can achieve relatively low false positive rates while maintaining its detection accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline violation, which stems from privilege misuse in scenarios where business logic and policies are too complex to be accurately defined and enforced. Both threats can lead to sequences of web requests that deviate from typical user behaviors. The objective of this paper is to detect anomalous user behaviors based on the sequence of their requests within a web session. We first decompose web sessions into workflows based on their data objects. In doing so, the detection of anomalous sessions is reduced to detection of anomalous workflows. Next, we apply a hidden Markov model (HMM) to characterize workflows on a per-object basis. In this model, the implicit business logic involved in this object defines the unobserved states of the Markov process, where the web requests are observations. To derive more robust HMMs, we extend the object-specific approach to an object-cluster approach, where objects with similar workflows are clustered and HMM models are derived on a per-cluster basis. We evaluate our models using two real systems, including an open source web application and a large web-based electronic medical record system. The results show that our approach can detect anomalous web sessions and lend evidence to suggest that the clustering approach can achieve relatively low false positive rates while maintaining its detection accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Web applications are increasingly used as portals to interact with back-end database systems and support business processes. This type of data-centric workflow-driven web application is vulnerable to two types of security threats. The first is an request integrity attack, which stems from the vulnerabilities in the implementation of business logic within web applications. The second is guideline violation, which stems from privilege misuse in scenarios where business logic and policies are too complex to be accurately defined and enforced. Both threats can lead to sequences of web requests that deviate from typical user behaviors. The objective of this paper is to detect anomalous user behaviors based on the sequence of their requests within a web session. We first decompose web sessions into workflows based on their data objects. In doing so, the detection of anomalous sessions is reduced to detection of anomalous workflows. Next, we apply a hidden Markov model (HMM) to characterize workflows on a per-object basis. In this model, the implicit business logic involved in this object defines the unobserved states of the Markov process, where the web requests are observations. To derive more robust HMMs, we extend the object-specific approach to an object-cluster approach, where objects with similar workflows are clustered and HMM models are derived on a per-cluster basis. We evaluate our models using two real systems, including an open source web application and a large web-based electronic medical record system. The results show that our approach can detect anomalous web sessions and lend evidence to suggest that the clustering approach can achieve relatively low false positive rates while maintaining its detection accuracy.", "fno": "4784a001", "keywords": [ "Web Security", "Anomaly Detection", "Workflow Driven Web Application", "Hidden Markov Model", "Sequence Similarity", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Xiaowei Li", "givenName": "Xiaowei", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuan Xue", "givenName": "Yuan", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bradley Malin", "givenName": "Bradley", "surname": "Malin", "__typename": "ArticleAuthorType" } ], "idPrefix": "srds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2012", "issn": "1060-9857", "isbn": "978-1-4673-2397-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4784z018", "articleId": "12OmNzkMlV0", "__typename": "AdjacentArticleType" }, "next": { "fno": "4784a011", "articleId": "12OmNyvoXfv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/compsacw/2011/4459/0/4459a362", "title": "Detecting Artifact Anomalies in Temporal Structured Workflow as Reusable Assets", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2011/4459a362/12OmNBkxspI", "parentPublication": { "id": "proceedings/compsacw/2011/4459/0", "title": "2011 IEEE 35th Annual Computer Software and Applications Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2008/3127/0/3127a498", "title": "Workflow Inspector ? A Test Tool for Microsoft Workflow Foundation", "doi": null, "abstractUrl": "/proceedings-article/icst/2008/3127a498/12OmNCesrb1", "parentPublication": { "id": "proceedings/icst/2008/3127/0", "title": "2008 1st International Conference on Software Testing, Verification, and Validation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2010/4126/0/4126a337", "title": "Alternative Approaches for Workflow Similarity", "doi": null, "abstractUrl": "/proceedings-article/scc/2010/4126a337/12OmNvRU0gn", "parentPublication": { "id": "proceedings/scc/2010/4126/0", "title": "2010 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2008/3163/0/3163a632", "title": "Worst-Case Workflow Performance Optimization", "doi": null, "abstractUrl": "/proceedings-article/iciw/2008/3163a632/12OmNx76TJ5", "parentPublication": { "id": "proceedings/iciw/2008/3163/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2017/1993/0/1993a230", "title": "DriftInsight: Detecting Anomalous Behaviors in Large-Scale Cloud Platform", "doi": null, "abstractUrl": "/proceedings-article/cloud/2017/1993a230/12OmNxXl5Bi", "parentPublication": { "id": "proceedings/cloud/2017/1993/0", "title": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wecwis/2002/1567/0/15670051", "title": "Integration of Web Services into Workflows through a Multi-Level chema Architecture", "doi": null, "abstractUrl": "/proceedings-article/wecwis/2002/15670051/12OmNy3RRyZ", "parentPublication": { "id": "proceedings/wecwis/2002/1567/0", "title": "Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2011/4482/0/4482a042", "title": "Applying Sequence Alignment in Tracking Evolving Clusters of Web-Sessions Data: An Artificial Immune Network Approach", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2011/4482a042/12OmNzIl3A2", "parentPublication": { "id": "proceedings/cicsyn/2011/4482/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2012/04/ttq2012040511", "title": "DoubleGuard: Detecting Intrusions in Multitier Web Applications", "doi": null, "abstractUrl": "/journal/tq/2012/04/ttq2012040511/13rRUxjQyqv", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2019/6934/0/08909570", "title": "Detecting Anomalous Behaviour from Textual Content in Financial Records", "doi": null, "abstractUrl": "/proceedings-article/wi/2019/08909570/1febnpPm49y", "parentPublication": { "id": "proceedings/wi/2019/6934/0", "title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itnac/2020/8827/0/09315029", "title": "Detecting Network Intrusion through Anomalous Packet Identification", "doi": null, "abstractUrl": "/proceedings-article/itnac/2020/09315029/1qmfEluwd8s", "parentPublication": { "id": "proceedings/itnac/2020/8827/0", "title": "2020 30th International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF2o", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNwJgAMk", "doi": "10.1109/ASONAM.2010.60", "title": "Mining Interaction Behaviors for Email Reply Order Prediction", "normalizedTitle": "Mining Interaction Behaviors for Email Reply Order Prediction", "abstract": "In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users are those who can effectively solicit responses from other users. Responsive users are those who are willing to respond to other users. By modeling such behaviors, we are able to mine them and to identify engaging or responsive users. This paper proposes four types of models to quantify engagingness and responsiveness of users. These behaviors can be used as features in the email reply order prediction task which predicts the email reply order given an email pair. Our experiments show that engagingness and responsiveness behavior features are more useful than other non-behavior features in building a classifier for the email reply order prediction task. When combining behavior and non-behavior features, our classifier is also shown to predict the email reply order with good accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users are those who can effectively solicit responses from other users. Responsive users are those who are willing to respond to other users. By modeling such behaviors, we are able to mine them and to identify engaging or responsive users. This paper proposes four types of models to quantify engagingness and responsiveness of users. These behaviors can be used as features in the email reply order prediction task which predicts the email reply order given an email pair. Our experiments show that engagingness and responsiveness behavior features are more useful than other non-behavior features in building a classifier for the email reply order prediction task. When combining behavior and non-behavior features, our classifier is also shown to predict the email reply order with good accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users are those who can effectively solicit responses from other users. Responsive users are those who are willing to respond to other users. By modeling such behaviors, we are able to mine them and to identify engaging or responsive users. This paper proposes four types of models to quantify engagingness and responsiveness of users. These behaviors can be used as features in the email reply order prediction task which predicts the email reply order given an email pair. Our experiments show that engagingness and responsiveness behavior features are more useful than other non-behavior features in building a classifier for the email reply order prediction task. When combining behavior and non-behavior features, our classifier is also shown to predict the email reply order with good accuracy.", "fno": "4138a306", "keywords": [ "Social Networks", "Social Behavior Modeling", "Responsiveness" ], "authors": [ { "affiliation": null, "fullName": "Byung-Won On", "givenName": "Byung-Won", "surname": "On", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ee-Peng Lim", "givenName": "Ee-Peng", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jing Jiang", "givenName": "Jing", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Amruta Purandare", "givenName": "Amruta", "surname": "Purandare", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Loo-Nin Teow", "givenName": "Loo-Nin", "surname": "Teow", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "306-310", "year": "2010", "issn": null, "isbn": "978-0-7695-4138-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4138a301", "articleId": "12OmNBQTJjQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "4138a311", "articleId": "12OmNrMZpjW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2005/2268/4/22680108b", "title": "Email Chronemics: Unobtrusive Profiling of Response Times", "doi": null, "abstractUrl": "/proceedings-article/hicss/2005/22680108b/12OmNBOCWwj", "parentPublication": { "id": "proceedings/hicss/2005/2268/4", "title": "Proceedings of the 38th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/3/4513c373", "title": "Email Social Network Extraction and Search", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513c373/12OmNCf1DwQ", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2014/7646/0/7646a331", "title": "A Novel Email Virus Propagation Model with Local Group", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2014/7646a331/12OmNsbY6QZ", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2014/7646/0", "title": "2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialcom/2010/4211/0/4211a425", "title": "Messaging Behavior Modeling in Mobile Social Networks", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2010/4211a425/12OmNvDI3UY", "parentPublication": { "id": "proceedings/socialcom/2010/4211/0", "title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2009/3843/1/3843a388", "title": "Modeling Email Worm Propagation Using Game Theory", "doi": null, "abstractUrl": "/proceedings-article/mines/2009/3843a388/12OmNwHhoR8", "parentPublication": { "id": "proceedings/mines/2009/3843/1", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iptc/2010/4196/0/4196a286", "title": "Power-Law Distribution of Human Behaviors in Internet Forums", "doi": null, "abstractUrl": "/proceedings-article/iptc/2010/4196a286/12OmNx2QUL1", "parentPublication": { "id": "proceedings/iptc/2010/4196/0", "title": "Intelligence Information Processing and Trusted Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2015/9200/0/9200a016", "title": "Simulation of the Users' Email Behavior Based on BP-BDI Model", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2015/9200a016/12OmNxwncBp", "parentPublication": { "id": "proceedings/cyberc/2015/9200/0", "title": "2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799b132", "title": "An Evolutionary-Based Method for Reconstructing Conversation Threads in Email Corpora", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799b132/12OmNxwnciI", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscloud/2017/6644/0/6644a091", "title": "Security Analysis of Email Systems", "doi": null, "abstractUrl": "/proceedings-article/cscloud/2017/6644a091/12OmNyUFfZn", "parentPublication": { "id": "proceedings/cscloud/2017/6644/0", "title": "2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a171", "title": "APT Behaviors Detection Based on Email Business Scenarios", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a171/1CuhP8O5MgE", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrF2DIa", "title": "2017 21st International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxWcHem", "doi": "10.1109/iV.2017.24", "title": "Visual Tool for Extracting Anomalous Approaches of Moving Objects", "normalizedTitle": "Visual Tool for Extracting Anomalous Approaches of Moving Objects", "abstract": "The analysis of incidents is important for preventing collisions between moving objects. However, it requires that many cases of incidents be collected as target data. The purpose of this study was to develop a method that supports the collection of many cases of anomalous (near-miss) approach from massive movement data. To achieve this, a relative superposition method is proposed. Relative superposition is a type of visualization method, in which the trajectories of pairs of moving objects are transformed, focusing on their relative positional relationships. The method is expected to facilitate the search for anomalous approach cases. This paper describes five types of relative superposition, together with a visual tool in which they are implemented. Moreover, it presents a case study in which anomalous approach cases of ships were searched by applying the tool to actual the automatic identification system (AIS) data.", "abstracts": [ { "abstractType": "Regular", "content": "The analysis of incidents is important for preventing collisions between moving objects. However, it requires that many cases of incidents be collected as target data. The purpose of this study was to develop a method that supports the collection of many cases of anomalous (near-miss) approach from massive movement data. To achieve this, a relative superposition method is proposed. Relative superposition is a type of visualization method, in which the trajectories of pairs of moving objects are transformed, focusing on their relative positional relationships. The method is expected to facilitate the search for anomalous approach cases. This paper describes five types of relative superposition, together with a visual tool in which they are implemented. Moreover, it presents a case study in which anomalous approach cases of ships were searched by applying the tool to actual the automatic identification system (AIS) data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The analysis of incidents is important for preventing collisions between moving objects. However, it requires that many cases of incidents be collected as target data. The purpose of this study was to develop a method that supports the collection of many cases of anomalous (near-miss) approach from massive movement data. To achieve this, a relative superposition method is proposed. Relative superposition is a type of visualization method, in which the trajectories of pairs of moving objects are transformed, focusing on their relative positional relationships. The method is expected to facilitate the search for anomalous approach cases. This paper describes five types of relative superposition, together with a visual tool in which they are implemented. Moreover, it presents a case study in which anomalous approach cases of ships were searched by applying the tool to actual the automatic identification system (AIS) data.", "fno": "0831a274", "keywords": [ "Data Analysis", "Data Visualisation", "User Interfaces", "Automatic Identification System Data", "AIS Data", "Anomalous Approach Cases", "Relative Positional Relationships", "Visualization Method", "Relative Superposition Method", "Massive Movement Data", "Moving Objects", "Visual Tool", "Trajectory", "Tools", "Visualization", "Data Visualization", "Marine Vehicles", "Animation", "Artificial Intelligence", "Trajectory Analytics", "Anomaly Search", "Moving Objects", "AIS", "Relative Superposition" ], "authors": [ { "affiliation": null, "fullName": "Kouhei Hamada", "givenName": "Kouhei", "surname": "Hamada", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Takahiro Saito", "givenName": "Takahiro", "surname": "Saito", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kazuo Misue", "givenName": "Kazuo", "surname": "Misue", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "274-280", "year": "2017", "issn": "2375-0138", "isbn": "978-1-5386-0831-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0831a268", "articleId": "12OmNviZlA5", "__typename": "AdjacentArticleType" }, "next": { "fno": "0831a281", "articleId": "12OmNzmLxRg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edoc/2013/5081/0/5081a027", "title": "Extracting Data Objects and Their States from Process Models", "doi": null, "abstractUrl": "/proceedings-article/edoc/2013/5081a027/12OmNAMtANA", "parentPublication": { "id": "proceedings/edoc/2013/5081/0", "title": "2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ms/2015/7284/0/7284a112", "title": "Mobile Data Fusion from Multiple Tracking Sensors to Augment Maritime Safety: Mobile Detection, Early Identification, and Tracking of Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/ms/2015/7284a112/12OmNqBtj9h", "parentPublication": { "id": "proceedings/ms/2015/7284/0", "title": "2015 IEEE International Conference on Mobile Services (MS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmcs/1997/7819/0/00609625", "title": "Modeling of moving objects in a video database", "doi": null, "abstractUrl": "/proceedings-article/mmcs/1997/00609625/12OmNx6PisK", "parentPublication": { "id": "proceedings/mmcs/1997/7819/0", "title": "Proceedings of IEEE International Conference on Multimedia Computing and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2013/1050/0/06642525", "title": "Road segment partitioning towards anomalous trajectory detection for surveillance applications", "doi": null, "abstractUrl": "/proceedings-article/iri/2013/06642525/12OmNxwENzg", "parentPublication": { "id": "proceedings/iri/2013/1050/0", "title": "2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a017", "title": "Non-overlapping Aggregated Multivariate Glyphs for Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a017/12OmNy2agTd", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/01/mcg2012010056", "title": "Interactive Density Maps for Moving Objects", "doi": null, "abstractUrl": "/magazine/cg/2012/01/mcg2012010056/13rRUwcS1uV", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aike/2018/9555/0/955500a189", "title": "Generation of Data Set for Tactical Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/aike/2018/955500a189/17D45XoXP3K", "parentPublication": { "id": "proceedings/aike/2018/9555/0", "title": "2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/10/09802784", "title": "Visualization in Motion: A Research Agenda and Two Evaluations", "doi": null, "abstractUrl": "/journal/tg/2022/10/09802784/1Eo1xk9vKuI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ises/2022/9922/0/992200a694", "title": "Slow Moving Vehicle, Do Not Pass, and Stationary Vehicle V2V Warnings Based on DSRC Basic Safety Messages", "doi": null, "abstractUrl": "/proceedings-article/ises/2022/992200a694/1KrgrjD4uMU", "parentPublication": { "id": "proceedings/ises/2022/9922/0", "title": "2022 IEEE International Symposium on Smart Electronic Systems (iSES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/02/08950124", "title": "Visual Analytics of Anomalous User Behaviors: A Survey", "doi": null, "abstractUrl": "/journal/bd/2022/02/08950124/1gKwHIY8sAo", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1gQYgE8", "doi": "10.1109/VR.2018.8447550", "title": "Beyond Replication: Augmenting Social Behaviors in Multi-User Virtual Realities", "normalizedTitle": "Beyond Replication: Augmenting Social Behaviors in Multi-User Virtual Realities", "abstract": "This paper presents a novel approach for the augmentation of social behaviors in virtual reality (VR). We designed three visual transformations for behavioral phenomena crucial to everyday social interactions: eye contact, joint attention, and grouping. To evaluate the approach, we let users interact socially in a virtual museum using a large-scale multi-user tracking environment. Using a between-subject design (N = 125) we formed groups of five participants. Participants were represented as simplified avatars and experienced the virtual museum simultaneously, either with or without the augmentations. Our results indicate that our approach can significantly increase social presence in multi-user environments and that the augmented experience appears more thought-provoking. Furthermore, the augmentations seem also to affect the actual behavior of participants with regard to more eye contact and more focus on avatars/objects in the scene. We interpret these findings as first indicators for the potential of social augmentations to impact social perception and behavior in VR.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a novel approach for the augmentation of social behaviors in virtual reality (VR). We designed three visual transformations for behavioral phenomena crucial to everyday social interactions: eye contact, joint attention, and grouping. To evaluate the approach, we let users interact socially in a virtual museum using a large-scale multi-user tracking environment. Using a between-subject design (N = 125) we formed groups of five participants. Participants were represented as simplified avatars and experienced the virtual museum simultaneously, either with or without the augmentations. Our results indicate that our approach can significantly increase social presence in multi-user environments and that the augmented experience appears more thought-provoking. Furthermore, the augmentations seem also to affect the actual behavior of participants with regard to more eye contact and more focus on avatars/objects in the scene. We interpret these findings as first indicators for the potential of social augmentations to impact social perception and behavior in VR.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a novel approach for the augmentation of social behaviors in virtual reality (VR). We designed three visual transformations for behavioral phenomena crucial to everyday social interactions: eye contact, joint attention, and grouping. To evaluate the approach, we let users interact socially in a virtual museum using a large-scale multi-user tracking environment. Using a between-subject design (N = 125) we formed groups of five participants. Participants were represented as simplified avatars and experienced the virtual museum simultaneously, either with or without the augmentations. Our results indicate that our approach can significantly increase social presence in multi-user environments and that the augmented experience appears more thought-provoking. Furthermore, the augmentations seem also to affect the actual behavior of participants with regard to more eye contact and more focus on avatars/objects in the scene. We interpret these findings as first indicators for the potential of social augmentations to impact social perception and behavior in VR.", "fno": "08447550", "keywords": [ "Avatars", "Groupware", "Museums", "Virtual Reality", "Social Behaviors", "Multiuser Virtual Realities", "Virtual Reality", "VR", "Visual Transformations", "Behavioral Phenomena", "Everyday Social Interactions", "Eye Contact", "Joint Attention", "Virtual Museum", "Large Scale Multiuser Tracking Environment", "Between Subject Design", "Social Presence", "Multiuser Environments", "Augmented Experience", "Actual Behavior", "Social Augmentations", "Social Perception", "Avatars", "Visualization", "Electronic Mail", "Color", "Human Computer Interaction", "Computing Methodologies Computer Graphics Graphics Systems And Interfaces Virtual Reality" ], "authors": [ { "affiliation": "University of Würzburg, HCI Group", "fullName": "Daniel Roth", "givenName": "Daniel", "surname": "Roth", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Würzburg, HCI Group", "fullName": "Constantin Klelnbeck", "givenName": "Constantin", "surname": "Klelnbeck", "__typename": "ArticleAuthorType" }, { "affiliation": "Friedrich-Alexander University Erlangen-NOrnberg (FAU), Programming Systems Group", "fullName": "Tobias Feigl", "givenName": "Tobias", "surname": "Feigl", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IIS, Machine Learning and Information Fusion Group", "fullName": "Christopher Mutschler", "givenName": "Christopher", "surname": "Mutschler", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Würzburg, HCI Group", "fullName": "Marc Erich Latoschik", "givenName": "Marc Erich", "surname": "Latoschik", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "215-222", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08446575", "articleId": "13bd1eOELLA", "__typename": "AdjacentArticleType" }, "next": { "fno": "08446235", "articleId": "13bd1eW2l9F", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2013/6097/0/06550223", "title": "Poster: Gesture-based control of avatars for social TV", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550223/12OmNAGepYr", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504726", "title": "Redirected head gaze to support AR meetings distributed over heterogeneous environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504726/12OmNBOCWvM", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a042", "title": "[POSTER] Social Augmentations in Multi-User Virtual Reality: A Virtual Museum Experience", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a042/12OmNrAMEVY", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571304", "title": "Associating Avatars with Musical Genres", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571304/12OmNwswg1d", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504761", "title": "Avatar realism and social interaction quality in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504761/12OmNzdoMvk", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699286", "title": "Effects of Hybrid and Synthetic Social Gaze in Avatar-Mediated Interactions", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699286/19F1VntaVYQ", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a576", "title": "Understanding Shoulder Surfer Behavior Using Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a576/1CJd33f4h4k", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797907", "title": "Digital Demons: Psychological Effects of Creating, and Engaging with, Virtual Avatars Representing Undesirable Aspects of the Self", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797907/1cJ1eAkUYNO", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090517", "title": "Affective Embodiment: Embodying emotions through postural representation in VR", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090517/1jIxmmduE5a", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a068", "title": "Verbal Mimicry Predicts Social Distance and Social Attraction to an Outgroup Member in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a068/1qpzC44fheg", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CuhMtnDJlu", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "acronym": "dsc", "groupId": "1815424", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1CuhP8O5MgE", "doi": "10.1109/DSC53577.2021.00031", "title": "APT Behaviors Detection Based on Email Business Scenarios", "normalizedTitle": "APT Behaviors Detection Based on Email Business Scenarios", "abstract": "Advanced Persistent Threat (APT) is considered a serious problem faced by governments and enterprises. The detection method of APT should be different from general cyber-attacks because of its characteristics of persistence, camouflage and indirection, and there's no strategy that is effective enough at present. In this paper, we introduce business scenarios of email into APT detection to make our approach more targeted to anomalous behaviors which are caused by APT than other general cyber-attacks. We combine the key information of email protocols and factors of behaviors in business scenarios to extract more targeted features and learn deep features using deep learning algorithms. Then we summarize Tactics, Techniques, and Procedures (TTPs) based on email business scenarios in order to detect APT emails more effectively. Our experiments are conducted on a real dataset that up to 10,850,796 emails from October 2016 till January 2021, and we discovered 3 cases of real APT campaigns and also a new type of APT behaviors that is not detected by previous works.", "abstracts": [ { "abstractType": "Regular", "content": "Advanced Persistent Threat (APT) is considered a serious problem faced by governments and enterprises. The detection method of APT should be different from general cyber-attacks because of its characteristics of persistence, camouflage and indirection, and there's no strategy that is effective enough at present. In this paper, we introduce business scenarios of email into APT detection to make our approach more targeted to anomalous behaviors which are caused by APT than other general cyber-attacks. We combine the key information of email protocols and factors of behaviors in business scenarios to extract more targeted features and learn deep features using deep learning algorithms. Then we summarize Tactics, Techniques, and Procedures (TTPs) based on email business scenarios in order to detect APT emails more effectively. Our experiments are conducted on a real dataset that up to 10,850,796 emails from October 2016 till January 2021, and we discovered 3 cases of real APT campaigns and also a new type of APT behaviors that is not detected by previous works.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Advanced Persistent Threat (APT) is considered a serious problem faced by governments and enterprises. The detection method of APT should be different from general cyber-attacks because of its characteristics of persistence, camouflage and indirection, and there's no strategy that is effective enough at present. In this paper, we introduce business scenarios of email into APT detection to make our approach more targeted to anomalous behaviors which are caused by APT than other general cyber-attacks. We combine the key information of email protocols and factors of behaviors in business scenarios to extract more targeted features and learn deep features using deep learning algorithms. Then we summarize Tactics, Techniques, and Procedures (TTPs) based on email business scenarios in order to detect APT emails more effectively. Our experiments are conducted on a real dataset that up to 10,850,796 emails from October 2016 till January 2021, and we discovered 3 cases of real APT campaigns and also a new type of APT behaviors that is not detected by previous works.", "fno": "181500a171", "keywords": [ "Computer Crime", "Data Handling", "Deep Learning Artificial Intelligence", "Electronic Mail", "Feature Extraction", "APT Behaviors Detection", "Email Business Scenarios", "Anomalous Behaviors", "Feature Extraction", "Deep Learning", "Advanced Persistent Threat Behavior Detection", "Cyberattacks", "APT Email Protocols", "Tactics Techniques And Procedures", "TTP", "Deep Learning", "Protocols", "Phishing", "Government", "Clustering Algorithms", "Data Science", "Feature Extraction", "Email Behavior", "APT", "Business Scenario", "Deep Learning" ], "authors": [ { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Bo Bai", "givenName": "Bo", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Yun Feng", "givenName": "Yun", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Baoxu Liu", "givenName": "Baoxu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Xutong Wang", "givenName": "Xutong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Jiaxi Liu", "givenName": "Jiaxi", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Qingyue Liu", "givenName": "Qingyue", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Qixu Liu", "givenName": "Qixu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Network Data,Beijing,China", "fullName": "Shuang Zhao", "givenName": "Shuang", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "171-178", "year": "2021", "issn": null, "isbn": "978-1-6654-1815-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "181500a166", "articleId": "1Cui3Xm2H2E", "__typename": "AdjacentArticleType" }, "next": { "fno": "181500a179", "articleId": "1CuhNoR7Yhq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scc/2017/2005/0/2005a019", "title": "Business Process Instances Discovery from Email Logs", "doi": null, "abstractUrl": "/proceedings-article/scc/2017/2005a019/12OmNAoDhQI", "parentPublication": { "id": "proceedings/scc/2017/2005/0", "title": "2017 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccc/2017/2008/0/2008a112", "title": "Mining Business Process Activities from Email Logs", "doi": null, "abstractUrl": "/proceedings-article/iccc/2017/2008a112/12OmNCzb9vk", "parentPublication": { "id": "proceedings/iccc/2017/2008/0", "title": "2017 IEEE International Conference on Cognitive Computing (ICCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2010/4138/0/4138a306", "title": "Mining Interaction Behaviors for Email Reply Order Prediction", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a306/12OmNwJgAMk", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460212", "title": "Business email classification using incremental subspace learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460212/12OmNxVDuMj", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2007/2841/0/284100782", "title": "SEFAP: An Email System for Anti-Phishing", "doi": null, "abstractUrl": "/proceedings-article/icis/2007/284100782/12OmNzcPA6y", "parentPublication": { "id": "proceedings/icis/2007/2841/0", "title": "2007 International Conference on Computer and Information Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a007", "title": "Phishing Email Detection Using Robust NLP Techniques", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a007/18jXJaYA2wo", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671531", "title": "Convolutional Neural Network Optimization for Phishing Email Classification", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671531/1A8goAp6Kic", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500b360", "title": "Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500b360/1LFMaXxXiGQ", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2020/6975/0/697500a193", "title": "A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/wetice/2020/697500a193/1qROZVt3WWQ", "parentPublication": { "id": "proceedings/wetice/2020/6975/0", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377821", "title": "Email Embeddings for Phishing Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377821/1s64MLWwXm0", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LFLQivG5gI", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "acronym": "trustcom", "groupId": "10063338", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LFMaXxXiGQ", "doi": "10.1109/TrustCom56396.2022.00192", "title": "Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector", "normalizedTitle": "Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector", "abstract": "Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylist to filter out unexpected emails based on suspicious vocabularies present in the email’s subject and contents. However, this type of signature-based approach cannot effectively discover novel and unknown suspicious emails that utilize various evolving malicious payloads. To address the problem, in this paper, we present Holmes, an efficient and lightweight semantic based engine for anomalous email detection. Holmes can convert each email event log into a sentence through word embedding and then identify abnormalities that deviate from a historical baseline based on those translated sentences. We have evaluated the performance of Holmes in a real-world enterprise environment, where around 5,000 emails are sent/received each day. In our experiments, Holmes shows a high capability to detect email threats, especially those that cannot be handled by the enterprise anti-spam gateway. It is also demonstrated through our experiment that Holmes can discover more concealed malicious emails that are immune from several commercial detection tools.", "abstracts": [ { "abstractType": "Regular", "content": "Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylist to filter out unexpected emails based on suspicious vocabularies present in the email’s subject and contents. However, this type of signature-based approach cannot effectively discover novel and unknown suspicious emails that utilize various evolving malicious payloads. To address the problem, in this paper, we present Holmes, an efficient and lightweight semantic based engine for anomalous email detection. Holmes can convert each email event log into a sentence through word embedding and then identify abnormalities that deviate from a historical baseline based on those translated sentences. We have evaluated the performance of Holmes in a real-world enterprise environment, where around 5,000 emails are sent/received each day. In our experiments, Holmes shows a high capability to detect email threats, especially those that cannot be handled by the enterprise anti-spam gateway. It is also demonstrated through our experiment that Holmes can discover more concealed malicious emails that are immune from several commercial detection tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylist to filter out unexpected emails based on suspicious vocabularies present in the email’s subject and contents. However, this type of signature-based approach cannot effectively discover novel and unknown suspicious emails that utilize various evolving malicious payloads. To address the problem, in this paper, we present Holmes, an efficient and lightweight semantic based engine for anomalous email detection. Holmes can convert each email event log into a sentence through word embedding and then identify abnormalities that deviate from a historical baseline based on those translated sentences. We have evaluated the performance of Holmes in a real-world enterprise environment, where around 5,000 emails are sent/received each day. In our experiments, Holmes shows a high capability to detect email threats, especially those that cannot be handled by the enterprise anti-spam gateway. It is also demonstrated through our experiment that Holmes can discover more concealed malicious emails that are immune from several commercial detection tools.", "fno": "942500b360", "keywords": [ "Computer Crime", "Computer Network Security", "Electronic Mail", "Fraud", "Internetworking", "Security Of Data", "Unsolicited E Mail", "Anomalous Email Detection", "Anomalous Email Detector", "Blackmail", "Concealed Malicious Emails", "Efficient Based Engine", "Email Event", "Email Threat", "Enterprise Anti Spam Gateway", "Enterprise Security", "Evolving Malicious Payloads", "Holmes", "Lightweight Semantic Based Engine", "Malicious Forms", "Malvertisement", "Real World Enterprise Environment", "Signature Based Approach", "Suspicious Vocabularies", "Traditional Anti Spam Gateway", "Unexpected Emails", "Unknown Suspicious Emails", "Vocabulary", "Privacy", "Phishing", "Semantics", "Detectors", "Logic Gates", "Electronic Mail", "Phishing Detection", "Novelty Detection", "Machine Learning", "Intrusion Detection", "Fraud Detection" ], "authors": [ { "affiliation": "Lenovo Research,Lenovo Global Security Laboratory", "fullName": "Peilun Wu", "givenName": "Peilun", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of New South Wales (UNSW),School of Computer Science and Engineering,Sydney", "fullName": "Hui Guo", "givenName": "Hui", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "trustcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1360-1367", "year": "2022", "issn": null, "isbn": "978-1-6654-9425-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "942500b354", "articleId": "1LFM8Fbyn4I", "__typename": "AdjacentArticleType" }, "next": { "fno": "942500b368", "articleId": "1LFM6zimLMk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2015/8657/0/8657a113", "title": "A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a113/12OmNyUFfLP", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/securware/2010/4095/0/05633679", "title": "Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection", "doi": null, "abstractUrl": "/proceedings-article/securware/2010/05633679/13bd1eTtWYO", "parentPublication": { "id": "proceedings/securware/2010/4095/0", "title": "2010 Fourth International Conference on Emerging Security Information, Systems and Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2012/03/msp2012030064", "title": "Detecting Targeted Malicious Email", "doi": null, "abstractUrl": "/magazine/sp/2012/03/msp2012030064/13rRUNvyaj1", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a007", "title": "Phishing Email Detection Using Robust NLP Techniques", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a007/18jXJaYA2wo", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671531", "title": "Convolutional Neural Network Optimization for Phishing Email Classification", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671531/1A8goAp6Kic", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asiajcis/2020/9922/0/09194109", "title": "Analysis of Malicious Email Detection using Cialdini’s Principles", "doi": null, "abstractUrl": "/proceedings-article/asiajcis/2020/09194109/1n0Ip4UqiKA", "parentPublication": { "id": "proceedings/asiajcis/2020/9922/0", "title": "2020 15th Asia Joint Conference on Information Security (AsiaJCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2020/6975/0/697500a193", "title": "A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/wetice/2020/697500a193/1qROZVt3WWQ", "parentPublication": { "id": "proceedings/wetice/2020/6975/0", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377821", "title": "Email Embeddings for Phishing Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377821/1s64MLWwXm0", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09565347", "title": "Phishing Email Detection Using Persuasion Cues", "doi": null, "abstractUrl": "/journal/tq/2022/02/09565347/1xx8eOVja6I", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&p/2021/1491/0/149100a578", "title": "D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System", "doi": null, "abstractUrl": "/proceedings-article/euros&p/2021/149100a578/1yg1cTL1ey4", "parentPublication": { "id": "proceedings/euros&p/2021/1491/0", "title": "2021 IEEE European Symposium on Security and Privacy (EuroS&P)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmL7SYcA2k", "doi": "10.1109/ICCV48922.2021.01259", "title": "Sparse Needlets for Lighting Estimation with Spherical Transport Loss", "normalizedTitle": "Sparse Needlets for Lighting Estimation with Spherical Transport Loss", "abstract": "Accurate lighting estimation is challenging yet critical to many computer vision and computer graphics tasks such as high-dynamic-range (HDR) relighting. Existing approaches model lighting in either frequency domain or spatial domain which is insufficient to represent the complex lighting conditions in scenes and tends to produce inaccurate estimation. This paper presents NeedleLight, a new lighting estimation model that represents illumination with needlets and allows lighting estimation in both frequency domain and spatial domain jointly. An optimal thresholding function is designed to achieve sparse needlets which trims redundant lighting parameters and demonstrates superior localization properties for illumination representation. In addition, a novel spherical transport loss is designed based on optimal transport theory which guides to regress lighting representation parameters with consideration of the spatial information. Furthermore, we propose a new metric that is concise yet effective by directly evaluating the estimated illumination maps rather than rendered images. Extensive experiments show that NeedleLight achieves superior lighting estimation consistently across multiple evaluation metrics as compared with state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Accurate lighting estimation is challenging yet critical to many computer vision and computer graphics tasks such as high-dynamic-range (HDR) relighting. Existing approaches model lighting in either frequency domain or spatial domain which is insufficient to represent the complex lighting conditions in scenes and tends to produce inaccurate estimation. This paper presents NeedleLight, a new lighting estimation model that represents illumination with needlets and allows lighting estimation in both frequency domain and spatial domain jointly. An optimal thresholding function is designed to achieve sparse needlets which trims redundant lighting parameters and demonstrates superior localization properties for illumination representation. In addition, a novel spherical transport loss is designed based on optimal transport theory which guides to regress lighting representation parameters with consideration of the spatial information. Furthermore, we propose a new metric that is concise yet effective by directly evaluating the estimated illumination maps rather than rendered images. Extensive experiments show that NeedleLight achieves superior lighting estimation consistently across multiple evaluation metrics as compared with state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Accurate lighting estimation is challenging yet critical to many computer vision and computer graphics tasks such as high-dynamic-range (HDR) relighting. Existing approaches model lighting in either frequency domain or spatial domain which is insufficient to represent the complex lighting conditions in scenes and tends to produce inaccurate estimation. This paper presents NeedleLight, a new lighting estimation model that represents illumination with needlets and allows lighting estimation in both frequency domain and spatial domain jointly. An optimal thresholding function is designed to achieve sparse needlets which trims redundant lighting parameters and demonstrates superior localization properties for illumination representation. In addition, a novel spherical transport loss is designed based on optimal transport theory which guides to regress lighting representation parameters with consideration of the spatial information. Furthermore, we propose a new metric that is concise yet effective by directly evaluating the estimated illumination maps rather than rendered images. Extensive experiments show that NeedleLight achieves superior lighting estimation consistently across multiple evaluation metrics as compared with state-of-the-art methods.", "fno": "281200m2810", "keywords": [ "Measurement", "Location Awareness", "Training", "Computer Vision", "Frequency Domain Analysis", "Computational Modeling", "Lighting", "3 D From A Single Image And Shape From X", "Computational Photography" ], "authors": [ { "affiliation": "Nanyang Technological University", "fullName": "Fangneng Zhan", "givenName": "Fangneng", "surname": "Zhan", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,DAMO Academy", "fullName": "Changgong Zhang", "givenName": "Changgong", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Chinese University of Hong Kong", "fullName": "Wenbo Hu", "givenName": "Wenbo", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University", "fullName": "Shijian Lu", "givenName": "Shijian", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,DAMO Academy", "fullName": "Feiying Ma", "givenName": "Feiying", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,DAMO Academy", "fullName": "Xuansong Xie", "givenName": "Xuansong", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": "Inception Institute of Artificial Intelligence", "fullName": "Ling Shao", "givenName": "Ling", "surname": "Shao", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "12810-12819", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200m2799", "articleId": "1BmJb3RcOGY", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200m2820", "articleId": "1BmGiQWvUXK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209c101", "title": "A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c101/12OmNBzRNty", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/1/01315013", "title": "Spherical harmonics vs. Haar wavelets: basis for recovering illumination from cast shadows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315013/12OmNyL0Tly", "parentPublication": { "id": "proceedings/cvpr/2004/2158/1", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2008/02/ttp2008020197", "title": "A Theory Of Frequency Domain Invariants: Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency", "doi": null, "abstractUrl": "/journal/tp/2008/02/ttp2008020197/13rRUwwJWGR", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1998/02/mcg1998020022", "title": "Composite Lighting Simulations with Lighting Networks", "doi": null, "abstractUrl": "/magazine/cg/1998/02/mcg1998020022/13rRUx0xPvt", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/01/ttg2010010043", "title": "All-Frequency Lighting with Multiscale Spherical Radial Basis Functions", "doi": null, "abstractUrl": "/journal/tg/2010/01/ttg2010010043/13rRUxjQybO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192703", "title": "LiteVis: Integrated Visualization for Simulation-Based Decision Support in Lighting Design", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192703/13rRUxjQyvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300g920", "title": "Deep Sky Modeling for Single Image Outdoor Lighting Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300g920/1gyrdbEY2sM", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i548", "title": "SPLINE-Net: Sparse Photometric Stereo Through Lighting Interpolation and Normal Estimation Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i548/1hVldEvIqWY", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i538", "title": "Variational Uncalibrated Photometric Stereo Under General Lighting", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i538/1hVlknLM2EU", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150983", "title": "Deep Lighting Environment Map Estimation from Spherical Panoramas", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150983/1lPH5UYz7Da", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ziP833pXeE", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "acronym": "iccst", "groupId": "1838984", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1ziPhs64k0M", "doi": "10.1109/ICCST53801.2021.00127", "title": "A Comparative Analysis of Lighting Design Software", "normalizedTitle": "A Comparative Analysis of Lighting Design Software", "abstract": "With the rapid economic development and technical progress, the traditional means of lighting design can no longer meet the needs of people, leading to the emergence of new lighting design methods and lighting design software. With humanistic thought as the design concept in the art of lighting, lighting design is gradually becoming professional and standardized. Domestic and foreign software related to lighting design are developing at a fast pace in this industry, and each software has its own unique advantages and disadvantages. In this paper, a comparative analysis is made on DIALux, AGI32, Ecotect and Lightscape, the four commonly used domestic lighting design software.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid economic development and technical progress, the traditional means of lighting design can no longer meet the needs of people, leading to the emergence of new lighting design methods and lighting design software. With humanistic thought as the design concept in the art of lighting, lighting design is gradually becoming professional and standardized. Domestic and foreign software related to lighting design are developing at a fast pace in this industry, and each software has its own unique advantages and disadvantages. In this paper, a comparative analysis is made on DIALux, AGI32, Ecotect and Lightscape, the four commonly used domestic lighting design software.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid economic development and technical progress, the traditional means of lighting design can no longer meet the needs of people, leading to the emergence of new lighting design methods and lighting design software. With humanistic thought as the design concept in the art of lighting, lighting design is gradually becoming professional and standardized. Domestic and foreign software related to lighting design are developing at a fast pace in this industry, and each software has its own unique advantages and disadvantages. In this paper, a comparative analysis is made on DIALux, AGI32, Ecotect and Lightscape, the four commonly used domestic lighting design software.", "fno": "425400a585", "keywords": [ "Design Engineering", "Industrial Economics", "Lighting", "Professional Aspects", "Rapid Economic Development", "Foreign Software", "Domestic Lighting Design Software", "Professional Aspects", "Industries", "Economics", "Art", "Design Methodology", "Lighting", "Software", "Lighting Design", "CALD", "Software" ], "authors": [ { "affiliation": "Wuhan University of Technology,Key Laboratory of Digital Stage Design and Service Culture and Tourism Ministry of the PRC School of Mechanical and Engineering,Wuhan,China", "fullName": "Mingyang Su", "givenName": "Mingyang", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University of Technology,Key Laboratory of Digital Stage Design and Service Culture and Tourism Ministry of the PRC School of Mechanical and Engineering,Wuhan,China", "fullName": "Jingbing Wu", "givenName": "Jingbing", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University of Technology,Key Laboratory of Digital Stage Design and Service Culture and Tourism Ministry of the PRC School of Mechanical and Engineering,Wuhan,China", "fullName": "Hanxi Wang", "givenName": "Hanxi", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "585-589", "year": "2021", "issn": null, "isbn": "978-1-6654-4254-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "425400a580", "articleId": "1ziPbOS3Xby", "__typename": "AdjacentArticleType" }, "next": { "fno": "425400a590", "articleId": "1ziPiBaSOoo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itcs/2009/3688/2/3688b104", "title": "The Design of a Large-Scale Area Lighting Scheme Design Language for Olympic Park", "doi": null, "abstractUrl": "/proceedings-article/itcs/2009/3688b104/12OmNCdk2ZL", "parentPublication": { "id": "proceedings/itcs/2009/3688/2", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2004/8788/0/87880281", "title": "Light Collages: Lighting Design for Effective Visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880281/12OmNrJAe0V", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2010/3973/0/3973a282", "title": "Energy Efficient Lighting System Design for Building", "doi": null, "abstractUrl": "/proceedings-article/isms/2010/3973a282/12OmNwErpD4", "parentPublication": { "id": "proceedings/isms/2010/3973/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a331", "title": "Interactive Lighting and Material Design System for Cyber Worlds", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a331/12OmNxYbSXU", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwcs/2010/4003/0/4003a213", "title": "A Novel Design of Solid-State Lighting Control System", "doi": null, "abstractUrl": "/proceedings-article/apwcs/2010/4003a213/12OmNykTNkL", "parentPublication": { "id": "proceedings/apwcs/2010/4003/0", "title": "Wearable Computing Systems, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456434", "title": "Design of Fireworks Lighting Off Systems Based on USB Communication", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456434/12OmNzZWbN5", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122372", "title": "Structure-Aware Lighting Design for Volume Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122372/13rRUwghd97", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192703", "title": "LiteVis: Integrated Visualization for Simulation-Based Decision Support in Lighting Design", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192703/13rRUxjQyvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2020/8138/0/813800a546", "title": "Stage Lighting Simulation Based on Epipolar Sampling", "doi": null, "abstractUrl": "/proceedings-article/iccst/2020/813800a546/1p1goMqefzq", "parentPublication": { "id": "proceedings/iccst/2020/8138/0", "title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a230", "title": "The Research on the Visual Emotional Response of Tourists in the Lighting Environment of Dalian Art Museum Based on the Correlation Analysis of SPSS", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a230/1tROx8Bbp1C", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzZmZgK", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwENyH", "doi": "10.1145/1065385.1065445", "title": "A focus-context browser for multiple timelines", "normalizedTitle": "A focus-context browser for multiple timelines", "abstract": "Events may be best understood in the context of other events. We can call a set of related events a \"timeline\", because of the temporal ordering. Such timelines are themselves best understood in the context of other timelines. To facilitate the exploration of a collection of events and timelines, a visualization tool has been developed that facilitates the user's ability to compare and browse across events and timelines. In this model, each event is accompanied by a text description and links to related resources such as articles from digitized historical newspapers", "abstracts": [ { "abstractType": "Regular", "content": "Events may be best understood in the context of other events. We can call a set of related events a \"timeline\", because of the temporal ordering. Such timelines are themselves best understood in the context of other timelines. To facilitate the exploration of a collection of events and timelines, a visualization tool has been developed that facilitates the user's ability to compare and browse across events and timelines. In this model, each event is accompanied by a text description and links to related resources such as articles from digitized historical newspapers", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Events may be best understood in the context of other events. We can call a set of related events a \"timeline\", because of the temporal ordering. Such timelines are themselves best understood in the context of other timelines. To facilitate the exploration of a collection of events and timelines, a visualization tool has been developed that facilitates the user's ability to compare and browse across events and timelines. In this model, each event is accompanied by a text description and links to related resources such as articles from digitized historical newspapers", "fno": "04118551", "keywords": [ "Data Visualisation", "Graphical User Interfaces", "History", "Online Front Ends", "Multiple Timelines", "Focus Context Browser", "Temporal Ordering", "Visualization Tool", "Text Description", "Digitized Historical Newspapers", "History", "Focusing", "Visualization", "Human Factors", "Bridges", "Educational Institutions", "Information Science", "Computer Science Education", "Cultural Differences", "Libraries", "Causation", "Cultural Heritage", "Events", "History", "Newspapers", "Timelines" ], "authors": [ { "affiliation": "Drexel University, Philadelphia, PA", "fullName": "Robert B. Allen", "givenName": "Robert B.", "surname": "Allen", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-06-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2005", "issn": null, "isbn": "1-58113-876-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04118550", "articleId": "12OmNxWuiis", "__typename": "AdjacentArticleType" }, "next": { "fno": "04118552", "articleId": "12OmNwFicXb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2012/1353/0/06462310", "title": "A survey of attitudes, beliefs, and perceptions regarding the internationalization of engineering and Computer Science undergraduate programs at the University of Victoria", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462310/12OmNA0vnYj", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2015/0163/0/0163a534", "title": "Toward a Robust Diversity-Based Model to Detect Changes of Context", "doi": null, "abstractUrl": "/proceedings-article/ictai/2015/0163a534/12OmNBIWXzf", "parentPublication": { "id": "proceedings/ictai/2015/0163/0", "title": "2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/empire/2012/4363/0/06347676", "title": "Evidence-based timelines for project retrospectives — A method for assessing requirements engineering in context", "doi": null, "abstractUrl": "/proceedings-article/empire/2012/06347676/12OmNBpVPZY", "parentPublication": { "id": "proceedings/empire/2012/4363/0", "title": "2012 IEEE Second International Workshop on Empirical Requirements Engineering (EmpiRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/3/01265899", "title": "Ways of knowing: ways of practice", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01265899/12OmNrHB1W1", "parentPublication": { "id": "proceedings/fie/2003/7961/3", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgsew/2014/5206/0/5206a015", "title": "GSD Sim: A Global Software Development Game", "doi": null, "abstractUrl": "/proceedings-article/icgsew/2014/5206a015/12OmNwcl7Dw", "parentPublication": { "id": "proceedings/icgsew/2014/5206/0", "title": "2014 IEEE International Conference on Global Software Engineeering Workshops (ICGSEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/1998/4762/1/00736882", "title": "Teaching history in computing", "doi": null, "abstractUrl": "/proceedings-article/fie/1998/00736882/12OmNxwWoWr", "parentPublication": { "id": "proceedings/fie/1998/4762/1", "title": "FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/5/00495299", "title": "Organizational usability of digital libraries in the courts", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495299/12OmNzmclUd", "parentPublication": { "id": "proceedings/hicss/1996/7324/5", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192669", "title": "TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured Text", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192669/13rRUxjQyvn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/geicse/2022/9294/0/929400a027", "title": "Pros and Cons of running educational Hackathons in a gender-neutral fashion", "doi": null, "abstractUrl": "/proceedings-article/geicse/2022/929400a027/1FRKuRJAZ68", "parentPublication": { "id": "proceedings/geicse/2022/9294/0", "title": "2022 IEEE/ACM 3rd International Workshop on Gender Equality, Diversity and Inclusion in Software Engineering (GEICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028563", "title": "Teachers’ Awards - an Incentive for Pedagogical Development in Saudi Arabia", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028563/1iffhRc7UyY", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvzJG4b", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "2", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNy6qfQB", "doi": "10.1109/ICME.2004.1394447", "title": "Dividable dynamic timeline-based authoring for SMI 2.0 presentations", "normalizedTitle": "Dividable dynamic timeline-based authoring for SMI 2.0 presentations", "abstract": "Timeline-based editing provides users an intuitive and friendly way of multimedia authoring, but the schedule-based and deterministic property of the timeline results in a lack of ability to support non-deterministic temporal behavior, which is one of the key features of SMIL2.0. This paper presents the efforts to support non-deterministic temporal behavior by timeline-based editing. The concept of dividable dynamic timeline (DDT) is proposed in the paper, which includes two novel features: dividable timeline and dynamic section. With DDTL, authors can create interactive multimedia presentations while enjoying the convenience of the timeline. Mechanisms for converting from DDTL editing results to SMTL2.0 are also presented in the paper", "abstracts": [ { "abstractType": "Regular", "content": "Timeline-based editing provides users an intuitive and friendly way of multimedia authoring, but the schedule-based and deterministic property of the timeline results in a lack of ability to support non-deterministic temporal behavior, which is one of the key features of SMIL2.0. This paper presents the efforts to support non-deterministic temporal behavior by timeline-based editing. The concept of dividable dynamic timeline (DDT) is proposed in the paper, which includes two novel features: dividable timeline and dynamic section. With DDTL, authors can create interactive multimedia presentations while enjoying the convenience of the timeline. Mechanisms for converting from DDTL editing results to SMTL2.0 are also presented in the paper", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Timeline-based editing provides users an intuitive and friendly way of multimedia authoring, but the schedule-based and deterministic property of the timeline results in a lack of ability to support non-deterministic temporal behavior, which is one of the key features of SMIL2.0. This paper presents the efforts to support non-deterministic temporal behavior by timeline-based editing. The concept of dividable dynamic timeline (DDT) is proposed in the paper, which includes two novel features: dividable timeline and dynamic section. With DDTL, authors can create interactive multimedia presentations while enjoying the convenience of the timeline. Mechanisms for converting from DDTL editing results to SMTL2.0 are also presented in the paper", "fno": "01394447", "keywords": [ "Authoring Systems", "Interactive Programming", "Multimedia Systems", "Multimedia Documents", "SMIL Document", "Dividable Dynamic Timeline Based Authoring", "SMI 2 0 Presentations", "Timeline Based Editing", "Multimedia Authoring", "Nondeterministic Temporal Behavior", "DDT", "Dynamic Section", "Interactive Multimedia Presentations", "DDTL SMTL 2 0 Conversion", "Visualization", "Timing", "Authoring Systems", "Multimedia Communication", "Computer Science", "Processor Scheduling", "Image Converters", "Samarium", "World Wide Web", "Internet" ], "authors": [ { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Chun-Chuan Yang", "givenName": null, "surname": "Chun-Chuan Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Chen-Kuei Chu", "givenName": null, "surname": "Chen-Kuei Chu", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Yung-Chi Wang", "givenName": null, "surname": "Yung-Chi Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "1243,1244,1245,1246", "year": "2004", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01394446", "articleId": "12OmNyUnEJT", "__typename": "AdjacentArticleType" }, "next": { "fno": "01394448", "articleId": "12OmNzFdt9n", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmcs/1996/7436/0/74360291", "title": "Refining the MATILDA multimedia authoring framework with a visual formalism", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1996/74360291/12OmNBhpRYL", "parentPublication": { "id": "proceedings/icmcs/1996/7436/0", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2001/1198/0/11980199", "title": "AUTHORING AND NAVIGATING HYPERMEDIA DOCUMENTS ON THE WWW", "doi": null, "abstractUrl": "/proceedings-article/icme/2001/11980199/12OmNC8MsyH", "parentPublication": { "id": "proceedings/icme/2001/1198/0", "title": "IEEE International Conference on Multimedia and Expo, 2001. ICME 2001.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mse/2000/0933/0/09330385", "title": "JACIE-an authoring language for rapid prototyping net-centric, multimedia and collaborative applications", "doi": null, "abstractUrl": "/proceedings-article/mse/2000/09330385/12OmNqGRGjs", "parentPublication": { "id": "proceedings/mse/2000/0933/0", "title": "Microelectronics Systems Education, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mse/2002/1857/0/18570206", "title": "A Visual Authoring Environment for Prototyping Multimedia Presentations", "doi": null, "abstractUrl": "/proceedings-article/mse/2002/18570206/12OmNy5zsrL", "parentPublication": { "id": "proceedings/mse/2002/1857/0", "title": "Microelectronics Systems Education, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/3/01394711", "title": "An object-based hypervideo authoring system", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394711/12OmNyoiZ90", "parentPublication": { "id": "proceedings/icme/2004/8603/3", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394445", "title": "Reuse of SMI 2.0 scripts in dividable dynamic timeline-based authoring", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394445/12OmNyuy9Vu", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmsd/1996/7511/0/75110150", "title": "Authoring MHEG Presentations with GLASS-Studio", "doi": null, "abstractUrl": "/proceedings-article/mmsd/1996/75110150/12OmNzcxZje", "parentPublication": { "id": "proceedings/mmsd/1996/7511/0", "title": "Multimedia Software Development, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvzJG4b", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "2", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNyuy9Vu", "doi": "10.1109/ICME.2004.1394445", "title": "Reuse of SMI 2.0 scripts in dividable dynamic timeline-based authoring", "normalizedTitle": "Reuse of SMI 2.0 scripts in dividable dynamic timeline-based authoring", "abstract": "The dividable dynamic timeline (DDTL) was proposed in our previous work to address the non-deterministic temporal behavior in SMIL2.0 scripts. This paper presents the mechanisms for the reuse of SMIL2.0 scripts in authoring a new presentation. To reuse a SMIL2.0 script, the script must be converted to elements in DDTL. By the reuse of existing SMIL2.0 scripts and the flexible features of DDTL, an efficient and friendly authoring environment for SMIL2.0-based interactive multimedia presentations can be provided", "abstracts": [ { "abstractType": "Regular", "content": "The dividable dynamic timeline (DDTL) was proposed in our previous work to address the non-deterministic temporal behavior in SMIL2.0 scripts. This paper presents the mechanisms for the reuse of SMIL2.0 scripts in authoring a new presentation. To reuse a SMIL2.0 script, the script must be converted to elements in DDTL. By the reuse of existing SMIL2.0 scripts and the flexible features of DDTL, an efficient and friendly authoring environment for SMIL2.0-based interactive multimedia presentations can be provided", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The dividable dynamic timeline (DDTL) was proposed in our previous work to address the non-deterministic temporal behavior in SMIL2.0 scripts. This paper presents the mechanisms for the reuse of SMIL2.0 scripts in authoring a new presentation. To reuse a SMIL2.0 script, the script must be converted to elements in DDTL. By the reuse of existing SMIL2.0 scripts and the flexible features of DDTL, an efficient and friendly authoring environment for SMIL2.0-based interactive multimedia presentations can be provided", "fno": "01394445", "keywords": [ "Authoring Languages", "Authoring Systems", "Interactive Systems", "Multimedia Systems", "Synchronisation", "Dividable Dynamic Timeline Based Authoring", "Synchronized Multimedia Integrated Language", "SMI 2 0 Script Reuse", "DDTL Elements", "Script Nondeterministic Temporal Behavior", "Presentation Authoring", "SMIL 2 0 Based Interactive Multimedia Presentations", "Visualization", "Scheduling", "Timing", "Data Mining", "Multimedia Communication", "Computer Science", "Web Sites", "Internet", "Authoring Systems", "Runtime" ], "authors": [ { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Chun-Chuan Yang", "givenName": null, "surname": "Chun-Chuan Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Yung-Chi Wang", "givenName": null, "surname": "Yung-Chi Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Inf. Eng., Nat. Chi Nan Univ., Taiwan", "fullName": "Chen-Kuei Chu", "givenName": null, "surname": "Chen-Kuei Chu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "1235,1236,1237,1238", "year": "2004", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01394444", "articleId": "12OmNBKEytS", "__typename": "AdjacentArticleType" }, "next": { "fno": "01394446", "articleId": "12OmNyUnEJT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcasia/1997/7901/0/79010517", "title": "Integrated Multimedia E-mail Handler with Authoring Tool", "doi": null, "abstractUrl": "/proceedings-article/hpcasia/1997/79010517/12OmNB9KHtQ", "parentPublication": { "id": "proceedings/hpcasia/1997/7901/0", "title": "High Performance Computing and Grid in Asia Pacific Region, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smap/2008/3444/0/3444a009", "title": "Towards an Authoring Tool for Personalizable Multimedia Content", "doi": null, "abstractUrl": "/proceedings-article/smap/2008/3444a009/12OmNBBzohA", "parentPublication": { "id": "proceedings/smap/2008/3444/0", "title": "2008 Third International Workshop on Semantic Media Adaptation and Personalization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/c5/2008/3115/0/3115a133", "title": "New Metaphors for Multimedia Authoring Environments", "doi": null, "abstractUrl": "/proceedings-article/c5/2008/3115a133/12OmNClQ0Be", "parentPublication": { "id": "proceedings/c5/2008/3115/0", "title": "2008 6th International Conference on Creating, Connecting and Collaborating through Computing (C5 '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1996/7508/0/75080276", "title": "Interactive Authoring of Multimedia Documents", "doi": null, "abstractUrl": "/proceedings-article/vl/1996/75080276/12OmNy3iFh5", "parentPublication": { "id": "proceedings/vl/1996/7508/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mse/2002/1857/0/18570206", "title": "A Visual Authoring Environment for Prototyping Multimedia Presentations", "doi": null, "abstractUrl": "/proceedings-article/mse/2002/18570206/12OmNy5zsrL", "parentPublication": { "id": "proceedings/mse/2002/1857/0", "title": "Microelectronics Systems Education, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394447", "title": "Dividable dynamic timeline-based authoring for SMI 2.0 presentations", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394447/12OmNy6qfQB", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compcon/1996/7414/0/74140300", "title": "Graphical containment in multimedia authoring", "doi": null, "abstractUrl": "/proceedings-article/compcon/1996/74140300/12OmNzZ5olH", "parentPublication": { "id": "proceedings/compcon/1996/7414/0", "title": "Computer Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compcon/1996/7414/0/74140305", "title": "User interfaces for authoring systems with object stores", "doi": null, "abstractUrl": "/proceedings-article/compcon/1996/74140305/12OmNzw8jeZ", "parentPublication": { "id": "proceedings/compcon/1996/7414/0", "title": "Computer Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/1995/04/u4024", "title": "Hypermedia Authoring", "doi": null, "abstractUrl": "/magazine/mu/1995/04/u4024/13rRUwInvoX", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2003/04/01237555", "title": "Authoring 744: writing descriptions to create content", "doi": null, "abstractUrl": "/magazine/mu/2003/04/01237555/13rRUwd9CIi", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1aDSOMTGCIw", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1aDSTXST9fO", "doi": "10.1109/ICDE.2019.00250", "title": "Location Inference for Non-Geotagged Tweets in User Timelines [Extended Abstract]", "normalizedTitle": "Location Inference for Non-Geotagged Tweets in User Timelines [Extended Abstract]", "abstract": "This study explores the problem of inferring locations for individual tweets. We scrutinize Twitter user timelines in a novel fashion. First of all, we split each user's tweet timeline temporally into a number of clusters, each tending to imply a distinct location. Subsequently, we adapt machine learning models to our setting and design classifiers that classify each tweet cluster into one of the pre-defined location classes at the city level. Extensive experiments on a large set of real Twitter data suggest that our models are effective at inferring locations for non-geotagged tweets and outperform the state-of-the-art approaches significantly in terms of inference accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "This study explores the problem of inferring locations for individual tweets. We scrutinize Twitter user timelines in a novel fashion. First of all, we split each user's tweet timeline temporally into a number of clusters, each tending to imply a distinct location. Subsequently, we adapt machine learning models to our setting and design classifiers that classify each tweet cluster into one of the pre-defined location classes at the city level. Extensive experiments on a large set of real Twitter data suggest that our models are effective at inferring locations for non-geotagged tweets and outperform the state-of-the-art approaches significantly in terms of inference accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study explores the problem of inferring locations for individual tweets. We scrutinize Twitter user timelines in a novel fashion. First of all, we split each user's tweet timeline temporally into a number of clusters, each tending to imply a distinct location. Subsequently, we adapt machine learning models to our setting and design classifiers that classify each tweet cluster into one of the pre-defined location classes at the city level. Extensive experiments on a large set of real Twitter data suggest that our models are effective at inferring locations for non-geotagged tweets and outperform the state-of-the-art approaches significantly in terms of inference accuracy.", "fno": "747400c111", "keywords": [ "Data Analysis", "Inference Mechanisms", "Internet", "Learning Artificial Intelligence", "Pattern Classification", "Social Networking Online", "User Timelines", "Tweet Cluster Classification", "Location Classes", "Machine Learning Models", "Location Inference", "Inference Accuracy", "Nongeotagged Tweets", "Twitter Data", "Twitter", "Testing", "Urban Areas", "Training", "Data Models", "Convolution", "Computational Modeling", "Twitter Location Inference Bayes LSTM" ], "authors": [ { "affiliation": "Zhejiang University, China", "fullName": "Pengfei Li", "givenName": "Pengfei", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Aalborg University", "fullName": "Hua Lu", "givenName": "Hua", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "NTENT, Barcelona, Spain", "fullName": "Nattiya Kanhabua", "givenName": "Nattiya", "surname": "Kanhabua", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Sha Zhao", "givenName": "Sha", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Gang Pan", "givenName": "Gang", "surname": "Pan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "2111-2112", "year": "2019", "issn": null, "isbn": "978-1-5386-7474-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "747400c106", "articleId": "1aDSQM2bT9K", "__typename": "AdjacentArticleType" }, "next": { "fno": "747400c113", "articleId": "1aDT2u6GCxq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgc/2013/5114/0/5114a575", "title": "Inferring the Interesting Tweets in Your Network", "doi": null, "abstractUrl": "/proceedings-article/cgc/2013/5114a575/12OmNAR1aVB", "parentPublication": { "id": "proceedings/cgc/2013/5114/0", "title": "2013 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406289", "title": "Characterizing Urban Landscapes Using Geolocated Tweets", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406289/12OmNAq3hTP", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/3/9618c048", "title": "An Approach to Identify SPAM Tweets Based on Metadata", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618c048/12OmNBOllsQ", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/3", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800b178", "title": "TweeLoc: A System for Geolocalizing Tweets at Fine-Grain", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800b178/12OmNwtEEOg", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2018/5377/0/537701a386", "title": "Deep Learning Model for Classifying Drug Abuse Risk Behavior in Tweets", "doi": null, "abstractUrl": "/proceedings-article/ichi/2018/537701a386/12OmNx1qV7T", "parentPublication": { "id": "proceedings/ichi/2018/5377/0", "title": "2018 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/09/07913605", "title": "Towards Real-Time, Country-Level Location Classification of Worldwide Tweets", "doi": null, "abstractUrl": "/journal/tk/2017/09/07913605/13rRUwInvJO", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/09/08295255", "title": "A Survey of Location Prediction on Twitter", "doi": null, "abstractUrl": "/journal/tk/2018/09/08295255/13rRUxOdD8J", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/06/08403245", "title": "Location Inference for Non-Geotagged Tweets in User Timelines", "doi": null, "abstractUrl": "/journal/tk/2019/06/08403245/13rRUyeCkaV", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801a972", "title": "P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801a972/17D45Xq6dDl", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020460", "title": "Where did you tweet from? Inferring the origin locations of tweets based on contextual information", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020460/1KfT3iBYcTe", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dsfR2yEMbS", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vl-hcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dsfSMAJmwg", "doi": "10.1109/VLHCC.2019.8818871", "title": "Editable AI: Mixed Human-AI Authoring of Code Patterns", "normalizedTitle": "Editable AI: Mixed Human-AI Authoring of Code Patterns", "abstract": "Developers authoring HTML documents define elements following patterns which establish and reflect the visual structure of a document, such as making all images in a footer the same height by applying a class to each. To surface these patterns to developers and support developers in authoring consistent with these patterns, we propose a mixed human-AI technique for creating code patterns. Patterns are first learned from individual HTML documents through a decision tree, generating a representation which developers may view and edit. Code patterns are used to offer developers autocomplete suggestions, list examples, and flag violations. To evaluate our technique, we conducted a user study in which 24 participants wrote, edited, and corrected HTML documents. We found that our technique enabled developers to edit and correct documents more quickly and create, edit, and correct documents more successfully.", "abstracts": [ { "abstractType": "Regular", "content": "Developers authoring HTML documents define elements following patterns which establish and reflect the visual structure of a document, such as making all images in a footer the same height by applying a class to each. To surface these patterns to developers and support developers in authoring consistent with these patterns, we propose a mixed human-AI technique for creating code patterns. Patterns are first learned from individual HTML documents through a decision tree, generating a representation which developers may view and edit. Code patterns are used to offer developers autocomplete suggestions, list examples, and flag violations. To evaluate our technique, we conducted a user study in which 24 participants wrote, edited, and corrected HTML documents. We found that our technique enabled developers to edit and correct documents more quickly and create, edit, and correct documents more successfully.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Developers authoring HTML documents define elements following patterns which establish and reflect the visual structure of a document, such as making all images in a footer the same height by applying a class to each. To surface these patterns to developers and support developers in authoring consistent with these patterns, we propose a mixed human-AI technique for creating code patterns. Patterns are first learned from individual HTML documents through a decision tree, generating a representation which developers may view and edit. Code patterns are used to offer developers autocomplete suggestions, list examples, and flag violations. To evaluate our technique, we conducted a user study in which 24 participants wrote, edited, and corrected HTML documents. We found that our technique enabled developers to edit and correct documents more quickly and create, edit, and correct documents more successfully.", "fno": "08818871", "keywords": [ "Artificial Intelligence", "Authoring Systems", "Decision Trees", "Hypermedia Markup Languages", "Internet", "User Interfaces", "Code Patterns", "Developers Autocomplete Suggestions", "Editable AI", "Human AI Authoring", "Support Developers", "Human AI Technique", "HTML Documents", "Iris", "Decision Trees", "Visualization", "Feature Extraction", "Training Data", "Computational Modeling", "Computer Science", "Explainable AI", "Autocomplete", "Example Centric Programming", "Decision Trees", "Development Environments" ], "authors": [ { "affiliation": "Department of Computer Science, University of Virginia Charlottesville, VA, USA", "fullName": "Kartik Chugh", "givenName": "Kartik", "surname": "Chugh", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, George Mason University Fairfax, VA, USA", "fullName": "Andrea Y. Solis", "givenName": "Andrea Y.", "surname": "Solis", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, George Mason University Fairfax, VA, USA", "fullName": "Thomas D. LaToza", "givenName": "Thomas D.", "surname": "LaToza", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl-hcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "35-43", "year": "2019", "issn": null, "isbn": "978-1-7281-0810-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08818751", "articleId": "1dsfUe8BHC8", "__typename": "AdjacentArticleType" }, "next": { "fno": "08818886", "articleId": "1dsfTA5sLJK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/caia/1992/2690/0/00200031", "title": "Learning to predict DNA hydration patterns", "doi": null, "abstractUrl": "/proceedings-article/caia/1992/00200031/12OmNAoUT2z", "parentPublication": { "id": "proceedings/caia/1992/2690/0", "title": "Proceedings Eighth Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2011/4557/0/4557a032", "title": "Efficient Approach for Repeated Patterns Mining Based on Indent Shape of HTML Documents", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2011/4557a032/12OmNBLdKP5", "parentPublication": { "id": "proceedings/cyberc/2011/4557/0", "title": "2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-euc/2013/5088/0/06832037", "title": "Using Traditional Data Analysis Algorithms to Detect Access Patterns for Massive Data Processing", "doi": null, "abstractUrl": "/proceedings-article/hpcc-euc/2013/06832037/12OmNvlg8j1", "parentPublication": { "id": "proceedings/hpcc-euc/2013/5088/0", "title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209a483", "title": "Sensing Visual Attention by Sequential Patterns", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a483/12OmNxvNZWi", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2003/1978/0/19780747", "title": "Detecting Patterns of Change Using Enhanced Parallel Coordinates Visualization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2003/19780747/12OmNy7yElF", "parentPublication": { "id": "proceedings/icdm/2003/1978/0", "title": "Third IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/1997/8105/0/81050320", "title": "Structured Document Framework for Design Patterns Based on SGML", "doi": null, "abstractUrl": "/proceedings-article/compsac/1997/81050320/12OmNyRg4yz", "parentPublication": { "id": "proceedings/compsac/1997/8105/0", "title": "Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2008/03/mic2008030078", "title": "Generating Synthetic Data to Match Data Mining Patterns", "doi": null, "abstractUrl": "/magazine/ic/2008/03/mic2008030078/13rRUwcS1Ba", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2018/1970/0/197000a049", "title": "Architecture Patterns, Quality Attributes, and Design Contexts: How Developers Design with Them", "doi": null, "abstractUrl": "/proceedings-article/apsec/2018/197000a049/1b66mkcMEh2", "parentPublication": { "id": "proceedings/apsec/2018/1970/0", "title": "2018 25th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232651", "title": "Multimedia Document Mining using Sequential Multimedia Feature Patterns", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232651/1o56CwisBji", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400b813", "title": "Recommending Attack Patterns for Software Requirements Document", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400b813/1uGYxJ9L4ly", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAlvHKQ", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzC5SH3", "doi": "10.1109/WI.2016.0015", "title": "Discovering Coherent Topics with Entity Topic Models", "normalizedTitle": "Discovering Coherent Topics with Entity Topic Models", "abstract": "Probabilistic topic models are powerful techniques which are widely used for discovering topics or semantic content from a large collection of documents. However, because topic models are entirely unsupervised, they may lead to topics that are not understandable in applications. Recently, several knowledge-based topic models have been proposed which primarily use word-level domain knowledge in the model to enhance the topic coherence and ignore the rich information carried by entities (e.g persons, location, organizations, etc.) associated with the documents. Additionally, there exists a vast amount of prior knowledge (background knowledge) represented as ontologies and Linked Open Data (LOD), which can be incorporated into the topic models to produce coherent topics. In this paper, we introduce a novel entity-based topic model, called EntLDA, to effectively integrate an ontology with an entity topic model to improve the topic modeling process. Furthermore, to increase the coherence of the identified topics, we introduce a novel ontology-based regularization framework, which is then integrated with the EntLDA model. Our experimental results demonstrate the effectiveness of the proposed model in improving the coherence of the topics.", "abstracts": [ { "abstractType": "Regular", "content": "Probabilistic topic models are powerful techniques which are widely used for discovering topics or semantic content from a large collection of documents. However, because topic models are entirely unsupervised, they may lead to topics that are not understandable in applications. Recently, several knowledge-based topic models have been proposed which primarily use word-level domain knowledge in the model to enhance the topic coherence and ignore the rich information carried by entities (e.g persons, location, organizations, etc.) associated with the documents. Additionally, there exists a vast amount of prior knowledge (background knowledge) represented as ontologies and Linked Open Data (LOD), which can be incorporated into the topic models to produce coherent topics. In this paper, we introduce a novel entity-based topic model, called EntLDA, to effectively integrate an ontology with an entity topic model to improve the topic modeling process. Furthermore, to increase the coherence of the identified topics, we introduce a novel ontology-based regularization framework, which is then integrated with the EntLDA model. Our experimental results demonstrate the effectiveness of the proposed model in improving the coherence of the topics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Probabilistic topic models are powerful techniques which are widely used for discovering topics or semantic content from a large collection of documents. However, because topic models are entirely unsupervised, they may lead to topics that are not understandable in applications. Recently, several knowledge-based topic models have been proposed which primarily use word-level domain knowledge in the model to enhance the topic coherence and ignore the rich information carried by entities (e.g persons, location, organizations, etc.) associated with the documents. Additionally, there exists a vast amount of prior knowledge (background knowledge) represented as ontologies and Linked Open Data (LOD), which can be incorporated into the topic models to produce coherent topics. In this paper, we introduce a novel entity-based topic model, called EntLDA, to effectively integrate an ontology with an entity topic model to improve the topic modeling process. Furthermore, to increase the coherence of the identified topics, we introduce a novel ontology-based regularization framework, which is then integrated with the EntLDA model. Our experimental results demonstrate the effectiveness of the proposed model in improving the coherence of the topics.", "fno": "4470a026", "keywords": [ "Ontologies", "Biological System Modeling", "Semantics", "Coherence", "Knowledge Based Systems", "Data Models", "Analytical Models", "Ontologies", "Statistical Learning", "Topic Modeling", "Topic Coherence", "Semantic Web" ], "authors": [ { "affiliation": null, "fullName": "Mehdi Allahyari", "givenName": "Mehdi", "surname": "Allahyari", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Krys Kochut", "givenName": "Krys", "surname": "Kochut", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "26-33", "year": "2016", "issn": null, "isbn": "978-1-5090-4470-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4470a018", "articleId": "12OmNxGSm74", "__typename": "AdjacentArticleType" }, "next": { "fno": "4470a034", "articleId": "12OmNAPjA5R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icise/2016/2287/0/07486210", "title": "Labelling Topics in Weibo Using Word Embedding and Graph-Based Method", "doi": null, "abstractUrl": "/proceedings-article/icise/2016/07486210/12OmNBQC874", "parentPublication": { "id": "proceedings/icise/2016/2287/0", "title": "2016 International Conference on Information Systems Engineering (ICISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a803", "title": "Topic Models with Topic Ordering Regularities for Topic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a803/12OmNvEyRbL", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2017/4203/0/4203a029", "title": "Leveraging External Knowledge for Phrase-Based Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/taai/2017/4203a029/12OmNzd7bFF", "parentPublication": { "id": "proceedings/taai/2017/4203/0", "title": "2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a254", "title": "Incorporating Entity Correlation Knowledge into Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a254/12OmNzdoMCc", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/02/07737042", "title": "Guided HTM: Hierarchical Topic Model with Dirichlet Forest Priors", "doi": null, "abstractUrl": "/journal/tk/2017/02/07737042/13rRUygBwi4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594882", "title": "ASTM: An Attentional Segmentation Based Topic Model for Short Texts", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594882/17D45WwsQ6M", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecnlpir/2022/7382/0/738200a084", "title": "Multilingual Document Concept Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/ecnlpir/2022/738200a084/1KMQ5U38nXG", "parentPublication": { "id": "proceedings/ecnlpir/2022/7382/0", "title": "2022 European Conference on Natural Language Processing and Information Retrieval (ECNLPIR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2019/4543/0/08938961", "title": "NeurIPS Conference Papers Classification Based on Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/icat/2019/08938961/1fYfx2A5Mf6", "parentPublication": { "id": "proceedings/icat/2019/4543/0", "title": "2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09018114", "title": "Copula Guided Parallel Gibbs Sampling for Nonparametric and Coherent Topic Discovery", "doi": null, "abstractUrl": "/journal/tk/2022/01/09018114/1hN4iBNAecg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2021/3414/0/341400a001", "title": "GraphTMT: Unsupervised Graph-based Topic Modeling from Video Transcripts", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2021/341400a001/1zpEMx8sA3S", "parentPublication": { "id": "proceedings/bigmm/2021/3414/0", "title": "2021 IEEE Seventh International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy314bq", "title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "acronym": "snpd", "groupId": "1001811", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzC5Tgr", "doi": "10.1109/SNPD.2016.7515925", "title": "Exploring topic models in software engineering data analysis: A survey", "normalizedTitle": "Exploring topic models in software engineering data analysis: A survey", "abstract": "Topic models are shown to be effective to mine unstructured software engineering (SE) data. In this paper, we give a simple survey of exploring topic models to support various SE tasks between 2003 and 2015. The survey results show that there is an increasing concern in this area. Among the SE tasks, source code comprehension and software history comprehension are the mostly studied, followed by software defects prediction. However, there is still only a few studies on other SE tasks, such as feature location and regression testing.", "abstracts": [ { "abstractType": "Regular", "content": "Topic models are shown to be effective to mine unstructured software engineering (SE) data. In this paper, we give a simple survey of exploring topic models to support various SE tasks between 2003 and 2015. The survey results show that there is an increasing concern in this area. Among the SE tasks, source code comprehension and software history comprehension are the mostly studied, followed by software defects prediction. However, there is still only a few studies on other SE tasks, such as feature location and regression testing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topic models are shown to be effective to mine unstructured software engineering (SE) data. In this paper, we give a simple survey of exploring topic models to support various SE tasks between 2003 and 2015. The survey results show that there is an increasing concern in this area. Among the SE tasks, source code comprehension and software history comprehension are the mostly studied, followed by software defects prediction. However, there is still only a few studies on other SE tasks, such as feature location and regression testing.", "fno": "07515925", "keywords": [ "Software", "Object Oriented Modeling", "Software Engineering", "Conferences", "Analytical Models", "Predictive Models", "Data Models", "Survey", "Software Engineering", "Topic Models" ], "authors": [ { "affiliation": "School of Information Engineering, Yangzhou University, China", "fullName": "Xiaobing Sun", "givenName": "Xiaobing", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Engineering, Yangzhou University, China", "fullName": "Xiangyue Liu", "givenName": "Xiangyue", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Engineering, Yangzhou University, China", "fullName": "Bin Li", "givenName": "Bin", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Hainan University, Haikou, China", "fullName": "Yucong Duan", "givenName": "Yucong", "surname": "Duan", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Engineering, Yangzhou University, China", "fullName": "Hui Yang", "givenName": "Hui", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Engineering, Yangzhou University, China", "fullName": "Jiajun Hu", "givenName": "Jiajun", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "snpd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "357-362", "year": "2016", "issn": null, "isbn": "978-1-5090-2239-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07515924", "articleId": "12OmNqEAT9g", "__typename": "AdjacentArticleType" }, "next": { "fno": "07515926", "articleId": "12OmNs5rkOE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/conisoft/2016/1074/0/1074a097", "title": "A Serious Game to Promote Object Oriented Programming and Software Engineering Basic Concepts Learning", "doi": null, "abstractUrl": "/proceedings-article/conisoft/2016/1074a097/12OmNB8TUeu", "parentPublication": { "id": "proceedings/conisoft/2016/1074/0", "title": "2016 4th International Conference in Software Engineering Research and Innovation (CONISOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/2/0367b260", "title": "Infusing Topic Modeling into Interactive Program Comprehension: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367b260/12OmNqOfftG", "parentPublication": { "id": "compsac/2017/0367/2", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606598", "title": "How to effectively use topic models for software engineering tasks? An approach based on Genetic Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606598/12OmNro0HYn", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2011/0445/0/04451138", "title": "Mining software repositories using topic models", "doi": null, "abstractUrl": "/proceedings-article/icse/2011/04451138/12OmNwMXns5", "parentPublication": { "id": "proceedings/icse/2011/0445/0", "title": "2011 33rd International Conference on Software Engineering (ICSE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2017/3681/0/3681a642", "title": "Facilitating Scenario-Based Program Comprehension with Topic Models", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a642/12OmNwqx4aW", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gtse/2015/7052/0/7052a015", "title": "Exploring Theory of Cognition for General Theory of Software Engineering", "doi": null, "abstractUrl": "/proceedings-article/gtse/2015/7052a015/12OmNwtn3Az", "parentPublication": { "id": "proceedings/gtse/2015/7052/0", "title": "2015 IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering (GTSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a985", "title": "Discriminatively Enhanced Topic Models", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a985/12OmNzvQHOD", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/05/06914609", "title": "Discriminative Relational Topic Models", "doi": null, "abstractUrl": "/journal/tp/2015/05/06914609/13rRUNvyaal", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09896170", "title": "Impact of Software Engineering Research in Practice: A Patent and Author Survey Analysis", "doi": null, "abstractUrl": "/journal/ts/2023/04/09896170/1GP3QjV2eha", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/05/09237151", "title": "A Survey on the Use of Computer Vision to Improve Software Engineering Tasks", "doi": null, "abstractUrl": "/journal/ts/2022/05/09237151/1o8mJu65x3a", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KaFN97eXLi", "title": "2022 26th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KaH4pAKhva", "doi": "10.1109/IV56949.2022.00025", "title": "Relative Confusion Matrix: Efficient Comparison of Decision Models", "normalizedTitle": "Relative Confusion Matrix: Efficient Comparison of Decision Models", "abstract": "Current machine learning and deep learning approaches are cutting-edge methods for solving classification tasks. Comparing the performances of classification models has become a prominent task since the outbreak of these techniques. The performance of such classification models is measured by the ratio between the correctly predicted samples and the others. The most widely used visualization to represent this information is the Confusion matrix. Yet, if this technique is suited to apprehend one model performances, very few works use this representation to compare models. In that paper, we present the Relative Confusion Matrix (RCM), a new matrix visualization that leverages Confusion matrices and a color encoding to expose the class-wise differences of performances between two models. We conduct a user evaluation to compare RCM with two confusion matrix variants. Our results show that RCM encoding leads to a more efficient comparison of two models than existing approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Current machine learning and deep learning approaches are cutting-edge methods for solving classification tasks. Comparing the performances of classification models has become a prominent task since the outbreak of these techniques. The performance of such classification models is measured by the ratio between the correctly predicted samples and the others. The most widely used visualization to represent this information is the Confusion matrix. Yet, if this technique is suited to apprehend one model performances, very few works use this representation to compare models. In that paper, we present the Relative Confusion Matrix (RCM), a new matrix visualization that leverages Confusion matrices and a color encoding to expose the class-wise differences of performances between two models. We conduct a user evaluation to compare RCM with two confusion matrix variants. Our results show that RCM encoding leads to a more efficient comparison of two models than existing approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current machine learning and deep learning approaches are cutting-edge methods for solving classification tasks. Comparing the performances of classification models has become a prominent task since the outbreak of these techniques. The performance of such classification models is measured by the ratio between the correctly predicted samples and the others. The most widely used visualization to represent this information is the Confusion matrix. Yet, if this technique is suited to apprehend one model performances, very few works use this representation to compare models. In that paper, we present the Relative Confusion Matrix (RCM), a new matrix visualization that leverages Confusion matrices and a color encoding to expose the class-wise differences of performances between two models. We conduct a user evaluation to compare RCM with two confusion matrix variants. Our results show that RCM encoding leads to a more efficient comparison of two models than existing approaches.", "fno": "900700a098", "keywords": [ "Data Visualisation", "Deep Learning Artificial Intelligence", "Matrix Algebra", "Pattern Classification", "Classification Tasks", "Cutting Edge Methods", "Decision Models", "Deep Learning", "Efficient Comparison", "Machine Learning", "Matrix Visualization", "RCM", "Relative Confusion Matrix", "Deep Learning", "Visualization", "Current Measurement", "Color", "Predictive Models", "Encoding", "Task Analysis", "Confusion Matrix", "Models Comparison", "Evaluation" ], "authors": [ { "affiliation": "Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI,Talence,France,UMR5800, F-33400", "fullName": "Luc-Etienne Pommé", "givenName": "Luc-Etienne", "surname": "Pommé", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI,Talence,France,UMR5800, F-33400", "fullName": "Romain Bourqui", "givenName": "Romain", "surname": "Bourqui", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI,Talence,France,UMR5800, F-33400", "fullName": "Romain Giot", "givenName": "Romain", "surname": "Giot", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Bordeaux, CNRS, Bordeaux INP, LaBRI,Talence,France,UMR5800, F-33400", "fullName": "David Auber", "givenName": "David", "surname": "Auber", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "98-103", "year": "2022", "issn": null, "isbn": "978-1-6654-9007-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "900700a091", "articleId": "1KaH0Tc7hDy", "__typename": "AdjacentArticleType" }, "next": { "fno": "900700a104", "articleId": "1KaFNxrDmY8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460209", "title": "Robust lyric search based on weighted syllable confusion matrix", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460209/12OmNBKEytT", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c947", "title": "The Research for Color Image Encoding Based on 4-D n Order Orthogonal Matrix", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c947/12OmNrAdsG4", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2010/8817/1/05670052", "title": "Discountings of a Belief Function Using a Confusion Matrix", "doi": null, "abstractUrl": "/proceedings-article/ictai/2010/05670052/12OmNvs4vo4", "parentPublication": { "id": "proceedings/ictai/2010/8817/1", "title": "2010 22nd IEEE International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/03/ttp2013030653", "title": "Reidentification by Relative Distance Comparison", "doi": null, "abstractUrl": "/journal/tp/2013/03/ttp2013030653/13rRUNvgz5A", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/09/07879291", "title": "Confusion-Matrix-Based Kernel Logistic Regression for Imbalanced Data Classification", "doi": null, "abstractUrl": "/journal/tk/2017/09/07879291/13rRUwjGoM5", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400b362", "title": "Probabilistic Matrix Completion", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400b362/1MrFY3QMtnq", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2019/3891/0/08925037", "title": "Classifying Confusion: Autodetection of Communicative Misunderstandings using Facial Action Units", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2019/08925037/1fHFghPpp3q", "parentPublication": { "id": "proceedings/aciiw/2019/3891/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a688", "title": "A Semantic Collaborative Clustering Approach Based on Confusion Matrix", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a688/1j9xELt5Uwo", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09149790", "title": "ConfusionFlow: A Model-Agnostic Visualization for Temporal Analysis of Classifier Confusion", "doi": null, "abstractUrl": "/journal/tg/2022/02/09149790/1lNXFpGivV6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219633", "title": "JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219633/1nRPhZmb7bi", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fTgF9x78sw", "title": "2019 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fTgG7SigOQ", "doi": "10.1109/VISUAL.2019.8933646", "title": "OCTVis: Ontology-Based Comparison of Topic Models", "normalizedTitle": "OCTVis: Ontology-Based Comparison of Topic Models", "abstract": "Evaluating topic modeling results requires communication between domain and NLP experts. OCTVis is a visual interface to compare the quality of two topic models when mapped against a domain ontology. Its design is based on detailed data and task models, and was tested in a case study in the healthcare domain.", "abstracts": [ { "abstractType": "Regular", "content": "Evaluating topic modeling results requires communication between domain and NLP experts. OCTVis is a visual interface to compare the quality of two topic models when mapped against a domain ontology. Its design is based on detailed data and task models, and was tested in a case study in the healthcare domain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Evaluating topic modeling results requires communication between domain and NLP experts. OCTVis is a visual interface to compare the quality of two topic models when mapped against a domain ontology. Its design is based on detailed data and task models, and was tested in a case study in the healthcare domain.", "fno": "08933646", "keywords": [ "Data Visualisation", "Health Care", "Medical Computing", "Natural Language Processing", "Ontologies Artificial Intelligence", "NLP Experts", "OCT Vis", "Visual Interface", "Domain Ontology", "Healthcare Domain", "Ontology Based Comparison", "Topic Modeling", "Ontologies", "Computational Modeling", "Task Analysis", "Data Models", "Measurement", "Analytical Models", "Semantics", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "University of British Columbia,Department of Computer Science", "fullName": "Amon Ge", "givenName": "Amon", "surname": "Ge", "__typename": "ArticleAuthorType" }, { "affiliation": "University of British Columbia,Department of Computer Science", "fullName": "Hyeju Jang", "givenName": "Hyeju", "surname": "Jang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of British Columbia,Department of Computer Science", "fullName": "Giuseppe Carenini", "givenName": "Giuseppe", "surname": "Carenini", "__typename": "ArticleAuthorType" }, { "affiliation": "University of British Columbia,Department of Emergency Medicine", "fullName": "Kendall Ho", "givenName": "Kendall", "surname": "Ho", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pittsburgh,School of Nursing", "fullName": "Young Ji Lee", "givenName": "Young Ji", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "66-70", "year": "2019", "issn": null, "isbn": "978-1-7281-4941-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08933537", "articleId": "1fTgJqwvR4I", "__typename": "AdjacentArticleType" }, "next": { "fno": "08933639", "articleId": "1fTgIqqkKLC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2014/4302/0/4302a803", "title": "Topic Models with Topic Ordering Regularities for Topic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a803/12OmNvEyRbL", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2018/4210/0/421001a881", "title": "Expert Identification Based on Dynamic LDA Topic Model", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a881/12OmNxA3Z04", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a026", "title": "Discovering Coherent Topics with Entity Topic Models", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a026/12OmNzC5SH3", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2016/0987/0/0987a537", "title": "Automatic Production of an Ontology with NLP: Comparison between a Prolog Based Approach and a Cloud Approach Based on Bluemix Watson Service", "doi": null, "abstractUrl": "/proceedings-article/cisis/2016/0987a537/12OmNzFMFmZ", "parentPublication": { "id": "proceedings/cisis/2016/0987/0", "title": "2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2017/1562/0/1562a032", "title": "Unsupervised Terminological Ontology Learning Based on Hierarchical Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/iri/2017/1562a032/12OmNzUPpAn", "parentPublication": { "id": "proceedings/iri/2017/1562/0", "title": "2017 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019821", "title": "PhenoLines: Phenotype Comparison Visualizations for Disease Subtyping via Topic Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019821/13rRUwI5U2P", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07194832", "title": "Task-Driven Comparison of Topic Models", "doi": null, "abstractUrl": "/journal/tg/2016/01/07194832/13rRUxBJhFA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006160", "title": "Search for K: Assessing Five Topic-Modeling Approaches to 120,000 Canadian Articles", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006160/1hJsniFbp3G", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a451", "title": "Maintaining Topic Models for Growing Corpora", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a451/1iffAgA2Jna", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2021/8899/0/889900a449", "title": "Ontology-based Document Recommendation System using Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/icsc/2021/889900a449/1rFzW5m23hC", "parentPublication": { "id": "proceedings/icsc/2021/8899/0", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgoo5VSJBm", "title": "Intelligent Computation Technology and Automation, International Conference on", "acronym": "icicta", "groupId": "1002487", "volume": "2", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyFU709", "doi": "10.1109/ICICTA.2011.391", "title": "An Image Correction Method of Fisheye Lens Based on Bilinear Interpolation", "normalizedTitle": "An Image Correction Method of Fisheye Lens Based on Bilinear Interpolation", "abstract": "Fisheye lens has a big viewing field, with the range between 180° to 270° which works at fixed angle, without spinning. It is widely applied in recent years. However, there is obvious distortion of the image, it is rarely used in the identification of objects. Spherical projection method was used to rectify the image. The method was introduced from the aspects of imaging, projection model, distortion model, bilinear interpolation adjusting etc. The result image has a high resolution, homogeneous illumination distribution suggesting that the method is practical.", "abstracts": [ { "abstractType": "Regular", "content": "Fisheye lens has a big viewing field, with the range between 180° to 270° which works at fixed angle, without spinning. It is widely applied in recent years. However, there is obvious distortion of the image, it is rarely used in the identification of objects. Spherical projection method was used to rectify the image. The method was introduced from the aspects of imaging, projection model, distortion model, bilinear interpolation adjusting etc. The result image has a high resolution, homogeneous illumination distribution suggesting that the method is practical.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fisheye lens has a big viewing field, with the range between 180° to 270° which works at fixed angle, without spinning. It is widely applied in recent years. However, there is obvious distortion of the image, it is rarely used in the identification of objects. Spherical projection method was used to rectify the image. The method was introduced from the aspects of imaging, projection model, distortion model, bilinear interpolation adjusting etc. The result image has a high resolution, homogeneous illumination distribution suggesting that the method is practical.", "fno": "05750916", "keywords": [ "Image Processing", "Interpolation", "Lenses", "Image Correction Method", "Fisheye Lens", "Bilinear Interpolation", "Image Distortion", "Spherical Projection Method", "Homogeneous Illumination Distribution", "Lenses", "Optical Distortion", "Optical Imaging", "Cameras", "Solid Modeling", "Interpolation", "Image Correction", "Image Processing", "Fisheye Lens", "Spherical Projection", "Bilinear Interpolation" ], "authors": [ { "affiliation": null, "fullName": "Bi Kun", "givenName": "Bi", "surname": "Kun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huang Feifei", "givenName": "Huang", "surname": "Feifei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Cheng", "givenName": "Wang", "surname": "Cheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-03-01T00:00:00", "pubType": "proceedings", "pages": "428-431", "year": "2011", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05750915", "articleId": "12OmNyRPgxg", "__typename": "AdjacentArticleType" }, "next": { "fno": "05750917", "articleId": "12OmNBKEyA5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/6/3304f133", "title": "Calibration and Correction for Omnidirectional Image with a Fisheye Lens", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304f133/12OmNB06l4X", "parentPublication": { "id": "proceedings/icnc/2008/3304/6", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2009/3716/0/3716a149", "title": "Real-Time Fisheye Lens Distortion Correction Using Automatically Generated Streaming Accelerators", "doi": null, "abstractUrl": "/proceedings-article/fccm/2009/3716a149/12OmNBUS79F", "parentPublication": { "id": "proceedings/fccm/2009/3716/0", "title": "Field-Programmable Custom Computing Machines, Annual IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78220237", "title": "Creating Image-Based VR Using a Self-Calibrating Fisheye Lens", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78220237/12OmNs59JHA", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a217", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a217/12OmNzVXNRA", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a370", "title": "Parameterized Synthetic Image Data Set for Fisheye Lens", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a370/17D45WaTkc9", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a561", "title": "Spatial Focal Loss for Pedestrian Detection in Fisheye Imagery", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a561/18j8Nt8TwNW", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a187", "title": "Distortion Correction of Building-Fisheye-Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a187/1dUo3WXGjbG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/4.803E44", "title": "Calibration of Axial Fisheye Cameras Through Generic Virtual Central Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/4.803E44/1hQqpDxzYbe", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b174", "title": "Deep Single Fisheye Image Camera Calibration for Over 180-degree Projection of Field of View", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b174/1yNinwg4Lvy", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzZmZgI", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "acronym": "iciicii", "groupId": "1811364", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzVXNRA", "doi": "10.1109/ICIICII.2015.136", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "normalizedTitle": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "abstract": "With the purpose of correcting the severe distortion in fisheye images captured by fisheye lens, an ellipsoid function model for fisheye lens correction is proposed. Firstly, an ellipsoidal function model need to be built. Secondly, based on this model, make preliminary correction to the fisheye images. Finally, adjust the parameters in the ellipsoidal function model to apply amendment to the images for better corrected results. Experiments with real circular fisheye images and elliptic fisheye images show that the correction model is feasible and effective.", "abstracts": [ { "abstractType": "Regular", "content": "With the purpose of correcting the severe distortion in fisheye images captured by fisheye lens, an ellipsoid function model for fisheye lens correction is proposed. Firstly, an ellipsoidal function model need to be built. Secondly, based on this model, make preliminary correction to the fisheye images. Finally, adjust the parameters in the ellipsoidal function model to apply amendment to the images for better corrected results. Experiments with real circular fisheye images and elliptic fisheye images show that the correction model is feasible and effective.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the purpose of correcting the severe distortion in fisheye images captured by fisheye lens, an ellipsoid function model for fisheye lens correction is proposed. Firstly, an ellipsoidal function model need to be built. Secondly, based on this model, make preliminary correction to the fisheye images. Finally, adjust the parameters in the ellipsoidal function model to apply amendment to the images for better corrected results. Experiments with real circular fisheye images and elliptic fisheye images show that the correction model is feasible and effective.", "fno": "8312a217", "keywords": [ "Distortion", "Mathematical Model", "Lenses", "Shape", "Optical Distortion", "Image Edge Detection", "Transportation", "Elliptic Fisheye Images", "Ellipsoidal Function Model", "Correction", "Amendment", "Circular Fisheye Images" ], "authors": [ { "affiliation": null, "fullName": "Bokai Zhang", "givenName": "Bokai", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jing Wang", "givenName": "Jing", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianke Li", "givenName": "Jianke", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaoyan Wang", "givenName": "Xiaoyan", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciicii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "217-221", "year": "2015", "issn": null, "isbn": "978-1-4673-8312-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8312a213", "articleId": "12OmNylsZBf", "__typename": "AdjacentArticleType" }, "next": { "fno": "8312a222", "articleId": "12OmNzuZUDb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2010/6442/0/05470360", "title": "Fisheye lens distortion correction on multicore and hardware accelerator platforms", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2010/05470360/12OmNAJ4pdE", "parentPublication": { "id": "proceedings/ipdps/2010/6442/0", "title": "2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/6/3304f133", "title": "Calibration and Correction for Omnidirectional Image with a Fisheye Lens", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304f133/12OmNB06l4X", "parentPublication": { "id": "proceedings/icnc/2008/3304/6", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2015/6759/0/07301373", "title": "Fresnel lens imaging with post-capture image processing", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2015/07301373/12OmNBLdKJ7", "parentPublication": { "id": "proceedings/cvprw/2015/6759/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2009/3716/0/3716a149", "title": "Real-Time Fisheye Lens Distortion Correction Using Automatically Generated Streaming Accelerators", "doi": null, "abstractUrl": "/proceedings-article/fccm/2009/3716a149/12OmNBUS79F", "parentPublication": { "id": "proceedings/fccm/2009/3716/0", "title": "Field-Programmable Custom Computing Machines, Annual IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/4353/2/05750916", "title": "An Image Correction Method of Fisheye Lens Based on Bilinear Interpolation", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750916/12OmNyFU709", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2013/5053/0/06475054", "title": "Automatic curve selection for lens distortion correction using Hough transform energy", "doi": null, "abstractUrl": "/proceedings-article/wacv/2013/06475054/12OmNzXFoJb", "parentPublication": { "id": "proceedings/wacv/2013/5053/0", "title": "Applications of Computer Vision, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2010/8833/0/05759696", "title": "A system and method for auto-correction of first order lens distortion", "doi": null, "abstractUrl": "/proceedings-article/aipr/2010/05759696/12OmNzw8jc1", "parentPublication": { "id": "proceedings/aipr/2010/8833/0", "title": "2010 IEEE 39th Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a187", "title": "Distortion Correction of Building-Fisheye-Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a187/1dUo3WXGjbG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h718", "title": "RDCFace: Radial Distortion Correction for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h718/1m3n9WusSUo", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiss", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "acronym": "icisce", "groupId": "1807704", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WaTkc9", "doi": "10.1109/ICISCE.2018.00084", "title": "Parameterized Synthetic Image Data Set for Fisheye Lens", "normalizedTitle": "Parameterized Synthetic Image Data Set for Fisheye Lens", "abstract": "Based on different projection geometry, a fisheye image can be presented as a parameterized non-rectilinear image. Deep neural networks(DNN) is one of the solutions for extracting the parameters for fisheye image feature expression. However, a number of images are required for training a reasonable prediction model for DNN. In this paper, we propose to extend the scale of the dataset using parameterized synthetic images which effectively boost the diversity of samples and avoid the limitation on the scale. To simulate different viewing angles and distances, we adopt controllable parameterized projection processes on transformation. The reliability of the proposed method is tested with the image captured by a fisheye camera. The synthetic fisheye image dataset is the first dataset that is developed by existing labeled perspective images. It is accessible via: http://www2.leuphana.de/misl/fisheye-data-set/.", "abstracts": [ { "abstractType": "Regular", "content": "Based on different projection geometry, a fisheye image can be presented as a parameterized non-rectilinear image. Deep neural networks(DNN) is one of the solutions for extracting the parameters for fisheye image feature expression. However, a number of images are required for training a reasonable prediction model for DNN. In this paper, we propose to extend the scale of the dataset using parameterized synthetic images which effectively boost the diversity of samples and avoid the limitation on the scale. To simulate different viewing angles and distances, we adopt controllable parameterized projection processes on transformation. The reliability of the proposed method is tested with the image captured by a fisheye camera. The synthetic fisheye image dataset is the first dataset that is developed by existing labeled perspective images. It is accessible via: http://www2.leuphana.de/misl/fisheye-data-set/.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Based on different projection geometry, a fisheye image can be presented as a parameterized non-rectilinear image. Deep neural networks(DNN) is one of the solutions for extracting the parameters for fisheye image feature expression. However, a number of images are required for training a reasonable prediction model for DNN. In this paper, we propose to extend the scale of the dataset using parameterized synthetic images which effectively boost the diversity of samples and avoid the limitation on the scale. To simulate different viewing angles and distances, we adopt controllable parameterized projection processes on transformation. The reliability of the proposed method is tested with the image captured by a fisheye camera. The synthetic fisheye image dataset is the first dataset that is developed by existing labeled perspective images. It is accessible via: http://www2.leuphana.de/misl/fisheye-data-set/.", "fno": "550000a370", "keywords": [ "Cameras", "Feature Extraction", "Neural Nets", "Object Detection", "Viewing Angles", "Projection Geometry", "Deep Neural Networks", "DNN", "Parametrized Nonrectilinear Image", "Labeled Perspective Images", "Controllable Parameterized Projection Processes", "Fisheye Image Feature Expression", "Fisheye Lens", "Parameterized Synthetic Image Data Set", "Synthetic Fisheye Image Dataset", "Fisheye Camera", "Parameterized Synthetic Images", "Reasonable Prediction Model", "Lenses", "Cameras", "Artificial Neural Networks", "Visualization", "Training", "Navigation", "Fisheye Lens", "Synthetic Data Set", "Neural Network", "Image Processing" ], "authors": [ { "affiliation": null, "fullName": "Zhen Chen", "givenName": "Zhen", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Anthimos Georgiadis", "givenName": "Anthimos", "surname": "Georgiadis", "__typename": "ArticleAuthorType" } ], "idPrefix": "icisce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "370-374", "year": "2018", "issn": null, "isbn": "978-1-5386-5500-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "550000a365", "articleId": "17D45WcjjRv", "__typename": "AdjacentArticleType" }, "next": { "fno": "550000a375", "articleId": "17D45VTRoyl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2011/4353/2/05750916", "title": "An Image Correction Method of Fisheye Lens Based on Bilinear Interpolation", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750916/12OmNyFU709", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a217", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a217/12OmNzVXNRA", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/04/ttp2013040813", "title": "Calibration of Ultrawide Fisheye Lens Cameras by Eigenvalue Minimization", "doi": null, "abstractUrl": "/journal/tp/2013/04/ttp2013040813/13rRUxASuNH", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192681", "title": "SchemeLens: A Content-Aware Vector-Based Fisheye Technique for Navigating Large Systems Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192681/13rRUxC0SEi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a313", "title": "360 Stitching from Dual-Fisheye Cameras Based on Feature Cluster Matching", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a313/17D45VVho41", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a561", "title": "Spatial Focal Loss for Pedestrian Detection in Fisheye Imagery", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a561/18j8Nt8TwNW", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a187", "title": "Distortion Correction of Building-Fisheye-Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a187/1dUo3WXGjbG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2019/0990/0/08909877", "title": "Supervised People Counting Using An Overhead Fisheye Camera", "doi": null, "abstractUrl": "/proceedings-article/avss/2019/08909877/1febLB2V8kg", "parentPublication": { "id": "proceedings/avss/2019/0990/0", "title": "2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150746", "title": "Toward Real-world Panoramic Image Enhancement", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150746/1lPHwVradBm", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18j8Ecq0jn2", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18j8Nt8TwNW", "doi": "10.1109/WACV.2019.00065", "title": "Spatial Focal Loss for Pedestrian Detection in Fisheye Imagery", "normalizedTitle": "Spatial Focal Loss for Pedestrian Detection in Fisheye Imagery", "abstract": "Objects in the periphery of fisheye images can become extremely distorted. This distortion can cause false positives and missed detections for automated object detection systems. This is problematic, not only for systems which have been trained on perspective images, but also for those that have been explicitly trained on fisheye data. In this paper we propose a new cost function for training object detectors on fisheye images. We model fisheye image distortion as an imbalanced domain problem and develop a domain association loss function to approach it with deep learning. We define separate domains based on the level of distortion within the image plane and propose a new objective function, inspired by the recently introduced focal loss for object detection, which we call a spatial focal loss. Our proposed loss incorporates a domain-modulating term which re-weights samples from different domains to encourage the learning of domain-invariant features. We implement spatial focal loss function in the YOLOv2 architecture and evaluate it on the task of pedestrian detection in a fisheye dataset captured by a 360 camera system mounted on a moving vehicle and labeled with over 11,000 pedestrian instances. Our experiments demonstrate that spatial focal loss can improve model performance in the highly distorted image periphery versus existing loss functions, including focal loss, without sacrificing performance in the less distorted image center, with no adaptations to network architectures required. By analyzing the locations of missed detections, we show further evidence that our loss function can improve the learning of domain-invariant features.", "abstracts": [ { "abstractType": "Regular", "content": "Objects in the periphery of fisheye images can become extremely distorted. This distortion can cause false positives and missed detections for automated object detection systems. This is problematic, not only for systems which have been trained on perspective images, but also for those that have been explicitly trained on fisheye data. In this paper we propose a new cost function for training object detectors on fisheye images. We model fisheye image distortion as an imbalanced domain problem and develop a domain association loss function to approach it with deep learning. We define separate domains based on the level of distortion within the image plane and propose a new objective function, inspired by the recently introduced focal loss for object detection, which we call a spatial focal loss. Our proposed loss incorporates a domain-modulating term which re-weights samples from different domains to encourage the learning of domain-invariant features. We implement spatial focal loss function in the YOLOv2 architecture and evaluate it on the task of pedestrian detection in a fisheye dataset captured by a 360 camera system mounted on a moving vehicle and labeled with over 11,000 pedestrian instances. Our experiments demonstrate that spatial focal loss can improve model performance in the highly distorted image periphery versus existing loss functions, including focal loss, without sacrificing performance in the less distorted image center, with no adaptations to network architectures required. By analyzing the locations of missed detections, we show further evidence that our loss function can improve the learning of domain-invariant features.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Objects in the periphery of fisheye images can become extremely distorted. This distortion can cause false positives and missed detections for automated object detection systems. This is problematic, not only for systems which have been trained on perspective images, but also for those that have been explicitly trained on fisheye data. In this paper we propose a new cost function for training object detectors on fisheye images. We model fisheye image distortion as an imbalanced domain problem and develop a domain association loss function to approach it with deep learning. We define separate domains based on the level of distortion within the image plane and propose a new objective function, inspired by the recently introduced focal loss for object detection, which we call a spatial focal loss. Our proposed loss incorporates a domain-modulating term which re-weights samples from different domains to encourage the learning of domain-invariant features. We implement spatial focal loss function in the YOLOv2 architecture and evaluate it on the task of pedestrian detection in a fisheye dataset captured by a 360 camera system mounted on a moving vehicle and labeled with over 11,000 pedestrian instances. Our experiments demonstrate that spatial focal loss can improve model performance in the highly distorted image periphery versus existing loss functions, including focal loss, without sacrificing performance in the less distorted image center, with no adaptations to network architectures required. By analyzing the locations of missed detections, we show further evidence that our loss function can improve the learning of domain-invariant features.", "fno": "197500a561", "keywords": [ "Cameras", "Learning Artificial Intelligence", "Object Detection", "Pedestrians", "Traffic Engineering Computing", "Camera System", "YOL Ov 2 Architecture", "Deep Learning", "Domain Association Loss Function", "Fisheye Image Distortion", "Spatial Focal Loss Function", "Domain Invariant Features", "Image Plane", "Imbalanced Domain Problem", "Cost Function", "Automated Object Detection Systems", "Pedestrian Detection", "Distortion", "Computer Architecture", "Object Detection", "Cameras", "Lenses", "Training", "Task Analysis" ], "authors": [ { "affiliation": null, "fullName": "Xishuai Peng", "givenName": "Xishuai", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi Murphey", "givenName": "Yi", "surname": "Murphey", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Simon Stent", "givenName": "Simon", "surname": "Stent", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuanxiang Li", "givenName": "Yuanxiang", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zihao Zhao", "givenName": "Zihao", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-01-01T00:00:00", "pubType": "proceedings", "pages": "561-569", "year": "2019", "issn": "1550-5790", "isbn": "978-1-7281-1975-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "197500a551", "articleId": "18j8HgsaiqY", "__typename": "AdjacentArticleType" }, "next": { "fno": "197500a570", "articleId": "18j8GHvw6Aw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2017/2939/0/08078535", "title": "People detection in top-view fisheye imaging", "doi": null, "abstractUrl": "/proceedings-article/avss/2017/08078535/12OmNAWH9yD", "parentPublication": { "id": "proceedings/avss/2017/2939/0", "title": "2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209a202", "title": "Non-frontal Camera Calibration Using Focal Stack Imagery", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a202/12OmNC943xl", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1993/3970/0/00269620", "title": "Layout-independent fisheye views of nested graphs", "doi": null, "abstractUrl": "/proceedings-article/vl/1993/00269620/12OmNvq5jzV", "parentPublication": { "id": "proceedings/vl/1993/3970/0", "title": "Proceedings 1993 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a217", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a217/12OmNzVXNRA", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440835", "title": "Structure-aware Fisheye Views for Efficient Large Graph Exploration", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440835/17D45XwUAL3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a187", "title": "Distortion Correction of Building-Fisheye-Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a187/1dUo3WXGjbG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/4.803E44", "title": "Calibration of Axial Fisheye Cameras Through Generic Virtual Central Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/4.803E44/1hQqpDxzYbe", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b174", "title": "Deep Single Fisheye Image Camera Calibration for Over 180-degree Projection of Field of View", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b174/1yNinwg4Lvy", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631545", "title": "Improved Face Detector on Fisheye Images via Spherical-Domain Attention", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631545/1zmvL3l1TVK", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dUo07mzDNu", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "acronym": "icnisc", "groupId": "1807445", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1dUo3WXGjbG", "doi": "10.1109/ICNISC.2018.00044", "title": "Distortion Correction of Building-Fisheye-Images", "normalizedTitle": "Distortion Correction of Building-Fisheye-Images", "abstract": "The fisheye image is the image taken with a fisheye camera, in which the object suffer from distortion. The street view building images are always taken by fisheye cameras due to the boarder view of the very cameras. So, the distortion of the images must be corrected before further applications. This paper compared three state of the art's distortion correction algorithms, including algorithm based on Polynomial Model, algorithm based on Division Model, and algorithm in [1]. The comparison results on both synthetic and real data show that algorithm in [1] performs the best.", "abstracts": [ { "abstractType": "Regular", "content": "The fisheye image is the image taken with a fisheye camera, in which the object suffer from distortion. The street view building images are always taken by fisheye cameras due to the boarder view of the very cameras. So, the distortion of the images must be corrected before further applications. This paper compared three state of the art's distortion correction algorithms, including algorithm based on Polynomial Model, algorithm based on Division Model, and algorithm in [1]. The comparison results on both synthetic and real data show that algorithm in [1] performs the best.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The fisheye image is the image taken with a fisheye camera, in which the object suffer from distortion. The street view building images are always taken by fisheye cameras due to the boarder view of the very cameras. So, the distortion of the images must be corrected before further applications. This paper compared three state of the art's distortion correction algorithms, including algorithm based on Polynomial Model, algorithm based on Division Model, and algorithm in [1]. The comparison results on both synthetic and real data show that algorithm in [1] performs the best.", "fno": "695600a187", "keywords": [ "Cameras", "Image Enhancement", "Image Matching", "Image Sensors", "Polynomials", "Distortion Correction", "Building Fisheye Images", "Fisheye Camera", "Image Distortion", "Synthetic Data", "Division Model", "Polynomial Model", "Distortion", "Cameras", "Image Segmentation", "Buildings", "Calibration", "Lenses", "Automobiles", "Fisheye Image", "Distortion", "Building", "Correction" ], "authors": [ { "affiliation": "North China Electric Power University", "fullName": "SU Jie", "givenName": "SU", "surname": "Jie", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Electric Power University", "fullName": "Jiang Dong-Qi", "givenName": "Jiang", "surname": "Dong-Qi", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Electric Power University", "fullName": "Wang Xu-Guang", "givenName": "Wang", "surname": "Xu-Guang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnisc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "187-191", "year": "2018", "issn": null, "isbn": "978-1-5386-6956-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "695600a182", "articleId": "1dUo4byBvRm", "__typename": "AdjacentArticleType" }, "next": { "fno": "695600a192", "articleId": "1e5ZoAZMvhm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/6/3304f133", "title": "Calibration and Correction for Omnidirectional Image with a Fisheye Lens", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304f133/12OmNB06l4X", "parentPublication": { "id": "proceedings/icnc/2008/3304/6", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/1996/7620/0/76200214", "title": "Nonparametric Correction of Distortion", "doi": null, "abstractUrl": "/proceedings-article/wacv/1996/76200214/12OmNy3Agqz", "parentPublication": { "id": "proceedings/wacv/1996/7620/0", "title": "Applications of Computer Vision, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/4353/2/05750916", "title": "An Image Correction Method of Fisheye Lens Based on Bilinear Interpolation", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750916/12OmNyFU709", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a217", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a217/12OmNzVXNRA", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2013/5053/0/06475054", "title": "Automatic curve selection for lens distortion correction using Hough transform energy", "doi": null, "abstractUrl": "/proceedings-article/wacv/2013/06475054/12OmNzXFoJb", "parentPublication": { "id": "proceedings/wacv/2013/5053/0", "title": "Applications of Computer Vision, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/08/i1309", "title": "Parameter-Free Radial Distortion Correction with Center of Distortion Estimation", "doi": null, "abstractUrl": "/journal/tp/2007/08/i1309/13rRUxASuqt", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192681", "title": "SchemeLens: A Content-Aware Vector-Based Fisheye Technique for Navigating Large Systems Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192681/13rRUxC0SEi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/4.803E44", "title": "Calibration of Axial Fisheye Cameras Through Generic Virtual Central Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/4.803E44/1hQqpDxzYbe", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a441", "title": "Distortion-Aware Room Layout Estimation from A Single Fisheye Image", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a441/1yeD4l8wyl2", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hQqpDxzYbe", "doi": "10.1109/ICCV.2019.00414", "title": "Calibration of Axial Fisheye Cameras Through Generic Virtual Central Models", "normalizedTitle": "Calibration of Axial Fisheye Cameras Through Generic Virtual Central Models", "abstract": "Fisheye cameras are notoriously hard to calibrate using traditional plane-based methods. This paper proposes a new calibration method for large field of view cameras. Similarly to planar calibration, it relies on multiple images of a planar calibration grid with dense correspondences, typically obtained using structured light. By relying on the grids themselves instead of the distorted image plane, we can build a rectilinear Generic Virtual Central (GVC) camera. Instead of relying on a single GVC camera, our method proposes a selection of multiple GVC cameras which can cover any field of view and be trivially aligned to provide a very accurate generic central model. We demonstrate that this approach can directly model axial cameras, assuming the distortion center is located on the camera axis. Experimental validation is provided on both synthetic and real fisheye cameras featuring up to a 280° field of view. To our knowledge, this is one of the only practical methods to calibrate axial cameras.", "abstracts": [ { "abstractType": "Regular", "content": "Fisheye cameras are notoriously hard to calibrate using traditional plane-based methods. This paper proposes a new calibration method for large field of view cameras. Similarly to planar calibration, it relies on multiple images of a planar calibration grid with dense correspondences, typically obtained using structured light. By relying on the grids themselves instead of the distorted image plane, we can build a rectilinear Generic Virtual Central (GVC) camera. Instead of relying on a single GVC camera, our method proposes a selection of multiple GVC cameras which can cover any field of view and be trivially aligned to provide a very accurate generic central model. We demonstrate that this approach can directly model axial cameras, assuming the distortion center is located on the camera axis. Experimental validation is provided on both synthetic and real fisheye cameras featuring up to a 280° field of view. To our knowledge, this is one of the only practical methods to calibrate axial cameras.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fisheye cameras are notoriously hard to calibrate using traditional plane-based methods. This paper proposes a new calibration method for large field of view cameras. Similarly to planar calibration, it relies on multiple images of a planar calibration grid with dense correspondences, typically obtained using structured light. By relying on the grids themselves instead of the distorted image plane, we can build a rectilinear Generic Virtual Central (GVC) camera. Instead of relying on a single GVC camera, our method proposes a selection of multiple GVC cameras which can cover any field of view and be trivially aligned to provide a very accurate generic central model. We demonstrate that this approach can directly model axial cameras, assuming the distortion center is located on the camera axis. Experimental validation is provided on both synthetic and real fisheye cameras featuring up to a 280° field of view. To our knowledge, this is one of the only practical methods to calibrate axial cameras.", "fno": "4.803E44", "keywords": [ "Calibration", "Cameras", "Single GVC Camera", "Multiple GVC Cameras", "Axial Fisheye Cameras", "Generic Central Model", "Image Plane Distortion", "Planar Calibration Grid Method", "Rectilinear Generic Virtual Central Camera Models", "Cameras", "Calibration", "Lenses", "Optical Imaging", "Three Dimensional Displays", "Distortion", "Optical Distortion" ], "authors": [ { "affiliation": "Université de Montréal", "fullName": "Pierre-André Brousseau", "givenName": "Pierre-André", "surname": "Brousseau", "__typename": "ArticleAuthorType" }, { "affiliation": "Montreal University", "fullName": "Sebastien Roy", "givenName": "Sebastien", "surname": "Roy", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "4039-4047", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09008534", "articleId": "1hVlKpPvdzW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09009499", "articleId": "1hVlc4XnFmg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032d867", "title": "Parameter-Free Lens Distortion Calibration of Central Cameras", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032d867/12OmNB1eJyc", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1994/6952/2/00413666", "title": "Axial stereovision: modelization and comparison between two calibration methods", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413666/12OmNBlXsa7", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2017/2610/0/261001a612", "title": "Accurate Calibration of Multiple Pan-Tilt Cameras for Live Broadcasts", "doi": null, "abstractUrl": "/proceedings-article/3dv/2017/261001a612/12OmNwDj1gn", "parentPublication": { "id": "proceedings/3dv/2017/2610/0", "title": "2017 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/1/252110539", "title": "Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252110539/12OmNwF0BYk", "parentPublication": { "id": "proceedings/icpr/2006/2521/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwecms/2011/398/0/05952376", "title": "A new method for Scheimpflug camera calibration", "doi": null, "abstractUrl": "/proceedings-article/iwecms/2011/05952376/12OmNx57HFV", "parentPublication": { "id": "proceedings/iwecms/2011/398/0", "title": "2011 10th International Workshop on Electronics, Control, Measurement and Signals (ECMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c192", "title": "Non-parametric Structure-Based Calibration of Radially Symmetric Cameras", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c192/12OmNyxXlvx", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/04/ttp2013040813", "title": "Calibration of Ultrawide Fisheye Lens Cameras by Eigenvalue Minimization", "doi": null, "abstractUrl": "/journal/tp/2013/04/ttp2013040813/13rRUxASuNH", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545604", "title": "Generic calibration of cameras with non-parallel optical elements", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545604/17D45Xh13t3", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900f218", "title": "A New Non-central Model for Fisheye Calibration", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900f218/1G57jZ2TfA4", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a187", "title": "Distortion Correction of Building-Fisheye-Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a187/1dUo3WXGjbG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvA1hvn", "title": "Great Lakes Symposium on VLSI", "acronym": "glsvlsid", "groupId": "1000805", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNrkBwFQ", "doi": "10.1109/GLSV.1995.516036", "title": "An efficient building block layout methodology for compact placement", "normalizedTitle": "An efficient building block layout methodology for compact placement", "abstract": "In this paper, a new efficient methodology for building block layout is presented by using synthesis placement and compaction. The synthesis placement part of the methodology is based on a formal language called GEOMETRIA. The compaction part is based on geometric reshapings (gs) of blocks and the merging of the communication channels. Both reshaping and merging follow the VLSI regulations for legal layout placement and improve the overall functional performance of the integrated system, by reducing the average length of the connection lines and the size of the occupied chip area by retaining the functionality and the neighboring relations of the blocks. The main goal of the blocks' geometric reshaping is minimization of the wasted area (or dead space among the blocks) called \"open holes\". The channels merging process of compaction is based on the legal overlapping of the blocks' communication channels by reducing the layout placement at the local and global routing.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, a new efficient methodology for building block layout is presented by using synthesis placement and compaction. The synthesis placement part of the methodology is based on a formal language called GEOMETRIA. The compaction part is based on geometric reshapings (gs) of blocks and the merging of the communication channels. Both reshaping and merging follow the VLSI regulations for legal layout placement and improve the overall functional performance of the integrated system, by reducing the average length of the connection lines and the size of the occupied chip area by retaining the functionality and the neighboring relations of the blocks. The main goal of the blocks' geometric reshaping is minimization of the wasted area (or dead space among the blocks) called \"open holes\". The channels merging process of compaction is based on the legal overlapping of the blocks' communication channels by reducing the layout placement at the local and global routing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, a new efficient methodology for building block layout is presented by using synthesis placement and compaction. The synthesis placement part of the methodology is based on a formal language called GEOMETRIA. The compaction part is based on geometric reshapings (gs) of blocks and the merging of the communication channels. Both reshaping and merging follow the VLSI regulations for legal layout placement and improve the overall functional performance of the integrated system, by reducing the average length of the connection lines and the size of the occupied chip area by retaining the functionality and the neighboring relations of the blocks. The main goal of the blocks' geometric reshaping is minimization of the wasted area (or dead space among the blocks) called \"open holes\". The channels merging process of compaction is based on the legal overlapping of the blocks' communication channels by reducing the layout placement at the local and global routing.", "fno": "70350118", "keywords": [ "Circuit Layout CAD Network Routing Formal Languages VLSI Integrated Circuit Layout Integrated Circuit Interconnections Building Block Layout Methodology Compact Placement Synthesis Placement Compaction Formal Language GEOMETRIA Geometric Reshapings VLSI Regulation Functional Performance Connection Lines Occupied Chip Area Neighboring Relations Dead Space Open Holes Channels Merging Process Legal Overlapping Local Routing Global Routing" ], "authors": [ { "affiliation": "T.J. Watson Sch. of Appl. Sci., Binghamton Univ., NY, USA", "fullName": "N.G. Bourbakis", "givenName": "N.G.", "surname": "Bourbakis", "__typename": "ArticleAuthorType" }, { "affiliation": "T.J. Watson Sch. of Appl. Sci., Binghamton Univ., NY, USA", "fullName": "M. Mortazavi", "givenName": "M.", "surname": "Mortazavi", "__typename": "ArticleAuthorType" } ], "idPrefix": "glsvlsid", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-03-01T00:00:00", "pubType": "proceedings", "pages": "118", "year": "1995", "issn": "1066-1395", "isbn": "0-8186-7035-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "70350112", "articleId": "12OmNyQ7G8v", "__typename": "AdjacentArticleType" }, "next": { "fno": "00516037", "articleId": "1h0PwrqJy4E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqMDAV", "title": "Design Automation Conference", "acronym": "dac", "groupId": "1000196", "volume": "0", "displayVolume": "0", "year": "1990", "__typename": "ProceedingType" }, "article": { "id": "12OmNvnfkbQ", "doi": "10.1109/DAC.1990.114902", "title": "LiB: a cell layout generator", "normalizedTitle": "LiB: a cell layout generator", "abstract": "An automatic layout generation system, called LiB, for the library cells used in CMOS ASIC design is presented. LiB takes a transistor-level circuit schematic in SPICE format and outputs a symbolic layout. In LiB, the intra-cell routing runs not only between PMOS and NMOS but also on diffusion islands as well as the two side regions (one between the PMOS diffusion and the power line, and the other between the NMOS diffusion and the ground line). Several heuristic algorithms are proposed to solve the transistor-clustering, -pairing, -chaining, -folding, the chain placement, the routing, and the net assignment problems. Experimental results are presented to show the capability of LiB.", "abstracts": [ { "abstractType": "Regular", "content": "An automatic layout generation system, called LiB, for the library cells used in CMOS ASIC design is presented. LiB takes a transistor-level circuit schematic in SPICE format and outputs a symbolic layout. In LiB, the intra-cell routing runs not only between PMOS and NMOS but also on diffusion islands as well as the two side regions (one between the PMOS diffusion and the power line, and the other between the NMOS diffusion and the ground line). Several heuristic algorithms are proposed to solve the transistor-clustering, -pairing, -chaining, -folding, the chain placement, the routing, and the net assignment problems. Experimental results are presented to show the capability of LiB.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An automatic layout generation system, called LiB, for the library cells used in CMOS ASIC design is presented. LiB takes a transistor-level circuit schematic in SPICE format and outputs a symbolic layout. In LiB, the intra-cell routing runs not only between PMOS and NMOS but also on diffusion islands as well as the two side regions (one between the PMOS diffusion and the power line, and the other between the NMOS diffusion and the ground line). Several heuristic algorithms are proposed to solve the transistor-clustering, -pairing, -chaining, -folding, the chain placement, the routing, and the net assignment problems. Experimental results are presented to show the capability of LiB.", "fno": "00114902", "keywords": [ "Li B", "Cell Layout Generator", "Automatic Layout Generation System", "Library Cells", "CMOS ASIC Design", "Transistor Level Circuit Schematic", "SPICE Format", "Symbolic Layout", "PMOS", "NMOS", "Heuristic Algorithms", "Transistor Clustering", "Pairing", "Chaining", "Folding", "Chain Placement", "Routing", "Net Assignment" ], "authors": [ { "affiliation": "Electron. Res. & Service Organ., Ind. Technol. Res. Inst., Hsin-Chu, Taiwan", "fullName": "Yung-Ching Hsieh", "givenName": null, "surname": "Yung-Ching Hsieh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chi-Yi Hwang", "givenName": null, "surname": "Chi-Yi Hwang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Youn-Long Lin", "givenName": null, "surname": "Youn-Long Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu-Chin Hsu", "givenName": null, "surname": "Yu-Chin Hsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "dac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1990-06-01T00:00:00", "pubType": "proceedings", "pages": "474-479", "year": "1990", "issn": null, "isbn": "0-89791-363-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00114901", "articleId": "12OmNqGRGdq", "__typename": "AdjacentArticleType" }, "next": { "fno": "00114903", "articleId": "12OmNwbLVt1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aspdac/1998/4425/0/00669451", "title": "ALPS: an automatic layouter for pass-transistor cell synthesis", "doi": null, "abstractUrl": "/proceedings-article/aspdac/1998/00669451/12OmNASraQU", "parentPublication": { "id": "proceedings/aspdac/1998/4425/0", "title": "Proceedings of 1998 Asia and South Pacific Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1997/2477/0/24770456", "title": "An Efficient Transistor Folding Algorithm for Row-Based CMOS Layout Design", "doi": null, "abstractUrl": "/proceedings-article/dac/1997/24770456/12OmNAXPyiW", "parentPublication": { "id": "proceedings/dac/1997/2477/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iolts/2011/1053/0/05993829", "title": "Multiple-bit-upset and single-bit-upset resilient 8T SRAM bitcell layout with divided wordline structure", "doi": null, "abstractUrl": "/proceedings-article/iolts/2011/05993829/12OmNwLfMBw", "parentPublication": { "id": "proceedings/iolts/2011/1053/0", "title": "2011 IEEE 17th International On-Line Testing Symposium (IOLTS 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/1997/8206/0/82060130", "title": "Comparison between nMOS pass transistor logic style vs. CMOS complementary cells", "doi": null, "abstractUrl": "/proceedings-article/iccd/1997/82060130/12OmNwM6zXC", "parentPublication": { "id": "proceedings/iccd/1997/8206/0", "title": "Proceedings International Conference on Computer Design VLSI in Computers and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2011/4208/0/05763161", "title": "Proactive recovery for BTI in high-k SRAM cells", "doi": null, "abstractUrl": "/proceedings-article/date/2011/05763161/12OmNyGbI9K", "parentPublication": { "id": "proceedings/date/2011/4208/0", "title": "Design, Automation & Test in Europe Conference & Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arvlsid/1995/7047/0/70470185", "title": "HAL: heuristic algorithms for layout synthesis", "doi": null, "abstractUrl": "/proceedings-article/arvlsid/1995/70470185/12OmNyRxFp4", "parentPublication": { "id": "proceedings/arvlsid/1995/7047/0", "title": "Advanced Research in VLSI, Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cool-chips/2012/1202/0/06216586", "title": "An area-efficient, standard-cell based on-chip NMOS and PMOS performance monitor for process variability compensation", "doi": null, "abstractUrl": "/proceedings-article/cool-chips/2012/06216586/12OmNyaXPUu", "parentPublication": { "id": "proceedings/cool-chips/2012/1202/0", "title": "2012 IEEE COOL Chips XV", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1989/310/0/01586385", "title": "The Layout Synthesizer: An Automatic Netlist-to-Layout System", "doi": null, "abstractUrl": "/proceedings-article/dac/1989/01586385/12OmNyaXPWb", "parentPublication": { "id": "proceedings/dac/1989/310/0", "title": "26th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edtc/1996/7423/0/74230393", "title": "XPRESS: A Cell Layout Generator with Integrated Transistor Folding", "doi": null, "abstractUrl": "/proceedings-article/edtc/1996/74230393/12OmNyqzLWd", "parentPublication": { "id": "proceedings/edtc/1996/7423/0", "title": "European Design and Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fpl/2011/4529/0/4529a453", "title": "Capacitive Boosting for FPGA Interconnection Networks", "doi": null, "abstractUrl": "/proceedings-article/fpl/2011/4529a453/12OmNzuIjiL", "parentPublication": { "id": "proceedings/fpl/2011/4529/0", "title": "International Conference on Field Programmable Logic and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlD947", "title": "Software Engineering Conference, Australian", "acronym": "aswec", "groupId": "1000682", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNxGj9NT", "doi": "10.1109/ASWEC.2010.38", "title": "A Reduction of Grid-Bag Layout to Auckland Layout", "normalizedTitle": "A Reduction of Grid-Bag Layout to Auckland Layout", "abstract": "Many major programming platforms support layout managers in Grid-bag style, where GUI elements can be placed on a rectangular grid. In Grid-bag layout mangers, cells of the underlying grid can be merged in order to create more complex layouts. In this work we classify software engineering issues with Grid-bag layout managers - chiefly bad coupling and a low level of abstraction - into several levels of severity of these issues. In the past we have presented the Auckland Layout Model, which is based on tabstops instead of gridlines. The Auckland Layout Model provides several layers of abstraction and avoids the bad coupling phenomena encountered in Grid-bag Layout. In this work we report on a platform-independent reduction of Grid-bag Layout to Auckland Layout, thus establishing that Grid-bag Layout can be implemented on top of Auckland Layout Model. The reduction of Grid-bag Layout to Auckland Layout presented here is based on an abstract datatype called a Grid-bag analyzer.", "abstracts": [ { "abstractType": "Regular", "content": "Many major programming platforms support layout managers in Grid-bag style, where GUI elements can be placed on a rectangular grid. In Grid-bag layout mangers, cells of the underlying grid can be merged in order to create more complex layouts. In this work we classify software engineering issues with Grid-bag layout managers - chiefly bad coupling and a low level of abstraction - into several levels of severity of these issues. In the past we have presented the Auckland Layout Model, which is based on tabstops instead of gridlines. The Auckland Layout Model provides several layers of abstraction and avoids the bad coupling phenomena encountered in Grid-bag Layout. In this work we report on a platform-independent reduction of Grid-bag Layout to Auckland Layout, thus establishing that Grid-bag Layout can be implemented on top of Auckland Layout Model. The reduction of Grid-bag Layout to Auckland Layout presented here is based on an abstract datatype called a Grid-bag analyzer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many major programming platforms support layout managers in Grid-bag style, where GUI elements can be placed on a rectangular grid. In Grid-bag layout mangers, cells of the underlying grid can be merged in order to create more complex layouts. In this work we classify software engineering issues with Grid-bag layout managers - chiefly bad coupling and a low level of abstraction - into several levels of severity of these issues. In the past we have presented the Auckland Layout Model, which is based on tabstops instead of gridlines. The Auckland Layout Model provides several layers of abstraction and avoids the bad coupling phenomena encountered in Grid-bag Layout. In this work we report on a platform-independent reduction of Grid-bag Layout to Auckland Layout, thus establishing that Grid-bag Layout can be implemented on top of Auckland Layout Model. The reduction of Grid-bag Layout to Auckland Layout presented here is based on an abstract datatype called a Grid-bag analyzer.", "fno": "4006a067", "keywords": [ "Graphical User Interfaces", "Layout" ], "authors": [ { "affiliation": null, "fullName": "Gerald Weber", "givenName": "Gerald", "surname": "Weber", "__typename": "ArticleAuthorType" } ], "idPrefix": "aswec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-04-01T00:00:00", "pubType": "proceedings", "pages": "67-74", "year": "2010", "issn": "1530-0803", "isbn": "978-0-7695-4006-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4006a055", "articleId": "12OmNyUFg05", "__typename": "AdjacentArticleType" }, "next": { "fno": "4006a075", "articleId": "12OmNro0IcU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/1995/7201/0/72010026", "title": "Research report: improving browsing in information by the automatic display layout", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1995/72010026/12OmNAqkSCU", "parentPublication": { "id": "proceedings/ieee-infovis/1995/7201/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wvl/1990/2090/0/00128382", "title": "A declarative formalism for specifying graphical layout", "doi": null, "abstractUrl": "/proceedings-article/wvl/1990/00128382/12OmNrAMF3v", "parentPublication": { "id": "proceedings/wvl/1990/2090/0", "title": "Proceedings of the 1990 IEEE Workshop on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aswec/2008/3100/0/3100a300", "title": "Modular Specification of GUI Layout Using Constraints", "doi": null, "abstractUrl": "/proceedings-article/aswec/2008/3100a300/12OmNrJAehz", "parentPublication": { "id": "proceedings/aswec/2008/3100/0", "title": "2008 19th Australian Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1981/9999/0/01585356", "title": "Virtual Grid Symbolic Layout", "doi": null, "abstractUrl": "/proceedings-article/dac/1981/01585356/12OmNvjyxzb", "parentPublication": { "id": "proceedings/dac/1981/9999/0", "title": "18th Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2017/3681/0/3681a695", "title": "A Novel Tool for Automatic GUI Layout Testing", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a695/12OmNzlD9f7", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192733", "title": "High-Quality Ultra-Compact Grid Layout of Grouped Networks", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192733/13rRUILc8fd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1993/07/e0707", "title": "Layout Appropriateness: A Metric for Evaluating User Interface Widget Layout", "doi": null, "abstractUrl": "/journal/ts/1993/07/e0707/13rRUxASuwR", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2018/9497/0/949700a187", "title": "User Interface Layout Recommendation Based on Pairing Model", "doi": null, "abstractUrl": "/proceedings-article/icdh/2018/949700a187/17D45WLdYSB", "parentPublication": { "id": "proceedings/icdh/2018/9497/0", "title": "2018 7th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2020/1075/0/09156007", "title": "Translation from Visual to Layout-based Android Test Cases: a Proof of Concept", "doi": null, "abstractUrl": "/proceedings-article/icstw/2020/09156007/1m1jpiC9EZ2", "parentPublication": { "id": "proceedings/icstw/2020/1075/0", "title": "2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900n3637", "title": "Variational Transformer Networks for Layout Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900n3637/1yeHYPqFSQo", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxuXcDx", "title": "Visual Languages, IEEE Symposium on", "acronym": "vl", "groupId": "1000793", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRPgyj", "doi": "10.1109/VL.1998.706134", "title": "Competitive Learning of Network Diagram Layout", "normalizedTitle": "Competitive Learning of Network Diagram Layout", "abstract": "For applications which generate diagrammatic representations automatic layout techniques are a crucial component. Since graph-like network diagrams are among the most commonly used and most important types of diagrammatic displays, layout techniques for graphs have been extensively studied. However, a problem with current graph layout methods which are capable of producing satisfactory results for a wide range of graphs is that they put an extremely high demand on computational resources.This paper introduces a new layout method that consumes only little computational resources and does not need any heavy-duty preprocessing. Unlike other declarative layout algorithms not even the costly repeated evaluation of an objective function is required. The method presented is based on a competitive learning algorithm which is an extension of self-organization strategies known from unsupervised neural networks.We describe the formal details of the layout algorithm as well as the intuition behind it and present experimental results and a comparison with other methods.", "abstracts": [ { "abstractType": "Regular", "content": "For applications which generate diagrammatic representations automatic layout techniques are a crucial component. Since graph-like network diagrams are among the most commonly used and most important types of diagrammatic displays, layout techniques for graphs have been extensively studied. However, a problem with current graph layout methods which are capable of producing satisfactory results for a wide range of graphs is that they put an extremely high demand on computational resources.This paper introduces a new layout method that consumes only little computational resources and does not need any heavy-duty preprocessing. Unlike other declarative layout algorithms not even the costly repeated evaluation of an objective function is required. The method presented is based on a competitive learning algorithm which is an extension of self-organization strategies known from unsupervised neural networks.We describe the formal details of the layout algorithm as well as the intuition behind it and present experimental results and a comparison with other methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For applications which generate diagrammatic representations automatic layout techniques are a crucial component. Since graph-like network diagrams are among the most commonly used and most important types of diagrammatic displays, layout techniques for graphs have been extensively studied. However, a problem with current graph layout methods which are capable of producing satisfactory results for a wide range of graphs is that they put an extremely high demand on computational resources.This paper introduces a new layout method that consumes only little computational resources and does not need any heavy-duty preprocessing. Unlike other declarative layout algorithms not even the costly repeated evaluation of an objective function is required. The method presented is based on a competitive learning algorithm which is an extension of self-organization strategies known from unsupervised neural networks.We describe the formal details of the layout algorithm as well as the intuition behind it and present experimental results and a comparison with other methods.", "fno": "87120056", "keywords": [ "Visualization", "Automatic Layout", "Graph Layout", "Neural Networks", "Learning Algorithms" ], "authors": [ { "affiliation": "University of Munich", "fullName": "Bernd Meyer", "givenName": "Bernd", "surname": "Meyer", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-09-01T00:00:00", "pubType": "proceedings", "pages": "56", "year": "1998", "issn": "1049-2615", "isbn": "0-8186-8712-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "87120048", "articleId": "12OmNAtst68", "__typename": "AdjacentArticleType" }, "next": { "fno": "87120066", "articleId": "12OmNwwd2Mi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWf", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyo1nU9", "doi": "10.1109/PacificVis.2014.21", "title": "Enhancing Layout and Interaction in Formal Concept Analysis", "normalizedTitle": "Enhancing Layout and Interaction in Formal Concept Analysis", "abstract": "Formal Concept Analysis (FCA) derives a multiple-inheritance class hierarchy from a formal context. The number of classes is bounded above by an exponential function of the number of objects and attributes in the context. To support interactive analysis of large formal contexts, this paper exploits a divide-and-conquer technique which discovers hierarchical structure in amenable formal contexts. That hierarchical structure is used to expedite and enhance both the layout of, and user interaction with, the concept lattice. The principal contribution is the dual use of the discovered hierarchical structure for scalable, interactive FCA.", "abstracts": [ { "abstractType": "Regular", "content": "Formal Concept Analysis (FCA) derives a multiple-inheritance class hierarchy from a formal context. The number of classes is bounded above by an exponential function of the number of objects and attributes in the context. To support interactive analysis of large formal contexts, this paper exploits a divide-and-conquer technique which discovers hierarchical structure in amenable formal contexts. That hierarchical structure is used to expedite and enhance both the layout of, and user interaction with, the concept lattice. The principal contribution is the dual use of the discovered hierarchical structure for scalable, interactive FCA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Formal Concept Analysis (FCA) derives a multiple-inheritance class hierarchy from a formal context. The number of classes is bounded above by an exponential function of the number of objects and attributes in the context. To support interactive analysis of large formal contexts, this paper exploits a divide-and-conquer technique which discovers hierarchical structure in amenable formal contexts. That hierarchical structure is used to expedite and enhance both the layout of, and user interaction with, the concept lattice. The principal contribution is the dual use of the discovered hierarchical structure for scalable, interactive FCA.", "fno": "2874a248", "keywords": [ "Containers", "Context", "Lattices", "Layout", "Visualization", "Vegetation", "Partitioning Algorithms", "Graph Algorithms", "Hasse Diagram", "Layout", "Coordinated Views", "User Interfaces Interaction Styles", "Screen Design", "Graph Theory Trees" ], "authors": [ { "affiliation": null, "fullName": "Tim Pattison", "givenName": "Tim", "surname": "Pattison", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Derek Weber", "givenName": "Derek", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aaron Ceglar", "givenName": "Aaron", "surname": "Ceglar", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-03-01T00:00:00", "pubType": "proceedings", "pages": "248-252", "year": "2014", "issn": null, "isbn": "978-1-4799-2874-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2874a243", "articleId": "12OmNBOllhJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "2874a253", "articleId": "12OmNC8uRAg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2015/7272/0/7272a717", "title": "Canonical Computational Models Based on Formal Concept Analysis for Social Network Analysis and Representation", "doi": null, "abstractUrl": "/proceedings-article/icws/2015/7272a717/12OmNCeaQ1S", "parentPublication": { "id": "proceedings/icws/2015/7272/0", "title": "2015 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634876", "title": "Using Formal Concept Analysis for Maritime Ontology Building", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634876/12OmNCfSqJj", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2017/3581/0/3581a922", "title": "Billingual Formal Concept Analysis for Cross-Language Information Retrieval", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2017/3581a922/12OmNqGA5mc", "parentPublication": { "id": "proceedings/aiccsa/2017/3581/0", "title": "2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870199", "title": "Discovering Knowledge in Online Drug Transactions Using Conceptual Graphs and Formal Concept Analysis", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870199/12OmNvDI40u", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059842", "title": "Bounded Rationality for Data Reasoning Based on Formal Concept Analysis", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059842/12OmNvk7JW4", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2009/3810/0/3810a160", "title": "The Logical Operations on Relations, Scales and Concept Lattices", "doi": null, "abstractUrl": "/proceedings-article/skg/2009/3810a160/12OmNzcPAr1", "parentPublication": { "id": "proceedings/skg/2009/3810/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2015/02/07097049", "title": "Using Ontologies and Formal Concept Analysis to Integrate Heterogeneous Tourism Information", "doi": null, "abstractUrl": "/journal/ec/2015/02/07097049/13rRUB6SpWs", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2018/7308/0/08644553", "title": "A Dynamic Load Balancing Scheme for Distributed Formal Concept Analysis", "doi": null, "abstractUrl": "/proceedings-article/icpads/2018/08644553/17QjJbMAORC", "parentPublication": { "id": "proceedings/icpads/2018/7308/0", "title": "2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a480", "title": "Concept Analysis Based on Granular Formal Contexts", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a480/18jXyFxJIIw", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/su/2020/03/08620359", "title": "Virtual Machines Scheduling in Mobile Edge Computing: A Formal Concept Analysis Approach", "doi": null, "abstractUrl": "/journal/su/2020/03/08620359/1mYZ7Ijs5sk", "parentPublication": { "id": "trans/su", "title": "IEEE Transactions on Sustainable Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqyUUJ9", "title": "2014 9th International Design & Test Symposium (IDT)", "acronym": "idt", "groupId": "1001579", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyz5JVe", "doi": "10.1109/IDT.2014.7038592", "title": "Multi-device layout templates for nanometer analog design", "normalizedTitle": "Multi-device layout templates for nanometer analog design", "abstract": "With the advance of nanoscale fabrication processes, well-known common-centroid analog layout techniques are no longer sufficient to guarantee the required level of device matching. This paper proposes a complex multi-device layout generator of highly matched devices for analog circuit design. The proposed tool offers different placement techniques for alternative layouts, as well as different matching strategies with focus on common-centroid, lithography and stress effect mitigation. Device arrays are key for producing uniform, litho-friendly layouts. Generic array templates can be generated for transistors, resistors and capacitors. The layout of a switched-capacitor integrator is given as an example.", "abstracts": [ { "abstractType": "Regular", "content": "With the advance of nanoscale fabrication processes, well-known common-centroid analog layout techniques are no longer sufficient to guarantee the required level of device matching. This paper proposes a complex multi-device layout generator of highly matched devices for analog circuit design. The proposed tool offers different placement techniques for alternative layouts, as well as different matching strategies with focus on common-centroid, lithography and stress effect mitigation. Device arrays are key for producing uniform, litho-friendly layouts. Generic array templates can be generated for transistors, resistors and capacitors. The layout of a switched-capacitor integrator is given as an example.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the advance of nanoscale fabrication processes, well-known common-centroid analog layout techniques are no longer sufficient to guarantee the required level of device matching. This paper proposes a complex multi-device layout generator of highly matched devices for analog circuit design. The proposed tool offers different placement techniques for alternative layouts, as well as different matching strategies with focus on common-centroid, lithography and stress effect mitigation. Device arrays are key for producing uniform, litho-friendly layouts. Generic array templates can be generated for transistors, resistors and capacitors. The layout of a switched-capacitor integrator is given as an example.", "fno": "07038592", "keywords": [ "Layout", "Routing", "Generators", "Capacitors", "Mirrors", "Engines", "Stress", "Layout Generation", "Analog Design", "Analog Layout Synthesis" ], "authors": [ { "affiliation": "Mentor Graphics Corporation", "fullName": "Mohannad Elshawy", "givenName": "Mohannad", "surname": "Elshawy", "__typename": "ArticleAuthorType" }, { "affiliation": "Mentor Graphics Corporation", "fullName": "Mohamed Dessouky", "givenName": "Mohamed", "surname": "Dessouky", "__typename": "ArticleAuthorType" }, { "affiliation": "Mentor Graphics Corporation", "fullName": "Sherif Saif", "givenName": "Sherif", "surname": "Saif", "__typename": "ArticleAuthorType" }, { "affiliation": "Mentor Graphics Corporation", "fullName": "Sherif Mansour", "givenName": "Sherif", "surname": "Mansour", "__typename": "ArticleAuthorType" }, { "affiliation": "Mentor Graphics Corporation", "fullName": "Ed Petrus", "givenName": "Ed", "surname": "Petrus", "__typename": "ArticleAuthorType" } ], "idPrefix": "idt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "83-88", "year": "2014", "issn": null, "isbn": "978-1-4799-8200-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07038591", "articleId": "12OmNrJiCXj", "__typename": "AdjacentArticleType" }, "next": { "fno": "07038593", "articleId": "12OmNyqiaXv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vdat/2015/1743/0/07208062", "title": "Pre-layout estimation of performance and design of basic analog circuits in stress enabled technologies", "doi": null, "abstractUrl": "/proceedings-article/vdat/2015/07208062/12OmNAfy7I1", "parentPublication": { "id": "proceedings/vdat/2015/1743/0", "title": "2015 19th International Symposium on VLSI Design and Test (VDAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2011/4208/0/05763267", "title": "Generator based approach for analog circuit and layout design and optimization", "doi": null, "abstractUrl": "/proceedings-article/date/2011/05763267/12OmNB1eJF4", "parentPublication": { "id": "proceedings/date/2011/4208/0", "title": "Design, Automation & Test in Europe Conference & Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asp-dac/2004/2543/0/01337608", "title": "Hierarchical extraction and verification of symmetry constraints for analog layout automation", "doi": null, "abstractUrl": "/proceedings-article/asp-dac/2004/01337608/12OmNBCZnRb", "parentPublication": { "id": "proceedings/asp-dac/2004/2543/0", "title": "Asia and South Pacific Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asp-dac/2004/2543/0/25430400", "title": "Hierarchical Extraction and Verification of Symmetry Constraints for Analog Layout Automation", "doi": null, "abstractUrl": "/proceedings-article/asp-dac/2004/25430400/12OmNBSSVin", "parentPublication": { "id": "proceedings/asp-dac/2004/2543/0", "title": "Asia and South Pacific Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2011/1399/0/06105379", "title": "Fast analog layout prototyping for nanometer design migration", "doi": null, "abstractUrl": "/proceedings-article/iccad/2011/06105379/12OmNBrlPCF", "parentPublication": { "id": "proceedings/iccad/2011/1399/0", "title": "Computer-Aided Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aspdac/2004/8175/0/01337608", "title": "Hierarchical extraction and verification of symmetry constraints for analog layout automation", "doi": null, "abstractUrl": "/proceedings-article/aspdac/2004/01337608/12OmNwE9ONl", "parentPublication": { "id": "proceedings/aspdac/2004/8175/0", "title": "ASP-DAC 2004: Asia and South Pacific Design Automation Conference 2004", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsid/2005/2264/0/22640457", "title": "Automatic Device Layout Generation for Analog Layout Retargeting", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2005/22640457/12OmNwJPN2U", "parentPublication": { "id": "proceedings/vlsid/2005/2264/0", "title": "VLSI Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2004/2501/0/25010139", "title": "Correct-by-Construction Layout-Centric Retargeting of Large Analog Designs", "doi": null, "abstractUrl": "/proceedings-article/dac/2004/25010139/12OmNyRPgIC", "parentPublication": { "id": "proceedings/dac/2004/2501/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/idt/2014/8200/0/07038590", "title": "Exploiting satisfiability modulo theories for analog layout automation", "doi": null, "abstractUrl": "/proceedings-article/idt/2014/07038590/12OmNzBOhWx", "parentPublication": { "id": "proceedings/idt/2014/8200/0", "title": "2014 9th International Design & Test Symposium (IDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2019/04/08576649", "title": "EA-Based LDE-Aware Fast Analog Layout Retargeting With Device Abstraction", "doi": null, "abstractUrl": "/journal/si/2019/04/08576649/17D45W9KVGf", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir6", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XvMcb4", "doi": "10.1109/ICPR.2018.8546278", "title": "Indoor Scene Layout Estimation from a Single Image", "normalizedTitle": "Indoor Scene Layout Estimation from a Single Image", "abstract": "With the popularity of the hand devices and intelligent agents, many aimed to explore machine's potential in interacting with reality. Scene understanding, among the many facets of reality interaction, has gained much attention for its relevance in applications such as augmented reality (AR). Scene understanding can be partitioned into several sub tasks (i.e., layout estimation, scene classification, saliency prediction, etc). In this paper, we propose a deep learning-based approach for estimating the layout of a given indoor image in real-time. Our method consists of a deep fully convolutional network, a novel layout-degeneration augmentation method, and a new training pipeline which integrate an adaptive edge penalty and smoothness terms into the training process. Unlike previous deep learning-based methods that depend on post-processing refinement (e.g., proposal ranking and optimization), our method motivates the generalization ability of the network and the smoothness of estimated layout edges without deploying postprocessing techniques. Moreover, the proposed approach is time-efficient since it only takes the model one forward pass to render accurate layouts. We evaluate our method on LSUN Room Layout and Hedau dataset and obtain estimation results comparable with the state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "With the popularity of the hand devices and intelligent agents, many aimed to explore machine's potential in interacting with reality. Scene understanding, among the many facets of reality interaction, has gained much attention for its relevance in applications such as augmented reality (AR). Scene understanding can be partitioned into several sub tasks (i.e., layout estimation, scene classification, saliency prediction, etc). In this paper, we propose a deep learning-based approach for estimating the layout of a given indoor image in real-time. Our method consists of a deep fully convolutional network, a novel layout-degeneration augmentation method, and a new training pipeline which integrate an adaptive edge penalty and smoothness terms into the training process. Unlike previous deep learning-based methods that depend on post-processing refinement (e.g., proposal ranking and optimization), our method motivates the generalization ability of the network and the smoothness of estimated layout edges without deploying postprocessing techniques. Moreover, the proposed approach is time-efficient since it only takes the model one forward pass to render accurate layouts. We evaluate our method on LSUN Room Layout and Hedau dataset and obtain estimation results comparable with the state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the popularity of the hand devices and intelligent agents, many aimed to explore machine's potential in interacting with reality. Scene understanding, among the many facets of reality interaction, has gained much attention for its relevance in applications such as augmented reality (AR). Scene understanding can be partitioned into several sub tasks (i.e., layout estimation, scene classification, saliency prediction, etc). In this paper, we propose a deep learning-based approach for estimating the layout of a given indoor image in real-time. Our method consists of a deep fully convolutional network, a novel layout-degeneration augmentation method, and a new training pipeline which integrate an adaptive edge penalty and smoothness terms into the training process. Unlike previous deep learning-based methods that depend on post-processing refinement (e.g., proposal ranking and optimization), our method motivates the generalization ability of the network and the smoothness of estimated layout edges without deploying postprocessing techniques. Moreover, the proposed approach is time-efficient since it only takes the model one forward pass to render accurate layouts. We evaluate our method on LSUN Room Layout and Hedau dataset and obtain estimation results comparable with the state-of-the-art methods.", "fno": "08546278", "keywords": [ "Layout", "Estimation", "Semantics", "Training", "Image Edge Detection", "Task Analysis", "Pipelines" ], "authors": [ { "affiliation": "Dept. of Computer Science, National Tsing Hua University, Hsinchu, Taiwan", "fullName": "Hung Jin Lin", "givenName": "Hung Jin", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Computer Science, National Tsing Hua University, Hsinchu, Taiwan", "fullName": "Sheng-Wei Huang", "givenName": "Sheng-Wei", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Computer Science, National Tsing Hua University, Hsinchu, Taiwan", "fullName": "Shang-Hong Lai", "givenName": "Shang-Hong", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan", "fullName": "Chen-Kuo Chiang", "givenName": "Chen-Kuo", "surname": "Chiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "842-847", "year": "2018", "issn": "1051-4651", "isbn": "978-1-5386-3788-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08545809", "articleId": "17D45XoXP4D", "__typename": "AdjacentArticleType" }, "next": { "fno": "08545069", "articleId": "17D45XuDNF2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391a936", "title": "Learning Informative Edge Maps for Indoor Scene Layout Prediction", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a936/12OmNvSKNTq", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851a616", "title": "DeLay: Robust Spatial Layout Estimation for Cluttered Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851a616/12OmNwfb6SI", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457a870", "title": "Physics Inspired Optimization on Semantic Transfer Features: An Alternative Method for Room Layout Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457a870/12OmNyv7mc0", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032a162", "title": "Joint Layout Estimation and Global Multi-view Registration for Indoor Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032a162/12OmNzTYBP2", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d926", "title": "Automatic 3D Indoor Scene Modeling from Single Panorama", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d926/17D45VtKiys", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600q6969", "title": "Learning Object Context for Novel-view Scene Layout Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600q6969/1H1iU88XYyI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093519", "title": "Mono Lay out: Amodal scene layout from a single image", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093519/1jPblbvdOlW", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a323", "title": "Layout Structure Assisted Indoor Image Generation", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a323/1xPso7x537W", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5348", "title": "SSLayout360: Semi-Supervised Indoor Layout Estimation from 360° Panorama", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5348/1yeLn6wpowE", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i829", "title": "Holistic 3D Scene Understanding from a Single Image with Implicit Representation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i829/1yeLsqtovKg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iTvczdcyc0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "8972688", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iTveVENFPG", "doi": "10.1109/CVPRW.2019.00094", "title": "Compact Scene Graphs for Layout Composition and Patch Retrieval", "normalizedTitle": "Compact Scene Graphs for Layout Composition and Patch Retrieval", "abstract": "Structured representations such as scene graphs serve as an efficient and compact representation that can be used for downstream rendering or retrieval tasks. However, existing efforts to generate realistic images from scene graphs perform poorly on scene composition for cluttered or complex scenes. We propose two contributions to improve the scene composition. First, we enhance the scene graph representation with heuristic-based relations, which add minimal storage overhead. Second, we use extreme points representation to supervise the learning of the scene composition network. These methods achieve significantly higher performance over existing work (69.0% vs 51.2% in relation score metric). We additionally demonstrate how scene graphs can be used to retrieve pose-constrained image patches that are semantically similar to the source query. Improving structured scene graph representations for rendering or retrieval are an important step towards realistic image generation.", "abstracts": [ { "abstractType": "Regular", "content": "Structured representations such as scene graphs serve as an efficient and compact representation that can be used for downstream rendering or retrieval tasks. However, existing efforts to generate realistic images from scene graphs perform poorly on scene composition for cluttered or complex scenes. We propose two contributions to improve the scene composition. First, we enhance the scene graph representation with heuristic-based relations, which add minimal storage overhead. Second, we use extreme points representation to supervise the learning of the scene composition network. These methods achieve significantly higher performance over existing work (69.0% vs 51.2% in relation score metric). We additionally demonstrate how scene graphs can be used to retrieve pose-constrained image patches that are semantically similar to the source query. Improving structured scene graph representations for rendering or retrieval are an important step towards realistic image generation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Structured representations such as scene graphs serve as an efficient and compact representation that can be used for downstream rendering or retrieval tasks. However, existing efforts to generate realistic images from scene graphs perform poorly on scene composition for cluttered or complex scenes. We propose two contributions to improve the scene composition. First, we enhance the scene graph representation with heuristic-based relations, which add minimal storage overhead. Second, we use extreme points representation to supervise the learning of the scene composition network. These methods achieve significantly higher performance over existing work (69.0% vs 51.2% in relation score metric). We additionally demonstrate how scene graphs can be used to retrieve pose-constrained image patches that are semantically similar to the source query. Improving structured scene graph representations for rendering or retrieval are an important step towards realistic image generation.", "fno": "250600a676", "keywords": [ "Image Representation", "Image Retrieval", "Information Retrieval", "Learning Artificial Intelligence", "Object Detection", "Realistic Images", "Rendering Computer Graphics", "Rendering", "Structured Scene Graph Representations", "Scene Composition Network", "Extreme Points Representation", "Scene Graph Representation", "Complex Scenes", "Cluttered Scenes", "Compact Representation", "Efficient Representation", "Structured Representations", "Patch Retrieval", "Layout Composition", "Compact Scene Graphs", "Layout", "Task Analysis", "Image Generation", "Shape", "Measurement", "Convolutional Neural Networks", "Convolution" ], "authors": [ { "affiliation": "Intel AI Lab, USA", "fullName": "Subarna Tripathi", "givenName": "Subarna", "surname": "Tripathi", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel AI Lab, USA", "fullName": "Sharath Nittur Sridhar", "givenName": "Sharath Nittur", "surname": "Sridhar", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel AI Lab, USA", "fullName": "Sairam Sundaresan", "givenName": "Sairam", "surname": "Sundaresan", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel AI Lab, USA", "fullName": "Hanlin Tang", "givenName": "Hanlin", "surname": "Tang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "676-683", "year": "2019", "issn": null, "isbn": "978-1-7281-2506-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250600a667", "articleId": "1iTvrNlTa4E", "__typename": "AdjacentArticleType" }, "next": { "fno": "250600a684", "articleId": "1iTvp55rOvu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2005/8929/0/01492801", "title": "Internal and external scene graphs: a new approach for flexible distributed render engines", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492801/12OmNy5hRfj", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284767", "title": "An Error-Tolerant Video Retrieval Method Based on the Shot Composition Sequence in a Scene", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284767/12OmNyqiaNY", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08057796", "title": "Narrative Collage of Image Collections by Scene Graph Recombination", "doi": null, "abstractUrl": "/journal/tg/2018/09/08057796/13rRUwI5TR6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a302", "title": "Factoring Shape, Pose, and Layout from the 2D Image of a 3D Scene", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a302/17D45Wc1IJG", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b219", "title": "Image Generation from Scene Graphs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b219/17D45XwUAKS", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b387", "title": "In Defense of Scene Graphs for Image Captioning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b387/1BmHHhGwAI8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600q6969", "title": "Learning Object Context for Novel-view Scene Layout Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600q6969/1H1iU88XYyI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e560", "title": "Specifying Object Attributes and Relations in Interactive Scene Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e560/1hQqljcoSlO", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300b783", "title": "Triplet-Aware Scene Graph Embeddings", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300b783/1i5mEq1Ubfy", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800d753", "title": "End-to-End Optimization of Scene Layout", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800d753/1m3ooUhHlVC", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxaw596", "title": "2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)", "acronym": "dsc", "groupId": "1815424", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwp74tK", "doi": "10.1109/DSC.2017.43", "title": "Interactive Network Clustering Layout Method Based on Implicit Connection", "normalizedTitle": "Interactive Network Clustering Layout Method Based on Implicit Connection", "abstract": "Force-directed algorithms are devoted to creating network visualization that better meet aesthetic standards but rarely consider interactive requirements, making it difficult to place certain nodes with semantic clustering features together through interactive operations. To solve this problem, we realize the interactive semantic clustering visualization through implicit connection. The key steps include: First, to layout the network to equilibrium state using traditional algorithm; then, to establish implicit connections interactively, so adjusting the repulsion and attraction forces to break the balanced state and generate semantic clustering. Experiments show that our algorithm has the same quality as the traditional algorithms. The advantage of our algorithm is that it can meet the user's interaction needs, so our results are more able to meet the user's expectations.", "abstracts": [ { "abstractType": "Regular", "content": "Force-directed algorithms are devoted to creating network visualization that better meet aesthetic standards but rarely consider interactive requirements, making it difficult to place certain nodes with semantic clustering features together through interactive operations. To solve this problem, we realize the interactive semantic clustering visualization through implicit connection. The key steps include: First, to layout the network to equilibrium state using traditional algorithm; then, to establish implicit connections interactively, so adjusting the repulsion and attraction forces to break the balanced state and generate semantic clustering. Experiments show that our algorithm has the same quality as the traditional algorithms. The advantage of our algorithm is that it can meet the user's interaction needs, so our results are more able to meet the user's expectations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Force-directed algorithms are devoted to creating network visualization that better meet aesthetic standards but rarely consider interactive requirements, making it difficult to place certain nodes with semantic clustering features together through interactive operations. To solve this problem, we realize the interactive semantic clustering visualization through implicit connection. The key steps include: First, to layout the network to equilibrium state using traditional algorithm; then, to establish implicit connections interactively, so adjusting the repulsion and attraction forces to break the balanced state and generate semantic clustering. Experiments show that our algorithm has the same quality as the traditional algorithms. The advantage of our algorithm is that it can meet the user's interaction needs, so our results are more able to meet the user's expectations.", "fno": "1600a339", "keywords": [ "Layout", "Force", "Clustering Algorithms", "Semantics", "Algorithm Design And Analysis", "Standards", "Visualization", "Force Directed Algorithm", "Interactive Layout", "Implicit Connection", "Network Visualization", "Clustering Layout" ], "authors": [ { "affiliation": null, "fullName": "Huaquan Hu", "givenName": "Huaquan", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lingda Wu", "givenName": "Lingda", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ronghuan Yu", "givenName": "Ronghuan", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-06-01T00:00:00", "pubType": "proceedings", "pages": "339-342", "year": "2017", "issn": null, "isbn": "978-1-5386-1600-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1600a333", "articleId": "12OmNCbCrM9", "__typename": "AdjacentArticleType" }, "next": { "fno": "1600a346", "articleId": "12OmNqBbI2l", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aina/2013/4953/0/4953a748", "title": "Combining Collaborative Filtering and Clustering for Implicit Recommender System", "doi": null, "abstractUrl": "/proceedings-article/aina/2013/4953a748/12OmNAYXWyR", "parentPublication": { "id": "proceedings/aina/2013/4953/0", "title": "2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a509", "title": "Implicit Surface Reconstruction Based on Adaptive Clustering", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a509/12OmNqJHFLk", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004080", "title": "An Interactive Bio-inspired Approach to Clustering and Visualizing Datasets", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004080/12OmNwDAC9t", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2010/4191/1/4191a417", "title": "Text Clustering via Term Semantic Units", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2010/4191a417/12OmNwNwzIn", "parentPublication": { "id": "proceedings/wi-iat/2010/4191/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr-wcre/2014/3752/0/06747174", "title": "Remodularization analysis using semantic clustering", "doi": null, "abstractUrl": "/proceedings-article/csmr-wcre/2014/06747174/12OmNyO8tSQ", "parentPublication": { "id": "proceedings/csmr-wcre/2014/3752/0", "title": "2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406306", "title": "Search Results Clustering without External Resources", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406306/12OmNyqzM1g", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h773", "title": "Interactive Image Synthesis with Panoptic Layout Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h773/1H1mlrOB1Wo", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a512", "title": "iTDW: Immersive Tiled Display Wall with Clustering-Driven Layout", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a512/1J7Wx5q1ySI", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/10/09094378", "title": "Interactive Steering of Hierarchical Clustering", "doi": null, "abstractUrl": "/journal/tg/2021/10/09094378/1jQNru4p18k", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2021/1372/0/137200a012", "title": "SHIM: Semantic Hierarchical clustering with Interactive Machine learning", "doi": null, "abstractUrl": "/proceedings-article/mlui/2021/137200a012/1yNhiLP2gLu", "parentPublication": { "id": "proceedings/mlui/2021/1372/0", "title": "2021 IEEE Workshop on Machine Learning from User Interactions (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzwZ6qH", "title": "Proceedings Fourth International Conference on Software Engineering and Knowledge Engineering", "acronym": "seke", "groupId": "1001923", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2TCuu", "doi": "10.1109/SEKE.1992.227922", "title": "Automatic layout of diagrams for software specification", "normalizedTitle": "Automatic layout of diagrams for software specification", "abstract": "This paper presents an automatic layout tool which applies fuzzy theory to rule-based layout of diagrams in graphical models. MERA (Meta-Entity-Relation-Attribute) is used as a uniform language for various graphical models used in requirements and design specifications of software. A unique feature of the tool is that a layout of a diagram in a graphical model is produced, based on the layout rules implied by semantics of the diagram and the model formalism. Another unique feature of the tool is that layout rules for a graphical model can automatically be generated from layout examples given by users. The examples of a diagram layout can be regarded as stereotypes of the diagram layout for the model. A prototype of the automatic layout tool has been implemented in SUN Common Lisp using CLOS.<>", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents an automatic layout tool which applies fuzzy theory to rule-based layout of diagrams in graphical models. MERA (Meta-Entity-Relation-Attribute) is used as a uniform language for various graphical models used in requirements and design specifications of software. A unique feature of the tool is that a layout of a diagram in a graphical model is produced, based on the layout rules implied by semantics of the diagram and the model formalism. Another unique feature of the tool is that layout rules for a graphical model can automatically be generated from layout examples given by users. The examples of a diagram layout can be regarded as stereotypes of the diagram layout for the model. A prototype of the automatic layout tool has been implemented in SUN Common Lisp using CLOS.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents an automatic layout tool which applies fuzzy theory to rule-based layout of diagrams in graphical models. MERA (Meta-Entity-Relation-Attribute) is used as a uniform language for various graphical models used in requirements and design specifications of software. A unique feature of the tool is that a layout of a diagram in a graphical model is produced, based on the layout rules implied by semantics of the diagram and the model formalism. Another unique feature of the tool is that layout rules for a graphical model can automatically be generated from layout examples given by users. The examples of a diagram layout can be regarded as stereotypes of the diagram layout for the model. A prototype of the automatic layout tool has been implemented in SUN Common Lisp using CLOS.", "fno": "00227922", "keywords": [ "Diagrams", "Entity Relationship Modelling", "Formal Specification", "Fuzzy Logic", "Knowledge Based Systems", "Software Tools", "Rule Based Diagram Layout", "Software Specification", "Software Prototype", "Fuzzy Theory", "Graphical Models", "MERA", "Meta Entity Relation Attribute", "SUN", "Common Lisp", "CLOS", "Layout", "Graphical Models", "Software Design", "Prototypes", "Sun" ], "authors": [ { "affiliation": "Dept. of Inf. & Comput. Sci., Hawaii Univ., Honolulu, HI, USA", "fullName": "K. Sugihara", "givenName": "K.", "surname": "Sugihara", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Yamamoto", "givenName": "K.", "surname": "Yamamoto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "I. Miyamoto", "givenName": "I.", "surname": "Miyamoto", "__typename": "ArticleAuthorType" } ], "idPrefix": "seke", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "245,246,247,248,249,250,251,252", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00227921", "articleId": "12OmNB7tUqx", "__typename": "AdjacentArticleType" }, "next": { "fno": "00227923", "articleId": "12OmNzgwmPs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/1995/7201/0/72010026", "title": "Research report: improving browsing in information by the automatic display layout", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1995/72010026/12OmNAqkSCU", "parentPublication": { "id": "proceedings/ieee-infovis/1995/7201/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1993/3970/0/00269618", "title": "Specification of diagram editors providing layout adjustment with minimal change", "doi": null, "abstractUrl": "/proceedings-article/vl/1993/00269618/12OmNBB0bY2", "parentPublication": { "id": "proceedings/vl/1993/3970/0", "title": "Proceedings 1993 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/1999/0509/0/05090110", "title": "Interactive Layout Method for Object Diagrams of OMT", "doi": null, "abstractUrl": "/proceedings-article/apsec/1999/05090110/12OmNvmG81N", "parentPublication": { "id": "proceedings/apsec/1999/0509/0", "title": "Proceedings Sixth Asia Pacific Software Engineering Conference (ASPEC'99) (Cat. No.PR00509)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/1989/1971/0/00063322", "title": "Schematic specification of datapath layout", "doi": null, "abstractUrl": "/proceedings-article/iccd/1989/00063322/12OmNxbEtOy", "parentPublication": { "id": "proceedings/iccd/1989/1971/0", "title": "Proceedings 1989 IEEE International Conference on Computer Design: VLSI in Computers and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wvl/1992/3090/0/00275779", "title": "Layout-by-example: a fuzzy visual language for specifying stereotypes of diagram layout", "doi": null, "abstractUrl": "/proceedings-article/wvl/1992/00275779/12OmNxzuMKd", "parentPublication": { "id": "proceedings/wvl/1992/3090/0", "title": "Proceedings IEEE Workshop on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1994/6660/0/00363608", "title": "Interaction in really graphical user interfaces", "doi": null, "abstractUrl": "/proceedings-article/vl/1994/00363608/12OmNzahc2Q", "parentPublication": { "id": "proceedings/vl/1994/6660/0", "title": "Proceedings of 1994 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2017/3681/0/3681a695", "title": "A Novel Tool for Automatic GUI Layout Testing", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a695/12OmNzlD9f7", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1986/04/06312901", "title": "A layout algorithm for data flow diagrams", "doi": null, "abstractUrl": "/journal/ts/1986/04/06312901/13rRUwhpBPd", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1991/01/e0010", "title": "Towards the Automatic Generation of Software Diagrams", "doi": null, "abstractUrl": "/journal/ts/1991/01/e0010/13rRUxOvebr", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMEOBcvvVe", "title": "2019 23rd International Conference in Information Visualization – Part II", "acronym": "iv-2", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMERgrTcLS", "doi": "10.1109/IV-2.2019.00023", "title": "Computational and Human Evaluations of Orthogonal Graph Drawings", "normalizedTitle": "Computational and Human Evaluations of Orthogonal Graph Drawings", "abstract": "Graphs are often drawn into straight-line node-link diagrams for better understanding of the underlying data. However, curves have also been used in graph visualization for various purposes. Orthogonal drawing is one type of graph drawings in which each edge is made up with an alternating sequence of vertical and horizontal line segments. In the past, many algorithms have been developed for orthogonal drawing so that the resulting drawings meet some pre-defined aesthetic criteria and constraints. Experiments have also been conducted to evaluate performance of algorithms and effectiveness of orthogonal drawings. In this paper, we briefly summarize the research that has been done in relation to orthogonal drawing and provide directions for future research.", "abstracts": [ { "abstractType": "Regular", "content": "Graphs are often drawn into straight-line node-link diagrams for better understanding of the underlying data. However, curves have also been used in graph visualization for various purposes. Orthogonal drawing is one type of graph drawings in which each edge is made up with an alternating sequence of vertical and horizontal line segments. In the past, many algorithms have been developed for orthogonal drawing so that the resulting drawings meet some pre-defined aesthetic criteria and constraints. Experiments have also been conducted to evaluate performance of algorithms and effectiveness of orthogonal drawings. In this paper, we briefly summarize the research that has been done in relation to orthogonal drawing and provide directions for future research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graphs are often drawn into straight-line node-link diagrams for better understanding of the underlying data. However, curves have also been used in graph visualization for various purposes. Orthogonal drawing is one type of graph drawings in which each edge is made up with an alternating sequence of vertical and horizontal line segments. In the past, many algorithms have been developed for orthogonal drawing so that the resulting drawings meet some pre-defined aesthetic criteria and constraints. Experiments have also been conducted to evaluate performance of algorithms and effectiveness of orthogonal drawings. In this paper, we briefly summarize the research that has been done in relation to orthogonal drawing and provide directions for future research.", "fno": "285000a074", "keywords": [ "Computational Geometry", "Data Visualisation", "Graph Theory", "Human Evaluations", "Orthogonal Graph Drawings", "Straight Line Node Link Diagrams", "Graph Visualization", "Orthogonal Drawing", "Vertical Line Segments", "Horizontal Line Segments", "Resulting Drawings", "Computational Evaluations", "Layout", "Task Analysis", "Visualization", "Unified Modeling Language", "Minimization", "Gaze Tracking", "Clutter", "Orthogonal Graph Drawing", "Computational Evaluations", "Human Evaluations", "Bends" ], "authors": [ { "affiliation": "Swinburne University of Technology", "fullName": "Irfan Baig Mirza", "givenName": "Irfan Baig", "surname": "Mirza", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology", "fullName": "Weidong Huang", "givenName": "Weidong", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology", "fullName": "Dimitrios Georgakopoulos", "givenName": "Dimitrios", "surname": "Georgakopoulos", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing University of Technology", "fullName": "Hengyang Liu", "givenName": "Hengyang", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv-2", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "74-77", "year": "2019", "issn": null, "isbn": "978-1-7281-2850-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "285000a068", "articleId": "1cMERdhKnTi", "__typename": "AdjacentArticleType" }, "next": { "fno": "285000a078", "articleId": "1cMEQHtP1h6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2007/1630/0/04409059", "title": "A Divide-and-Conquer Approach to 3D Object Reconstruction from Line Drawings", "doi": null, "abstractUrl": "/proceedings-article/iccv/2007/04409059/12OmNBh8gRx", "parentPublication": { "id": "proceedings/iccv/2007/1630/0", "title": "2007 11th IEEE International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1991/2310/0/0218215", "title": "Lower bounds and parallel algorithms for planar orthogonal grid drawings", "doi": null, "abstractUrl": "/proceedings-article/spdp/1991/0218215/12OmNrK9q1y", "parentPublication": { "id": "proceedings/spdp/1991/2310/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1993/3870/0/00378203", "title": "A linear complexity procedure for labelling line drawings of polyhedral scenes using vanishing points", "doi": null, "abstractUrl": "/proceedings-article/iccv/1993/00378203/12OmNrYlmvS", "parentPublication": { "id": "proceedings/iccv/1993/3870/0", "title": "1993 (4th) International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soac/1990/2031/0/00082190", "title": "Automatic vectorization of scanned engineering drawings", "doi": null, "abstractUrl": "/proceedings-article/soac/1990/00082190/12OmNvUaNk3", "parentPublication": { "id": "proceedings/soac/1990/2031/0", "title": "Proceedings of the 1990 Symposium on Applied Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323888", "title": "Information extraction from telephone company drawings", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323888/12OmNyywxza", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1993/4960/0/00395638", "title": "On-line text/drawings segmentation of handwritten patterns", "doi": null, "abstractUrl": "/proceedings-article/icdar/1993/00395638/12OmNzBOhB8", "parentPublication": { "id": "proceedings/icdar/1993/4960/0", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/039P1A39", "title": "Example-based 3D object reconstruction from line drawings", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/039P1A39/12OmNzwHvw4", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118a692", "title": "Separation of Line Drawings Based on Split Faces for 3D Object Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118a692/12OmNzxyiDL", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1982/05/04767289", "title": "Mathematical Structures of Line Drawings of Polyhedrons-Toward Man-Machine Communication by Means of Line Drawings", "doi": null, "abstractUrl": "/journal/tp/1982/05/04767289/13rRUxAASU0", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h905", "title": "Learning to generate line drawings that convey geometry and semantics", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h905/1H0N8jfArni", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHkkWQ0aEE", "title": "2019 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHklquet0s", "doi": "10.1109/CW.2019.00026", "title": "Automatic Furniture Layout Based on Functional Area Division", "normalizedTitle": "Automatic Furniture Layout Based on Functional Area Division", "abstract": "We propose an automatic indoor furniture layout scheme based on functional area division and furniture filling. According to the function, we suppose each kind of furniture may be laid out in one or several functional areas, for example, a sofa may be located in the meeting area of a living room and a bed may be located in the sleeping area of a bedroom, etc.. Our automatic layout method divides an empty room region into several functional areas by using conditional generative adversarial networks (CGAN). We expound the learning process of the algorithm in the process of functional areas division, including the objective function construct and training process. Moreover, in order to fill furniture into a specific functional area, a learning-based furniture filling algorithm is proposed by training a fully connected network model for different kinds of functional area. Experiments show our automatic furniture layout method has its advantages in performance and effect compared with the existing methods.", "abstracts": [ { "abstractType": "Regular", "content": "We propose an automatic indoor furniture layout scheme based on functional area division and furniture filling. According to the function, we suppose each kind of furniture may be laid out in one or several functional areas, for example, a sofa may be located in the meeting area of a living room and a bed may be located in the sleeping area of a bedroom, etc.. Our automatic layout method divides an empty room region into several functional areas by using conditional generative adversarial networks (CGAN). We expound the learning process of the algorithm in the process of functional areas division, including the objective function construct and training process. Moreover, in order to fill furniture into a specific functional area, a learning-based furniture filling algorithm is proposed by training a fully connected network model for different kinds of functional area. Experiments show our automatic furniture layout method has its advantages in performance and effect compared with the existing methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose an automatic indoor furniture layout scheme based on functional area division and furniture filling. According to the function, we suppose each kind of furniture may be laid out in one or several functional areas, for example, a sofa may be located in the meeting area of a living room and a bed may be located in the sleeping area of a bedroom, etc.. Our automatic layout method divides an empty room region into several functional areas by using conditional generative adversarial networks (CGAN). We expound the learning process of the algorithm in the process of functional areas division, including the objective function construct and training process. Moreover, in order to fill furniture into a specific functional area, a learning-based furniture filling algorithm is proposed by training a fully connected network model for different kinds of functional area. Experiments show our automatic furniture layout method has its advantages in performance and effect compared with the existing methods.", "fno": "229700a109", "keywords": [ "Architectural CAD", "Furniture", "Learning Artificial Intelligence", "Neural Nets", "Conditional Generative Adversarial Networks", "CGAN", "Learning Based Furniture Filling Algorithm", "Specific Functional Area", "Objective Function", "Sleeping Area", "Meeting Area", "Automatic Indoor Furniture Layout Scheme", "Functional Area Division", "Layout", "Training", "Solid Modeling", "Gallium Nitride", "Generators", "Standards", "Three Dimensional Displays", "Automatic Furniture Layout CGAN Functional Area Division Furniture Filling" ], "authors": [ { "affiliation": "Zhejiang Gongshang University", "fullName": "Bailin Yang", "givenName": "Bailin", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Gongshang University", "fullName": "Liuliu Li", "givenName": "Liuliu", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Gongshang University", "fullName": "Chao Song", "givenName": "Chao", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Gongshang University", "fullName": "Zhaoyi Jiang", "givenName": "Zhaoyi", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Gongshang University", "fullName": "Yun Ling", "givenName": "Yun", "surname": "Ling", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "109-116", "year": "2019", "issn": null, "isbn": "978-1-7281-2297-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "229700a101", "articleId": "1fHklx7OPC0", "__typename": "AdjacentArticleType" }, "next": { "fno": "229700a117", "articleId": "1fHkmZgjquc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismarw/2016/3740/0/07836488", "title": "A Transitional AR Furniture Arrangement System with Automatic View Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836488/12OmNBVrji6", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1987/0781/0/01586279", "title": "Layout Optimization of CMOS Functional Cells", "doi": null, "abstractUrl": "/proceedings-article/dac/1987/01586279/12OmNroijnA", "parentPublication": { "id": "proceedings/dac/1987/0781/0", "title": "24th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446341", "title": "Immersing Web3D Furniture into Real Interior Images", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446341/13bd1rsER20", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000h986", "title": "Inferring Semantic Layout for Hierarchical Text-to-Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000h986/17D45VTRoCU", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a798", "title": "Moving Soon? Rearranging Furniture using Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a798/1CJcJw3fs2s", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccict/2022/7224/0/722400a488", "title": "Visualization Of Furniture Model Using Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ccict/2022/722400a488/1HpDS9q0OMo", "parentPublication": { "id": "proceedings/ccict/2022/7224/0", "title": "2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a839", "title": "Layout Aware Inpainting for Automated Furniture Removal in Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a839/1J7W82UYOVa", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2019/5050/0/505000a031", "title": "Rationality Evaluation of Art Furniture Layout Based on Scene Simulation", "doi": null, "abstractUrl": "/proceedings-article/icvris/2019/505000a031/1fHk7oNyImY", "parentPublication": { "id": "proceedings/icvris/2019/5050/0", "title": "2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0530", "title": "Image Synthesis From Reconfigurable Layout and Style", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0530/1hVlpxVSLMA", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/10/09106863", "title": "Attribute-Conditioned Layout GAN for Automatic Graphic Design", "doi": null, "abstractUrl": "/journal/tg/2021/10/09106863/1kkFGfMRO36", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs0kyrw", "title": "2014 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "acronym": "icsme", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzu6Wh", "doi": "10.1109/ICSME.2014.90", "title": "Improving Low Quality Stack Overflow Post Detection", "normalizedTitle": "Improving Low Quality Stack Overflow Post Detection", "abstract": "Stack Overflow is a popular questions and answers (Q&A) website among software developers. It counts more than two millions of users who actively contribute by asking and answering thousands of questions daily. Identifying and reviewing low quality posts preserves the quality of site's contents and it is crucial to maintain a good user experience. In Stack Overflow the identification of poor quality posts is performed by selected users manually. The system also uses an automated identification system based on textual features. Low quality posts automatically enter a review queue maintained by experienced users. We present an approach to improve the automated system in use at Stack Overflow. It analyzes both the content of a post (e.g., simple textual features and complex readability metrics) and community-related aspects (e.g., popularity of a user in the community). Our approach reduces the size of the review queue effectively and removes misclassified good quality posts.", "abstracts": [ { "abstractType": "Regular", "content": "Stack Overflow is a popular questions and answers (Q&A) website among software developers. It counts more than two millions of users who actively contribute by asking and answering thousands of questions daily. Identifying and reviewing low quality posts preserves the quality of site's contents and it is crucial to maintain a good user experience. In Stack Overflow the identification of poor quality posts is performed by selected users manually. The system also uses an automated identification system based on textual features. Low quality posts automatically enter a review queue maintained by experienced users. We present an approach to improve the automated system in use at Stack Overflow. It analyzes both the content of a post (e.g., simple textual features and complex readability metrics) and community-related aspects (e.g., popularity of a user in the community). Our approach reduces the size of the review queue effectively and removes misclassified good quality posts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stack Overflow is a popular questions and answers (Q&A) website among software developers. It counts more than two millions of users who actively contribute by asking and answering thousands of questions daily. Identifying and reviewing low quality posts preserves the quality of site's contents and it is crucial to maintain a good user experience. In Stack Overflow the identification of poor quality posts is performed by selected users manually. The system also uses an automated identification system based on textual features. Low quality posts automatically enter a review queue maintained by experienced users. We present an approach to improve the automated system in use at Stack Overflow. It analyzes both the content of a post (e.g., simple textual features and complex readability metrics) and community-related aspects (e.g., popularity of a user in the community). Our approach reduces the size of the review queue effectively and removes misclassified good quality posts.", "fno": "6146a541", "keywords": [ "Measurement", "Communities", "Readability Metrics", "Indexes", "Entropy", "Genetic Algorithms", "Software" ], "authors": [ { "affiliation": null, "fullName": "Luca Ponzanelli", "givenName": "Luca", "surname": "Ponzanelli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrea Mocci", "givenName": "Andrea", "surname": "Mocci", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alberto Bacchelli", "givenName": "Alberto", "surname": "Bacchelli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michele Lanza", "givenName": "Michele", "surname": "Lanza", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Fullerton", "givenName": "David", "surname": "Fullerton", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "541-544", "year": "2014", "issn": "1063-6773", "isbn": "978-1-4799-6146-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6146a536", "articleId": "12OmNC4eSwe", "__typename": "AdjacentArticleType" }, "next": { "fno": "6146a545", "articleId": "12OmNxGALdc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/saner/2017/5501/0/07884629", "title": "Stack Overflow: A code laundering platform?", "doi": null, "abstractUrl": "/proceedings-article/saner/2017/07884629/12OmNBCqbzX", "parentPublication": { "id": "proceedings/saner/2017/5501/0", "title": "2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2017/3681/0/3681a636", "title": "Identifying Textual Features of High-Quality Questions: An Empirical Study on Stack Overflow", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a636/12OmNyr8Yjj", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a005", "title": "StackInTheFlow: Behavior-Driven Recommendation System for Stack Overflow Posts", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a005/13bd1sx4ZsE", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2022/9303/0/930300a247", "title": "SOSum: A Dataset of Stack Overflow Post Summaries", "doi": null, "abstractUrl": "/proceedings-article/msr/2022/930300a247/1Eo5OyCXs1a", "parentPublication": { "id": "proceedings/msr/2022/9303/0", "title": "2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2022/3786/0/378600a577", "title": "SOTitle: A Transformer-based Post Title Generation Approach for Stack Overflow", "doi": null, "abstractUrl": "/proceedings-article/saner/2022/378600a577/1FbSZpEGKNq", "parentPublication": { "id": "proceedings/saner/2022/3786/0", "title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2019/4937/0/493700a141", "title": "Characterizing Leveraged Stack Overflow Posts", "doi": null, "abstractUrl": "/proceedings-article/scam/2019/493700a141/1fJRObZlfkA", "parentPublication": { "id": "proceedings/scam/2019/4937/0", "title": "2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2020/9532/0/09226292", "title": "Improving Quality of a Post&#x2019;s Set of Answers in Stack Overflow", "doi": null, "abstractUrl": "/proceedings-article/seaa/2020/09226292/1nYsRufQKis", "parentPublication": { "id": "proceedings/seaa/2020/9532/0", "title": "2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-nier/2020/7126/0/712600a045", "title": "Why Will My Question Be Closed? NLP-Based Pre-Submission Predictions of Question Closing Reasons on Stack Overflow", "doi": null, "abstractUrl": "/proceedings-article/icse-nier/2020/712600a045/1sDsTY0peyk", "parentPublication": { "id": "proceedings/icse-nier/2020/7126/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/09/09469219", "title": "Post2Vec: Learning Distributed Representations of Stack Overflow Posts", "doi": null, "abstractUrl": "/journal/ts/2022/09/09469219/1uSP1oP63hm", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/09/09447188", "title": "Broken External Links on Stack Overflow", "doi": null, "abstractUrl": "/journal/ts/2022/09/09447188/1ua0pzJpNKM", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtsf8P4yI", "doi": "10.1109/PacificVis52677.2021.00009", "title": "A Machine Learning Approach for Predicting Human Preference for Graph Layouts", "normalizedTitle": "A Machine Learning Approach for Predicting Human Preference for Graph Layouts", "abstract": "Understanding what graph layout human prefer and why they prefer such graph layout is significant and challenging due to the highly complex visual perception and cognition system in human brain. In this paper, we present the first machine learning approach for predicting human preference for graph layouts.In general, the data sets with human preference labels are limited and insufficient for training deep networks. To address this, we train our deep learning model by employing the transfer learning method, e.g., exploiting the quality metrics, such as shape-based metrics, edge crossing and stress, which are shown to be correlated to human preference on graph layouts. Experimental results using the ground truth human preference data sets show that our model can successfully predict human preference for graph layouts. To our best knowledge, this is the first approach for predicting qualitative evaluation of graph layouts using human preference experiment data.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding what graph layout human prefer and why they prefer such graph layout is significant and challenging due to the highly complex visual perception and cognition system in human brain. In this paper, we present the first machine learning approach for predicting human preference for graph layouts.In general, the data sets with human preference labels are limited and insufficient for training deep networks. To address this, we train our deep learning model by employing the transfer learning method, e.g., exploiting the quality metrics, such as shape-based metrics, edge crossing and stress, which are shown to be correlated to human preference on graph layouts. Experimental results using the ground truth human preference data sets show that our model can successfully predict human preference for graph layouts. To our best knowledge, this is the first approach for predicting qualitative evaluation of graph layouts using human preference experiment data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding what graph layout human prefer and why they prefer such graph layout is significant and challenging due to the highly complex visual perception and cognition system in human brain. In this paper, we present the first machine learning approach for predicting human preference for graph layouts.In general, the data sets with human preference labels are limited and insufficient for training deep networks. To address this, we train our deep learning model by employing the transfer learning method, e.g., exploiting the quality metrics, such as shape-based metrics, edge crossing and stress, which are shown to be correlated to human preference on graph layouts. Experimental results using the ground truth human preference data sets show that our model can successfully predict human preference for graph layouts. To our best knowledge, this is the first approach for predicting qualitative evaluation of graph layouts using human preference experiment data.", "fno": "393100a006", "keywords": [ "Cognition", "Deep Learning Artificial Intelligence", "Graph Drawing", "Graph Layout", "Cognition System", "Human Brain", "Machine Learning", "Human Preference Prediction", "Deep Learning Model Training", "Transfer Learning", "Graph Drawing", "Measurement", "Training", "Deep Learning", "Layout", "Transfer Learning", "Data Visualization", "Predictive Models" ], "authors": [ { "affiliation": "University of Sydney,Australia", "fullName": "Shijun Cai", "givenName": "Shijun", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sydney,Australia", "fullName": "Seok-Hee Hong", "givenName": "Seok-Hee", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sydney,Australia", "fullName": "Jialiang Shen", "givenName": "Jialiang", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sydney,Australia", "fullName": "Tongliang Liu", "givenName": "Tongliang", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "6-10", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a001", "articleId": "1tTtpOLXIrK", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a011", "articleId": "1tTtqdxk10I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2013/2240/0/06785723", "title": "Predicting political preference of Twitter users", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785723/12OmNB8kHWY", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/devlrn/2005/9226/0/01490950", "title": "'Infants' preference for infants and adults", "doi": null, "abstractUrl": "/proceedings-article/devlrn/2005/01490950/12OmNyUWQVz", "parentPublication": { "id": "proceedings/devlrn/2005/9226/0", "title": "International Conference on Development and Learning", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009060961", "title": "A Comparison of User-Generated and Automatic Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009060961/13rRUwbaqLs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061333", "title": "Perceptual Organization in User-Generated Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061333/13rRUyeCkac", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/04/08739137", "title": "Evaluating the Readability of Force Directed Graph Layouts: A Deep Learning Approach", "doi": null, "abstractUrl": "/magazine/cg/2019/04/08739137/1aXM6mNkouI", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807275", "title": "<italic>DeepDrawing</italic>: A Deep Learning Approach to Graph Drawing", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807275/1cG6703GLja", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807379", "title": "Persistent Homology Guided Force-Directed Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a045", "title": "Effects of Individual Difference on User-Sketched Layouts of Vertex-Weighted Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a045/1rSReYMa9b2", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2141", "title": "Hierarchical Video Prediction using Relational Layouts for Human-Object Interactions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2141/1yeLaX6KclG", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900l1043", "title": "LayoutGMN: Neural Graph Matching for Structural Layout Similarity", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900l1043/1yeMivKnMmA", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBLvlL4", "doi": "10.1109/VAST.2014.7042496", "title": "PEARL: An interactive visual analytic tool for understanding personal emotion style derived from social media", "normalizedTitle": "PEARL: An interactive visual analytic tool for understanding personal emotion style derived from social media", "abstract": "Hundreds of millions of people leave digital footprints on social media (e.g., Twitter and Facebook). Such data not only disclose a person's demographics and opinions, but also reveal one's emotional style. Emotional style captures a person's patterns of emotions over time, including his overall emotional volatility and resilience. Understanding one's emotional style can provide great benefits for both individuals and businesses alike, including the support of self-reflection and delivery of individualized customer care. We present PEARL, a timeline-based visual analytic tool that allows users to interactively discover and examine a person's emotional style derived from this person's social media text. Compared to other visual text analytic systems, our work offers three unique contributions. First, it supports multi-dimensional emotion analysis from social media text to automatically detect a person's expressed emotions at different time points and summarize those emotions to reveal the person's emotional style. Second, it effectively visualizes complex, multi-dimensional emotion analysis results to create a visual emotional profile of an individual, which helps users browse and interpret one's emotional style. Third, it supports rich visual interactions that allow users to interactively explore and validate emotion analysis results. We have evaluated our work extensively through a series of studies. The results demonstrate the effectiveness of our tool both in emotion analysis from social media and in support of interactive visualization of the emotion analysis results.", "abstracts": [ { "abstractType": "Regular", "content": "Hundreds of millions of people leave digital footprints on social media (e.g., Twitter and Facebook). Such data not only disclose a person's demographics and opinions, but also reveal one's emotional style. Emotional style captures a person's patterns of emotions over time, including his overall emotional volatility and resilience. Understanding one's emotional style can provide great benefits for both individuals and businesses alike, including the support of self-reflection and delivery of individualized customer care. We present PEARL, a timeline-based visual analytic tool that allows users to interactively discover and examine a person's emotional style derived from this person's social media text. Compared to other visual text analytic systems, our work offers three unique contributions. First, it supports multi-dimensional emotion analysis from social media text to automatically detect a person's expressed emotions at different time points and summarize those emotions to reveal the person's emotional style. Second, it effectively visualizes complex, multi-dimensional emotion analysis results to create a visual emotional profile of an individual, which helps users browse and interpret one's emotional style. Third, it supports rich visual interactions that allow users to interactively explore and validate emotion analysis results. We have evaluated our work extensively through a series of studies. The results demonstrate the effectiveness of our tool both in emotion analysis from social media and in support of interactive visualization of the emotion analysis results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Hundreds of millions of people leave digital footprints on social media (e.g., Twitter and Facebook). Such data not only disclose a person's demographics and opinions, but also reveal one's emotional style. Emotional style captures a person's patterns of emotions over time, including his overall emotional volatility and resilience. Understanding one's emotional style can provide great benefits for both individuals and businesses alike, including the support of self-reflection and delivery of individualized customer care. We present PEARL, a timeline-based visual analytic tool that allows users to interactively discover and examine a person's emotional style derived from this person's social media text. Compared to other visual text analytic systems, our work offers three unique contributions. First, it supports multi-dimensional emotion analysis from social media text to automatically detect a person's expressed emotions at different time points and summarize those emotions to reveal the person's emotional style. Second, it effectively visualizes complex, multi-dimensional emotion analysis results to create a visual emotional profile of an individual, which helps users browse and interpret one's emotional style. Third, it supports rich visual interactions that allow users to interactively explore and validate emotion analysis results. We have evaluated our work extensively through a series of studies. The results demonstrate the effectiveness of our tool both in emotion analysis from social media and in support of interactive visualization of the emotion analysis results.", "fno": "07042496", "keywords": [ "Mood", "Visualization", "Media", "Engines", "Analytical Models", "Resilience", "Computational Modeling", "Information Visualization", "Personal Emotion Analytics", "Affective And Mood Modeling", "Social Media Text", "Twitter" ], "authors": [ { "affiliation": "University of Toronto", "fullName": "Jian Zhao", "givenName": "Jian", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research Almadén", "fullName": "Liang Gou", "givenName": "Liang", "surname": "Gou", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research Almadén", "fullName": "Fei Wang", "givenName": "Fei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research Almadén", "fullName": "Michelle Zhou", "givenName": "Michelle", "surname": "Zhou", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "203-212", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042495", "articleId": "12OmNANTAwO", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042497", "articleId": "12OmNAThXU2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isise/2009/6325/0/05447267", "title": "A Study of Fuzzy Emotion Semantic Ontology", "doi": null, "abstractUrl": "/proceedings-article/isise/2009/05447267/12OmNAoDifq", "parentPublication": { "id": "proceedings/isise/2009/6325/0", "title": "2009 Second International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217786", "title": "Emotion classification using deep neural networks and emotional patches", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217786/12OmNwtWfTI", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a448", "title": "On the Influence of Emotional Feedback on Emotion Awareness and Gaze Behavior", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a448/12OmNxGja8r", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09778970", "title": "Emotion Intensity and its Control for Emotional Voice Conversion", "doi": null, "abstractUrl": "/journal/ta/2023/01/09778970/1DvfACRh4Pe", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2019/4637/0/463700a115", "title": "Investigating Emotion Style in Human Faces and Avatars", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2019/463700a115/1fHHrDla9z2", "parentPublication": { "id": "proceedings/sbgames/2019/4637/0", "title": "2019 18th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2019/5604/0/560400a251", "title": "Live Emoji: A Live Storytelling VR System with Programmable Cartoon-Style Emotion Embodiment", "doi": null, "abstractUrl": "/proceedings-article/aivr/2019/560400a251/1grOk3JbfQk", "parentPublication": { "id": "proceedings/aivr/2019/5604/0", "title": "2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2019/5604/0/560400a102", "title": "A Live Storytelling Virtual Reality System with Programmable Cartoon-Style Emotion Embodiment", "doi": null, "abstractUrl": "/proceedings-article/aivr/2019/560400a102/1grOlrH5hdK", "parentPublication": { "id": "proceedings/aivr/2019/5604/0", "title": "2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103868", "title": "Emotion Computing Method Based On Knowledge Representation", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103868/1kesxlvYP28", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09376944", "title": "Automatic Emotion Recognition for Groups: A Review", "doi": null, "abstractUrl": "/journal/ta/2023/01/09376944/1rUN7wIS06Y", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a198", "title": "Temporal Integration of Emotion Perception for Cross-Cultural and Multi-Emotion Music", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a198/1ziPgcS2xWw", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmtWEq", "doi": "10.1109/VAST.2014.7042486", "title": "A visual reasoning approach for data-driven transport assessment on urban roads", "normalizedTitle": "A visual reasoning approach for data-driven transport assessment on urban roads", "abstract": "Transport assessment plays a vital role in urban planning and traffic control, which are influenced by multi-faceted traffic factors involving road infrastructure and traffic flow. Conventional solutions can hardly meet the requirements and expectations of domain experts. In this paper we present a data-driven solution by leveraging a visual analysis system to evaluate the real traffic situations based on taxi trajectory data. A sketch-based visual interface is designed to support dynamic query and visual reasoning of traffic situations within multiple coordinated views. In particular, we propose a novel road-based query model for analysts to interactively conduct evaluation tasks. This model is supported by a bi-directional hash structure, TripHash, which enables real-time responses to the data queries over a huge amount of trajectory data. Case studies with a real taxi GPS trajectory dataset (> 30GB) show that our system performs well for on-demand transport assessment and reasoning.", "abstracts": [ { "abstractType": "Regular", "content": "Transport assessment plays a vital role in urban planning and traffic control, which are influenced by multi-faceted traffic factors involving road infrastructure and traffic flow. Conventional solutions can hardly meet the requirements and expectations of domain experts. In this paper we present a data-driven solution by leveraging a visual analysis system to evaluate the real traffic situations based on taxi trajectory data. A sketch-based visual interface is designed to support dynamic query and visual reasoning of traffic situations within multiple coordinated views. In particular, we propose a novel road-based query model for analysts to interactively conduct evaluation tasks. This model is supported by a bi-directional hash structure, TripHash, which enables real-time responses to the data queries over a huge amount of trajectory data. Case studies with a real taxi GPS trajectory dataset (> 30GB) show that our system performs well for on-demand transport assessment and reasoning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Transport assessment plays a vital role in urban planning and traffic control, which are influenced by multi-faceted traffic factors involving road infrastructure and traffic flow. Conventional solutions can hardly meet the requirements and expectations of domain experts. In this paper we present a data-driven solution by leveraging a visual analysis system to evaluate the real traffic situations based on taxi trajectory data. A sketch-based visual interface is designed to support dynamic query and visual reasoning of traffic situations within multiple coordinated views. In particular, we propose a novel road-based query model for analysts to interactively conduct evaluation tasks. This model is supported by a bi-directional hash structure, TripHash, which enables real-time responses to the data queries over a huge amount of trajectory data. Case studies with a real taxi GPS trajectory dataset (> 30GB) show that our system performs well for on-demand transport assessment and reasoning.", "fno": "07042486", "keywords": [ "Roads", "Trajectory", "Global Positioning System", "Topology", "Visualization", "Indexes", "Visual Analysis", "Road Based Query", "Taxi Trajectory", "Hash Index" ], "authors": [ { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Fei Wang", "givenName": "Fei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Wei Chen", "givenName": "Wei", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Feiran Wu", "givenName": "Feiran", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Kent State University", "fullName": "Ye Zhao", "givenName": "Ye", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Han Hong", "givenName": "Han", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Tianyu Gu", "givenName": "Tianyu", "surname": "Gu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Long Wang", "givenName": "Long", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Technology", "fullName": "Ronghua Liang", "givenName": "Ronghua", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab of CAD&CG, Zhejiang University", "fullName": "Hujun Bao", "givenName": "Hujun", "surname": "Bao", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "103-112", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042485", "articleId": "12OmNBuL1em", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042487", "articleId": "12OmNs4S8Ka", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156392", "title": "TrajRank: Exploring travel behaviour on a route by trajectory ranking", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156392/12OmNAYXWFA", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a495", "title": "Tracking Hit-and-Run Vehicle with Sparse Video Surveillance Cameras and Mobile Taxicabs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a495/12OmNBqdr37", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a137", "title": "Visualizing Hidden Themes of Taxi Movement with Semantic Transformation", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a137/12OmNwI8ccX", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518255", "title": "Discovering Urban Social Functional Regions Using Taxi Trajectories", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518255/12OmNwpXRXJ", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2013/1050/0/06642525", "title": "Road segment partitioning towards anomalous trajectory detection for surveillance applications", "doi": null, "abstractUrl": "/proceedings-article/iri/2013/06642525/12OmNxwENzg", "parentPublication": { "id": "proceedings/iri/2013/1050/0", "title": "2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2015/9783/0/07347679", "title": "Visual analysis of route choice behaviour based on GPS trajectories", "doi": null, "abstractUrl": "/proceedings-article/vast/2015/07347679/12OmNyKJiqF", "parentPublication": { "id": "proceedings/vast/2015/9783/0", "title": "2015 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/08320847", "title": "Visual Interactive Map Matching", "doi": null, "abstractUrl": "/journal/tg/2018/06/08320847/13rRUwInvBd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2020/01/08454749", "title": "Efficient Path Query Processing Over Massive Trajectories on the Cloud", "doi": null, "abstractUrl": "/journal/bd/2020/01/08454749/13rRUxCitBk", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2019/3363/0/336300a138", "title": "Time-Dependent Reachability Analysis: A Data-Driven Approach", "doi": null, "abstractUrl": "/proceedings-article/mdm/2019/336300a138/1ckrNs0DbMI", "parentPublication": { "id": "proceedings/mdm/2019/3363/0", "title": "2019 20th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232669", "title": "Trajectory Similarity Assessment On Road Networks Via Embedding Learning", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232669/1o56Ba3QX6g", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3njOz1HtC", "doi": "10.1109/CVPR42600.2020.01231", "title": "Visual Chirality", "normalizedTitle": "Visual Chirality", "abstract": "How can we tell whether an image has been mirrored? While we understand the geometry of mirror reflections very well, less has been said about how it affects distributions of imagery at scale, despite widespread use for data augmentation in computer vision. In this paper, we investigate how the statistics of visual data are changed by reflection. We refer to these changes as ``visual chirality,'' after the concept of geometric chirality---the notion of objects that are distinct from their mirror image. Our analysis of visual chirality reveals surprising results, including low-level chiral signals pervading imagery stemming from image processing in cameras, to the ability to discover visual chirality in images of people and faces. Our work has implications for data augmentation, self-supervised learning, and image forensics.", "abstracts": [ { "abstractType": "Regular", "content": "How can we tell whether an image has been mirrored? While we understand the geometry of mirror reflections very well, less has been said about how it affects distributions of imagery at scale, despite widespread use for data augmentation in computer vision. In this paper, we investigate how the statistics of visual data are changed by reflection. We refer to these changes as ``visual chirality,'' after the concept of geometric chirality---the notion of objects that are distinct from their mirror image. Our analysis of visual chirality reveals surprising results, including low-level chiral signals pervading imagery stemming from image processing in cameras, to the ability to discover visual chirality in images of people and faces. Our work has implications for data augmentation, self-supervised learning, and image forensics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "How can we tell whether an image has been mirrored? While we understand the geometry of mirror reflections very well, less has been said about how it affects distributions of imagery at scale, despite widespread use for data augmentation in computer vision. In this paper, we investigate how the statistics of visual data are changed by reflection. We refer to these changes as ``visual chirality,'' after the concept of geometric chirality---the notion of objects that are distinct from their mirror image. Our analysis of visual chirality reveals surprising results, including low-level chiral signals pervading imagery stemming from image processing in cameras, to the ability to discover visual chirality in images of people and faces. Our work has implications for data augmentation, self-supervised learning, and image forensics.", "fno": "716800m2292", "keywords": [ "Chirality", "Computational Geometry", "Computer Vision", "Image Forensics", "Supervised Learning", "Visual Chirality", "Data Augmentation", "Mirror Reflections", "Visual Data", "Mirror Image", "Computer Vision", "Geometric Chirality", "Image Processing", "Self Supervised Learning", "Image Forensics", "Visualization", "Task Analysis", "Computer Vision", "Training", "Mirrors", "Image Processing", "Cameras" ], "authors": [ { "affiliation": "Cornell University", "fullName": "Zhiqiu Lin", "givenName": "Zhiqiu", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University; Cornell Tech", "fullName": "Jin Sun", "givenName": "Jin", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University; Cornell Tech", "fullName": "Abe Davis", "givenName": "Abe", "surname": "Davis", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University; Cornell Tech", "fullName": "Noah Snavely", "givenName": "Noah", "surname": "Snavely", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "12292-12300", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800m2282", "articleId": "1m3nTz3eRTW", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800m2301", "articleId": "1m3nNcIIpB6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2016/0641/0/07477604", "title": "A new computer vision-based system to help clinicians objectively assess visual pursuit with the moving mirror stimulus for the diagnosis of minimally conscious state", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477604/12OmNANkohJ", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1988/0862/0/00196253", "title": "How to tell right from left (chirality for 2-D binary shapes)", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1988/00196253/12OmNBt3qpB", "parentPublication": { "id": "proceedings/cvpr/1988/0862/0", "title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wevr/2017/3881/0/07957713", "title": "Design of a practical TV interface for teacher-guided VR field trips", "doi": null, "abstractUrl": "/proceedings-article/wevr/2017/07957713/12OmNrIJqrh", "parentPublication": { "id": "proceedings/wevr/2017/3881/0", "title": "2017 IEEE 3rd Workshop on Everyday Virtual Reality (WEVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440856", "title": "Face to Face: Evaluating Visual Comparison", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440856/17D45WnnFWl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09793716", "title": "Mirror Detection With the Visual Chirality Cue", "doi": null, "abstractUrl": "/journal/tp/2023/03/09793716/1E5LCl0Myre", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798257", "title": "Visual Stimulus Disrupts the Spatial Localization of a Tactile Sensation in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798257/1cJ0HzmDEsg", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798009", "title": "Laser-based Photochromic Drawing Method for Rotating Objects with High-speed Visual Feedback", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798009/1cJ1a4b7cfS", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2019/2297/0/229700a128", "title": "Combining Tendon Vibration and Visual Stimulation Enhances Kinesthetic Illusions", "doi": null, "abstractUrl": "/proceedings-article/cw/2019/229700a128/1fHklRh3t3W", "parentPublication": { "id": "proceedings/cw/2019/2297/0", "title": "2019 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102809", "title": "Knowledge-Based Fine-Grained Classification For Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102809/1kwqQY7JA3K", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900d043", "title": "Depth-Aware Mirror Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900d043/1yeLRme2vYI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tROFXZKX3q", "title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "acronym": "percom-workshops", "groupId": "1000552", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tROM4WfBbq", "doi": "10.1109/PerComWorkshops51409.2021.9431001", "title": "Towards Automated Data Sharing in Personal Data Stores", "normalizedTitle": "Towards Automated Data Sharing in Personal Data Stores", "abstract": "The data on the Web is increasingly being centralised towards a few service providers. Personal Data Stores (PDS) have emerged, proposing a fundamental shift from the current service-centric data ecosystem to a decentralised data storage and processing environment by placing the data with users. Users are to assume total self-sovereignty over their data, including opportunities to monetise. While PDS systems enable user empowerment, they also put a greater burden on the users, who may not be technically-savvy, to manage data access, which may increase the chance of unintended mishaps and privacy risks. This research proposes a privacy preference recommender system for privacy-preserving data sharing control that is designed to work with the constraints of user-centric data storage and processing environment for PDS. The outcome contributes towards a user-assisting privacy technology that utilises user context effectively to recommend privacy settings while conforming to the PDS architecture by storing and processing all analytics locally.", "abstracts": [ { "abstractType": "Regular", "content": "The data on the Web is increasingly being centralised towards a few service providers. Personal Data Stores (PDS) have emerged, proposing a fundamental shift from the current service-centric data ecosystem to a decentralised data storage and processing environment by placing the data with users. Users are to assume total self-sovereignty over their data, including opportunities to monetise. While PDS systems enable user empowerment, they also put a greater burden on the users, who may not be technically-savvy, to manage data access, which may increase the chance of unintended mishaps and privacy risks. This research proposes a privacy preference recommender system for privacy-preserving data sharing control that is designed to work with the constraints of user-centric data storage and processing environment for PDS. The outcome contributes towards a user-assisting privacy technology that utilises user context effectively to recommend privacy settings while conforming to the PDS architecture by storing and processing all analytics locally.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The data on the Web is increasingly being centralised towards a few service providers. Personal Data Stores (PDS) have emerged, proposing a fundamental shift from the current service-centric data ecosystem to a decentralised data storage and processing environment by placing the data with users. Users are to assume total self-sovereignty over their data, including opportunities to monetise. While PDS systems enable user empowerment, they also put a greater burden on the users, who may not be technically-savvy, to manage data access, which may increase the chance of unintended mishaps and privacy risks. This research proposes a privacy preference recommender system for privacy-preserving data sharing control that is designed to work with the constraints of user-centric data storage and processing environment for PDS. The outcome contributes towards a user-assisting privacy technology that utilises user context effectively to recommend privacy settings while conforming to the PDS architecture by storing and processing all analytics locally.", "fno": "09431001", "keywords": [ "Data Privacy", "Distributed Processing", "User Interfaces", "User Context", "Service Providers", "Personal Data Stores", "Decentralised Data Storage", "PDS Systems", "User Empowerment", "Data Access", "Unintended Mishaps", "Privacy Risks", "Privacy Preference Recommender System", "Privacy Preserving Data", "User Centric Data Storage", "Service Centric Data Ecosystem", "Automated Data Sharing", "User Assisting Privacy", "Pervasive Computing", "Privacy", "Data Privacy", "Handheld Computers", "Conferences", "Ecosystems", "Memory", "Personal Data Stores PDS", "Privacy Preferences", "Recommender Systems", "Io T" ], "authors": [ { "affiliation": "School of Computer Science and Engineering, Cyber Security Cooperative Research Centre University of New South Wales,Sydney,Australia", "fullName": "Yashothara Shanmugarasa", "givenName": "Yashothara", "surname": "Shanmugarasa", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Engineering, Cyber Security Cooperative Research Centre University of New South Wales,Sydney,Australia", "fullName": "Hye-Young Paik", "givenName": "Hye-Young", "surname": "Paik", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Engineering, Cyber Security Cooperative Research Centre University of New South Wales,Sydney,Australia", "fullName": "Salil S. Kanhere", "givenName": "Salil S.", "surname": "Kanhere", "__typename": "ArticleAuthorType" }, { "affiliation": "Data61/CSIRO,Sydney,Australia", "fullName": "Liming Zhu", "givenName": "Liming", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "percom-workshops", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "328-331", "year": "2021", "issn": null, "isbn": "978-1-6654-0424-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09430933", "articleId": "1tROMoFWkVy", "__typename": "AdjacentArticleType" }, "next": { "fno": "09431036", "articleId": "1tROO4H4Ibm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2016/3207/0/3207a040", "title": "A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper)", "doi": null, "abstractUrl": "/proceedings-article/iri/2016/3207a040/12OmNx7G61E", "parentPublication": { "id": "proceedings/iri/2016/3207/0", "title": "2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2010/3965/0/3965a131", "title": "Visualizing Past Personal Data Disclosures", "doi": null, "abstractUrl": "/proceedings-article/ares/2010/3965a131/12OmNzC5ToP", "parentPublication": { "id": "proceedings/ares/2010/3965/0", "title": "2010 International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2017/1792/0/1792a151", "title": "Learning Privacy Habits of PDS Owners", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792a151/12OmNzE54Ax", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2013/05/06336755", "title": "The Personal Data Store Approach to Personal Data Security", "doi": null, "abstractUrl": "/magazine/sp/2013/05/06336755/13rRUwhpBMN", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b330", "title": "Blockchain as a Notarization Service for Data Sharing with Personal Data Store", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b330/17D45WYQJa7", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/02/08662576", "title": "Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications", "doi": null, "abstractUrl": "/journal/tq/2021/02/08662576/18cSRmMmFPO", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2022/03/09811280", "title": "A PIMS Development Kit for New Personal Data Platforms", "doi": null, "abstractUrl": "/magazine/ic/2022/03/09811280/1ECXDFkC4QE", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900a897", "title": "A Parallel Data Stream Layer for Large Data Workloads on WANs", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900a897/1t7mWTjz0lO", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2021/4890/0/489000a092", "title": "PDS<sup>2</sup>: A user-centered decentralized marketplace for privacy preserving data processing", "doi": null, "abstractUrl": "/proceedings-article/icdew/2021/489000a092/1tROCmBrAhq", "parentPublication": { "id": "proceedings/icdew/2021/4890/0", "title": "2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2022/01/09530451", "title": "Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores", "doi": null, "abstractUrl": "/magazine/sp/2022/01/09530451/1wG1lJa9xgA", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAWH9tH", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNrHB1QE", "doi": "10.1109/PACIFICVIS.2011.5742386", "title": "TripVista: Triple Perspective Visual Trajectory Analytics and its application on microscopic traffic data at a road intersection", "normalizedTitle": "TripVista: Triple Perspective Visual Trajectory Analytics and its application on microscopic traffic data at a road intersection", "abstract": "In this paper, we present an interactive visual analytics system, Triple Perspective Visual Trajectory Analytics (TripVista), for exploring and analyzing complex traffic trajectory data. The users are equipped with a carefully designed interface to inspect data interactively from three perspectives (spatial, temporal and multi-dimensional views). While most previous works, in both visualization and transportation research, focused on the macro aspects of traffic flows, we develop visualization methods to investigate and analyze microscopic traffic patterns and abnormal behaviors. In the spatial view of our system, traffic trajectories with various presentation styles are directly interactive with user brushing, together with convenient pattern exploration and selection through ring-style sliders. Improved ThemeRiver, embedded with glyphs indicating directional information, and multiple scatterplots with time as horizontal axes illustrate temporal information of the traffic flows. Our system also harnesses the power of parallel coordinates to visualize the multi-dimensional aspects of the traffic trajectory data. The above three view components are linked closely and interactively to provide access to multiple perspectives for users. Experiments show that our system is capable of effectively finding both regular and abnormal traffic flow patterns.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present an interactive visual analytics system, Triple Perspective Visual Trajectory Analytics (TripVista), for exploring and analyzing complex traffic trajectory data. The users are equipped with a carefully designed interface to inspect data interactively from three perspectives (spatial, temporal and multi-dimensional views). While most previous works, in both visualization and transportation research, focused on the macro aspects of traffic flows, we develop visualization methods to investigate and analyze microscopic traffic patterns and abnormal behaviors. In the spatial view of our system, traffic trajectories with various presentation styles are directly interactive with user brushing, together with convenient pattern exploration and selection through ring-style sliders. Improved ThemeRiver, embedded with glyphs indicating directional information, and multiple scatterplots with time as horizontal axes illustrate temporal information of the traffic flows. Our system also harnesses the power of parallel coordinates to visualize the multi-dimensional aspects of the traffic trajectory data. The above three view components are linked closely and interactively to provide access to multiple perspectives for users. Experiments show that our system is capable of effectively finding both regular and abnormal traffic flow patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present an interactive visual analytics system, Triple Perspective Visual Trajectory Analytics (TripVista), for exploring and analyzing complex traffic trajectory data. The users are equipped with a carefully designed interface to inspect data interactively from three perspectives (spatial, temporal and multi-dimensional views). While most previous works, in both visualization and transportation research, focused on the macro aspects of traffic flows, we develop visualization methods to investigate and analyze microscopic traffic patterns and abnormal behaviors. In the spatial view of our system, traffic trajectories with various presentation styles are directly interactive with user brushing, together with convenient pattern exploration and selection through ring-style sliders. Improved ThemeRiver, embedded with glyphs indicating directional information, and multiple scatterplots with time as horizontal axes illustrate temporal information of the traffic flows. Our system also harnesses the power of parallel coordinates to visualize the multi-dimensional aspects of the traffic trajectory data. The above three view components are linked closely and interactively to provide access to multiple perspectives for users. Experiments show that our system is capable of effectively finding both regular and abnormal traffic flow patterns.", "fno": "05742386", "keywords": [ "Data Visualisation", "Interactive Systems", "Road Traffic", "Traffic Engineering Computing", "User Interfaces", "Trip Vista", "Triple Perspective Visual Trajectory Analytics", "Microscopic Traffic Data", "Road Intersection", "Interactive Visual Analytics System", "User Interface", "Pattern Exploration", "Ring Style Slider", "Theme River", "Abnormal Traffic Flow Pattern", "Multidimensional Data Visualization", "Trajectory", "Data Visualization", "Roads", "Rivers", "Brushes", "Visual Analytics", "Linked View", "Spatiotemporal", "Multidimensional Data Visualization", "Traffic Visualization" ], "authors": [ { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, Beijing, China", "fullName": "Hanqi Guo", "givenName": "Hanqi", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, Beijing, China", "fullName": "Zuchao Wang", "givenName": "Zuchao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, Beijing, China", "fullName": "Bowen Yu", "givenName": "Bowen", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, Beijing, China", "fullName": "Huijing Zhao", "givenName": "Huijing", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, Beijing, China", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-03-01T00:00:00", "pubType": "proceedings", "pages": "163-170", "year": "2011", "issn": "2165-8765", "isbn": "978-1-61284-935-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05742385", "articleId": "12OmNwMFMm9", "__typename": "AdjacentArticleType" }, "next": { "fno": "05742387", "articleId": "12OmNBhHth0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2015/6850/0/6850a013", "title": "A Method for the Trajectory Privacy Protection Based on the Segmented Fake Trajectory under Road Networks", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a013/12OmNBkxsrh", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2013/1050/0/06642525", "title": "Road segment partitioning towards anomalous trajectory detection for surveillance applications", "doi": null, "abstractUrl": "/proceedings-article/iri/2013/06642525/12OmNxwENzg", "parentPublication": { "id": "proceedings/iri/2013/1050/0", "title": "2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2012/4685/0/4685a142", "title": "NEAT: Road Network Aware Trajectory Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2012/4685a142/12OmNz5JBOu", "parentPublication": { "id": "proceedings/icdcs/2012/4685/0", "title": "2012 IEEE 32nd International Conference on Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192687", "title": "TrajGraph: A Graph-Based Visual Analytics Approach to Studying Urban Network Centralities Using Taxi Trajectory Data", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192687/13rRUwInvBa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876014", "title": "Visual Exploration of Sparse Traffic Trajectory Data", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876014/13rRUxjQyvk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b114", "title": "Trajectory WaveNet: A Trajectory-Based Model for Traffic Forecasting", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b114/1Aqxfal6FSE", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a174", "title": "Visual Analytics of Taxi Trajectory Data via Topical Sub-trajectories", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a174/1cMF7meccAo", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101626", "title": "Automatic Calibration of Road Intersection Topology using Trajectories", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101626/1kaMMZBeWZi", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232669", "title": "Trajectory Similarity Assessment On Road Networks Via Embedding Learning", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232669/1o56Ba3QX6g", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/4.899E87", "title": "A Region-and-Trajectory Movement Matching for Multiple Turn-counts at Road Intersection on Edge Device", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/4.899E87/1yJYi1ktkkw", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNASrawz", "title": "2009 IEEE Virtual Reality Conference", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZmZl5", "doi": "10.1109/VR.2009.4811021", "title": "Virtualized Traffic: Reconstructing Traffic Flows from Discrete Spatio-Temporal Data", "normalizedTitle": "Virtualized Traffic: Reconstructing Traffic Flows from Discrete Spatio-Temporal Data", "abstract": "We present a novel concept, Virtualized Traffic, to reconstruct and visualize continuous traffic flows from discrete spatio-temporal data provided by traffic sensors or generated artificially to enhance a sense of immersion in a dynamic virtual world. Given the positions of each car at two recorded locations on a highway and the corresponding time instances, our approach can reconstruct the traffic flows (i.e. the dynamic motions of multiple cars over time) in between the two locations along the highway for immersive visualization of virtual cities or other environments. Our algorithm is applicable to high-density traffic on highways with an arbitrary number of lanes and takes into account the geometric, kinematic, and dynamic constraints on the cars. Our method reconstructs the car motion that automatically minimizes the number of lane changes, respects safety distance to other cars, and computes the acceleration necessary to obtain a smooth traffic flow subject to the given constraints. Furthermore, our framework can process a continuous stream of input data in real time, enabling the users to view virtualized traffic events in a virtual world as they occur.", "abstracts": [ { "abstractType": "Regular", "content": "We present a novel concept, Virtualized Traffic, to reconstruct and visualize continuous traffic flows from discrete spatio-temporal data provided by traffic sensors or generated artificially to enhance a sense of immersion in a dynamic virtual world. Given the positions of each car at two recorded locations on a highway and the corresponding time instances, our approach can reconstruct the traffic flows (i.e. the dynamic motions of multiple cars over time) in between the two locations along the highway for immersive visualization of virtual cities or other environments. Our algorithm is applicable to high-density traffic on highways with an arbitrary number of lanes and takes into account the geometric, kinematic, and dynamic constraints on the cars. Our method reconstructs the car motion that automatically minimizes the number of lane changes, respects safety distance to other cars, and computes the acceleration necessary to obtain a smooth traffic flow subject to the given constraints. Furthermore, our framework can process a continuous stream of input data in real time, enabling the users to view virtualized traffic events in a virtual world as they occur.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a novel concept, Virtualized Traffic, to reconstruct and visualize continuous traffic flows from discrete spatio-temporal data provided by traffic sensors or generated artificially to enhance a sense of immersion in a dynamic virtual world. Given the positions of each car at two recorded locations on a highway and the corresponding time instances, our approach can reconstruct the traffic flows (i.e. the dynamic motions of multiple cars over time) in between the two locations along the highway for immersive visualization of virtual cities or other environments. Our algorithm is applicable to high-density traffic on highways with an arbitrary number of lanes and takes into account the geometric, kinematic, and dynamic constraints on the cars. Our method reconstructs the car motion that automatically minimizes the number of lane changes, respects safety distance to other cars, and computes the acceleration necessary to obtain a smooth traffic flow subject to the given constraints. Furthermore, our framework can process a continuous stream of input data in real time, enabling the users to view virtualized traffic events in a virtual world as they occur.", "fno": "04811021", "keywords": [ "Automobiles", "Data Visualisation", "Road Traffic", "Virtual Reality", "Virtualized Traffic", "Traffic Flows", "Discrete Spatiotemporal Data", "Dynamic Virtual World", "Immersive Visualization", "Virtual Cities", "Geometric Constraint", "Kinematic Constraint", "Dynamic Constraint", "Car Motion", "Safety Distance", "Traffic Control", "Data Visualization", "Road Transportation", "Automated Highways", "Kinematics", "Layout", "Image Reconstruction", "Virtual Reality", "Computer Science", "Cities And Towns", "I 6 3 Computing Methodologies Simulation And Modeling Applications" ], "authors": [ { "affiliation": "Department of Computer Science University of North Carolina at Chapel Hill, USA e-mail: berg@cs.unc.edu", "fullName": "Jur van den Berg", "givenName": "Jur", "surname": "van den Berg", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science University of North Carolina at Chapel Hill, USA e-mail: sewall@cs.unc.edu", "fullName": "Jason Sewall", "givenName": "Jason", "surname": "Sewall", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science University of North Carolina at Chapel Hill, USA e-mail: lin@cs.unc.edu", "fullName": "Ming Lin", "givenName": "Ming", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science University of North Carolina at Chapel Hill, USA e-mail: dm@cs.unc.edu", "fullName": "Dinesh Manocha", "givenName": "Dinesh", "surname": "Manocha", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-03-01T00:00:00", "pubType": "proceedings", "pages": "183-190", "year": "2009", "issn": "1087-8270", "isbn": "978-1-4244-3943-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04811019", "articleId": "12OmNwMXnsz", "__typename": "AdjacentArticleType" }, "next": { "fno": "04811022", "articleId": "12OmNAtst6V", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2008/3357/2/3357c574", "title": "Traffic Safety Evaluation of Highway Intersection with the Use of Conflict Severity Concept", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357c574/12OmNBSBk1S", "parentPublication": { "id": "icicta/2008/3357/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2012/4652/0/4652a254", "title": "An International Driving Simulator: Recognizing the Sense of a Car Body by the Simulator", "doi": null, "abstractUrl": "/proceedings-article/waina/2012/4652a254/12OmNqHItNL", "parentPublication": { "id": "proceedings/waina/2012/4652/0", "title": "2012 26th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2008/3357/2/3357c461", "title": "Safety Analysis on Road Sight Distance", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357c461/12OmNs59JGH", "parentPublication": { "id": "icicta/2008/3357/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/3/4077e045", "title": "Research on Network Safety Operation of Highway Segment", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077e045/12OmNwMXnrS", "parentPublication": { "id": "proceedings/icicta/2010/4077/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ss/1999/0128/0/01280079", "title": "Microscopic Simulations of Freeway Traffic Flow", "doi": null, "abstractUrl": "/proceedings-article/ss/1999/01280079/12OmNxHJ9uK", "parentPublication": { "id": "proceedings/ss/1999/0128/0", "title": "Simulation Symposium, Annual", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576243", "title": "Towards robust automatic traffic scene analysis in real-time", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576243/12OmNyS6RLN", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ivs/2005/8961/0/01505118", "title": "VisionSense: an advanced lateral collision warning system", "doi": null, "abstractUrl": "/proceedings-article/ivs/2005/01505118/12OmNz2TCIh", "parentPublication": { "id": "proceedings/ivs/2005/8961/0", "title": "2005 IEEE Intelligent Vehicles Symposium Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2015/8315/0/8315a551", "title": "A Cellular Automaton Model of Traffic with Railroad Crossing", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2015/8315a551/12OmNzayNDd", "parentPublication": { "id": "proceedings/bwcca/2015/8315/0", "title": "2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010026", "title": "Virtualized Traffic: Reconstructing Traffic Flows from Discrete Spatiotemporal Data", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010026/13rRUwIF6dJ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoias/2019/2662/0/266200a135", "title": "Analysis of Traffic Congestion Reducer Agents on Multi-Lane Highway", "doi": null, "abstractUrl": "/proceedings-article/icoias/2019/266200a135/1c8PahCGRpK", "parentPublication": { "id": "proceedings/icoias/2019/2662/0", "title": "2019 2nd International Conference on Intelligent Autonomous Systems (ICoIAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvAiSpK", "title": "Programming Models for Massively Parallel Computers", "acronym": "pmmp", "groupId": "1000593", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvsw", "doi": "10.1109/PMMPC.1995.504348", "title": "Comparing scalable programming techniques for weather prediction", "normalizedTitle": "Comparing scalable programming techniques for weather prediction", "abstract": "In this paper we study the of issues of programmability and performance in the parallelization of weather prediction models. We compare parallelization using a high level library (the Nearest Neighbor Tool: NNT) and a high level language/directive approach (High Performance Fortran: HPF). We report on the performance of a complete weather prediction model (the Rapid Update Cycle, which is currently run operationally at the National Meteorological Center at Washington) coded using NNT. We quantify the performance effects of optimizations possible with NNT that must be performed by an HPF compiler.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we study the of issues of programmability and performance in the parallelization of weather prediction models. We compare parallelization using a high level library (the Nearest Neighbor Tool: NNT) and a high level language/directive approach (High Performance Fortran: HPF). We report on the performance of a complete weather prediction model (the Rapid Update Cycle, which is currently run operationally at the National Meteorological Center at Washington) coded using NNT. We quantify the performance effects of optimizations possible with NNT that must be performed by an HPF compiler.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we study the of issues of programmability and performance in the parallelization of weather prediction models. We compare parallelization using a high level library (the Nearest Neighbor Tool: NNT) and a high level language/directive approach (High Performance Fortran: HPF). We report on the performance of a complete weather prediction model (the Rapid Update Cycle, which is currently run operationally at the National Meteorological Center at Washington) coded using NNT. We quantify the performance effects of optimizations possible with NNT that must be performed by an HPF compiler.", "fno": "71770111", "keywords": [ "Parallel Programming Weather Forecasting Software Performance Evaluation Scalable Programming Techniques Weather Prediction Programmability Performance Weather Prediction Models Parallelization High Level Library Nearest Neighbor Tool NNT High Performance Fortran Rapid Update Cycle National Meteorological Center Performance Effects" ], "authors": [ { "affiliation": "Forecast Syst. Lab., NOAA, Boulder, CO, USA", "fullName": "B. Rodriguez", "givenName": "B.", "surname": "Rodriguez", "__typename": "ArticleAuthorType" }, { "affiliation": "Forecast Syst. Lab., NOAA, Boulder, CO, USA", "fullName": "L. Hart", "givenName": "L.", "surname": "Hart", "__typename": "ArticleAuthorType" }, { "affiliation": "Forecast Syst. Lab., NOAA, Boulder, CO, USA", "fullName": "T. Henderson", "givenName": "T.", "surname": "Henderson", "__typename": "ArticleAuthorType" } ], "idPrefix": "pmmp", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-10-01T00:00:00", "pubType": "proceedings", "pages": "111", "year": "1995", "issn": null, "isbn": "0-8186-7177-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "71770106", "articleId": "12OmNCvcLJU", "__typename": "AdjacentArticleType" }, "next": { "fno": "71770122", "articleId": "12OmNySXF3k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbx3", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNxE2mGX", "doi": "10.1109/VISUAL.2003.1250383", "title": "Visually Accurate Multi-Field Weather Visualization", "normalizedTitle": "Visually Accurate Multi-Field Weather Visualization", "abstract": "Weather visualization is a difficult problem because it comprises volumetric multi-field data and traditional surface-based approaches obscure details of the complex three-dimensional structure of cloud dynamics. Therefore, visually accurate volumetric multi-field visualization of storm scale and cloud scale data is needed to effectively and efficiently communicate vital information to weather forecasters, improving storm forecasting, atmospheric dynamics models, and weather spotter training. We have developed a new approach to multi-field visualization that uses field specific, physically-based opacity, transmission, and lighting calculations per-field for the accurate visualization of storm and cloud scale weather data. Our approach extends traditional transfer function approaches to multi-field data and to volumetric illumination and scattering.", "abstracts": [ { "abstractType": "Regular", "content": "Weather visualization is a difficult problem because it comprises volumetric multi-field data and traditional surface-based approaches obscure details of the complex three-dimensional structure of cloud dynamics. Therefore, visually accurate volumetric multi-field visualization of storm scale and cloud scale data is needed to effectively and efficiently communicate vital information to weather forecasters, improving storm forecasting, atmospheric dynamics models, and weather spotter training. We have developed a new approach to multi-field visualization that uses field specific, physically-based opacity, transmission, and lighting calculations per-field for the accurate visualization of storm and cloud scale weather data. Our approach extends traditional transfer function approaches to multi-field data and to volumetric illumination and scattering.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Weather visualization is a difficult problem because it comprises volumetric multi-field data and traditional surface-based approaches obscure details of the complex three-dimensional structure of cloud dynamics. Therefore, visually accurate volumetric multi-field visualization of storm scale and cloud scale data is needed to effectively and efficiently communicate vital information to weather forecasters, improving storm forecasting, atmospheric dynamics models, and weather spotter training. We have developed a new approach to multi-field visualization that uses field specific, physically-based opacity, transmission, and lighting calculations per-field for the accurate visualization of storm and cloud scale weather data. Our approach extends traditional transfer function approaches to multi-field data and to volumetric illumination and scattering.", "fno": "20300037", "keywords": [ "Multi Field Visualization", "Visually Accurate Visualization", "Weather Visualization" ], "authors": [ { "affiliation": "Purdue University", "fullName": "Kirk Riley", "givenName": "Kirk", "surname": "Riley", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "David Ebert", "givenName": "David", "surname": "Ebert", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Utah", "fullName": "Charles Hansen", "givenName": "Charles", "surname": "Hansen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Oklahoma", "fullName": "Jason Levit", "givenName": "Jason", "surname": "Levit", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-10-01T00:00:00", "pubType": "proceedings", "pages": "37", "year": "2003", "issn": null, "isbn": "0-7695-2030-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "20300036", "articleId": "12OmNyKa61W", "__typename": "AdjacentArticleType" }, "next": { "fno": "20300038", "articleId": "12OmNC2xhD8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2000/6478/0/64780034", "title": "Visual Data Fusion for Applications of High-Resolution Numerical Weather", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780034/12OmNALUoxi", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004059", "title": "Exploratory Visualization for Weather Data Verification", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004059/12OmNAYXWEh", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634893", "title": "The Design and Realization of Qinghai Province Visualization Weather Consultation System", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634893/12OmNCzb9yg", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571250", "title": "Swedish Road Weather Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571250/12OmNxeut7K", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icac/2008/3175/0/3175a195", "title": "Towards a Self-Configurable Weather Research and Forecasting System", "doi": null, "abstractUrl": "/proceedings-article/icac/2008/3175a195/12OmNzDNtvU", "parentPublication": { "id": "proceedings/icac/2008/3175/0", "title": "Autonomic Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780065", "title": "Multi-Resolution Visualization Techniques for Nested Weather Models", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780065/12OmNzwpUr8", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061421", "title": "Noodles: A Tool for Visualization of Numerical Weather Model Ensemble Uncertainty", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061421/13rRUILtJm4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539342", "title": "Time-Hierarchical Clustering and Visualization of Weather Forecast Ensembles", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539342/13rRUxYIN4d", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192710", "title": "Visually Comparing Weather Features in Forecasts", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192710/13rRUxly95E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440052", "title": "An Interactive Framework for Visualization of Weather Forecast Ensembles", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440052/17D45XDIXW9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJiw4", "title": "Autonomic Computing, International Conference on", "acronym": "icac", "groupId": "1001178", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzDNtvU", "doi": "10.1109/ICAC.2008.17", "title": "Towards a Self-Configurable Weather Research and Forecasting System", "normalizedTitle": "Towards a Self-Configurable Weather Research and Forecasting System", "abstract": "Current weather forecast and visualization systems lack the scalability to support numerous customized requests for weather research and forecasting, especially at the time of natural disasters such as a hurricane landfall. Most of these systems provide somewhat generic forecasts for different types of users including meteorologists, business owners and emergency management officials. Such forecast while may be relevant to some specific group of users; to others it may not provide any useful information apart from the prediction of impending weather hazards. In other words, one size does not fit all. Weather data and its visualization indicating inclement weather conditions such as snow or ice storm, tornados and hurricanes need to be customized for the different type of users using such systems; thus, assisting them in ensuring effective preparatory and meticulous recovery plans. In this paper, we propose a self-configurable, user specific on-demand weather research and forecasting system that utilizes Grid computing to facilitate scalable weather forecast data analysis and prediction.", "abstracts": [ { "abstractType": "Regular", "content": "Current weather forecast and visualization systems lack the scalability to support numerous customized requests for weather research and forecasting, especially at the time of natural disasters such as a hurricane landfall. Most of these systems provide somewhat generic forecasts for different types of users including meteorologists, business owners and emergency management officials. Such forecast while may be relevant to some specific group of users; to others it may not provide any useful information apart from the prediction of impending weather hazards. In other words, one size does not fit all. Weather data and its visualization indicating inclement weather conditions such as snow or ice storm, tornados and hurricanes need to be customized for the different type of users using such systems; thus, assisting them in ensuring effective preparatory and meticulous recovery plans. In this paper, we propose a self-configurable, user specific on-demand weather research and forecasting system that utilizes Grid computing to facilitate scalable weather forecast data analysis and prediction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current weather forecast and visualization systems lack the scalability to support numerous customized requests for weather research and forecasting, especially at the time of natural disasters such as a hurricane landfall. Most of these systems provide somewhat generic forecasts for different types of users including meteorologists, business owners and emergency management officials. Such forecast while may be relevant to some specific group of users; to others it may not provide any useful information apart from the prediction of impending weather hazards. In other words, one size does not fit all. Weather data and its visualization indicating inclement weather conditions such as snow or ice storm, tornados and hurricanes need to be customized for the different type of users using such systems; thus, assisting them in ensuring effective preparatory and meticulous recovery plans. In this paper, we propose a self-configurable, user specific on-demand weather research and forecasting system that utilizes Grid computing to facilitate scalable weather forecast data analysis and prediction.", "fno": "3175a195", "keywords": [ "Weather Research And Forecasting", "WRF", "Self Configurable", "Web Based Portal", "Ensemble Forecast" ], "authors": [ { "affiliation": null, "fullName": "Khalid Saleem", "givenName": "Khalid", "surname": "Saleem", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "S. Masoud Sadjadi", "givenName": "S. Masoud", "surname": "Sadjadi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shu-Ching Chen", "givenName": "Shu-Ching", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-06-01T00:00:00", "pubType": "proceedings", "pages": "195-196", "year": "2008", "issn": null, "isbn": "978-0-7695-3175-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3175a182", "articleId": "12OmNvDqsNr", "__typename": "AdjacentArticleType" }, "next": { "fno": "3175a197", "articleId": "12OmNzVoBx7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcse/2009/3570/4/3570d073", "title": "Analysis on Weather Forecast Software Project Management at Provincial Level", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570d073/12OmNBZHihs", "parentPublication": { "id": "proceedings/wcse/2009/3570/4", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a285", "title": "The Joint Ensemble Forecast System (JEFS) Experiment", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a285/12OmNBZHikk", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/4/3507d364", "title": "Severe Weather Forecasting with Transition Information", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507d364/12OmNqC2v3y", "parentPublication": { "id": "proceedings/csie/2009/3507/4", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/2/267420274", "title": "Traffic Volume Forecasting Model for Cyber Weather Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/267420274/12OmNwdtwez", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2014/7505/0/7505a355", "title": "Analysis of Weather Forecasting Model in PRISM", "doi": null, "abstractUrl": "/proceedings-article/fit/2014/7505a355/12OmNx0A7HF", "parentPublication": { "id": "proceedings/fit/2014/7505/0", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/collaboratecom/2013/92/0/06680026", "title": "Accurate weather forecasting through locality based collaborative computing", "doi": null, "abstractUrl": "/proceedings-article/collaboratecom/2013/06680026/12OmNzRZq0n", "parentPublication": { "id": "proceedings/collaboratecom/2013/92/0", "title": "2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/2/04021228", "title": "Traffic Volume Forecasting Model for Cyber Weather Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/04021228/12OmNzhnaa8", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061421", "title": "Noodles: A Tool for Visualization of Numerical Weather Model Ensemble Uncertainty", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061421/13rRUILtJm4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2005/06/c6012", "title": "Service-Oriented Environments for Dynamically Interacting with Mesoscale Weather", "doi": null, "abstractUrl": "/magazine/cs/2005/06/c6012/13rRUNvgyZn", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192710", "title": "Visually Comparing Weather Features in Forecasts", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192710/13rRUxly95E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BERRAyQ2ly", "title": "2021 International Conference on Networking, Communications and Information Technology (NetCIT)", "acronym": "netcit", "groupId": "1846025", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BERYReaCcg", "doi": "10.1109/NetCIT54147.2021.00010", "title": "Research on the short-range forecast and warning method of strong convective weather for flight test", "normalizedTitle": "Research on the short-range forecast and warning method of strong convective weather for flight test", "abstract": "Test flight meteorological guarantee is different from military and civil aviation meteorological guarantee, mainly in terms of aircraft type, flight subjects, and guarantee mode, etc. Based on the above reasons test flights have more complex and diversified requirements for meteorological conditions, and at the same time, flying under dangerous weather conditions has high challenges for meteorological guarantee personnel in terms of psychological quality, technical level, communication ability and guarantee plan. By studying the strong convective weather affecting the test flight mission process in the past five years (2016-2020), we summarize the strong convective weather forecast and warning guarantee method, and use the fine grid 3-hour forecast from the European Centre for Medium-Range Weather Forecasting (ECMWF), Doppler radar of Xi'an station and satellite cloud maps to focus on the analysis of the squall line weather forecast and the whole process of test flight guarantee on June 13, 2020, to demonstrate the established The short-range forecasting and warning method and guarantee model were established to improve the strong convective weather forecasting and warning guarantee model and method, to realize the transformation from theoretical model to practical application, to lay a solid foundation for the strong convective weather process forecasting and guarantee capability, and to provide reference for future flight rehearsal guarantee under complex weather conditions.", "abstracts": [ { "abstractType": "Regular", "content": "Test flight meteorological guarantee is different from military and civil aviation meteorological guarantee, mainly in terms of aircraft type, flight subjects, and guarantee mode, etc. Based on the above reasons test flights have more complex and diversified requirements for meteorological conditions, and at the same time, flying under dangerous weather conditions has high challenges for meteorological guarantee personnel in terms of psychological quality, technical level, communication ability and guarantee plan. By studying the strong convective weather affecting the test flight mission process in the past five years (2016-2020), we summarize the strong convective weather forecast and warning guarantee method, and use the fine grid 3-hour forecast from the European Centre for Medium-Range Weather Forecasting (ECMWF), Doppler radar of Xi'an station and satellite cloud maps to focus on the analysis of the squall line weather forecast and the whole process of test flight guarantee on June 13, 2020, to demonstrate the established The short-range forecasting and warning method and guarantee model were established to improve the strong convective weather forecasting and warning guarantee model and method, to realize the transformation from theoretical model to practical application, to lay a solid foundation for the strong convective weather process forecasting and guarantee capability, and to provide reference for future flight rehearsal guarantee under complex weather conditions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Test flight meteorological guarantee is different from military and civil aviation meteorological guarantee, mainly in terms of aircraft type, flight subjects, and guarantee mode, etc. Based on the above reasons test flights have more complex and diversified requirements for meteorological conditions, and at the same time, flying under dangerous weather conditions has high challenges for meteorological guarantee personnel in terms of psychological quality, technical level, communication ability and guarantee plan. By studying the strong convective weather affecting the test flight mission process in the past five years (2016-2020), we summarize the strong convective weather forecast and warning guarantee method, and use the fine grid 3-hour forecast from the European Centre for Medium-Range Weather Forecasting (ECMWF), Doppler radar of Xi'an station and satellite cloud maps to focus on the analysis of the squall line weather forecast and the whole process of test flight guarantee on June 13, 2020, to demonstrate the established The short-range forecasting and warning method and guarantee model were established to improve the strong convective weather forecasting and warning guarantee model and method, to realize the transformation from theoretical model to practical application, to lay a solid foundation for the strong convective weather process forecasting and guarantee capability, and to provide reference for future flight rehearsal guarantee under complex weather conditions.", "fno": "007000a012", "keywords": [ "Clouds", "Convection", "Doppler Radar", "Geophysics Computing", "Meteorology", "Psychology", "Weather Forecasting", "Test Flight Guarantee", "Short Range Forecasting", "Warning Method", "Strong Convective Weather Forecasting", "Warning Guarantee Model", "Strong Convective Weather Process Forecasting", "Guarantee Capability", "Future Flight Rehearsal Guarantee", "Complex Weather Conditions", "Short Range Forecast", "Flight Test", "Test Flight Meteorological Guarantee", "Military Aviation Meteorological Guarantee", "Civil Aviation Meteorological Guarantee", "Flight Subjects", "Guarantee Mode", "Reasons Test Flights", "Meteorological Conditions", "Dangerous Weather Conditions", "Meteorological Guarantee Personnel", "Communication Ability", "Guarantee Plan", "Test Flight Mission Process", "Strong Convective Weather Forecast", "Warning Guarantee Method", "Fine Grid 3 Hour Forecast", "Medium Range Weather Forecasting", "Squall Line Weather Forecast", "Analytical Models", "Satellites", "Clouds", "Spaceborne Radar", "Weather Forecasting", "Predictive Models", "Radar Tracking", "Test Flight Meteorological Guarantee", "The Strong Convective Weather", "Forecasting And Warning Guarantee Method" ], "authors": [ { "affiliation": "Test Establishment,Meteorological Observatory of Field Affairs Department Chinese Flight,Xi’an,China", "fullName": "Ying Zhang", "givenName": "Ying", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dalian Air Traffic Management,Station of CACC,Dalian,China", "fullName": "Dongyang Cong", "givenName": "Dongyang", "surname": "Cong", "__typename": "ArticleAuthorType" }, { "affiliation": "Test Establishment,Meteorological Observatory of Field Affairs Department Chinese Flight,Xi’an,China", "fullName": "Hongbo Ni", "givenName": "Hongbo", "surname": "Ni", "__typename": "ArticleAuthorType" }, { "affiliation": "Test Establishment,Meteorological Observatory of Field Affairs Department Chinese Flight,Xi’an,China", "fullName": "Wenhui Yan", "givenName": "Wenhui", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": "Test Establishment,Meteorological Observatory of Field Affairs Department Chinese Flight,Xi’an,China", "fullName": "Ping Ni", "givenName": "Ping", "surname": "Ni", "__typename": "ArticleAuthorType" } ], "idPrefix": "netcit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "12-16", "year": "2021", "issn": null, "isbn": "978-1-6654-0070-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "007000a005", "articleId": "1BES40XSEdW", "__typename": "AdjacentArticleType" }, "next": { "fno": "007000a017", "articleId": "1BES1DGU82A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccms/2010/3941/1/3941a243", "title": "Simulation and Comparison of Two Kinds of Severe Convective Weather Processes", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a243/12OmNAYXWG5", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/4/3570d073", "title": "Analysis on Weather Forecast Software Project Management at Provincial Level", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570d073/12OmNBZHihs", "parentPublication": { "id": "proceedings/wcse/2009/3570/4", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a326", "title": "Combined Use of Double Weather Radar in Weather Modification", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a326/12OmNvjQ8CU", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479996", "title": "Haptic Weather", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479996/12OmNxw5B4Z", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07841102", "title": "An approach for extracting big micro-scale severe weather region trajectories automatically from meteorological radar data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07841102/12OmNyOq4Zz", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2012/4881/0/06407739", "title": "CloudCast: Cloud computing for short-term mobile weather forecasts", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2012/06407739/12OmNzdoMwx", "parentPublication": { "id": "proceedings/ipccc/2012/4881/0", "title": "2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a482", "title": "A FCN Approach to Blockage Correction in Radars", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a482/1BLnqpH9jyM", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927851", "title": "Dense-FCN: A Deep Learning Approach for Weather Radar Beam Blockage Correction", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927851/1J4Cuupycr6", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900b063", "title": "Deep-Learning-Based Precipitation Nowcasting with Ground Weather Station Data and Radar Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900b063/1KBr1gOJzNu", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377890", "title": "A Multi-task Two-stream Spatiotemporal Convolutional Neural Network for Convective Storm Nowcasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377890/1s64UMFqbJK", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNC2OSO4", "doi": "10.1109/BIBM.2017.8217937", "title": "NanoAsPipe: A transcriptome analysis and alternative splicing detection pipeline for MinION long-read RNA-seq", "normalizedTitle": "NanoAsPipe: A transcriptome analysis and alternative splicing detection pipeline for MinION long-read RNA-seq", "abstract": "After the next-generation sequencing technology, long-read sequencing technologies were developed. Both the advantages and the drawbacks of long-read sequencing technologies are obvious. Here, we take advantages of long-read sequencing technology, MinION, to develop a comprehensive and user-friendly pipeline, NanoAsPipe, to identify the transcriptomic profiles, isoform profiles, and alternative splicing (AS) events of long-read RNA-seq data on the Open Science Grid (OSG). NanoAsPipe includes RNA-seq data preprocessing, mapping and alternative splicing analysis to simultaneously account for AS events. NanoAsPipe was applied to two long-read datasets and its performance was evaluated by comparing discovered AS events with gene annotation and results from short-read RNA-seq data. Majority of predicted AS events by NanoAsPipe was confirmed by the gene annotation and there is a high correlation between results from long-read data and short-read data. NanoAsPipe was implemented as a software package, which is available for academic research at http://sysbio.unl.edu/NanoAsPipe. The user may run the workflow based on the OSG environment or switch it to other computing setup environments.", "abstracts": [ { "abstractType": "Regular", "content": "After the next-generation sequencing technology, long-read sequencing technologies were developed. Both the advantages and the drawbacks of long-read sequencing technologies are obvious. Here, we take advantages of long-read sequencing technology, MinION, to develop a comprehensive and user-friendly pipeline, NanoAsPipe, to identify the transcriptomic profiles, isoform profiles, and alternative splicing (AS) events of long-read RNA-seq data on the Open Science Grid (OSG). NanoAsPipe includes RNA-seq data preprocessing, mapping and alternative splicing analysis to simultaneously account for AS events. NanoAsPipe was applied to two long-read datasets and its performance was evaluated by comparing discovered AS events with gene annotation and results from short-read RNA-seq data. Majority of predicted AS events by NanoAsPipe was confirmed by the gene annotation and there is a high correlation between results from long-read data and short-read data. NanoAsPipe was implemented as a software package, which is available for academic research at http://sysbio.unl.edu/NanoAsPipe. The user may run the workflow based on the OSG environment or switch it to other computing setup environments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "After the next-generation sequencing technology, long-read sequencing technologies were developed. Both the advantages and the drawbacks of long-read sequencing technologies are obvious. Here, we take advantages of long-read sequencing technology, MinION, to develop a comprehensive and user-friendly pipeline, NanoAsPipe, to identify the transcriptomic profiles, isoform profiles, and alternative splicing (AS) events of long-read RNA-seq data on the Open Science Grid (OSG). NanoAsPipe includes RNA-seq data preprocessing, mapping and alternative splicing analysis to simultaneously account for AS events. NanoAsPipe was applied to two long-read datasets and its performance was evaluated by comparing discovered AS events with gene annotation and results from short-read RNA-seq data. Majority of predicted AS events by NanoAsPipe was confirmed by the gene annotation and there is a high correlation between results from long-read data and short-read data. NanoAsPipe was implemented as a software package, which is available for academic research at http://sysbio.unl.edu/NanoAsPipe. The user may run the workflow based on the OSG environment or switch it to other computing setup environments.", "fno": "08217937", "keywords": [ "Sequential Analysis", "Splicing", "Genomics", "Mice", "Nanobioscience", "Pipelines", "Cancer", "Gene Expression", "Open Science Grid", "Alternative Splicing", "Min ION", "Long Read RNA Seq" ], "authors": [ { "affiliation": "School of Biological Sciences, University of Nebraska-Lincoln, Lincoln, Nebraska, USA", "fullName": "Kan Liu", "givenName": "Kan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Biological Sciences, University of Nebraska-Lincoln, Lincoln, Nebraska, USA", "fullName": "Shangang Jia", "givenName": "Shangang", "surname": "Jia", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Biological Sciences, University of Nebraska-Lincoln, Lincoln, Nebraska, USA", "fullName": "Qian Du", "givenName": "Qian", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Biological Sciences, University of Nebraska-Lincoln, Lincoln, Nebraska, USA", "fullName": "Chi Zhang", "givenName": "Chi", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "1823-1826", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217936", "articleId": "12OmNyS6RD5", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217938", "articleId": "12OmNyO8tPN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2012/4687/0/4687a588", "title": "Digging in the RNA-seq Garbage: Evaluating the Characteristics of Unmapped RNA-seq Reads in Normal Tissues", "doi": null, "abstractUrl": "/proceedings-article/cisis/2012/4687a588/12OmNAsBFJD", "parentPublication": { "id": "proceedings/cisis/2012/4687/0", "title": "2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2012/1320/0/06182670", "title": "Workshop: Transcriptome assembly and isoform expression level estimation from biased RNA-Seq reads", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2012/06182670/12OmNBEGYJY", "parentPublication": { "id": "proceedings/iccabs/2012/1320/0", "title": "2012 IEEE 2nd International Conference on Computational Advances in Bio and medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2013/0716/0/06629235", "title": "Transcriptome assembly and quantification from Ion Torrent RNA-Seq data", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2013/06629235/12OmNxaw5cz", "parentPublication": { "id": "proceedings/iccabs/2013/0716/0", "title": "2013 IEEE 3rd International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a130", "title": "Towards Reliable Isoform Quantification Using RNA-Seq Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a130/12OmNxwENnL", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2014/5786/0/06863943", "title": "An SVM-based approach for discovering splicing junctions with RNA-Seq", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2014/06863943/12OmNyQGRVT", "parentPublication": { "id": "proceedings/iccabs/2014/5786/0", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08298529", "title": "IsoTree: A New Framework for de novo Transcriptome Assembly from RNA-seq Reads", "doi": null, "abstractUrl": "/journal/tb/2020/03/08298529/13rRUEgarzZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/05/06808521", "title": "RNA-Seq Analysis Pipeline Based on Oshell Environment", "doi": null, "abstractUrl": "/journal/tb/2014/05/06808521/13rRUwjGoKa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/05/07393555", "title": "An Annotation Agnostic Algorithm for Detecting Nascent RNA Transcripts in GRO-Seq", "doi": null, "abstractUrl": "/journal/tb/2017/05/07393555/13rRUyfKIGb", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a159", "title": "Detection of Fusion Genes from Human Breast Cancer Cell-Line RNA-Seq Data Using Shifted Short Read Clustering", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a159/17D45W1Oa4a", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/04/09724126", "title": "CRAM-Seq: Accelerating RNA-Seq Abundance Quantification Using Computational RAM", "doi": null, "abstractUrl": "/journal/ec/2022/04/09724126/1BocMXpUykM", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwd2X9", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNqH9heQ", "doi": "10.1109/BIBE.2007.4375757", "title": "Alternative Splicing: Associating Frequency with Isoforms", "normalizedTitle": "Alternative Splicing: Associating Frequency with Isoforms", "abstract": "In the simplest model of protein production, a gene gives rise to a single protein; DNA is transcribed to form pre-mRNA, which is converted to mRNA by splicing or removing introns. The result is a chain of exons that is translated to form a protein. Alternative splicing of exons may result in the formation of multiple proteins from the same gene sequence. However, not all of these proteins may be functional. Thus, we ask whether we can predict and rank (in order of frequency of occurrence and functional importance) the set of possible proteins for a gene. Herein we describe a tool that predicts the relative frequencies of isoforms that can be produced from a given gene.", "abstracts": [ { "abstractType": "Regular", "content": "In the simplest model of protein production, a gene gives rise to a single protein; DNA is transcribed to form pre-mRNA, which is converted to mRNA by splicing or removing introns. The result is a chain of exons that is translated to form a protein. Alternative splicing of exons may result in the formation of multiple proteins from the same gene sequence. However, not all of these proteins may be functional. Thus, we ask whether we can predict and rank (in order of frequency of occurrence and functional importance) the set of possible proteins for a gene. Herein we describe a tool that predicts the relative frequencies of isoforms that can be produced from a given gene.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the simplest model of protein production, a gene gives rise to a single protein; DNA is transcribed to form pre-mRNA, which is converted to mRNA by splicing or removing introns. The result is a chain of exons that is translated to form a protein. Alternative splicing of exons may result in the formation of multiple proteins from the same gene sequence. However, not all of these proteins may be functional. Thus, we ask whether we can predict and rank (in order of frequency of occurrence and functional importance) the set of possible proteins for a gene. Herein we describe a tool that predicts the relative frequencies of isoforms that can be produced from a given gene.", "fno": "04375757", "keywords": [ "Biology Computing", "DNA", "Genetics", "Molecular Biophysics", "Proteins", "Protein Formation", "DNA", "Exons Chain", "Alternative Splicing", "Gene Sequence", "Protein Frequency", "Isoforms", "Splicing", "Proteins", "Humans", "Computer Science", "Production", "Genomics", "Bioinformatics", "Frequency Conversion", "DNA", "Sequences", "Alternative Splicing", "Isoforms", "Protein Frequency" ], "authors": [ { "affiliation": "Department of Computer Science, University of Missouri-Rolla, Rolla, MO 65409, USA", "fullName": "Anuradha Roy", "givenName": "Anuradha", "surname": "Roy", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Missouri-Rolla, Rolla, MO 65409, USA", "fullName": "Jennifer L. Leopold", "givenName": "Jennifer L.", "surname": "Leopold", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biological Sciences, University of Missouri-Rolla, Rolla, MO 65409, USA", "fullName": "Anne M. Maglia", "givenName": "Anne M.", "surname": "Maglia", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2007", "issn": null, "isbn": "1-4244-1509-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04375756", "articleId": "12OmNrAdsHI", "__typename": "AdjacentArticleType" }, "next": { "fno": "04375758", "articleId": "12OmNC8uRDI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822540", "title": "DASE: Condition-specific differential alternative splicing variants estimation method without reference genome sequence, and its application to non-model organisms", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822540/12OmNAYoKjl", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706a461", "title": "Protein Trans-splicing Activities of Multiple Split Inteins Derived from Ssp GyrB Intein", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706a461/12OmNBl6EFg", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2009/3763/0/3763a208", "title": "Identification of Shadow Exons: Mining for Alternative Exons in Human, Mouse and Rat Comparative Databases", "doi": null, "abstractUrl": "/proceedings-article/dexa/2009/3763a208/12OmNBl6EFy", "parentPublication": { "id": "proceedings/dexa/2009/3763/0", "title": "2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375562", "title": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375562/12OmNrnJ6M3", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730293", "title": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730293/12OmNs0TL1Y", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a231", "title": "Exploring Alternative Splicing Features Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a231/12OmNvTTchr", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2011/4391/0/4391a033", "title": "Investigating Cancer-related Proteins Specific Domain Interactions and Differential Protein Interactions Caused by Alternative Splicing", "doi": null, "abstractUrl": "/proceedings-article/bibe/2011/4391a033/12OmNzUPpDA", "parentPublication": { "id": "proceedings/bibe/2011/4391/0", "title": "2011 IEEE 11th International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059856", "title": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059856/12OmNzWfoXU", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a319", "title": "The Amiloride Derivatives Regulate the Alternative Splicing of Apoptotic Gene Transcripts", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a319/17D45WK5Alr", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwd2X9", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNrnJ6M3", "doi": "10.1109/BIBE.2007.4375562", "title": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "normalizedTitle": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "abstract": "Alternative splicing is an important process in gene expression. Presently, most studies aimed at detecting alternatively spliced genes use ESTs (expressed sequence tags). However, reliance on ESTs might have some weaknesses in predicting alternative splicing. It is difficult to predict whether or not alternative splicing exists for those genes where ESTs are not available. In addition, since the EST libraries are often not clearly organized and annotated, we can pick erroneous ESTs. To address these issues and to improve the quality of detection and prediction for alternative splicing, we propose a method that primarily uses pre-mRNAs. It is achieved by a decision tree algorithm using codons, three nucleotides, as attributes for each chromosome in Arabidopsis thaliana. Each decision tree shows that alternative and normal splicing have different splicing patterns according to triplet nucleotides. Based on the patterns, alternative splicing of unlabeled genes can also be predicted.", "abstracts": [ { "abstractType": "Regular", "content": "Alternative splicing is an important process in gene expression. Presently, most studies aimed at detecting alternatively spliced genes use ESTs (expressed sequence tags). However, reliance on ESTs might have some weaknesses in predicting alternative splicing. It is difficult to predict whether or not alternative splicing exists for those genes where ESTs are not available. In addition, since the EST libraries are often not clearly organized and annotated, we can pick erroneous ESTs. To address these issues and to improve the quality of detection and prediction for alternative splicing, we propose a method that primarily uses pre-mRNAs. It is achieved by a decision tree algorithm using codons, three nucleotides, as attributes for each chromosome in Arabidopsis thaliana. Each decision tree shows that alternative and normal splicing have different splicing patterns according to triplet nucleotides. Based on the patterns, alternative splicing of unlabeled genes can also be predicted.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Alternative splicing is an important process in gene expression. Presently, most studies aimed at detecting alternatively spliced genes use ESTs (expressed sequence tags). However, reliance on ESTs might have some weaknesses in predicting alternative splicing. It is difficult to predict whether or not alternative splicing exists for those genes where ESTs are not available. In addition, since the EST libraries are often not clearly organized and annotated, we can pick erroneous ESTs. To address these issues and to improve the quality of detection and prediction for alternative splicing, we propose a method that primarily uses pre-mRNAs. It is achieved by a decision tree algorithm using codons, three nucleotides, as attributes for each chromosome in Arabidopsis thaliana. Each decision tree shows that alternative and normal splicing have different splicing patterns according to triplet nucleotides. Based on the patterns, alternative splicing of unlabeled genes can also be predicted.", "fno": "04375562", "keywords": [ "Biology Computing", "Cellular Biophysics", "Decision Trees", "Genetics", "Molecular Biophysics", "Alternative Splicing", "Acceptor Sites", "Donor Sites", "Pre M RNA", "Arabidopsis Thaliana", "Gene Expression", "Expressed Sequence Tags", "Decision Tree Algorithm", "Codons", "Nucleotides", "Chromosome", "Splicing", "Probes", "Libraries", "Proteins", "Gene Expression", "Genomics", "Bioinformatics", "DNA", "Sequences", "Data Mining" ], "authors": [ { "affiliation": "Department of Computer Science, University of Massachusetts, Lowell, MA 01854. Email: mpark@cs.uml.edu", "fullName": "Minseo Park", "givenName": "Minseo", "surname": "Park", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biological Sciences, University of Massachusetts, Lowell, MA 01854. Email: Deane_Falcone@uml.edu", "fullName": "Deane L. Falcone", "givenName": "Deane L.", "surname": "Falcone", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biological Sciences, University of Maine, Orono, ME 04469. Email: kil-young.yun@umit.maine.edu", "fullName": "Kil-Young Yun", "givenName": "Kil-Young", "surname": "Yun", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Massachusetts, Lowell, MA 01854. Email: kdaniels@cs.uml.edu", "fullName": "Karen M. Daniels", "givenName": "Karen M.", "surname": "Daniels", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2007", "issn": null, "isbn": "1-4244-1509-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04375561", "articleId": "12OmNBr4eqi", "__typename": "AdjacentArticleType" }, "next": { "fno": "04375563", "articleId": "12OmNvxbhI9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bic-ta/2011/4514/0/4514a246", "title": "An Extension of DNA Splicing System", "doi": null, "abstractUrl": "/proceedings-article/bic-ta/2011/4514a246/12OmNAR1b29", "parentPublication": { "id": "proceedings/bic-ta/2011/4514/0", "title": "Bio-Inspired Computing: Theories and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bic-ta/2011/4514/0/4514a167", "title": "Crossing-Preserved and Persistent Splicing Systems", "doi": null, "abstractUrl": "/proceedings-article/bic-ta/2011/4514a167/12OmNqyUUGk", "parentPublication": { "id": "proceedings/bic-ta/2011/4514/0", "title": "Bio-Inspired Computing: Theories and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730293", "title": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730293/12OmNs0TL1Y", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/46", "title": "From ESTs to ESRs: Comparative analysis of mutually exclusive exons in 15 species of insects", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/46/12OmNwCaCx4", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375620", "title": "A Computational Approach to Understand Arabidopsis thaliana and Soybean Resistance to Fusarium solani (Fsg)", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375620/12OmNwDACeD", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730310", "title": "Genome-Wide Alternative Splicing Events Detection through Analysis of Large Scale ESTs", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730310/12OmNwc3wyp", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/270", "title": "Workshop: Using a transcript catalog and paired-end RNA-Seq data to identify differential alternative splicing", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/270/12OmNyQGRZS", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059856", "title": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059856/12OmNzWfoXU", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medivis/2008/3284/0/3284a036", "title": "Visualizing Domain Interaction Networks and the Impact of Alternative Splicing Events", "doi": null, "abstractUrl": "/proceedings-article/medivis/2008/3284a036/12OmNzxPTFY", "parentPublication": { "id": "proceedings/medivis/2008/3284/0", "title": "2008 Fifth International Conference BioMedical Visualization: Information Visualization in Medical and Biomedical Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNArbG3u", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNs0TL1Y", "doi": "10.1109/BIBE.2004.1317356", "title": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "normalizedTitle": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "abstract": "Alternative splicing of a single pre-mRNA can give rise to different mRNA transcripts. Alternative splicing of pre-messenger RNA is an important layer of gene expression regulation in eukaryotic cell. Consequently, alternative splicing is an important mechanism for generating protein diversity from a single gene. Although alternative splicing is an important biological process, standard molecular biology techniques have only identified several hundred alternative splicing variants and create a bottleneck in terms of experimental validation. In this paper, we propose methods of obtaining models of weighted alternative splicing graphs and ways of generating all alternative splicing forms from a weighted alternative splicing graph and formulate linear programming models and use the popular linear programming solver to obtain the quantitative distributions of various alternative splicing forms. Basically, the method uses the UniGene clusters of human Expressed Sequence Tags (ESTs) to identify alternative splicing sites. Furthermore, we propose linear time algorithms that correctly produce all possible alternative splicing variants with their corresponding probabilities. Using these methods, we infer several sets of putative alternative splicing forms; these results are then compared with methods proposed by others. Then by aligning sequences of EST database to the genomic data, we identify locations of exons as well as the alternative splicing sites. To quantify these putative alternative splicing forms, we we choose segments in genome to count the EST number, and combine the information of EST and alternative splicing form by constructing the suitable linear programming model.", "abstracts": [ { "abstractType": "Regular", "content": "Alternative splicing of a single pre-mRNA can give rise to different mRNA transcripts. Alternative splicing of pre-messenger RNA is an important layer of gene expression regulation in eukaryotic cell. Consequently, alternative splicing is an important mechanism for generating protein diversity from a single gene. Although alternative splicing is an important biological process, standard molecular biology techniques have only identified several hundred alternative splicing variants and create a bottleneck in terms of experimental validation. In this paper, we propose methods of obtaining models of weighted alternative splicing graphs and ways of generating all alternative splicing forms from a weighted alternative splicing graph and formulate linear programming models and use the popular linear programming solver to obtain the quantitative distributions of various alternative splicing forms. Basically, the method uses the UniGene clusters of human Expressed Sequence Tags (ESTs) to identify alternative splicing sites. Furthermore, we propose linear time algorithms that correctly produce all possible alternative splicing variants with their corresponding probabilities. Using these methods, we infer several sets of putative alternative splicing forms; these results are then compared with methods proposed by others. Then by aligning sequences of EST database to the genomic data, we identify locations of exons as well as the alternative splicing sites. To quantify these putative alternative splicing forms, we we choose segments in genome to count the EST number, and combine the information of EST and alternative splicing form by constructing the suitable linear programming model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Alternative splicing of a single pre-mRNA can give rise to different mRNA transcripts. Alternative splicing of pre-messenger RNA is an important layer of gene expression regulation in eukaryotic cell. Consequently, alternative splicing is an important mechanism for generating protein diversity from a single gene. Although alternative splicing is an important biological process, standard molecular biology techniques have only identified several hundred alternative splicing variants and create a bottleneck in terms of experimental validation. In this paper, we propose methods of obtaining models of weighted alternative splicing graphs and ways of generating all alternative splicing forms from a weighted alternative splicing graph and formulate linear programming models and use the popular linear programming solver to obtain the quantitative distributions of various alternative splicing forms. Basically, the method uses the UniGene clusters of human Expressed Sequence Tags (ESTs) to identify alternative splicing sites. Furthermore, we propose linear time algorithms that correctly produce all possible alternative splicing variants with their corresponding probabilities. Using these methods, we infer several sets of putative alternative splicing forms; these results are then compared with methods proposed by others. Then by aligning sequences of EST database to the genomic data, we identify locations of exons as well as the alternative splicing sites. To quantify these putative alternative splicing forms, we we choose segments in genome to count the EST number, and combine the information of EST and alternative splicing form by constructing the suitable linear programming model.", "fno": "21730293", "keywords": [ "Splicing Graph", "Alternative Splicing", "Expressed Sequence Tag EST", "Weighted Alternative Splicing Graph", "Algorithm", "Linear Programming", "Alternative Splicing Form" ], "authors": [ { "affiliation": "Providence University, Taiwan", "fullName": "Hsun-Chang Chang", "givenName": "Hsun-Chang", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "Providence University, Taiwan", "fullName": "Po-Shun Yu", "givenName": "Po-Shun", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Providence University, Taiwan", "fullName": "Tze-Wei Huang", "givenName": "Tze-Wei", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "National Science Council, Taiwan", "fullName": "Yaw-Ling Lin", "givenName": "Yaw-Ling", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Taichung Healthcare and Management University, Taiwan", "fullName": "Fang-Rong Hsu", "givenName": "Fang-Rong", "surname": "Hsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-05-01T00:00:00", "pubType": "proceedings", "pages": "293", "year": "2004", "issn": null, "isbn": "0-7695-2173-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21730283", "articleId": "12OmNvD8Rta", "__typename": "AdjacentArticleType" }, "next": { "fno": "21730301", "articleId": "12OmNC8uRlz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/occbio/2009/3685/0/3685a079", "title": "Comparative Assessment of DNA Assemblers for Assembling Expressed Sequence Tags", "doi": null, "abstractUrl": "/proceedings-article/occbio/2009/3685a079/12OmNBNM98r", "parentPublication": { "id": "proceedings/occbio/2009/3685/0", "title": "Bioinformatics, 2009 Ohio Collaborative Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375757", "title": "Alternative Splicing: Associating Frequency with Isoforms", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375757/12OmNqH9heQ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375562", "title": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375562/12OmNrnJ6M3", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a231", "title": "Exploring Alternative Splicing Features Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a231/12OmNvTTchr", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/46", "title": "From ESTs to ESRs: Comparative analysis of mutually exclusive exons in 15 species of insects", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/46/12OmNwCaCx4", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730310", "title": "Genome-Wide Alternative Splicing Events Detection through Analysis of Large Scale ESTs", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730310/12OmNwc3wyp", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059856", "title": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059856/12OmNzWfoXU", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medivis/2008/3284/0/3284a036", "title": "Visualizing Domain Interaction Networks and the Impact of Alternative Splicing Events", "doi": null, "abstractUrl": "/proceedings-article/medivis/2008/3284a036/12OmNzxPTFY", "parentPublication": { "id": "proceedings/medivis/2008/3284/0", "title": "2008 Fifth International Conference BioMedical Visualization: Information Visualization in Medical and Biomedical Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a319", "title": "The Amiloride Derivatives Regulate the Alternative Splicing of Apoptotic Gene Transcripts", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a319/17D45WK5Alr", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBrDqEx", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNvTTchr", "doi": "10.1109/BIBM.2008.12", "title": "Exploring Alternative Splicing Features Using Support Vector Machines", "normalizedTitle": "Exploring Alternative Splicing Features Using Support Vector Machines", "abstract": "Alternative splicing is a mechanism for generating different gene transcripts (called isoforms) from the same genomic sequence. Finding alternative splicing events experimentally is both expensive and time consuming. Computational methods, in general, and machine learning algorithms,in particular, can be used to complement experimental methods in the process of identifying alternative splicing events. In this paper, we explore the predictive power of a rich set of features that have been experimentally shown to affect alternative splicing. We use these features to build support vector machine (SVM) classifiers for distinguishing between alternatively spliced exons and constitutive exons.Our results show that simple linear SVM classifiers built from a rich set of features give results comparable to those of more sophisticated SVM classifiers that use more basic sequence features. Furthermore, we use feature selection methods to identify computationally the most informative features for the prediction problem considered.", "abstracts": [ { "abstractType": "Regular", "content": "Alternative splicing is a mechanism for generating different gene transcripts (called isoforms) from the same genomic sequence. Finding alternative splicing events experimentally is both expensive and time consuming. Computational methods, in general, and machine learning algorithms,in particular, can be used to complement experimental methods in the process of identifying alternative splicing events. In this paper, we explore the predictive power of a rich set of features that have been experimentally shown to affect alternative splicing. We use these features to build support vector machine (SVM) classifiers for distinguishing between alternatively spliced exons and constitutive exons.Our results show that simple linear SVM classifiers built from a rich set of features give results comparable to those of more sophisticated SVM classifiers that use more basic sequence features. Furthermore, we use feature selection methods to identify computationally the most informative features for the prediction problem considered.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Alternative splicing is a mechanism for generating different gene transcripts (called isoforms) from the same genomic sequence. Finding alternative splicing events experimentally is both expensive and time consuming. Computational methods, in general, and machine learning algorithms,in particular, can be used to complement experimental methods in the process of identifying alternative splicing events. In this paper, we explore the predictive power of a rich set of features that have been experimentally shown to affect alternative splicing. We use these features to build support vector machine (SVM) classifiers for distinguishing between alternatively spliced exons and constitutive exons.Our results show that simple linear SVM classifiers built from a rich set of features give results comparable to those of more sophisticated SVM classifiers that use more basic sequence features. Furthermore, we use feature selection methods to identify computationally the most informative features for the prediction problem considered.", "fno": "3452a231", "keywords": [ "Alternative Splicing", "Support Vector Machine", "Feature Construction" ], "authors": [ { "affiliation": null, "fullName": "Jing Xia", "givenName": "Jing", "surname": "Xia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Doina Caragea", "givenName": "Doina", "surname": "Caragea", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Susan Brown", "givenName": "Susan", "surname": "Brown", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "231-238", "year": "2008", "issn": null, "isbn": "978-0-7695-3452-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3452a223", "articleId": "12OmNCfAPLU", "__typename": "AdjacentArticleType" }, "next": { "fno": "3452a239", "articleId": "12OmNyjtNH4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bmei/2008/3118/1/3118a143", "title": "Prediction of Alternative 5'/3' Splice Sites in the Human Genome", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a143/12OmNBKW9x3", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2009/3763/0/3763a208", "title": "Identification of Shadow Exons: Mining for Alternative Exons in Human, Mouse and Rat Comparative Databases", "doi": null, "abstractUrl": "/proceedings-article/dexa/2009/3763a208/12OmNBl6EFy", "parentPublication": { "id": "proceedings/dexa/2009/3763/0", "title": "2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375757", "title": "Alternative Splicing: Associating Frequency with Isoforms", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375757/12OmNqH9heQ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375562", "title": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375562/12OmNrnJ6M3", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730293", "title": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730293/12OmNs0TL1Y", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2017/2594/0/08114308", "title": "Prediction of back-splicing sites reveals sequence compositional features of human circular RNAs", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2017/08114308/12OmNvwC5xV", "parentPublication": { "id": "proceedings/iccabs/2017/2594/0", "title": "2017 IEEE 7th International Conference on Computational Advances in Bio- and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059856", "title": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059856/12OmNzWfoXU", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medivis/2008/3284/0/3284a036", "title": "Visualizing Domain Interaction Networks and the Impact of Alternative Splicing Events", "doi": null, "abstractUrl": "/proceedings-article/medivis/2008/3284a036/12OmNzxPTFY", "parentPublication": { "id": "proceedings/medivis/2008/3284/0", "title": "2008 Fifth International Conference BioMedical Visualization: Information Visualization in Medical and Biomedical Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a319", "title": "The Amiloride Derivatives Regulate the Alternative Splicing of Apoptotic Gene Transcripts", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a319/17D45WK5Alr", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBKW9zs", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "acronym": "iccabs", "groupId": "1800307", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQGRVT", "doi": "10.1109/ICCABS.2014.6863943", "title": "An SVM-based approach for discovering splicing junctions with RNA-Seq", "normalizedTitle": "An SVM-based approach for discovering splicing junctions with RNA-Seq", "abstract": "Because of the complicity of RNA splicing, discovering splicing junctions and aligning RNA-Seq reads with high sensitivity and specificity is still a challenging problem. In this paper, we propose an SVM-based approach for discovering splicing junctions with RNA-Seq data. The key idea of our approach is combining multiple sources of information contained in sequence data in discovering exon-intron boundaries. Results on simulated data suggest that our approach works well.", "abstracts": [ { "abstractType": "Regular", "content": "Because of the complicity of RNA splicing, discovering splicing junctions and aligning RNA-Seq reads with high sensitivity and specificity is still a challenging problem. In this paper, we propose an SVM-based approach for discovering splicing junctions with RNA-Seq data. The key idea of our approach is combining multiple sources of information contained in sequence data in discovering exon-intron boundaries. Results on simulated data suggest that our approach works well.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Because of the complicity of RNA splicing, discovering splicing junctions and aligning RNA-Seq reads with high sensitivity and specificity is still a challenging problem. In this paper, we propose an SVM-based approach for discovering splicing junctions with RNA-Seq data. The key idea of our approach is combining multiple sources of information contained in sequence data in discovering exon-intron boundaries. Results on simulated data suggest that our approach works well.", "fno": "06863943", "keywords": [ "Splicing", "Junctions", "Bioinformatics", "RNA", "Sensitivity", "Genomics", "Algorithm Design And Analysis", "Support Vector Machine", "Splicing Junctions Discovery", "RNA Seq Reads Alignment" ], "authors": [ { "affiliation": "Computer Science and Engineering, University of Connecticut, Storrs, 06269, USA", "fullName": "Chong Chu", "givenName": null, "surname": "Chong Chu", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Engineering, University of Connecticut, Storrs, 06269, USA", "fullName": "Yufeng Wu", "givenName": null, "surname": "Yufeng Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccabs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2014", "issn": null, "isbn": "978-1-4799-5786-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06863942", "articleId": "12OmNxWuijx", "__typename": "AdjacentArticleType" }, "next": { "fno": "06863944", "articleId": "12OmNAoDi4d", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822541", "title": "DeepSplice: Deep classification of novel splice junctions revealed by RNA-seq", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822541/12OmNApu5jR", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217937", "title": "NanoAsPipe: A transcriptome analysis and alternative splicing detection pipeline for MinION long-read RNA-seq", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217937/12OmNC2OSO4", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706557", "title": "Detection of splicing events and multiread locations from RNA-seq data based on a geometric-tail (GT) distribution of intron length", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706557/12OmNrEL2BJ", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2016/4199/0/07802790", "title": "JULiP: An efficient model for accurate intron selection from multiple RNA-seq samples", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2016/07802790/12OmNrYlmKt", "parentPublication": { "id": "proceedings/iccabs/2016/4199/0", "title": "2016 IEEE 6th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999155", "title": "ESclassifier: A random forest classifier for detection of exon skipping events from RNA-Seq data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999155/12OmNvTk047", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a130", "title": "Towards Reliable Isoform Quantification Using RNA-Seq Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a130/12OmNxwENnL", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08298529", "title": "IsoTree: A New Framework for de novo Transcriptome Assembly from RNA-seq Reads", "doi": null, "abstractUrl": "/journal/tb/2020/03/08298529/13rRUEgarzZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/04/06732885", "title": "SeeSite: Characterizing Relationships between Splice Junctions and Splicing Enhancers", "doi": null, "abstractUrl": "/journal/tb/2014/04/06732885/13rRUwcAqoL", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/05/06808521", "title": "RNA-Seq Analysis Pipeline Based on Oshell Environment", "doi": null, "abstractUrl": "/journal/tb/2014/05/06808521/13rRUwjGoKa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/04/07272055", "title": "Proteomic Evidence for In-Frame and Out-of-Frame Alternatively Spliced Isoforms in Human and Mouse", "doi": null, "abstractUrl": "/journal/tb/2018/04/07272055/13rRUxly8W5", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNApcu9t", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "acronym": "iccabs", "groupId": "1800307", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQGRZS", "doi": "10.1109/ICCABS.2011.5729924", "title": "Workshop: Using a transcript catalog and paired-end RNA-Seq data to identify differential alternative splicing", "normalizedTitle": "Workshop: Using a transcript catalog and paired-end RNA-Seq data to identify differential alternative splicing", "abstract": "The purpose of this NSF-Eager grant is to use high-throughput RNA sequencing of the transcriptome to assess the role of alternative splicing in the host-pathogen interaction between Arabidopsis thaliana and Pseudomonas syringae. Although previous studies have demonstrated that alternative splicing plays an important role for individual genes during this interaction, this whole-genome approach will investigate thousands of potential splicing events simultaneously. The method presented here employs a linear models framework to estimate the ratios of known isoforms in a given sample, taking into account the non-uniformity of RNA-sequencing reads along the targeted transcripts. Recently, the method was adapted in order to accommodate paired-end sequencing technology. Briefly, reads are mapped to a transcript catalog (TAIR 10 gene models), partition the reads according to their compatibility with these models, identify reads that are informative for isoform quantification, and then use a linear model to estimate isoform expression ratios for each gene. The results provide a first approximation of the extent of pathogen-induced alternative splicing and so far indicate evidence for a wide variety of novel alternative transcripts. In addition, the set of differentially spliced genes appears to be independent of the set of differentially expressed genes, providing new evidence for a hidden layer of regulation in the transcriptome. Hence, the set of differentially spliced genes provides a promising set of candidate genes that researchers may have previously overlooked by focusing solely on differential gene expression.", "abstracts": [ { "abstractType": "Regular", "content": "The purpose of this NSF-Eager grant is to use high-throughput RNA sequencing of the transcriptome to assess the role of alternative splicing in the host-pathogen interaction between Arabidopsis thaliana and Pseudomonas syringae. Although previous studies have demonstrated that alternative splicing plays an important role for individual genes during this interaction, this whole-genome approach will investigate thousands of potential splicing events simultaneously. The method presented here employs a linear models framework to estimate the ratios of known isoforms in a given sample, taking into account the non-uniformity of RNA-sequencing reads along the targeted transcripts. Recently, the method was adapted in order to accommodate paired-end sequencing technology. Briefly, reads are mapped to a transcript catalog (TAIR 10 gene models), partition the reads according to their compatibility with these models, identify reads that are informative for isoform quantification, and then use a linear model to estimate isoform expression ratios for each gene. The results provide a first approximation of the extent of pathogen-induced alternative splicing and so far indicate evidence for a wide variety of novel alternative transcripts. In addition, the set of differentially spliced genes appears to be independent of the set of differentially expressed genes, providing new evidence for a hidden layer of regulation in the transcriptome. Hence, the set of differentially spliced genes provides a promising set of candidate genes that researchers may have previously overlooked by focusing solely on differential gene expression.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The purpose of this NSF-Eager grant is to use high-throughput RNA sequencing of the transcriptome to assess the role of alternative splicing in the host-pathogen interaction between Arabidopsis thaliana and Pseudomonas syringae. Although previous studies have demonstrated that alternative splicing plays an important role for individual genes during this interaction, this whole-genome approach will investigate thousands of potential splicing events simultaneously. The method presented here employs a linear models framework to estimate the ratios of known isoforms in a given sample, taking into account the non-uniformity of RNA-sequencing reads along the targeted transcripts. Recently, the method was adapted in order to accommodate paired-end sequencing technology. Briefly, reads are mapped to a transcript catalog (TAIR 10 gene models), partition the reads according to their compatibility with these models, identify reads that are informative for isoform quantification, and then use a linear model to estimate isoform expression ratios for each gene. The results provide a first approximation of the extent of pathogen-induced alternative splicing and so far indicate evidence for a wide variety of novel alternative transcripts. In addition, the set of differentially spliced genes appears to be independent of the set of differentially expressed genes, providing new evidence for a hidden layer of regulation in the transcriptome. Hence, the set of differentially spliced genes provides a promising set of candidate genes that researchers may have previously overlooked by focusing solely on differential gene expression.", "fno": "270", "keywords": [ "Molecular Configurations", "Biology Computing", "Genetics", "Genomics", "Macromolecules", "Microorganisms", "Molecular Biophysics", "Isoform Quantification", "Transcript Catalog", "Paired End RNA Seq Data", "Differential Alternative Splicing", "High Throughput RNA Sequencing", "Transcriptome", "Host Pathogen Interaction", "Arabidopsis Thaliana", "Pseudomonas Syringae", "Gene Expression", "Whole Genome Approach", "Splicing", "Adaptation Model", "Immune System", "Diseases", "Catalogs", "USA Councils", "Focusing" ], "authors": [], "idPrefix": "iccabs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-02-01T00:00:00", "pubType": "proceedings", "pages": "270", "year": "2011", "issn": null, "isbn": "978-1-61284-851-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "233", "articleId": "12OmNAq3hKO", "__typename": "AdjacentArticleType" }, "next": { "fno": "271", "articleId": "12OmNvwC5uY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hisb/2012/4921/0/4921a113", "title": "AltAnalyze - An Optimized Platform for RNA-Seq Splicing and Domain-Level Analyses", "doi": null, "abstractUrl": "/proceedings-article/hisb/2012/4921a113/12OmNAle6A3", "parentPublication": { "id": "proceedings/hisb/2012/4921/0", "title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217993", "title": "Differential alternative splicing patterns with differential expression to computationally extract plant molecular pathways", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217993/12OmNx5Yv4u", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a130", "title": "Towards Reliable Isoform Quantification Using RNA-Seq Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a130/12OmNxwENnL", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392734", "title": "Reconstructing isoform graphs from RNA-Seq data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392734/12OmNyKJiBX", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2014/5786/0/06863943", "title": "An SVM-based approach for discovering splicing junctions with RNA-Seq", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2014/06863943/12OmNyQGRVT", "parentPublication": { "id": "proceedings/iccabs/2014/5786/0", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2010/4083/0/4083a296", "title": "Estimating the Expression of Transcript Isoforms from mRNA-Seq via Nonnegative Least Squares", "doi": null, "abstractUrl": "/proceedings-article/bibe/2010/4083a296/12OmNzsrwoW", "parentPublication": { "id": "proceedings/bibe/2010/4083/0", "title": "2010 IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08298529", "title": "IsoTree: A New Framework for de novo Transcriptome Assembly from RNA-seq Reads", "doi": null, "abstractUrl": "/journal/tb/2020/03/08298529/13rRUEgarzZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/05/ttb2012051281", "title": "CEDER: Accurate Detection of Differentially Expressed Genes by Combining Significance of Exons Using RNA-Seq", "doi": null, "abstractUrl": "/journal/tb/2012/05/ttb2012051281/13rRUIJuxnW", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09468392", "title": "Tissue Specificity Based Isoform Function Prediction", "doi": null, "abstractUrl": "/journal/tb/2022/05/09468392/1uPuLzmdBS0", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx7ouZy", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "acronym": "dexa", "groupId": "1000180", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzWfoXU", "doi": "10.1109/DEXA.2011.10", "title": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "normalizedTitle": "Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans", "abstract": "Alternative splicing is a widespread cellular phenomenon, which regulates gene expression in eukaryotic genomes. Availability of accumulating transcript and genomic sequence data has lead to generation of a wide-range of alternative splicing databases. Generally the available databases focus on mammalian transcriptomes. Here, we present two new alternative splicing databases for the model organisms, Drosophila melanogaster and Caenorhabditis elengans. Databases presented here allow the end-users to perform in-depth analysis of the alternative splicing events for their gene of interest. Utility of our databases are illustrated by presenting the extensively alternatively spliced DSCAM gene from Drosophila melanogaster and alternative splicing of the splicing regulatory factors U2AF, rsp-7 and swp-1 of Caenorhabditis elengans. In addition, using these two new splicing databases, we show that the majority of alternative splicing in both genomes is due to cassette exons.", "abstracts": [ { "abstractType": "Regular", "content": "Alternative splicing is a widespread cellular phenomenon, which regulates gene expression in eukaryotic genomes. Availability of accumulating transcript and genomic sequence data has lead to generation of a wide-range of alternative splicing databases. Generally the available databases focus on mammalian transcriptomes. Here, we present two new alternative splicing databases for the model organisms, Drosophila melanogaster and Caenorhabditis elengans. Databases presented here allow the end-users to perform in-depth analysis of the alternative splicing events for their gene of interest. Utility of our databases are illustrated by presenting the extensively alternatively spliced DSCAM gene from Drosophila melanogaster and alternative splicing of the splicing regulatory factors U2AF, rsp-7 and swp-1 of Caenorhabditis elengans. In addition, using these two new splicing databases, we show that the majority of alternative splicing in both genomes is due to cassette exons.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Alternative splicing is a widespread cellular phenomenon, which regulates gene expression in eukaryotic genomes. Availability of accumulating transcript and genomic sequence data has lead to generation of a wide-range of alternative splicing databases. Generally the available databases focus on mammalian transcriptomes. Here, we present two new alternative splicing databases for the model organisms, Drosophila melanogaster and Caenorhabditis elengans. Databases presented here allow the end-users to perform in-depth analysis of the alternative splicing events for their gene of interest. Utility of our databases are illustrated by presenting the extensively alternatively spliced DSCAM gene from Drosophila melanogaster and alternative splicing of the splicing regulatory factors U2AF, rsp-7 and swp-1 of Caenorhabditis elengans. In addition, using these two new splicing databases, we show that the majority of alternative splicing in both genomes is due to cassette exons.", "fno": "06059856", "keywords": [ "Biology Computing", "Database Management Systems", "Genetics", "Drosophila Melanogaster", "Caenorhabditis Elegans", "Cellular Phenomenon", "Gene Expression", "Eukaryotic Genomes", "Genomic Sequence Data", "Mammalian Transcriptomes", "Splicing Database", "Splicing", "Databases", "Genomics", "Bioinformatics", "Biological Cells", "Mice", "Alternative Splicing", "Drosophila", "C Elegans" ], "authors": [ { "affiliation": null, "fullName": "Bahar Taneri", "givenName": "Bahar", "surname": "Taneri", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ben Snyder", "givenName": "Ben", "surname": "Snyder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexey Novoradovsky", "givenName": "Alexey", "surname": "Novoradovsky", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Terry Gaasterland", "givenName": "Terry", "surname": "Gaasterland", "__typename": "ArticleAuthorType" } ], "idPrefix": "dexa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "435-439", "year": "2011", "issn": "1529-4188", "isbn": "978-1-4577-0982-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06059855", "articleId": "12OmNvpew9d", "__typename": "AdjacentArticleType" }, "next": { "fno": "06059857", "articleId": "12OmNxXCGOK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822540", "title": "DASE: Condition-specific differential alternative splicing variants estimation method without reference genome sequence, and its application to non-model organisms", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822540/12OmNAYoKjl", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217937", "title": "NanoAsPipe: A transcriptome analysis and alternative splicing detection pipeline for MinION long-read RNA-seq", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217937/12OmNC2OSO4", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375757", "title": "Alternative Splicing: Associating Frequency with Isoforms", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375757/12OmNqH9heQ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375562", "title": "Detection and Prediction of Alternative Splicing within Acceptor/Donor Sites in pre-mRNA of Arabidopsis thaliana", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375562/12OmNrnJ6M3", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730293", "title": "The Application of Alternative Splicing Graphs in Quantitative Analysis of Alternative Splicing Form from EST Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730293/12OmNs0TL1Y", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a231", "title": "Exploring Alternative Splicing Features Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a231/12OmNvTTchr", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2004/2173/0/21730310", "title": "Genome-Wide Alternative Splicing Events Detection through Analysis of Large Scale ESTs", "doi": null, "abstractUrl": "/proceedings-article/bibe/2004/21730310/12OmNwc3wyp", "parentPublication": { "id": "proceedings/bibe/2004/2173/0", "title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375755", "title": "Large-scale Discovery of Regulatory Motifs Involved in Alternative Splicing", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375755/12OmNxxNbTS", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2014/5786/0/06863943", "title": "An SVM-based approach for discovering splicing junctions with RNA-Seq", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2014/06863943/12OmNyQGRVT", "parentPublication": { "id": "proceedings/iccabs/2014/5786/0", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9VchbY4Mw", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9WbJsJ128", "doi": "10.1109/BIBM52615.2021.9669396", "title": "GraphIsoFun: a graph neural network based approach for splice isoform function prediction", "normalizedTitle": "GraphIsoFun: a graph neural network based approach for splice isoform function prediction", "abstract": "Alternative splicing has a significant impact in the process of gene regulation and it greatly raises the complexity of protein species and functions. At present, the gene function has been extensively studied, and there are multiple public databases of gene function annotations. Due to the high cost and the large number of isoforms, it is currently impossible to conduct extensive experimental analysis on isoform functions. Functions at the level of splicing isoforms remain largely unknown. Computational prediction provides an alternative to functional annotation of splice isoforms. Here we present GraphIsoFun, a novel computational approach to predict isoform function by integrating both gene and isoform-level expression information with graph neural network. It first constructs a heterogeneous co-expression network with both genes and isoforms being nodes. This network integrates the rich association between isoforms and genes, and provides a bridge for connecting isoform and gene functions. Then GraphIsoFun uses the graph neural network to mine the information of the co-expression network and obtains the final prediction score of isoforms for each function. The experiments on multiple datasets show that GraphIsoFun surpasses existing methods based on different evaluation indicators.", "abstracts": [ { "abstractType": "Regular", "content": "Alternative splicing has a significant impact in the process of gene regulation and it greatly raises the complexity of protein species and functions. At present, the gene function has been extensively studied, and there are multiple public databases of gene function annotations. Due to the high cost and the large number of isoforms, it is currently impossible to conduct extensive experimental analysis on isoform functions. Functions at the level of splicing isoforms remain largely unknown. Computational prediction provides an alternative to functional annotation of splice isoforms. Here we present GraphIsoFun, a novel computational approach to predict isoform function by integrating both gene and isoform-level expression information with graph neural network. It first constructs a heterogeneous co-expression network with both genes and isoforms being nodes. This network integrates the rich association between isoforms and genes, and provides a bridge for connecting isoform and gene functions. Then GraphIsoFun uses the graph neural network to mine the information of the co-expression network and obtains the final prediction score of isoforms for each function. The experiments on multiple datasets show that GraphIsoFun surpasses existing methods based on different evaluation indicators.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Alternative splicing has a significant impact in the process of gene regulation and it greatly raises the complexity of protein species and functions. At present, the gene function has been extensively studied, and there are multiple public databases of gene function annotations. Due to the high cost and the large number of isoforms, it is currently impossible to conduct extensive experimental analysis on isoform functions. Functions at the level of splicing isoforms remain largely unknown. Computational prediction provides an alternative to functional annotation of splice isoforms. Here we present GraphIsoFun, a novel computational approach to predict isoform function by integrating both gene and isoform-level expression information with graph neural network. It first constructs a heterogeneous co-expression network with both genes and isoforms being nodes. This network integrates the rich association between isoforms and genes, and provides a bridge for connecting isoform and gene functions. Then GraphIsoFun uses the graph neural network to mine the information of the co-expression network and obtains the final prediction score of isoforms for each function. The experiments on multiple datasets show that GraphIsoFun surpasses existing methods based on different evaluation indicators.", "fno": "09669396", "keywords": [ "Bioinformatics", "Biological Techniques", "Genetics", "Genomics", "Graph Theory", "Molecular Biophysics", "Neural Nets", "Proteins", "Multiple Public Databases", "Gene Function Annotations", "Isoform Level Expression Information", "Graph Neural Network Based Approach", "Splice Isoform Function Prediction", "Gene Regulation", "Graph Iso Fun Approach", "Heterogeneous Coexpression Network", "Gene Expression", "Protein Species", "Protein Functions", "Proteins", "Protein Engineering", "Costs", "Annotations", "Databases", "Splicing", "Conferences", "Alternative Splicing", "Isoform Function", "Gene Function", "Graph Neural Network" ], "authors": [ { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China,Hunan,410083", "fullName": "Shuo Zhang", "givenName": "Shuo", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China,Hunan,410083", "fullName": "Changhuo Yang", "givenName": "Changhuo", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China,Hunan,410083", "fullName": "Hong-Dong Li", "givenName": "Hong-Dong", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China,Hunan,410083", "fullName": "Jianxin Wang", "givenName": "Jianxin", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "112-117", "year": "2021", "issn": null, "isbn": "978-1-6654-0126-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09669306", "articleId": "1A9WaG2KJqg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669631", "articleId": "1A9WqUAVaso", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2007/1509/0/04375757", "title": "Alternative Splicing: Associating Frequency with Isoforms", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375757/12OmNqH9heQ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822512", "title": "Estimating isoform abundance by Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822512/12OmNqHItG6", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a130", "title": "Towards Reliable Isoform Quantification Using RNA-Seq Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a130/12OmNxwENnL", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392734", "title": "Reconstructing isoform graphs from RNA-Seq data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392734/12OmNyKJiBX", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192691", "title": "Vials: Visualizing Alternative Splicing of Genes", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192691/13rRUxBJhFz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09697358", "title": "IsoCell: An Approach to Enhance Single Cell Clustering by Integrating Isoform-Level Expression Through Orthogonal Projection", "doi": null, "abstractUrl": "/journal/tb/2023/01/09697358/1AC4hUTzFw4", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08982956", "title": "DMIL-III: Isoform-isoform interaction prediction using deep multi-instance learning method", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08982956/1hgugmxX4XK", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09353272", "title": "DeepIDA: Predicting Isoform-Disease Associations by Data Fusion and Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tb/2022/04/09353272/1r8juvir0aI", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09387128", "title": "DeepIII: Predicting Isoform-Isoform Interactions by Deep Neural Networks and Data Fusion", "doi": null, "abstractUrl": "/journal/tb/2022/04/09387128/1sfXaeu6J9K", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09468392", "title": "Tissue Specificity Based Isoform Function Prediction", "doi": null, "abstractUrl": "/journal/tb/2022/05/09468392/1uPuLzmdBS0", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mVy", "title": "Computing, Measurement, Control and Sensor Network, International Conference on", "acronym": "cmcsn", "groupId": "1801748", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNCd2rIa", "doi": "10.1109/CMCSN.2012.105", "title": "Increasing Visual Perception Brain Stroke Detection System", "normalizedTitle": "Increasing Visual Perception Brain Stroke Detection System", "abstract": "Stroke has been the third among the top ten leading causes of death in Taiwan. The danger is not only high mortality, but also gave the family a heavy economic. Recently, inspects the ischemic stroke the method to be divided into two categories: Computed Tomography (CT) and Magnetic Resonance Imaging (MRI). The former CT is the most regularly adoption because done once the time of the latter MRI is longer than the time of the former CT, and the latter MRI is the most expensive than the former CT. Due to academic studies of ischemic stroke detection is very finite, it is low successful rate to correctly detect stroke initial period. In tradition, we have to depend on radiologist¡¦s professional knowledge to diagnose ischemic stroke image, it will make radiologists increase fatigue so that made an error diagnostic. Therefore, we propose a Increasing visual perception brain stroke detection system. We use mathematic morphology to extract brain area. Then using median filter to remove noise, and uses canny edge detection to find out the edge of the brain tissue, and setting peak value in edge histogram as seed to perform region growing. Finally, we can clearly recognize the area of stroke. In the experimental result the recognition successful rate can reach 85%. Our successful rate cannot reach 100% because each patient¡¦s brain CT image is not certainly upright and foursquare. Future research direction, we will use other methods to correct gradient and CT image for each patient to improve successful rate of detection.", "abstracts": [ { "abstractType": "Regular", "content": "Stroke has been the third among the top ten leading causes of death in Taiwan. The danger is not only high mortality, but also gave the family a heavy economic. Recently, inspects the ischemic stroke the method to be divided into two categories: Computed Tomography (CT) and Magnetic Resonance Imaging (MRI). The former CT is the most regularly adoption because done once the time of the latter MRI is longer than the time of the former CT, and the latter MRI is the most expensive than the former CT. Due to academic studies of ischemic stroke detection is very finite, it is low successful rate to correctly detect stroke initial period. In tradition, we have to depend on radiologist¡¦s professional knowledge to diagnose ischemic stroke image, it will make radiologists increase fatigue so that made an error diagnostic. Therefore, we propose a Increasing visual perception brain stroke detection system. We use mathematic morphology to extract brain area. Then using median filter to remove noise, and uses canny edge detection to find out the edge of the brain tissue, and setting peak value in edge histogram as seed to perform region growing. Finally, we can clearly recognize the area of stroke. In the experimental result the recognition successful rate can reach 85%. Our successful rate cannot reach 100% because each patient¡¦s brain CT image is not certainly upright and foursquare. Future research direction, we will use other methods to correct gradient and CT image for each patient to improve successful rate of detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stroke has been the third among the top ten leading causes of death in Taiwan. The danger is not only high mortality, but also gave the family a heavy economic. Recently, inspects the ischemic stroke the method to be divided into two categories: Computed Tomography (CT) and Magnetic Resonance Imaging (MRI). The former CT is the most regularly adoption because done once the time of the latter MRI is longer than the time of the former CT, and the latter MRI is the most expensive than the former CT. Due to academic studies of ischemic stroke detection is very finite, it is low successful rate to correctly detect stroke initial period. In tradition, we have to depend on radiologist¡¦s professional knowledge to diagnose ischemic stroke image, it will make radiologists increase fatigue so that made an error diagnostic. Therefore, we propose a Increasing visual perception brain stroke detection system. We use mathematic morphology to extract brain area. Then using median filter to remove noise, and uses canny edge detection to find out the edge of the brain tissue, and setting peak value in edge histogram as seed to perform region growing. Finally, we can clearly recognize the area of stroke. In the experimental result the recognition successful rate can reach 85%. Our successful rate cannot reach 100% because each patient¡¦s brain CT image is not certainly upright and foursquare. Future research direction, we will use other methods to correct gradient and CT image for each patient to improve successful rate of detection.", "fno": "4738a429", "keywords": [ "Ichemic Stroke", "Computed Tomography", "Magnetic Resonance Imaging", "Mathematic Morphology", "Region Growing" ], "authors": [ { "affiliation": null, "fullName": "Ming Sian Lee", "givenName": "Ming Sian", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chiun Li Chin", "givenName": "Chiun Li", "surname": "Chin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ya Wen Lee", "givenName": "Ya Wen", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chian Yun Lee", "givenName": "Chian Yun", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yan Ru Chen", "givenName": "Yan Ru", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmcsn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "429-432", "year": "2012", "issn": null, "isbn": "978-0-7695-4738-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4738a425", "articleId": "12OmNxwWoWo", "__typename": "AdjacentArticleType" }, "next": { "fno": "4738a433", "articleId": "12OmNwtEEIV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2017/1710/0/1710a391", "title": "Level Set Based on Brain Radiological Densities for Stroke Segmentation in CT Images", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a391/12OmNA1mbd2", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/5/3119e003", "title": "Changes of Lactate Concentration in Ischemic Rat Brain after Sacrifice", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119e003/12OmNAFWOQo", "parentPublication": { "id": "proceedings/cisp/2008/3119/5", "title": "International Congress on Image and Signal Processing (CISP 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icons/2009/3551/0/3551a247", "title": "Whole Brain CT Perfusion Maps", "doi": null, "abstractUrl": "/proceedings-article/icons/2009/3551a247/12OmNqJq4mK", "parentPublication": { "id": "proceedings/icons/2009/3551/0", "title": "2009 Fourth International Conference on Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2010/9167/0/06042672", "title": "Using ontologies and probabilistic networks to develop a preventive stroke diagnosis system (PSDS)", "doi": null, "abstractUrl": "/proceedings-article/cbms/2010/06042672/12OmNrJROWm", "parentPublication": { "id": "proceedings/cbms/2010/9167/0", "title": "2010 IEEE 23rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a254", "title": "Morphology Based Enhancement and Skull Stripping of MRI Brain Images", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a254/12OmNx5Yv6U", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2011/4367/0/4367a494", "title": "Evaluation of Three Methods for MRI Brain Tumor Segmentation", "doi": null, "abstractUrl": "/proceedings-article/itng/2011/4367a494/12OmNzDvSgM", "parentPublication": { "id": "proceedings/itng/2011/4367/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669719", "title": "A Fast-Processing Pipeline for Three-dimensional Visualization of Acute Ischemic Stroke lesion topography", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669719/1A9VVWEHKeY", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a720", "title": "The Causes Analysis of Ischemic Stroke Transformation into Hemorrhagic Stroke using PLS (partial Least Square)-GA and Swarm Algorithm", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a720/1cYizfffQMU", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2019/0059/0/005900a284", "title": "Features of Hierarchical Fuzzy Entropy of Stroke Based on EEG Signal and Its Application in Stroke Classification", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2019/005900a284/1dDLV3zkdfW", "parentPublication": { "id": "proceedings/bigdataservice/2019/0059/0", "title": "2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904574", "title": "CT-To-MR Conditional Generative Adversarial Networks for Ischemic Stroke Lesion Segmentation", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904574/1f8N71cs18c", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZq8", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBtiFK", "doi": "10.1109/BIBM.2014.6999336", "title": "Regional homogeneity change in female depressive patients after abdominal acupuncture treatment", "normalizedTitle": "Regional homogeneity change in female depressive patients after abdominal acupuncture treatment", "abstract": "Background: Clinical studies showed that abdominal acupuncture was an effective and safe treatment for depression. However, the underlying neural mechanism was still largely unknown. The present study investigated the brain spontaneous activity changes following with the abdominal acupuncture treatment in female depressive patients with different levels, to explore the neural basis underpinning abdominal acupuncture treatment efficacy. Methods: Fifteen female depression patients (nine mild and six moderate-serious participants) were recruited for the present study, these patients treated by abdominal acupuncture for 4 weeks. The resting-state functional magnetic resonance imaging (fMRI) data was collected at before and after treatment stages. The changes of resting state regional homogeneity (ReHo) were examined between these two stages, to suggest the acupuncture treatment effect on spontaneous neural activity. Further analysis was performed to explore the correlation between ReHo changes and clinical measurements (Self-rating depression scale SDS and Montgomery-Asberg Depression Rating Scale MADRS scores). Results: The scores of SDS and MADRS had gradually declined after-treatment stage in mild and moderate-serious depression, compared with those of before-treatment stage. There were statistically differences of SDS and MADRS scores after treatment at 1st, 2nd, 3rd and 4th week's (P<0.05). Compared with the before-treatment state in mild depression, brain regions with increased ReHo were found in Frontal_Sup_L, Frontal_Inf_Tri_L, Frontal_Inf_Tri_R, and Parietal_Inf_R. Meanwhile, the brain regions including Temporal_Pole_Sup_R, Occipital_Inf_R, Occipital_Inf_R, Temporal_Sup_R, Cuneus_R and Temporal_Mid_L were observed with decreased ReHo. In moderate-serious depression, brain regions with increased ReHo were found in Frontal_Med_Orb_Rand, and Cingulum_Mid_R; meanwhile, the brain regions including Lingual_L and Postcentral_R were observed with decreased ReHo. There were a large of quantity regional homogeneity changes which correlated with scores of SDS and MADRS. Conclusion: Abdominal acupuncture treatment could induce spontaneous brain activity change in depression patients. However, there were different regional homogeneity changes in different depression levels. ReHo changes in mild depression were mainly distributed in prefrontal and temporal lobe, but the ReHo change in prefrontal, Parietal, Occipital lobe and limbic system in moderate-serious depression. Prefrontal region took important roles in the acupuncture treatment effect on depression patients. Together, the findings of the present study provided new evidence for that abdominal acupuncture was an effective treatment for depression, and the ReHo was efficacy evaluation objective indicators of acupuncture treatment for depression.", "abstracts": [ { "abstractType": "Regular", "content": "Background: Clinical studies showed that abdominal acupuncture was an effective and safe treatment for depression. However, the underlying neural mechanism was still largely unknown. The present study investigated the brain spontaneous activity changes following with the abdominal acupuncture treatment in female depressive patients with different levels, to explore the neural basis underpinning abdominal acupuncture treatment efficacy. Methods: Fifteen female depression patients (nine mild and six moderate-serious participants) were recruited for the present study, these patients treated by abdominal acupuncture for 4 weeks. The resting-state functional magnetic resonance imaging (fMRI) data was collected at before and after treatment stages. The changes of resting state regional homogeneity (ReHo) were examined between these two stages, to suggest the acupuncture treatment effect on spontaneous neural activity. Further analysis was performed to explore the correlation between ReHo changes and clinical measurements (Self-rating depression scale SDS and Montgomery-Asberg Depression Rating Scale MADRS scores). Results: The scores of SDS and MADRS had gradually declined after-treatment stage in mild and moderate-serious depression, compared with those of before-treatment stage. There were statistically differences of SDS and MADRS scores after treatment at 1st, 2nd, 3rd and 4th week's (P<0.05). Compared with the before-treatment state in mild depression, brain regions with increased ReHo were found in Frontal_Sup_L, Frontal_Inf_Tri_L, Frontal_Inf_Tri_R, and Parietal_Inf_R. Meanwhile, the brain regions including Temporal_Pole_Sup_R, Occipital_Inf_R, Occipital_Inf_R, Temporal_Sup_R, Cuneus_R and Temporal_Mid_L were observed with decreased ReHo. In moderate-serious depression, brain regions with increased ReHo were found in Frontal_Med_Orb_Rand, and Cingulum_Mid_R; meanwhile, the brain regions including Lingual_L and Postcentral_R were observed with decreased ReHo. There were a large of quantity regional homogeneity changes which correlated with scores of SDS and MADRS. Conclusion: Abdominal acupuncture treatment could induce spontaneous brain activity change in depression patients. However, there were different regional homogeneity changes in different depression levels. ReHo changes in mild depression were mainly distributed in prefrontal and temporal lobe, but the ReHo change in prefrontal, Parietal, Occipital lobe and limbic system in moderate-serious depression. Prefrontal region took important roles in the acupuncture treatment effect on depression patients. Together, the findings of the present study provided new evidence for that abdominal acupuncture was an effective treatment for depression, and the ReHo was efficacy evaluation objective indicators of acupuncture treatment for depression.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Background: Clinical studies showed that abdominal acupuncture was an effective and safe treatment for depression. However, the underlying neural mechanism was still largely unknown. The present study investigated the brain spontaneous activity changes following with the abdominal acupuncture treatment in female depressive patients with different levels, to explore the neural basis underpinning abdominal acupuncture treatment efficacy. Methods: Fifteen female depression patients (nine mild and six moderate-serious participants) were recruited for the present study, these patients treated by abdominal acupuncture for 4 weeks. The resting-state functional magnetic resonance imaging (fMRI) data was collected at before and after treatment stages. The changes of resting state regional homogeneity (ReHo) were examined between these two stages, to suggest the acupuncture treatment effect on spontaneous neural activity. Further analysis was performed to explore the correlation between ReHo changes and clinical measurements (Self-rating depression scale SDS and Montgomery-Asberg Depression Rating Scale MADRS scores). Results: The scores of SDS and MADRS had gradually declined after-treatment stage in mild and moderate-serious depression, compared with those of before-treatment stage. There were statistically differences of SDS and MADRS scores after treatment at 1st, 2nd, 3rd and 4th week's (P<0.05). Compared with the before-treatment state in mild depression, brain regions with increased ReHo were found in Frontal_Sup_L, Frontal_Inf_Tri_L, Frontal_Inf_Tri_R, and Parietal_Inf_R. Meanwhile, the brain regions including Temporal_Pole_Sup_R, Occipital_Inf_R, Occipital_Inf_R, Temporal_Sup_R, Cuneus_R and Temporal_Mid_L were observed with decreased ReHo. In moderate-serious depression, brain regions with increased ReHo were found in Frontal_Med_Orb_Rand, and Cingulum_Mid_R; meanwhile, the brain regions including Lingual_L and Postcentral_R were observed with decreased ReHo. There were a large of quantity regional homogeneity changes which correlated with scores of SDS and MADRS. Conclusion: Abdominal acupuncture treatment could induce spontaneous brain activity change in depression patients. However, there were different regional homogeneity changes in different depression levels. ReHo changes in mild depression were mainly distributed in prefrontal and temporal lobe, but the ReHo change in prefrontal, Parietal, Occipital lobe and limbic system in moderate-serious depression. Prefrontal region took important roles in the acupuncture treatment effect on depression patients. Together, the findings of the present study provided new evidence for that abdominal acupuncture was an effective treatment for depression, and the ReHo was efficacy evaluation objective indicators of acupuncture treatment for depression.", "fno": "06999336", "keywords": [ "Correlation", "Biomedical Imaging", "Educational Institutions", "Needles", "Hospitals", "Roads", "Montgomery Asberg Depression Rating Scale", "Female Depression", "Abdominal Acupuncture", "Resting State Functional Magnetic Resonance Imaging", "Regional Homogeneity", "Self Rating Depression Scale" ], "authors": [ { "affiliation": "The Second Affiliated Hospital of Guangzhou University of Chinese Medicine, 111 Dade Road, Guangzhou 510120, China", "fullName": "Jian Liu", "givenName": "Jian", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "The Second Affiliated Hospital of Guangzhou University of Chinese Medicine, 111 Dade Road, Guangzhou 510120, China", "fullName": "Bo Liu", "givenName": "Bo", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "The Second Affiliated Hospital of Guangzhou University of Chinese Medicine, 111 Dade Road, Guangzhou 510120, China", "fullName": "Guangning Nie", "givenName": "Guangning", "surname": "Nie", "__typename": "ArticleAuthorType" }, { "affiliation": "Yongchuan Hospital of Chinese Medicine, 2 Guest Road, Chongqing 402160, China", "fullName": "Bowei Wang", "givenName": "Bowei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Guangzhou University of Chinese Medicine, 12 Airport Road, Guangzhou 510405, China", "fullName": "Xuan Feng", "givenName": "Xuan", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "The Second Affiliated Hospital of Guangzhou University of Chinese Medicine, 111 Dade Road, Guangzhou 510120, China", "fullName": "Xiaoyun Wang", "givenName": "Xiaoyun", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "100-107", "year": "2014", "issn": null, "isbn": "978-1-4799-5669-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06999335", "articleId": "12OmNBKmXne", "__typename": "AdjacentArticleType" }, "next": { "fno": "06999337", "articleId": "12OmNBqv2aT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2014/5669/0/06999317", "title": "Clinical research on treatment of insomnia due to deficiency of the heart and spleen treated by acupuncture with ear pricking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999317/12OmNAQrYBd", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359931", "title": "Bo's abdominal acupuncture mitigate post-stroke fatigue: A clinical center retrospective analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359931/12OmNAYXWzH", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470375", "title": "Abdominal acupuncture for Bi syndrome of casino workers in Macau: A randomized controlled trial", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470375/12OmNAq3hHb", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732654", "title": "Acupoint injection combined with acupuncture for insomnia with cardiacsplenic asthenia: A research protocol for clinical trial", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732654/12OmNB9bvdz", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732674", "title": "The effect of Bo's abdominal acupuncture combined with rehabilitation exercise on shoulder pain after stroke", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732674/12OmNBrV1LZ", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a032", "title": "Acupuncture for Atopic Dermatitis: A Systematic Review and Meta-Analysis", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a032/12OmNCctf8N", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732635", "title": "System evaluation of electro-acupuncture (EA) for functional constipation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732635/12OmNrFTr8C", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470363", "title": "Clinical effect study on treatment of post cerebral infarction depression by Eight Methods of Intelligent Turtle", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470363/12OmNyY4rlk", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999345", "title": "The role of autonomic nerve in sepsis and certain possible acupuncture therapy", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999345/12OmNzd7bpu", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a034", "title": "Acupuncture Combined with Musical Therapy in the Treatment of Post-Stroke Depression: A Case Report", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a034/17D45WHONpK", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZX", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNvqEvNP", "doi": "10.1109/BIBM.2013.6732623", "title": "A novel prognostic model to predict the recovery of ischemie stroke patients", "normalizedTitle": "A novel prognostic model to predict the recovery of ischemie stroke patients", "abstract": "Evaluating the prognosis of ischemie stroke can provide useful information for clinical treatment. A novel prognostic model to predict the recovery of ischemie stroke was constructed in this study. We built a prognostic model mainly based on these items including the National Institutes of Health Stroke Scale (NIHSS) score and Traditional Chinese Medicine (TCM)symptoms & signs and their changes during the first 3 days of ischemie stroke patients in three TCM hospitals. Selecting the optimal cut-offvalue for evaluating the prognosis with the Receiver Operating Characteristic (ROC) curve analysis. The result of validation on the data of west medicine hospital showed that the model had a good sensitivity and specificity for judging the prognosis of ischemie stroke.", "abstracts": [ { "abstractType": "Regular", "content": "Evaluating the prognosis of ischemie stroke can provide useful information for clinical treatment. A novel prognostic model to predict the recovery of ischemie stroke was constructed in this study. We built a prognostic model mainly based on these items including the National Institutes of Health Stroke Scale (NIHSS) score and Traditional Chinese Medicine (TCM)symptoms & signs and their changes during the first 3 days of ischemie stroke patients in three TCM hospitals. Selecting the optimal cut-offvalue for evaluating the prognosis with the Receiver Operating Characteristic (ROC) curve analysis. The result of validation on the data of west medicine hospital showed that the model had a good sensitivity and specificity for judging the prognosis of ischemie stroke.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Evaluating the prognosis of ischemie stroke can provide useful information for clinical treatment. A novel prognostic model to predict the recovery of ischemie stroke was constructed in this study. We built a prognostic model mainly based on these items including the National Institutes of Health Stroke Scale (NIHSS) score and Traditional Chinese Medicine (TCM)symptoms & signs and their changes during the first 3 days of ischemie stroke patients in three TCM hospitals. Selecting the optimal cut-offvalue for evaluating the prognosis with the Receiver Operating Characteristic (ROC) curve analysis. The result of validation on the data of west medicine hospital showed that the model had a good sensitivity and specificity for judging the prognosis of ischemie stroke.", "fno": "06732623", "keywords": [ "Hospitals", "Predictive Models", "Bismuth", "History", "Prognostics And Health Management", "Educational Institutions", "Standards", "Ischemie Stroke", "Prognostic Model", "Recovery" ], "authors": [ { "affiliation": "Neurology department, Dongzhimen Hospital, Beijing University of Chinese Medicine", "fullName": "Kegang Cao", "givenName": "Kegang", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Neurology department, Dongzhimen Hospital, Beijing University of Chinese Medicine", "fullName": "Caihong Fu", "givenName": "Caihong", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Acupuncture and Moxibustion Department, Beijing Hospital of Traditional Chinese Medicine affiliated to Capital Medical University", "fullName": "Huanqin Li", "givenName": "Huanqin", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Traditional Chinese Medicine Department, Peking University Third Hospital Beijing, China", "fullName": "Xiyan Xin", "givenName": "Xiyan", "surname": "Xin", "__typename": "ArticleAuthorType" }, { "affiliation": "Neurology department, Dongzhimen Hospital, Beijing University of Chinese Medicine", "fullName": "Ying Gao", "givenName": "Ying", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "1-2", "year": "2013", "issn": null, "isbn": "978-1-4799-1309-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06732622", "articleId": "12OmNBRsVxi", "__typename": "AdjacentArticleType" }, "next": { "fno": "06732624", "articleId": "12OmNz4Bdv2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2017/1710/0/1710a413", "title": "Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a413/12OmNAYXWJ8", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2015/7983/0/07367658", "title": "Prediction models for estimation of survival rate and relapse for breast cancer patients", "doi": null, "abstractUrl": "/proceedings-article/bibe/2015/07367658/12OmNywfKAr", "parentPublication": { "id": "proceedings/bibe/2015/7983/0", "title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2015/6775/0/6775a141", "title": "Preliminary Study for a Bayesian Network Prognostic Model for Crohn's Disease", "doi": null, "abstractUrl": "/proceedings-article/cbms/2015/6775a141/12OmNz61dpC", "parentPublication": { "id": "proceedings/cbms/2015/6775/0", "title": "2015 IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999296", "title": "A survey of pattern classification-based methods for predicting survival time of lung cancer patients", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999296/12OmNzw8je0", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/06/08305616", "title": "Using Machine Learning to Improve the Prediction of Functional Outcome in Ischemic Stroke Patients", "doi": null, "abstractUrl": "/journal/tb/2018/06/08305616/17D45Xh13r1", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2022/8487/0/848700a363", "title": "Breast Cancer Survival Analysis with Molecular Subtypes: An Initial Step", "doi": null, "abstractUrl": "/proceedings-article/bibe/2022/848700a363/1J6hCOK9vWw", "parentPublication": { "id": "proceedings/bibe/2022/8487/0", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995080", "title": "MTOR hypermethylation may associate with the susceptibility and survival of SARS-CoV-2 infections to lung adenocarcinoma patients based on multi-omics data and machine learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995080/1JC1WYtbVtu", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088366", "title": "Stylized NFT Progressive Neural Paintings using Brush Stroke prediction", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088366/1M4rNiPE4mI", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a035", "title": "Survival prediction and risk estimation of Glioma patients using mRNA expressions", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a035/1pBMtubYNJ6", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313145", "title": "Identifying prognostic subgroups of luminal-A breast cancer using a deep autoencoder", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313145/1qmfQwJrmda", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwBjP17", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "acronym": "itme", "groupId": "1002567", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxG1yC0", "doi": "10.1109/ITME.2016.0075", "title": "Technology and Methods of Improving the Success Rate of MSCT-Guided Puncture", "normalizedTitle": "Technology and Methods of Improving the Success Rate of MSCT-Guided Puncture", "abstract": "Objective: To explore the technology and methods of improving the success rate of MSCT-guided puncture. Methods: Under the guidance of the 64-Slice CT, 58 patients had percutaneous biopsies. After completing the puncture, the occurrence of complications and treatment were observed by CT. The pathologic examination results were compared with the original clinical diagnosis, the reason which produced a variety of differences and complications was analyzed. Results: In this group, 58 patients were successfully punctured, postoperative scan showed pneumothorax in 1 case. 2 patients had a small amount of bleeding, after 5 minutes observation, their bleeding remitted, and no further bleeding after hemostatic drug treatment. Other important complications were not found. Five hours after the puncture, the 58 patients had no complications. For 58 patients in this study, the diseases of the 57 patients were diagnosedby pathological detections, detection success rate reached to 98.3%. Compared with diagnosis before puncture, diagnosis accurate rate was increased by 19.2% and 11.5%. One patient's disease was not diagnosed because his pathological detection result didn't return. Conclusions: Multi-slice CT-guided percutaneous biopsy can greatly improve the success rate. It's a new, safe and accurate technology which can help diagnosis and treatment.", "abstracts": [ { "abstractType": "Regular", "content": "Objective: To explore the technology and methods of improving the success rate of MSCT-guided puncture. Methods: Under the guidance of the 64-Slice CT, 58 patients had percutaneous biopsies. After completing the puncture, the occurrence of complications and treatment were observed by CT. The pathologic examination results were compared with the original clinical diagnosis, the reason which produced a variety of differences and complications was analyzed. Results: In this group, 58 patients were successfully punctured, postoperative scan showed pneumothorax in 1 case. 2 patients had a small amount of bleeding, after 5 minutes observation, their bleeding remitted, and no further bleeding after hemostatic drug treatment. Other important complications were not found. Five hours after the puncture, the 58 patients had no complications. For 58 patients in this study, the diseases of the 57 patients were diagnosedby pathological detections, detection success rate reached to 98.3%. Compared with diagnosis before puncture, diagnosis accurate rate was increased by 19.2% and 11.5%. One patient's disease was not diagnosed because his pathological detection result didn't return. Conclusions: Multi-slice CT-guided percutaneous biopsy can greatly improve the success rate. It's a new, safe and accurate technology which can help diagnosis and treatment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Objective: To explore the technology and methods of improving the success rate of MSCT-guided puncture. Methods: Under the guidance of the 64-Slice CT, 58 patients had percutaneous biopsies. After completing the puncture, the occurrence of complications and treatment were observed by CT. The pathologic examination results were compared with the original clinical diagnosis, the reason which produced a variety of differences and complications was analyzed. Results: In this group, 58 patients were successfully punctured, postoperative scan showed pneumothorax in 1 case. 2 patients had a small amount of bleeding, after 5 minutes observation, their bleeding remitted, and no further bleeding after hemostatic drug treatment. Other important complications were not found. Five hours after the puncture, the 58 patients had no complications. For 58 patients in this study, the diseases of the 57 patients were diagnosedby pathological detections, detection success rate reached to 98.3%. Compared with diagnosis before puncture, diagnosis accurate rate was increased by 19.2% and 11.5%. One patient's disease was not diagnosed because his pathological detection result didn't return. Conclusions: Multi-slice CT-guided percutaneous biopsy can greatly improve the success rate. It's a new, safe and accurate technology which can help diagnosis and treatment.", "fno": "3906a306", "keywords": [ "Lesions", "Lungs", "Needles", "Cancer", "Pathology", "Computed Tomography", "Puncture", "Biopsy", "Computed Tomography", "Pathological Detection" ], "authors": [ { "affiliation": null, "fullName": "Zhiwei Huang", "givenName": "Zhiwei", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bo Xiao", "givenName": "Bo", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qian Liu", "givenName": "Qian", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tian Tian", "givenName": "Tian", "surname": "Tian", "__typename": "ArticleAuthorType" } ], "idPrefix": "itme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "306-309", "year": "2016", "issn": "2474-3828", "isbn": "978-1-5090-3906-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3906a302", "articleId": "12OmNAThXTJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3906a310", "articleId": "12OmNvRU0rU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2014/7502/0/7502a427", "title": "Basilar Atelectasis as the True Predictor of Acute Abdomino-Pelvic Pathology -- A Two Year Retrospective Study of Patients under the Age of 55 Evaluated with Multi-detector CT-Scan", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a427/12OmNyqRn3X", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a282", "title": "The Effect of Nasal Septum Deviation on the New Technology of the Treatment of Maxillary Sinus Cyst", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a282/12OmNzhELmi", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669886", "title": "Vascular1: Development and Evaluation of a Virtual Reality Ultrasound Guided Vascular Access Training Module", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669886/1A9VxOJNsQM", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669440", "title": "Modified Linear Fascicle Evaluation (mLiFE) for Improving the Fiber Tractography of Stroke Patients using Diffusion MRI", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669440/1A9W9KqsVsk", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmbs/2022/6770/0/677000a323", "title": "Video Capsule Endoscopy Classification using Focal Modulation Guided Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cmbs/2022/677000a323/1GhVXg87LvW", "parentPublication": { "id": "proceedings/cmbs/2022/6770/0", "title": "2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2022/1015/0/101500a444", "title": "Application of Tirofiban for Stent-Assisted Coiling in Acutely Ruptured Intracranial Aneurysms", "doi": null, "abstractUrl": "/proceedings-article/itme/2022/101500a444/1M4rsSEtc1W", "parentPublication": { "id": "proceedings/itme/2022/1015/0", "title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/03/08948290", "title": "Surgical Navigation System for Low-Dose-Rate Brachytherapy Based on Mixed Reality", "doi": null, "abstractUrl": "/magazine/cg/2021/03/08948290/1geNLto4KGs", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2006/2517/0/01647604", "title": "Automatic Internal Medicine Diagnostics Using Statistical Imaging Methods", "doi": null, "abstractUrl": "/proceedings-article/cbms/2006/01647604/1i5mkrGQ2T6", "parentPublication": { "id": "proceedings/cbms/2006/2517/0", "title": "19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqGA5ht", "title": "2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)", "acronym": "cbms", "groupId": "1000153", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNzwHviJ", "doi": "10.1109/CBMS.2012.6266406", "title": "Using phase-type models to cost a cohort of stroke patients", "normalizedTitle": "Using phase-type models to cost a cohort of stroke patients", "abstract": "Stroke disease incurs long periods of hospital and community care, with associated costs. Also stroke is a highly complex disease with diverse outcomes and multiple strategies and care options for therapy and care. Previously we have developed a modeling framework which classifies patients with respect to their length of stay (LOS); phase-type models can then be used to describe patient flows for each class. Also multiple outcomes, such as discharge to normal residence, nursing home, or death can be included. We here add costs to this model of the total stroke care system and determine moments for total cost of a cohort of patients and also the separate costs in different phases and stages of care. Based on stroke patients' data from the Belfast City Hospital, various scenarios are explored with a focus on comparing the costs of thrombolysis, a clot-busting therapy under different regimes.", "abstracts": [ { "abstractType": "Regular", "content": "Stroke disease incurs long periods of hospital and community care, with associated costs. Also stroke is a highly complex disease with diverse outcomes and multiple strategies and care options for therapy and care. Previously we have developed a modeling framework which classifies patients with respect to their length of stay (LOS); phase-type models can then be used to describe patient flows for each class. Also multiple outcomes, such as discharge to normal residence, nursing home, or death can be included. We here add costs to this model of the total stroke care system and determine moments for total cost of a cohort of patients and also the separate costs in different phases and stages of care. Based on stroke patients' data from the Belfast City Hospital, various scenarios are explored with a focus on comparing the costs of thrombolysis, a clot-busting therapy under different regimes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stroke disease incurs long periods of hospital and community care, with associated costs. Also stroke is a highly complex disease with diverse outcomes and multiple strategies and care options for therapy and care. Previously we have developed a modeling framework which classifies patients with respect to their length of stay (LOS); phase-type models can then be used to describe patient flows for each class. Also multiple outcomes, such as discharge to normal residence, nursing home, or death can be included. We here add costs to this model of the total stroke care system and determine moments for total cost of a cohort of patients and also the separate costs in different phases and stages of care. Based on stroke patients' data from the Belfast City Hospital, various scenarios are explored with a focus on comparing the costs of thrombolysis, a clot-busting therapy under different regimes.", "fno": "06266406", "keywords": [ "Costing", "Health Care", "Hospitals", "Patient Care", "Patient Treatment", "Phase Type Model", "Stroke Patient", "Stroke Disease", "Hospital Care", "Community Care", "Modeling Framework", "Length Of Stay", "Total Stroke Care System", "Belfast City Hospital", "Thrombolysis", "Clot Busting Therapy", "Cost", "Transient Analysis", "Hospitals", "Biological System Modeling", "Communities", "Markov Processes", "Discharges Electric", "Phase Type Models", "Stroke Patients", "LOS", "Planning", "Efficiency Gains", "Healthcare Economics" ], "authors": [ { "affiliation": "School of Computing and Information Engineering, University of Ulster, Coleraine, UK", "fullName": "Sally McClean", "givenName": "Sally", "surname": "McClean", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing and Information Engineering, University of Ulster, Coleraine, UK", "fullName": "Jennifer Gillespie", "givenName": "Jennifer", "surname": "Gillespie", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing and Information Engineering, University of Ulster, Coleraine, UK", "fullName": "Bryan Scotney", "givenName": "Bryan", "surname": "Scotney", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Medicine, Dentistry, and Biomedical Sciences, Queen's University, Belfast, UK", "fullName": "Ken Fullerton", "givenName": "Ken", "surname": "Fullerton", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2012", "issn": "1063-7125", "isbn": "978-1-4673-2049-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06266405", "articleId": "12OmNrGb2fi", "__typename": "AdjacentArticleType" }, "next": { "fno": "06266407", "articleId": "12OmNxTmHLx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367d148", "title": "Review of Research on Knowledge Transfer in Care Transitions: Trust-Enhancing Principles for Information Systems Design", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367d148/12OmNAHmOrn", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2017/1710/0/1710a413", "title": "Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a413/12OmNAYXWJ8", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470342", "title": "Effects of emotional nursing care cooperated with acupuncture points massage for post-stroke patients with insomnia", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470342/12OmNCuDzqu", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ngmast/2016/0949/0/07801465", "title": "Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/ngmast/2016/07801465/12OmNrMZpyR", "parentPublication": { "id": "proceedings/ngmast/2016/0949/0", "title": "2016 10th International Conference on Next-Generation Mobile Applications, Security and Technologies (NGMAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732623", "title": "A novel prognostic model to predict the recovery of ischemie stroke patients", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732623/12OmNvqEvNP", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/0/00926563", "title": "Rural post-acute stroke care using multidisciplinary telerehabilitation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/00926563/12OmNx207fl", "parentPublication": { "id": "proceedings/hicss/2001/0981/2", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smrlo/2016/9941/0/9941a443", "title": "Assistance to Palliative Pediatric Patients: Simulation Model", "doi": null, "abstractUrl": "/proceedings-article/smrlo/2016/9941a443/12OmNxRWId8", "parentPublication": { "id": "proceedings/smrlo/2016/9941/0", "title": "2016 Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2013/5089/0/5089a239", "title": "Heart Failure Risk Models and Their Readiness for Clinical Practice", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a239/12OmNyYDDJC", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192713", "title": "TimeSpan: Using Visualization to Explore Temporal Multi-dimensional Data of Stroke Patients", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192713/13rRUx0geva", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2019/4540/0/08864513", "title": "Virtual Reality Environment for the Cognitive Rehabilitation of Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2019/08864513/1e5ZtlRT3SE", "parentPublication": { "id": "proceedings/vs-games/2019/4540/0", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirV", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "acronym": "itme", "groupId": "1002567", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONpK", "doi": "10.1109/ITME.2018.00019", "title": "Acupuncture Combined with Musical Therapy in the Treatment of Post-Stroke Depression: A Case Report", "normalizedTitle": "Acupuncture Combined with Musical Therapy in the Treatment of Post-Stroke Depression: A Case Report", "abstract": "Rationale: The clinical treatment of mental symptoms of post-stroke depression (PSD) mainly focuses on western medicines which lead to great pain to patients due to unavoidable side effects. In this study, simultaneous treatment of both body and mind consisting of traditional Chinese medicine (TCM) acupuncture combined with musical therapy was conducted to a patient with PSD, with satisfactory clinical efficacy obtained. Patient concerns: The patient was a 53-year old male who suddenly developed weakness of limbs on right side 1 month ago and was diagnosed with cerebral infarction by cranial CT. After treatment in local hospital, he still had inarticulateness and weakness of limbs on right side, complicated with depression symptoms marked by low spirit and pessimism, etc. Diagnosis: The patient in this study was diagnosed by comprehensive assessment methods consisting of biological indicator detection, behavioral indicator detection and imageological detection. Interventions: Simultaneous treatment of both body and mind consisting of TCM acupuncture combined with musical therapy was conducted. Outcomes: After treatment, patient’s symptoms, nerve function and activities of daily living (ADL) were improved significantly, Hamilton (HAMD) Depression Scale (17 items) score was reduced, and levels of biological indicators interleukin (IL)-6, tumor necrosis factor-α (TNF-α), high-sensitivity C-reactive protein (Hs-CRP) and Homocysteine (Hcy) were reduced and improved significantly. Lessons: Acupuncture combined with musical therapy had significant clinical efficacy in the treatment of PSD and deserved to be further studied. Abbreviations: PSD: post-stroke depression; TCM: traditional Chinese medicine; ADL: activities of daily living; HAMD: Hamilton; IL-6: interleukin-6; TNF-α: tumor necrosis factor-α; Hs-CRP: high-sensitivity C-reactive protein; Hcy: Homocysteine.", "abstracts": [ { "abstractType": "Regular", "content": "Rationale: The clinical treatment of mental symptoms of post-stroke depression (PSD) mainly focuses on western medicines which lead to great pain to patients due to unavoidable side effects. In this study, simultaneous treatment of both body and mind consisting of traditional Chinese medicine (TCM) acupuncture combined with musical therapy was conducted to a patient with PSD, with satisfactory clinical efficacy obtained. Patient concerns: The patient was a 53-year old male who suddenly developed weakness of limbs on right side 1 month ago and was diagnosed with cerebral infarction by cranial CT. After treatment in local hospital, he still had inarticulateness and weakness of limbs on right side, complicated with depression symptoms marked by low spirit and pessimism, etc. Diagnosis: The patient in this study was diagnosed by comprehensive assessment methods consisting of biological indicator detection, behavioral indicator detection and imageological detection. Interventions: Simultaneous treatment of both body and mind consisting of TCM acupuncture combined with musical therapy was conducted. Outcomes: After treatment, patient’s symptoms, nerve function and activities of daily living (ADL) were improved significantly, Hamilton (HAMD) Depression Scale (17 items) score was reduced, and levels of biological indicators interleukin (IL)-6, tumor necrosis factor-α (TNF-α), high-sensitivity C-reactive protein (Hs-CRP) and Homocysteine (Hcy) were reduced and improved significantly. Lessons: Acupuncture combined with musical therapy had significant clinical efficacy in the treatment of PSD and deserved to be further studied. Abbreviations: PSD: post-stroke depression; TCM: traditional Chinese medicine; ADL: activities of daily living; HAMD: Hamilton; IL-6: interleukin-6; TNF-α: tumor necrosis factor-α; Hs-CRP: high-sensitivity C-reactive protein; Hcy: Homocysteine.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Rationale: The clinical treatment of mental symptoms of post-stroke depression (PSD) mainly focuses on western medicines which lead to great pain to patients due to unavoidable side effects. In this study, simultaneous treatment of both body and mind consisting of traditional Chinese medicine (TCM) acupuncture combined with musical therapy was conducted to a patient with PSD, with satisfactory clinical efficacy obtained. Patient concerns: The patient was a 53-year old male who suddenly developed weakness of limbs on right side 1 month ago and was diagnosed with cerebral infarction by cranial CT. After treatment in local hospital, he still had inarticulateness and weakness of limbs on right side, complicated with depression symptoms marked by low spirit and pessimism, etc. Diagnosis: The patient in this study was diagnosed by comprehensive assessment methods consisting of biological indicator detection, behavioral indicator detection and imageological detection. Interventions: Simultaneous treatment of both body and mind consisting of TCM acupuncture combined with musical therapy was conducted. Outcomes: After treatment, patient’s symptoms, nerve function and activities of daily living (ADL) were improved significantly, Hamilton (HAMD) Depression Scale (17 items) score was reduced, and levels of biological indicators interleukin (IL)-6, tumor necrosis factor-α (TNF-α), high-sensitivity C-reactive protein (Hs-CRP) and Homocysteine (Hcy) were reduced and improved significantly. Lessons: Acupuncture combined with musical therapy had significant clinical efficacy in the treatment of PSD and deserved to be further studied. Abbreviations: PSD: post-stroke depression; TCM: traditional Chinese medicine; ADL: activities of daily living; HAMD: Hamilton; IL-6: interleukin-6; TNF-α: tumor necrosis factor-α; Hs-CRP: high-sensitivity C-reactive protein; Hcy: Homocysteine.", "fno": "774400a034", "keywords": [ "Medical Treatment", "Music", "Needles", "Proteins", "Psychology", "Stroke Post Stroke Depression Acupuncture Five Element Music Musical Therapy" ], "authors": [ { "affiliation": null, "fullName": "Facai Lin", "givenName": "Facai", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuhang Qin", "givenName": "Yuhang", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianzhu Wang", "givenName": "Jianzhu", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Feng Hao", "givenName": "Feng", "surname": "Hao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yunchuan Wu", "givenName": "Yunchuan", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "itme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "34-38", "year": "2018", "issn": null, "isbn": "978-1-5386-7744-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "774400a029", "articleId": "17D45WWzW6Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "774400a039", "articleId": "17D45XDIXSu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2013/1309/0/06732674", "title": "The effect of Bo's abdominal acupuncture combined with rehabilitation exercise on shoulder pain after stroke", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732674/12OmNBrV1LZ", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a032", "title": "Acupuncture for Atopic Dermatitis: A Systematic Review and Meta-Analysis", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a032/12OmNCctf8N", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999295", "title": "Study of acupuncture therapy on hypertension based on text ming", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999295/12OmNqBKTYv", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999336", "title": "Regional homogeneity change in female depressive patients after abdominal acupuncture treatment", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999336/12OmNqBtiFK", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732635", "title": "System evaluation of electro-acupuncture (EA) for functional constipation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732635/12OmNrFTr8C", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999334", "title": "The influence of acupuncture therapy on early rehabilitation following anterior cruciate ligament reconstruction: A randomized controlled trial", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999334/12OmNwcUjVC", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a199", "title": "Influence of Traditional Chinese Medicine Five-Element Musical Therapy on Depression Severity and Neurological Functional Deficit Scale in Patients with Post-Stroke Depression", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a199/12OmNwvVrCX", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a199", "title": "Influence of Five-Element Music Therapy on Expression of CaMKII in Hippocampi in Rats with Post-Stroke Depression", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a199/17D45WB0qdR", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2021/0679/0/067900a364", "title": "Effects of Five-Element Music on Post-stroke depression: A Systematic Review and Meta-Analysis", "doi": null, "abstractUrl": "/proceedings-article/itme/2021/067900a364/1CATDv1mnIY", "parentPublication": { "id": "proceedings/itme/2021/0679/0", "title": "2021 11th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tcs/2021/2910/0/291000a473", "title": "Therapeutic effect of double needle acupuncture therapy for 63 case of tennis elbow", "doi": null, "abstractUrl": "/proceedings-article/tcs/2021/291000a473/1wRIf8UodOM", "parentPublication": { "id": "proceedings/tcs/2021/2910/0", "title": "2021 International Conference on Information Technology and Contemporary Sports (TCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1e5ZpIoqcVi", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "acronym": "vs-games", "groupId": "1002788", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1e5ZtlRT3SE", "doi": "10.1109/VS-Games.2019.8864513", "title": "Virtual Reality Environment for the Cognitive Rehabilitation of Stroke Patients", "normalizedTitle": "Virtual Reality Environment for the Cognitive Rehabilitation of Stroke Patients", "abstract": "We present ongoing work to develop a virtual reality environment for the cognitive rehabilitation of patients as a part of their recovery from a stroke. A stroke causes damage to the brain and problem solving, memory and task sequencing are commonly affected. The brain can recover to some extent, however, and stroke patients have to relearn to carry out activities of daily learning. We have created an application called VIRTUE to enable such activities to be practiced using immersive virtual reality. Gamification techniques enhance the motivation of patients such as by making the level of difficulty of a task increase over time. The design and implementation of VIRTUE is presented together with the results of a small acceptability study.", "abstracts": [ { "abstractType": "Regular", "content": "We present ongoing work to develop a virtual reality environment for the cognitive rehabilitation of patients as a part of their recovery from a stroke. A stroke causes damage to the brain and problem solving, memory and task sequencing are commonly affected. The brain can recover to some extent, however, and stroke patients have to relearn to carry out activities of daily learning. We have created an application called VIRTUE to enable such activities to be practiced using immersive virtual reality. Gamification techniques enhance the motivation of patients such as by making the level of difficulty of a task increase over time. The design and implementation of VIRTUE is presented together with the results of a small acceptability study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present ongoing work to develop a virtual reality environment for the cognitive rehabilitation of patients as a part of their recovery from a stroke. A stroke causes damage to the brain and problem solving, memory and task sequencing are commonly affected. The brain can recover to some extent, however, and stroke patients have to relearn to carry out activities of daily learning. We have created an application called VIRTUE to enable such activities to be practiced using immersive virtual reality. Gamification techniques enhance the motivation of patients such as by making the level of difficulty of a task increase over time. The design and implementation of VIRTUE is presented together with the results of a small acceptability study.", "fno": "08864513", "keywords": [ "Cognition", "Patient Rehabilitation", "Serious Games Computing", "Virtual Reality", "Task Sequencing", "Stroke Patients", "Immersive Virtual Reality", "Cognitive Rehabilitation", "VIRTUE", "Task Analysis", "Stroke Medical Condition", "Resists", "Virtual Reality", "Hospitals", "Games", "Virtual Reality", "Cognitive Rehabilitation", "Stroke Recovery" ], "authors": [ { "affiliation": "University of Chester, UK", "fullName": "Nigel W. John", "givenName": "Nigel W.", "surname": "John", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chester, UK", "fullName": "Thomas W. Day", "givenName": "Thomas W.", "surname": "Day", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chester, UK", "fullName": "Serban R. Pop", "givenName": "Serban R.", "surname": "Pop", "__typename": "ArticleAuthorType" }, { "affiliation": "Countess of Chester Hospital, NHS Foundation Trust", "fullName": "Kausik Chatterjee", "givenName": "Kausik", "surname": "Chatterjee", "__typename": "ArticleAuthorType" }, { "affiliation": "Countess of Chester Hospital, NHS Foundation Trust", "fullName": "Katy Cottrell", "givenName": "Katy", "surname": "Cottrell", "__typename": "ArticleAuthorType" }, { "affiliation": "Cadscan Limited", "fullName": "Alistair Buchanan", "givenName": "Alistair", "surname": "Buchanan", "__typename": "ArticleAuthorType" }, { "affiliation": "Cadscan Limited", "fullName": "Jonathan Roberts", "givenName": "Jonathan", "surname": "Roberts", "__typename": "ArticleAuthorType" } ], "idPrefix": "vs-games", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2019", "issn": null, "isbn": "978-1-7281-4540-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08864516", "articleId": "1e5ZtM7doAw", "__typename": "AdjacentArticleType" }, "next": { "fno": "08864514", "articleId": "1e5ZqEogIGA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ngmast/2016/0949/0/07801465", "title": "Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/ngmast/2016/07801465/12OmNrMZpyR", "parentPublication": { "id": "proceedings/ngmast/2016/0949/0", "title": "2016 10th International Conference on Next-Generation Mobile Applications, Security and Technologies (NGMAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a253", "title": "An Upper Extremity Rehabilitation System Using Virtual Reality Technology", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a253/17D45WWzW5h", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/01/08663653", "title": "Using Virtual Reality to Increase Motivation in Poststroke Rehabilitation", "doi": null, "abstractUrl": "/magazine/cg/2019/01/08663653/18exyyHBfz2", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a626", "title": "Application of virtual reality technology in improving cognitive function in patients with cognitive dysfunction", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a626/1BQiogZHqla", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/conisoft/2022/6126/0/612600a102", "title": "Towards the improvement of computer-assisted medical activities for stroke rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/conisoft/2022/612600a102/1LFLwTJ0N3i", "parentPublication": { "id": "proceedings/conisoft/2022/6126/0", "title": "2022 10th International Conference in Software Engineering Research and Innovation (CONISOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088363", "title": "An Ensemble Learning Approach and Analysis for Stroke Prediction Dataset", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088363/1M4rLL7HEc0", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a513", "title": "Mobile Conversational Agents for Stroke Rehabilitation Therapy", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a513/1cdNZaVLg8U", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2019/3918/0/391800a031", "title": "Application of Digital Mining Technology in the Treatment of Depressive Symptoms in Patients with Post-Stroke Depression", "doi": null, "abstractUrl": "/proceedings-article/itme/2019/391800a031/1gRxmjINaVO", "parentPublication": { "id": "proceedings/itme/2019/3918/0", "title": "2019 10th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ubi-media/2019/2820/0/282000a192", "title": "A Kinect-Based System for Stroke Rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/ubi-media/2019/282000a192/1iESfZs2fF6", "parentPublication": { "id": "proceedings/ubi-media/2019/2820/0", "title": "2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2021/03/09076802", "title": "A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients", "doi": null, "abstractUrl": "/journal/ec/2021/03/09076802/1jLP4R1rlHG", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJrMRRjRn2", "doi": "10.1109/BigData47090.2019.9006592", "title": "Predicting Post-stroke Hospital Discharge Disposition Using Interpretable Machine Learning Approaches", "normalizedTitle": "Predicting Post-stroke Hospital Discharge Disposition Using Interpretable Machine Learning Approaches", "abstract": "Stroke is the fifth leading cause of death for Americans. Due to critical consequences and cost, an efficient stroke system of care (i.e., acute treatment, post-stroke acute rehabilitation) is necessary. Early determination of hospital discharge disposition is important for stroke management, and can make an immense impact in optimizing acute treatment and planning post-acute rehabilitation with desired outcomes. With the rise of sophisticated machine learning models, many researchers have gained momentum in using such models in their studies. However, due to the lack of explanations that models provide, the integrity of the prediction result is often challenged. Our goal is to predict post-stroke hospital discharge disposition using machine learning models to increase the prediction capability while providing explanations for the results using an interpretation method, such as Local Interpretable Model-agnoistic Explanations (LIME). Our results demonstrate the effectiveness of LIME in providing interpretability to machine learning models and suggests further exploration in performance improvement.", "abstracts": [ { "abstractType": "Regular", "content": "Stroke is the fifth leading cause of death for Americans. Due to critical consequences and cost, an efficient stroke system of care (i.e., acute treatment, post-stroke acute rehabilitation) is necessary. Early determination of hospital discharge disposition is important for stroke management, and can make an immense impact in optimizing acute treatment and planning post-acute rehabilitation with desired outcomes. With the rise of sophisticated machine learning models, many researchers have gained momentum in using such models in their studies. However, due to the lack of explanations that models provide, the integrity of the prediction result is often challenged. Our goal is to predict post-stroke hospital discharge disposition using machine learning models to increase the prediction capability while providing explanations for the results using an interpretation method, such as Local Interpretable Model-agnoistic Explanations (LIME). Our results demonstrate the effectiveness of LIME in providing interpretability to machine learning models and suggests further exploration in performance improvement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stroke is the fifth leading cause of death for Americans. Due to critical consequences and cost, an efficient stroke system of care (i.e., acute treatment, post-stroke acute rehabilitation) is necessary. Early determination of hospital discharge disposition is important for stroke management, and can make an immense impact in optimizing acute treatment and planning post-acute rehabilitation with desired outcomes. With the rise of sophisticated machine learning models, many researchers have gained momentum in using such models in their studies. However, due to the lack of explanations that models provide, the integrity of the prediction result is often challenged. Our goal is to predict post-stroke hospital discharge disposition using machine learning models to increase the prediction capability while providing explanations for the results using an interpretation method, such as Local Interpretable Model-agnoistic Explanations (LIME). Our results demonstrate the effectiveness of LIME in providing interpretability to machine learning models and suggests further exploration in performance improvement.", "fno": "09006592", "keywords": [ "Diseases", "Injuries", "Learning Artificial Intelligence", "Medical Computing", "Patient Rehabilitation", "Patient Treatment", "Machine Learning Models", "Acute Treatment", "Stroke Management", "Interpretable Machine Learning Approaches", "Local Interpretable Model Agnoistic Explanations", "Postacute Rehabilitation", "Poststroke Hospital Discharge Disposition", "Poststroke Acute Rehabilitation", "Predictive Models", "Hospitals", "Machine Learning", "Logistics", "Forestry", "Machine Learning Algorithms", "Data Models", "Machine Learning", "Model Interpretation", "Lime", "Neural Network", "Black Box" ], "authors": [ { "affiliation": "The University of Tennessee at Chattanooga,Department of Computer Science and Engineering,Chattanooga,TN,37402", "fullName": "Jin Cho", "givenName": "Jin", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tennessee at Chattanooga,Department of Computer Science and Engineering,Chattanooga,TN,37402", "fullName": "Alnour Alharin", "givenName": "Alnour", "surname": "Alharin", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tennessee at Chattanooga,Department of Computer Science and Engineering,Chattanooga,TN,37402", "fullName": "Zhen Hu", "givenName": "Zhen", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tennessee at Chattanooga,Department of Physical Therapy,Chattanooga,TN,37402", "fullName": "Nancy Fell", "givenName": "Nancy", "surname": "Fell", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tennessee at Chattanooga,Department of Computer Science and Engineering,Chattanooga,TN,37402", "fullName": "Mina Sartipi", "givenName": "Mina", "surname": "Sartipi", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "4817-4822", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006312", "articleId": "1hJsBweaD6w", "__typename": "AdjacentArticleType" }, "next": { "fno": "09006432", "articleId": "1hJs1kciEa4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2016/01/07192713", "title": "TimeSpan: Using Visualization to Explore Temporal Multi-dimensional Data of Stroke Patients", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192713/13rRUx0geva", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900a665", "title": "Using Machine Learning Method to Predict Stroke Risk", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900a665/1C8GrSk8RxK", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2022/6603/0/660300a184", "title": "Explainability Audit: An Automated Evaluation of Local Explainability in Rooftop Image Classification", "doi": null, "abstractUrl": "/proceedings-article/iri/2022/660300a184/1GvdPnx72jC", "parentPublication": { "id": "proceedings/iri/2022/6603/0", "title": "2022 IEEE 23rd International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccict/2022/7224/0/722400a019", "title": "Risk Detection of Stroke Using Classifier Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ccict/2022/722400a019/1HpDVMMFiCc", "parentPublication": { "id": "proceedings/ccict/2022/7224/0", "title": "2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2022/7956/0/795600a444", "title": "Why Don&#x2019;t XAI Techniques Agree? Characterizing the Disagreements Between Post-hoc Explanations of Defect Predictions", "doi": null, "abstractUrl": "/proceedings-article/icsme/2022/795600a444/1JeF9u9MQ8M", "parentPublication": { "id": "proceedings/icsme/2022/7956/0", "title": "2022 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020374", "title": "Detecting Paralysis of Stroke Symptom in Video: Transfer Learning with Gated Recurrent Unit using Public Big Data of Facial Images", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020374/1KfQyt1pRNC", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a007", "title": "Evaluating Local Interpretable Model-Agnostic Explanations on Clinical Machine Learning Classification Models", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a007/1mLMlF3jiVO", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a112", "title": "GBEx - towards Graph-Based Explanations", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a112/1pP3y6BWUTe", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378034", "title": "Evaluating MASHAP as a faster alternative to LIME for model-agnostic machine learning interpretability", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378034/1s64SHZshUs", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2021/4488/0/448800a090", "title": "Improving Object Recognition in Crime Scenes via Local Interpretable Model-Agnostic Explanations", "doi": null, "abstractUrl": "/proceedings-article/edocw/2021/448800a090/1yZ5DQlUVIA", "parentPublication": { "id": "proceedings/edocw/2021/4488/0", "title": "2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxX3uMV", "title": "2011 Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNrAMF4F", "doi": "10.1109/FIE.2011.6142732", "title": "Work in progress — Technical freehand sketching", "normalizedTitle": "Work in progress — Technical freehand sketching", "abstract": "In the past all engineering students took a drafting class. This involved the use of T-squares, triangles, architectural scales, pounce, eraser shields, bow compasses, pencils, and patience. It gave students a sense of how drawings and diagrams are made and used. As new subjects have come into the curriculum most engineering programs have dropped the drafting requirement, or at least replaced it with a computer-based CAD course. Also dropped, as a consequence, is the ability of engineering students to visually express the ideas they see in class and those that form in their heads. This paper describes the effort to address this change. This project is the result of a joint effort between an engineering and an art professor to empower students with the simple skills of producing reliable hand drawings for their notes and when expressing their design ideas. The result is a one-hour, lunch-time seminar open to engineering and science students to improve their technical freehand sketching techniques. They were coached by both professors in the techniques of hand sketching, including drawing straight and orthogonal lines, circles and ellipses, 2- and 3-D diagrams, graphs and charts, and labeling and lettering. Specific activities were used to gauge the improvement by the students as they progressed through the one-semester mini-course. This paper shares the best and the worst of this endeavor. This work was supported in part by a grant from the Professional Development Committee of SUNY Adirondack.", "abstracts": [ { "abstractType": "Regular", "content": "In the past all engineering students took a drafting class. This involved the use of T-squares, triangles, architectural scales, pounce, eraser shields, bow compasses, pencils, and patience. It gave students a sense of how drawings and diagrams are made and used. As new subjects have come into the curriculum most engineering programs have dropped the drafting requirement, or at least replaced it with a computer-based CAD course. Also dropped, as a consequence, is the ability of engineering students to visually express the ideas they see in class and those that form in their heads. This paper describes the effort to address this change. This project is the result of a joint effort between an engineering and an art professor to empower students with the simple skills of producing reliable hand drawings for their notes and when expressing their design ideas. The result is a one-hour, lunch-time seminar open to engineering and science students to improve their technical freehand sketching techniques. They were coached by both professors in the techniques of hand sketching, including drawing straight and orthogonal lines, circles and ellipses, 2- and 3-D diagrams, graphs and charts, and labeling and lettering. Specific activities were used to gauge the improvement by the students as they progressed through the one-semester mini-course. This paper shares the best and the worst of this endeavor. This work was supported in part by a grant from the Professional Development Committee of SUNY Adirondack.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the past all engineering students took a drafting class. This involved the use of T-squares, triangles, architectural scales, pounce, eraser shields, bow compasses, pencils, and patience. It gave students a sense of how drawings and diagrams are made and used. As new subjects have come into the curriculum most engineering programs have dropped the drafting requirement, or at least replaced it with a computer-based CAD course. Also dropped, as a consequence, is the ability of engineering students to visually express the ideas they see in class and those that form in their heads. This paper describes the effort to address this change. This project is the result of a joint effort between an engineering and an art professor to empower students with the simple skills of producing reliable hand drawings for their notes and when expressing their design ideas. The result is a one-hour, lunch-time seminar open to engineering and science students to improve their technical freehand sketching techniques. They were coached by both professors in the techniques of hand sketching, including drawing straight and orthogonal lines, circles and ellipses, 2- and 3-D diagrams, graphs and charts, and labeling and lettering. Specific activities were used to gauge the improvement by the students as they progressed through the one-semester mini-course. This paper shares the best and the worst of this endeavor. This work was supported in part by a grant from the Professional Development Committee of SUNY Adirondack.", "fno": "06142732", "keywords": [ "CAD", "Computer Aided Instruction", "Educational Courses", "Engineering Education", "Technical Freehand Sketching Technique", "Drafting Class", "Engineering Students", "T Squares", "Architectural Scales", "Pounce", "Eraser Shields", "Bow Compasses", "Engineering Programs", "Computer Based CAD Course", "Science Students", "3 D Diagrams", "One Semester Minicourse", "Professional Development Committee", "SUNY Adirondack", "Bicycles", "Art", "Engineering Students", "Design Automation", "Visualization", "Conferences", "Lead", "Drawing", "Sketching", "Design", "Drafting" ], "authors": [ { "affiliation": "SUNY Adirondack", "fullName": "Kenneth S. Manning", "givenName": "Kenneth S.", "surname": "Manning", "__typename": "ArticleAuthorType" }, { "affiliation": "SUNY Adirondack", "fullName": "John Hampshire", "givenName": "John", "surname": "Hampshire", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "F1C-1-F1C-2", "year": "2011", "issn": "0190-5848", "isbn": "978-1-61284-468-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06142731", "articleId": "12OmNx1qV1J", "__typename": "AdjacentArticleType" }, "next": { "fno": "06142733", "articleId": "12OmNCfSqRa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2011/468/0/06143044", "title": "Work in progress — Modeling academic success of female and minority engineering students using the student attitudinal success instrument and pre-college factors", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06143044/12OmNAFWORT", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142710", "title": "Work in progress — Effective teaching of technical teamwork to large cohorts of engineering students in China", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142710/12OmNC2xhyA", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01612092", "title": "Work in progress - unified technical writing guidelines for engineering courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612092/12OmNs0TKJT", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142806", "title": "Work in progress — A grand challenge leadership course for engineering students", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142806/12OmNvSKNZb", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684814", "title": "Interactive sketching in multi-touch digital books. A prototype for technical graphics", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684814/12OmNvm6VGu", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01612273", "title": "Work in Progress - The Worldview of Engineering Students", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612273/12OmNxVDuQe", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06143122", "title": "Work in progress — Engineering math with EARLY BIRD", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06143122/12OmNxwWoRo", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462337", "title": "Work in progress: What is critical thinking?", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462337/12OmNyRPgzQ", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962634", "title": "Work In Progress: An Object Assembly Test of Sketching in Undergraduate Engineering", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962634/1IHnKIqgCbu", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637338", "title": "Sketching Assessment in Engineering Education: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637338/1zuvJwMmZgs", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs5rkLQ", "title": "35th Annual Frontiers in Education", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNx7ov1C", "doi": "10.1109/FIE.2005.1611923", "title": "Special session - user-observation and sketching as core stages in the software design process", "normalizedTitle": "Special session - user-observation and sketching as core stages in the software design process", "abstract": "This interactive session focuses on user-observation and sketching, two of the least practiced and taught components of good software design. Attendees will experience how a rapid cycle of user observation, ideation, presentation, and feedback can quickly produce excellent design concepts by taking advantage of multiple levels of group intelligence: individuals, small groups, and groups of groups. It is expected that participants will develop an understanding of why these steps are crucial to the software design process and an understanding of how to incorporate these steps into their software design courses", "abstracts": [ { "abstractType": "Regular", "content": "This interactive session focuses on user-observation and sketching, two of the least practiced and taught components of good software design. Attendees will experience how a rapid cycle of user observation, ideation, presentation, and feedback can quickly produce excellent design concepts by taking advantage of multiple levels of group intelligence: individuals, small groups, and groups of groups. It is expected that participants will develop an understanding of why these steps are crucial to the software design process and an understanding of how to incorporate these steps into their software design courses", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This interactive session focuses on user-observation and sketching, two of the least practiced and taught components of good software design. Attendees will experience how a rapid cycle of user observation, ideation, presentation, and feedback can quickly produce excellent design concepts by taking advantage of multiple levels of group intelligence: individuals, small groups, and groups of groups. It is expected that participants will develop an understanding of why these steps are crucial to the software design process and an understanding of how to incorporate these steps into their software design courses", "fno": "01611923", "keywords": [ "Computer Science Education", "Educational Courses", "Software Engineering", "Software Design Process", "Sketching", "Group Intelligence", "Software Design Courses", "Software Design", "Product Design", "Computer Science", "Project Management", "Technology Management", "Analytical Models", "Feedback", "Application Software", "Prototypes", "Power Generation", "Creativity", "Ideation", "Sketching", "Software Design", "User Observation" ], "authors": [ { "affiliation": "Center for Urban Simulation & Policy Anal., Washington Univ., WA, USA", "fullName": "D. Socha", "givenName": "D.", "surname": "Socha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "S. Walter", "givenName": "S.", "surname": "Walter", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "T3A-1-2", "year": "2005", "issn": "0190-5848", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01611922", "articleId": "12OmNxEjY91", "__typename": "AdjacentArticleType" }, "next": { "fno": "01611924", "articleId": "12OmNyL0Tzl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2011/468/0/06142878", "title": "Work in progress &#x2014; An agile embedded systems design capstone course", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142878/12OmNCfjeAw", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/3/00493184", "title": "Project teams: profiles and member perceptions-implications for group support system research and products", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00493184/12OmNwFRp7X", "parentPublication": { "id": "proceedings/hicss/1996/7324/3", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a228", "title": "A Study on the Acceptance of Computer-Supported Morphological Analysis", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a228/12OmNwdL7hM", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190560", "title": "Special session: Learning design thinking using engineering case studies", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190560/12OmNylbouh", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2007/1255/0/04362645", "title": "The Social Context of Software Maintenance", "doi": null, "abstractUrl": "/proceedings-article/icsm/2007/04362645/12OmNzUgd34", "parentPublication": { "id": "proceedings/icsm/2007/1255/0", "title": "2007 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1992/3000/0/00217596", "title": "How the use of the STePS method can improve software quality and aid project management", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1992/00217596/12OmNzYwbTG", "parentPublication": { "id": "proceedings/cmpsac/1992/3000/0", "title": "1992 Proceedings. The Sixteenth Annual International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08421591", "title": "Model-Guided 3D Sketching", "doi": null, "abstractUrl": "/journal/tg/2019/10/08421591/13rRUEgs2Mb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2022/06/09928230", "title": "The Importance of a Usage-Centric Approach", "doi": null, "abstractUrl": "/magazine/so/2022/06/09928230/1HJuB3VvelW", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2003/1875/0/01183626", "title": "Special session: web computing", "doi": null, "abstractUrl": "/proceedings-article/pdp/2003/01183626/1h0Rko2Zkkw", "parentPublication": { "id": "proceedings/pdp/2003/1875/0", "title": "Eleventh Euromicro Conference on Parallel, Distributed and Network-Based Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2020/7438/0/09218186", "title": "Quality Requirements Elicitation by Ideation of Product Quality Risks with Design Thinking", "doi": null, "abstractUrl": "/proceedings-article/re/2020/09218186/1nMQvg8Au1G", "parentPublication": { "id": "proceedings/re/2020/7438/0", "title": "2020 IEEE 28th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz61dBt", "title": "2010 14th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNxuXcA3", "doi": "10.1109/IV.2010.56", "title": "Choosing Knowledge Visualizations to Augment Cognition: The Managers' View", "normalizedTitle": "Choosing Knowledge Visualizations to Augment Cognition: The Managers' View", "abstract": "Growing evidence in the scientific literature and in organizations shows the positive impact of employing conceptual visual representation for individual reasoning, communicating and facilitating meetings in organizations. 116 managers responded a questionnaire on the usefulness of 12 common business visualizations for typical knowledge tasks in organizations. The resulting ranking provides an overview of the comparative suitability of visualizations for generating ideas, sharing knowledge, evaluating options and planning. The findings can be used by organizations for evaluating visual templates as a support for specific knowledge tasks. Theoretical implications include the relationship between the structure level of knowledge visualization forms and convergent/divergent task type. Further implications for theory and practice are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Growing evidence in the scientific literature and in organizations shows the positive impact of employing conceptual visual representation for individual reasoning, communicating and facilitating meetings in organizations. 116 managers responded a questionnaire on the usefulness of 12 common business visualizations for typical knowledge tasks in organizations. The resulting ranking provides an overview of the comparative suitability of visualizations for generating ideas, sharing knowledge, evaluating options and planning. The findings can be used by organizations for evaluating visual templates as a support for specific knowledge tasks. Theoretical implications include the relationship between the structure level of knowledge visualization forms and convergent/divergent task type. Further implications for theory and practice are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Growing evidence in the scientific literature and in organizations shows the positive impact of employing conceptual visual representation for individual reasoning, communicating and facilitating meetings in organizations. 116 managers responded a questionnaire on the usefulness of 12 common business visualizations for typical knowledge tasks in organizations. The resulting ranking provides an overview of the comparative suitability of visualizations for generating ideas, sharing knowledge, evaluating options and planning. The findings can be used by organizations for evaluating visual templates as a support for specific knowledge tasks. Theoretical implications include the relationship between the structure level of knowledge visualization forms and convergent/divergent task type. Further implications for theory and practice are discussed.", "fno": "05571231", "keywords": [ "Cognition", "Data Visualisation", "Knowledge Engineering", "Knowledge Visualizations", "Cognition", "Conceptual Visual Representation", "Business Visualizations", "Knowledge Tasks", "Visualization", "Cognition", "Planning", "Bridges", "Companies", "Knowledge Work", "Business Representation", "Conceptual Visualization" ], "authors": [ { "affiliation": null, "fullName": "Sabrina Bresciani", "givenName": "Sabrina", "surname": "Bresciani", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Martin J. Eppler", "givenName": "Martin J.", "surname": "Eppler", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "355-360", "year": "2010", "issn": "1550-6037", "isbn": "978-1-4244-7846-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05571238", "articleId": "12OmNvjyxv7", "__typename": "AdjacentArticleType" }, "next": { "fno": "05571232", "articleId": "12OmNC2fGpK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004064", "title": "Listening to Managers: A Study about Visualizations in Corporate Presentations", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004064/12OmNqBbHF8", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2000/0798/0/07980043", "title": "Should Users Inhabit Visualizations?", "doi": null, "abstractUrl": "/proceedings-article/wetice/2000/07980043/12OmNvSbBA2", "parentPublication": { "id": "proceedings/wetice/2000/0798/0", "title": "Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2013/4797/0/06596147", "title": "On the faithfulness of graph visualizations", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596147/12OmNwCJON7", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017624", "title": "Imagining Replications: Graphical Prediction & Discrete Visualizations Improve Recall & Estimation of Effect Uncertainty", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017624/13rRUIM2VH5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539348", "title": "The Attraction Effect in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539348/13rRUwj7cpe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122053", "title": "Evaluation of Trend Localization with Multi-Variate Visualizations", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122053/13rRUxC0SEf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477126", "title": "Topic-Based Exploration and Embedded Visualizations for Research Idea Generation", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477126/14jQfS42dQ4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454489", "title": "Patterns and Pace: Quantifying Diverse Exploration Behavior with Visualizations on the Web", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454489/17D45W1Oa3s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09217952", "title": "A Bayesian cognition approach for belief updating of correlation judgement through uncertainty visualizations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09217952/1nL7qhcUKPe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222102", "title": "Communicative Visualizations as a Learning Problem", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222102/1nTr1JohElO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBscCYC", "title": "1988 International Conference on Computer Integrated Manufacturing", "acronym": "cim", "groupId": "1000133", "volume": "0", "displayVolume": "0", "year": "1988", "__typename": "ProceedingType" }, "article": { "id": "12OmNy7Qfuh", "doi": "10.1109/CIM.1988.5403", "title": "Integration of design, planning, and manufacturing subsystems in sheet metal processing", "normalizedTitle": "Integration of design, planning, and manufacturing subsystems in sheet metal processing", "abstract": "The elements and integration are described of a prototype manufacturing system which achieves a fully automated link between all CIM (computer-integrated manufacturing) functions from design to machine output. A generative computer-aided process-planning module operates directly on CAD exchange files, supplying part process information to a master production compiler. The compiler, in turn, combines small parts into standard sheet metal sizes and then issues efficient NC process instructions to a punch-and-shear machine series.<>", "abstracts": [ { "abstractType": "Regular", "content": "The elements and integration are described of a prototype manufacturing system which achieves a fully automated link between all CIM (computer-integrated manufacturing) functions from design to machine output. A generative computer-aided process-planning module operates directly on CAD exchange files, supplying part process information to a master production compiler. The compiler, in turn, combines small parts into standard sheet metal sizes and then issues efficient NC process instructions to a punch-and-shear machine series.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The elements and integration are described of a prototype manufacturing system which achieves a fully automated link between all CIM (computer-integrated manufacturing) functions from design to machine output. A generative computer-aided process-planning module operates directly on CAD exchange files, supplying part process information to a master production compiler. The compiler, in turn, combines small parts into standard sheet metal sizes and then issues efficient NC process instructions to a punch-and-shear machine series.", "fno": "00005403", "keywords": [ "CAD CAM", "Computerised Numerical Control", "Metallurgical Industries", "Process Computer Control", "Production Control", "Design", "Planning", "Manufacturing", "Sheet Metal Processing", "CIM", "Computer Integrated Manufacturing", "Computer Aided Process Planning Module", "CAD Exchange Files", "Part Process Information", "Master Production Compiler", "NC Process Instructions", "Punch And Shear Machine", "Process Planning", "Manufacturing Processes", "Sheet Metal Processing", "Production", "Job Shop Scheduling", "Computer Aided Manufacturing", "Elevators", "Prototypes", "Design Automation", "Manufacturing Automation" ], "authors": [ { "affiliation": "Sch. of Bus., Louisville Univ., KY, USA", "fullName": "T.M. Hancock", "givenName": "T.M.", "surname": "Hancock", "__typename": "ArticleAuthorType" } ], "idPrefix": "cim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1988-01-01T00:00:00", "pubType": "proceedings", "pages": "138,139,140,141,142,143", "year": "1988", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00005402", "articleId": "12OmNAio72o", "__typename": "AdjacentArticleType" }, "next": { "fno": "00005404", "articleId": "12OmNyugyK0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2009/3804/2/3804b363", "title": "A Framework for Measurement and Analysis of Sheet Metal Parts", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804b363/12OmNBubOSu", "parentPublication": { "id": "proceedings/icicta/2009/3804/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cimat/1994/6510/0/00389072", "title": "Manufacturing globalization: new challenges for the computer-integrated manufacturing", "doi": null, "abstractUrl": "/proceedings-article/cimat/1994/00389072/12OmNCfjeAa", "parentPublication": { "id": "proceedings/cimat/1994/6510/0", "title": "Proceedings of the Fourth International Conference on Computer Integrated Manufacturing and Automation Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1980/020/0/01585239", "title": "Automation of Sheet Metal Design and Manufacturing", "doi": null, "abstractUrl": "/proceedings-article/dac/1980/01585239/12OmNx3q71D", "parentPublication": { "id": "proceedings/dac/1980/020/0", "title": "17th Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2013/5016/0/5016b043", "title": "Research on Computer Integrated Manufacturing System", "doi": null, "abstractUrl": "/proceedings-article/icdma/2013/5016b043/12OmNy314a0", "parentPublication": { "id": "proceedings/icdma/2013/5016/0", "title": "2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031c952", "title": "Research on Multi-head Stretch Forming Technology of Sheet Metal", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031c952/12OmNyFCvQm", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1983/0026/0/01585730", "title": "CAD/CAM - The Foundation for Computer Integrated Manufacturing", "doi": null, "abstractUrl": "/proceedings-article/dac/1983/01585730/12OmNyeECE7", "parentPublication": { "id": "proceedings/dac/1983/0026/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isatp/1995/6995/0/69950305", "title": "Integration of metal cutting tool resharpening into manufacturing process planning", "doi": null, "abstractUrl": "/proceedings-article/isatp/1995/69950305/12OmNzBOi6h", "parentPublication": { "id": "proceedings/isatp/1995/6995/0", "title": "Assembly and Task Planning, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/2/4296c729", "title": "Numerical Stimulation and Optimization of Process Chain in High Pressure Sheet Metal Forming", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296c729/12OmNzXFoGY", "parentPublication": { "id": "proceedings/icmtma/2011/4296/2", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccie/2010/4026/2/4026b397", "title": "Research on Metal Flow Behavior and Forming Force in Sheet Metal Extrusion Process", "doi": null, "abstractUrl": "/proceedings-article/ccie/2010/4026b397/12OmNzb7Zlp", "parentPublication": { "id": "proceedings/ccie/2010/4026/2", "title": "Computing, Control and Industrial Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2011/4455/0/4455a429", "title": "Dimensional Variation Analysis of Compliant Sheet Metal Assembly", "doi": null, "abstractUrl": "/proceedings-article/icdma/2011/4455a429/12OmNzlD9ka", "parentPublication": { "id": "proceedings/icdma/2011/4455/0", "title": "2011 Second International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC4b", "title": "2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2012)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyKa6b2", "doi": "10.1109/VLHCC.2012.6344479", "title": "A combination of stroke manipulation and recognition strategies to support user interface construction and interactive behavior definition through sketching", "normalizedTitle": "A combination of stroke manipulation and recognition strategies to support user interface construction and interactive behavior definition through sketching", "abstract": "To realize the full potential of pen-based interfaces, it is important to provide adequate support to sketching, comparable to paper and pencil. This kind of support is paramount for highly flexible activities, such as user interface sketching. This paper discusses an implementation of a few recognition strategies to support this kind of activity, presenting accuracy test results for each one.", "abstracts": [ { "abstractType": "Regular", "content": "To realize the full potential of pen-based interfaces, it is important to provide adequate support to sketching, comparable to paper and pencil. This kind of support is paramount for highly flexible activities, such as user interface sketching. This paper discusses an implementation of a few recognition strategies to support this kind of activity, presenting accuracy test results for each one.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To realize the full potential of pen-based interfaces, it is important to provide adequate support to sketching, comparable to paper and pencil. This kind of support is paramount for highly flexible activities, such as user interface sketching. This paper discusses an implementation of a few recognition strategies to support this kind of activity, presenting accuracy test results for each one.", "fno": "06344479", "keywords": [ "Shape", "User Interfaces", "Approximation Algorithms", "Visualization", "Prototypes", "Algorithm Design And Analysis", "Human Factors", "Graphical User Interface", "User Interfaces", "Human Computer Interaction", "Software Prototyping", "Pen Input", "Shape Recognition" ], "authors": [ { "affiliation": "Dept. de Inf., PUC-Rio, Sao Vicente, Brazil", "fullName": "V. C. V. B. Segura", "givenName": "V. C. V. B.", "surname": "Segura", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. de Inf., PUC-Rio, Sao Vicente, Brazil", "fullName": "S. D. J. Barbosa", "givenName": "S. D. J.", "surname": "Barbosa", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "45-48", "year": "2012", "issn": "1943-6092", "isbn": "978-1-4673-0852-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06344478", "articleId": "12OmNvoWUWj", "__typename": "AdjacentArticleType" }, "next": { "fno": "06344480", "articleId": "12OmNrNh0KH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acii/2009/4800/0/05349527", "title": "Roll and rock: Exploring the affective loop in a pen", "doi": null, "abstractUrl": "/proceedings-article/acii/2009/05349527/12OmNARiM2V", "parentPublication": { "id": "proceedings/acii/2009/4800/0", "title": "2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (ACII 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/08099913", "title": "Network Sketching: Exploiting Binary Structure in Deep CNNs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/08099913/12OmNC1Guee", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2012/2262/0/06424438", "title": "Procedural Analysis of a Sketching Activity: Principles and Applications", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2012/06424438/12OmNC4eSvC", "parentPublication": { "id": "proceedings/icfhr/2012/2262/0", "title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815042", "title": "InSide: Interactive Sketching for Image Database Exploration", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815042/12OmNCmpcGZ", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2011/0445/0/04450808", "title": "Sketching tools for ideation: NIER track", "doi": null, "abstractUrl": "/proceedings-article/icse/2011/04450808/12OmNqBKUbW", "parentPublication": { "id": "proceedings/icse/2011/0445/0", "title": "2011 33rd International Conference on Software Engineering (ICSE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i867", "title": "Sketch Recognition Based Intelligent Whiteboard Teaching System", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i867/12OmNqN6QZu", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/2000/0840/0/08400225", "title": "Visual Languages for Sketching Documents", "doi": null, "abstractUrl": "/proceedings-article/vl/2000/08400225/12OmNx7XHak", "parentPublication": { "id": "proceedings/vl/2000/0840/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492785", "title": "The Planar: an interdisciplinary approach to a VR enabled tool for generation and manipulation of 3D data in industrial environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492785/12OmNx9FhSe", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07871004", "title": "Sketching Gesture-Based Applications in a Collaborative Working Environment with Wall-Sized Displays", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07871004/12OmNxbEtOu", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2010/8485/0/05635226", "title": "Sketching and Drawing in the Design of Open Source Software", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635226/12OmNzYwbV0", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxTEiSA", "title": "Proceedings - 13th International Conference on Software Engineering", "acronym": "icse", "groupId": "1000691", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNyKrH7c", "doi": "10.1109/ICSE.1991.130618", "title": "A methodology for prototyping-in-the-large", "normalizedTitle": "A methodology for prototyping-in-the-large", "abstract": "The authors define prototyping as an experimental activity intended to reduce risk of failure in a software product. In this context, they explore the effect of scale in prototyping and then describe a methodology for prototyping a large application. The authors describe a system being developed to evaluate this methodology, featuring a pair of languages (Promo and Moblog) to serve both large-scale and component-level prototyping needs. The authors conclude with a presentation of how the proposed methodology would be applied to a sample problem, a fault-prediction subsystem within the Space Station Freedom project.<>", "abstracts": [ { "abstractType": "Regular", "content": "The authors define prototyping as an experimental activity intended to reduce risk of failure in a software product. In this context, they explore the effect of scale in prototyping and then describe a methodology for prototyping a large application. The authors describe a system being developed to evaluate this methodology, featuring a pair of languages (Promo and Moblog) to serve both large-scale and component-level prototyping needs. The authors conclude with a presentation of how the proposed methodology would be applied to a sample problem, a fault-prediction subsystem within the Space Station Freedom project.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The authors define prototyping as an experimental activity intended to reduce risk of failure in a software product. In this context, they explore the effect of scale in prototyping and then describe a methodology for prototyping a large application. The authors describe a system being developed to evaluate this methodology, featuring a pair of languages (Promo and Moblog) to serve both large-scale and component-level prototyping needs. The authors conclude with a presentation of how the proposed methodology would be applied to a sample problem, a fault-prediction subsystem within the Space Station Freedom project.", "fno": "00130618", "keywords": [ "High Level Languages", "Software Prototyping", "Large Scale Prototyping", "Prototyping In The Large", "Scale", "Languages", "Promo", "Moblog", "Component Level Prototyping", "Fault Prediction Subsystem", "Space Station Freedom Project", "Prototypes", "Software Prototyping", "Large Scale Systems", "Application Software", "Programming Profession", "Costs", "Environmental Economics", "Visualization", "Computer Science", "Educational Institutions" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Maryland Univ., College Park, MD, USA", "fullName": "J. Purtilo", "givenName": "J.", "surname": "Purtilo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "A. Larson", "givenName": "A.", "surname": "Larson", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Clark", "givenName": "J.", "surname": "Clark", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "2,3,4,5,6,7,8,9,10,11,12", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": null, "next": { "fno": "00130619", "articleId": "12OmNxdVgZZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwrsp/1991/3040/0/00218625", "title": "Complex system prototyping using environment abstraction", "doi": null, "abstractUrl": "/proceedings-article/iwrsp/1991/00218625/12OmNBqdr7D", "parentPublication": { "id": "proceedings/iwrsp/1991/3040/0", "title": "The Second International Workshop on Rapid System Prototyping", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijsis/1996/7728/0/77280208", "title": "A methodology of complicated mechanical systems virtual prototyping", "doi": null, "abstractUrl": "/proceedings-article/ijsis/1996/77280208/12OmNCeK2b6", "parentPublication": { "id": "proceedings/ijsis/1996/7728/0", "title": "Intelligence and Systems, IEEE International Joint Symposia on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rsp/1997/8064/0/80640091", "title": "FrameKit and the prototyping of CASE environments", "doi": null, "abstractUrl": "/proceedings-article/rsp/1997/80640091/12OmNvCRgjA", "parentPublication": { "id": "proceedings/rsp/1997/8064/0", "title": "Rapid System Prototyping, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwrsp/1991/3040/0/00218621", "title": "An application of template methodology: rapid prototyping of user interface management systems", "doi": null, "abstractUrl": "/proceedings-article/iwrsp/1991/00218621/12OmNwCJOJg", "parentPublication": { "id": "proceedings/iwrsp/1991/3040/0", "title": "The Second International Workshop on Rapid System Prototyping", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/alpit/2007/2930/0/2930a329", "title": "The Embedded Prototyping System for Car Based on Object", "doi": null, "abstractUrl": "/proceedings-article/alpit/2007/2930a329/12OmNwDj0Z7", "parentPublication": { "id": "proceedings/alpit/2007/2930/0", "title": "Advanced Language Processing and Web Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpeur/1992/2760/0/00218462", "title": "Performance prototyping: a simulation methodology for software performance engineering", "doi": null, "abstractUrl": "/proceedings-article/cmpeur/1992/00218462/12OmNwtWfKU", "parentPublication": { "id": "proceedings/cmpeur/1992/2760/0", "title": "1992 Proceedings Computer Systems and Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsi/1992/2697/0/00217272", "title": "Software prototyping with MicroSTEP", "doi": null, "abstractUrl": "/proceedings-article/icsi/1992/00217272/12OmNy1SFJM", "parentPublication": { "id": "proceedings/icsi/1992/2697/0", "title": "Proceedings of the Second International Conference on Systems Integration", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wvl/1988/0876/0/00018024", "title": "A visual environment for system design and prototyping", "doi": null, "abstractUrl": "/proceedings-article/wvl/1988/00018024/12OmNyUnEKV", "parentPublication": { "id": "proceedings/wvl/1988/0876/0", "title": "1988 IEEE Workshop on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1990/2054/0/00139329", "title": "Specification of a rapid prototyping capability for the automated patent system", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1990/00139329/12OmNyrqzEf", "parentPublication": { "id": "proceedings/cmpsac/1990/2054/0", "title": "Proceedings Fourteenth Annual International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2008/03/mpc2008030024", "title": "Engineered Reality: Prototyping Inventions for Television", "doi": null, "abstractUrl": "/magazine/pc/2008/03/mpc2008030024/13rRUwciPgc", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwogh4y", "title": "2017 5th International Conference in Software Engineering Research and Innovation (CONISOFT)", "acronym": "conisoft", "groupId": "1813285", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRPgPd", "doi": "10.1109/CONISOFT.2017.00029", "title": "Impact of Technology in Collaborative and Interactive Programming Activities: Gathering Children's Feedback", "normalizedTitle": "Impact of Technology in Collaborative and Interactive Programming Activities: Gathering Children's Feedback", "abstract": "Visual programming tools are a great mean for introducing children to programming and to develop a skill set for algorithmic thinking. Collaborative learning and pair programming have demonstrated to have social and learning benefits. However, some of the online programming tools available for children are not designed to allow simultaneous and equitable participation of team members since they allow only for a single control point. In this paper, a preliminary study to cull ideas, insights, and design considerations for a formal programming course for children aged 8-10 using collaborative learning as a pedagogical approach is presented. Three setups were provided: 1) lo-fi prototype, 2) PC, 3) a 46” multi-touch display limited by the application to a single touch entry. Children played a “user” role and provided feedback at the end of the sessions. The feedback provided was mixed, regarding their setup preference, but they all agree to like teamwork.", "abstracts": [ { "abstractType": "Regular", "content": "Visual programming tools are a great mean for introducing children to programming and to develop a skill set for algorithmic thinking. Collaborative learning and pair programming have demonstrated to have social and learning benefits. However, some of the online programming tools available for children are not designed to allow simultaneous and equitable participation of team members since they allow only for a single control point. In this paper, a preliminary study to cull ideas, insights, and design considerations for a formal programming course for children aged 8-10 using collaborative learning as a pedagogical approach is presented. Three setups were provided: 1) lo-fi prototype, 2) PC, 3) a 46” multi-touch display limited by the application to a single touch entry. Children played a “user” role and provided feedback at the end of the sessions. The feedback provided was mixed, regarding their setup preference, but they all agree to like teamwork.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual programming tools are a great mean for introducing children to programming and to develop a skill set for algorithmic thinking. Collaborative learning and pair programming have demonstrated to have social and learning benefits. However, some of the online programming tools available for children are not designed to allow simultaneous and equitable participation of team members since they allow only for a single control point. In this paper, a preliminary study to cull ideas, insights, and design considerations for a formal programming course for children aged 8-10 using collaborative learning as a pedagogical approach is presented. Three setups were provided: 1) lo-fi prototype, 2) PC, 3) a 46” multi-touch display limited by the application to a single touch entry. Children played a “user” role and provided feedback at the end of the sessions. The feedback provided was mixed, regarding their setup preference, but they all agree to like teamwork.", "fno": "395601a179", "keywords": [ "Computer Aided Instruction", "Computer Science Education", "Educational Courses", "Human Computer Interaction", "Human Factors", "Interactive Systems", "Touch Sensitive Screens", "Visual Programming", "Single Control Point", "Formal Programming Course", "Collaborative Learning", "Single Touch Entry", "Interactive Programming Activities", "Visual Programming Tools", "Algorithmic Thinking", "Pair Programming", "Online Programming Tools", "Children Feedback", "Collaborative Programming Activities", "Multitouch Display", "Lo Fi Prototype", "Programming Profession", "Tools", "Prototypes", "Collaboration", "Collaborative Work", "Visualization", "Children", "Collaborative Programming", "Visual Programming", "Multi Touch Tabletop", "Lo FI Prototype" ], "authors": [ { "affiliation": null, "fullName": "Nadia S. Molina-Moreno", "givenName": "Nadia S.", "surname": "Molina-Moreno", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Maria S. Avila-Garcia", "givenName": "Maria S.", "surname": "Avila-Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marco Bianchetti", "givenName": "Marco", "surname": "Bianchetti", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Claudio-Gonzalez", "givenName": "David", "surname": "Claudio-Gonzalez", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marcelina Pantoja-Flores", "givenName": "Marcelina", "surname": "Pantoja-Flores", "__typename": "ArticleAuthorType" } ], "idPrefix": "conisoft", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "179-183", "year": "2017", "issn": null, "isbn": "978-1-5386-3956-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "395601a171", "articleId": "12OmNzd7bOf", "__typename": "AdjacentArticleType" }, "next": { "fno": "395601a184", "articleId": "12OmNvkpl67", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2005/876/0/04118546", "title": "In the company of readers: the digital library book as \"practiced place\"", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118546/12OmNAKM01s", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2012/4702/0/4702a134", "title": "Collaborative Reflection Activities with DynaLearn", "doi": null, "abstractUrl": "/proceedings-article/icalt/2012/4702a134/12OmNAkWvh3", "parentPublication": { "id": "proceedings/icalt/2012/4702/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/siie/2012/7/0/06403206", "title": "The importance of human factors to enhance the user experience in videogames", "doi": null, "abstractUrl": "/proceedings-article/siie/2012/06403206/12OmNBuL1mL", "parentPublication": { "id": "proceedings/siie/2012/7/0", "title": "2012 International Symposium on Computers in Education (SIIE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tabletop/2006/2494/0/01579196", "title": "Rotation and translation mechanisms for tabletop interaction", "doi": null, "abstractUrl": "/proceedings-article/tabletop/2006/01579196/12OmNwCaCwo", "parentPublication": { "id": "proceedings/tabletop/2006/2494/0", "title": "First IEEE International Workshop on Horizontal Interactive Human-Computer Systems 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a396", "title": "Impact of Using Creative Thinking Skills and Open Data on Programming Design in a Computer-Supported Collaborative Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a396/12OmNx4gUy2", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a176", "title": "Exploring New Interaction Mechanisms to Support Information Sharing and Collaboration Using Large Multi-touch Displays in the Context of Digital Storytelling", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a176/12OmNxH9XaV", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2012/2719/0/06337164", "title": "Using the Multi-Mouse Quiz System for Quiz Making Activities in an Elementary School", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2012/06337164/12OmNySG3Pn", "parentPublication": { "id": "proceedings/iiai-aai/2012/2719/0", "title": "2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/b&b/2017/2480/0/08120412", "title": "Towards collaborative block-based programming on digital tabletops", "doi": null, "abstractUrl": "/proceedings-article/b&b/2017/08120412/12OmNzG4gyS", "parentPublication": { "id": "proceedings/b&b/2017/2480/0", "title": "2017 IEEE Blocks and Beyond Workshop (B&B)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273950", "title": "Currents Trends in Use of Collaborative Learning in Teaching of Robotics and Programming &#x2013; A Systematic Review of Literature", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273950/1phRKVuSuHe", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a761", "title": "Developing Computational Thinking for Children with Autism using a Serious Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a761/1rSRclkCpzO", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZeH", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "acronym": "icmlc", "groupId": "1000424", "volume": "5", "displayVolume": "5", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNykCcfP", "doi": "10.1109/ICMLC.2003.1260138", "title": "A freehand sketchy graphic input system: SketchGIS", "normalizedTitle": "A freehand sketchy graphic input system: SketchGIS", "abstract": "Sketching is a natural and effective way to capture designer's brainstorms ideas. This paper presents a sketch-based graphics input system for conceptual design (SketchGIS), which is mainly based on online graphic recognition and dynamic user modeling. Online graphic recognition can discover latent primitive shapes among user-drawn strokes and show the regularized shape on the screen immediately based on spatial-relation graph (SRG) representation and conditioned partial matching by shape preparing, feature recognition, shape filtering and regularization. Dynamic user modeling method is used to recognize and predict sketchy composite shapes before they are completely drawn for user adaptation, which is based on the SVM-based incremental active learning method and the incremental decision tree induction method. Experiments show that the proposed method in this paper can yield good recognition precision, and the prototype system proposed provides fine user interaction effect, especially for UML diagramming.", "abstracts": [ { "abstractType": "Regular", "content": "Sketching is a natural and effective way to capture designer's brainstorms ideas. This paper presents a sketch-based graphics input system for conceptual design (SketchGIS), which is mainly based on online graphic recognition and dynamic user modeling. Online graphic recognition can discover latent primitive shapes among user-drawn strokes and show the regularized shape on the screen immediately based on spatial-relation graph (SRG) representation and conditioned partial matching by shape preparing, feature recognition, shape filtering and regularization. Dynamic user modeling method is used to recognize and predict sketchy composite shapes before they are completely drawn for user adaptation, which is based on the SVM-based incremental active learning method and the incremental decision tree induction method. Experiments show that the proposed method in this paper can yield good recognition precision, and the prototype system proposed provides fine user interaction effect, especially for UML diagramming.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Sketching is a natural and effective way to capture designer's brainstorms ideas. This paper presents a sketch-based graphics input system for conceptual design (SketchGIS), which is mainly based on online graphic recognition and dynamic user modeling. Online graphic recognition can discover latent primitive shapes among user-drawn strokes and show the regularized shape on the screen immediately based on spatial-relation graph (SRG) representation and conditioned partial matching by shape preparing, feature recognition, shape filtering and regularization. Dynamic user modeling method is used to recognize and predict sketchy composite shapes before they are completely drawn for user adaptation, which is based on the SVM-based incremental active learning method and the incremental decision tree induction method. Experiments show that the proposed method in this paper can yield good recognition precision, and the prototype system proposed provides fine user interaction effect, especially for UML diagramming.", "fno": "01260138", "keywords": [ "Support Vector Machines", "User Modelling", "Computer Graphics", "Learning Artificial Intelligence", "Decision Trees", "Feature Extraction", "Graphical User Interfaces", "Sketch Based Graphics Input System", "Sketch GIS", "Online Graphic Recognition", "Dynamic User Modeling", "Spatial Relation Graph", "Partial Matching", "Feature Recognition", "Shape Filtering", "Regularization", "SVM Based Incremental Active Learning Method", "Support Vector Machine", "Decision Tree Induction Method", "Prototype System", "UML Diagramming", "Feature Extraction", "Computer Graphics", "Shape", "Prototypes", "Learning Systems", "Unified Modeling Language", "Sun", "Computer Science", "Matched Filters", "Filtering", "Predictive Models" ], "authors": [ { "affiliation": "State Key Lab for Novel Software Technol., Nanjing Univ., China", "fullName": "Zheng-Xing Sun", "givenName": null, "surname": "Zheng-Xing Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab for Novel Software Technol., Nanjing Univ., China", "fullName": "Bin Zhang", "givenName": null, "surname": "Bin Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab for Novel Software Technol., Nanjing Univ., China", "fullName": "Qing-Hua Qiu", "givenName": null, "surname": "Qing-Hua Qiu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab for Novel Software Technol., Nanjing Univ., China", "fullName": "Li-Sha Zhang", "givenName": null, "surname": "Li-Sha Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmlc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "3232,3233,3234,3235,3236,3237", "year": "2003", "issn": null, "isbn": "0-7803-7865-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01260137", "articleId": "12OmNzw8jhK", "__typename": "AdjacentArticleType" }, "next": { "fno": "01260139", "articleId": "12OmNANkooU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vl/1994/6660/0/00363624", "title": "Visual programming: limits of graphic representation", "doi": null, "abstractUrl": "/proceedings-article/vl/1994/00363624/12OmNwkzune", "parentPublication": { "id": "proceedings/vl/1994/6660/0", "title": "Proceedings of 1994 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2001/1263/0/12630455", "title": "Learning of Structural Descriptions of Graphic Symbols Using Deformable Template Matching", "doi": null, "abstractUrl": "/proceedings-article/icdar/2001/12630455/12OmNx7ov55", "parentPublication": { "id": "proceedings/icdar/2001/1263/0", "title": "Proceedings of Sixth International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1979/9999/0/00729116", "title": "GUMBI - A Graphic User Microprogrammable Bit-slice Interpreter", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1979/00729116/12OmNxHryi6", "parentPublication": { "id": "proceedings/cmpcon/1979/9999/0", "title": "1979 Compcon Fall", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1979/9999/0/00729124", "title": "Color Graphic Design System for IC Mask", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1979/00729124/12OmNxYbT3H", "parentPublication": { "id": "proceedings/cmpcon/1979/9999/0", "title": "1979 Compcon Fall", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2001/1263/0/12631050", "title": "Smart Sketchpad - An On-line Graphics Recognition System", "doi": null, "abstractUrl": "/proceedings-article/icdar/2001/12631050/12OmNy68EGC", "parentPublication": { "id": "proceedings/icdar/2001/1263/0", "title": "Proceedings of Sixth International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/2/07502239", "title": "Hand-Drawn Symbol Recognition in Graphic Documents Using Deformable Template Matching and a Bayesian Framework", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07502239/12OmNzd7bq0", "parentPublication": { "id": "proceedings/icpr/2000/0750/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1993/3970/0/00269609", "title": "A comparison study of the pen and the mouse in editing graphic diagrams", "doi": null, "abstractUrl": "/proceedings-article/vl/1993/00269609/12OmNzd7buK", "parentPublication": { "id": "proceedings/vl/1993/3970/0", "title": "Proceedings 1993 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2018/6953/0/695301a249", "title": "A Study of Graphic Symbol Design Based on Visual Efficiency", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2018/695301a249/17D45WHONjm", "parentPublication": { "id": "proceedings/icsgea/2018/6953/0", "title": "2018 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/07/08948239", "title": "LayoutGAN: Synthesizing Graphic Layouts With Vector-Wireframe Adversarial Networks", "doi": null, "abstractUrl": "/journal/tp/2021/07/08948239/1geNB7KG1eE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ctmcd/2021/4856/0/485600a001", "title": "Reconstructing the New Significance of Combining Graphic Language &#x2014;&#x2014; Hand-drawn Graphic Language with Computer Graphics Language", "doi": null, "abstractUrl": "/proceedings-article/ctmcd/2021/485600a001/1uOupI43C24", "parentPublication": { "id": "proceedings/ctmcd/2021/4856/0", "title": "2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWc", "title": "IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures (ISVLSI'06)", "acronym": "isvlsid", "groupId": "1000807", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzYNNh5", "doi": "10.1109/ISVLSI.2006.87", "title": "System exploration of SystemC designs", "normalizedTitle": "System exploration of SystemC designs", "abstract": "Due to increasing design complexity new methodologies for system modeling have been established in VLSI CAD. The SystemC methodology gains a significant reduction of design cycles by introducing an executable specification and a top down refinement strategy. But still the size and the complexity of SystemC models grow, making it harder to understand the basic ideas architects and their designs intend. This extends the familiarization phase for coworkers and project partners. In modern design flows, this can become a significant problem. In this work, we present an approach for interactive system exploration of SystemC designs and its implementation. The aim of our approach is to facilitate the orientation towards complex SystemC models without the need for simulation based techniques. Our tool accomplishes system exploration by allowing to navigate hierarchically through SystemC designs. It uses schematic visualization at different levels of abstraction to display the structure and the behavior of the design. Further support is given for different schematic views, a source code view, crossprobing, path fragment navigation and module exploration.", "abstracts": [ { "abstractType": "Regular", "content": "Due to increasing design complexity new methodologies for system modeling have been established in VLSI CAD. The SystemC methodology gains a significant reduction of design cycles by introducing an executable specification and a top down refinement strategy. But still the size and the complexity of SystemC models grow, making it harder to understand the basic ideas architects and their designs intend. This extends the familiarization phase for coworkers and project partners. In modern design flows, this can become a significant problem. In this work, we present an approach for interactive system exploration of SystemC designs and its implementation. The aim of our approach is to facilitate the orientation towards complex SystemC models without the need for simulation based techniques. Our tool accomplishes system exploration by allowing to navigate hierarchically through SystemC designs. It uses schematic visualization at different levels of abstraction to display the structure and the behavior of the design. Further support is given for different schematic views, a source code view, crossprobing, path fragment navigation and module exploration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to increasing design complexity new methodologies for system modeling have been established in VLSI CAD. The SystemC methodology gains a significant reduction of design cycles by introducing an executable specification and a top down refinement strategy. But still the size and the complexity of SystemC models grow, making it harder to understand the basic ideas architects and their designs intend. This extends the familiarization phase for coworkers and project partners. In modern design flows, this can become a significant problem. In this work, we present an approach for interactive system exploration of SystemC designs and its implementation. The aim of our approach is to facilitate the orientation towards complex SystemC models without the need for simulation based techniques. Our tool accomplishes system exploration by allowing to navigate hierarchically through SystemC designs. It uses schematic visualization at different levels of abstraction to display the structure and the behavior of the design. Further support is given for different schematic views, a source code view, crossprobing, path fragment navigation and module exploration.", "fno": "01602461", "keywords": [ "Libraries", "Navigation", "Very Large Scale Integration", "Visualization", "Design Automation", "Electronic Design Automation And Methodology", "Computer Science", "Design Methodology", "Modeling", "Interactive Systems" ], "authors": [ { "affiliation": "Inst. of Comput. Sci., Bremen Univ., Germany", "fullName": "C. Genz", "givenName": "C.", "surname": "Genz", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Comput. Sci., Bremen Univ., Germany", "fullName": "R. Drechsler", "givenName": "R.", "surname": "Drechsler", "__typename": "ArticleAuthorType" } ], "idPrefix": "isvlsid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-06-01T00:00:00", "pubType": "proceedings", "pages": "6 pp.", "year": "2006", "issn": null, "isbn": "0-7695-2533-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01602472", "articleId": "12OmNvAiSAP", "__typename": "AdjacentArticleType" }, "next": { "fno": "01602462", "articleId": "12OmNyQGSks", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/date/2004/2085/1/208510538", "title": "High-Level System Modeling and Architecture Exploration with SystemC on a Network SoC: S3C2510 Case Study", "doi": null, "abstractUrl": "/proceedings-article/date/2004/208510538/12OmNBRbkpP", "parentPublication": { "id": "proceedings/date/2004/2085/3", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rsp/2005/2361/0/23610258", "title": "SyCE: An Integrated Environment for System Design in SystemC", "doi": null, "abstractUrl": "/proceedings-article/rsp/2005/23610258/12OmNCeaPV7", "parentPublication": { "id": "proceedings/rsp/2005/2361/0", "title": "Proceedings. The 16th International Workshop on Rapid System Prototyping (RSP 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ddecs/2013/6135/0/06549788", "title": "A static analysis approach to data race detection in SystemC designs", "doi": null, "abstractUrl": "/proceedings-article/ddecs/2013/06549788/12OmNqJHFv2", "parentPublication": { "id": "proceedings/ddecs/2013/6135/0", "title": "2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ahs/2008/3166/0/3166a354", "title": "TLM Platform Based on SystemC for STARSoC Design Space Exploration", "doi": null, "abstractUrl": "/proceedings-article/ahs/2008/3166a354/12OmNwMXnpK", "parentPublication": { "id": "proceedings/ahs/2008/3166/0", "title": "Adaptive Hardware and Systems, NASA/ESA Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/memcod/2004/8509/0/01459851", "title": "Checkers for SystemC designs", "doi": null, "abstractUrl": "/proceedings-article/memcod/2004/01459851/12OmNwbLVlm", "parentPublication": { "id": "proceedings/memcod/2004/8509/0", "title": "Proceedings. Second ACM and IEEE International Conference on Formal Methods and Models for Co-Design, MEMOCODE '04", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewdts/2016/0693/0/07807731", "title": "Power specification, simulation and verification of SystemC designs", "doi": null, "abstractUrl": "/proceedings-article/ewdts/2016/07807731/12OmNxXCGIt", "parentPublication": { "id": "proceedings/ewdts/2016/0693/0", "title": "2016 IEEE East-West Design & Test Symposium (EWDTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mtv/2009/6479/0/05460814", "title": "Mutation Operators for Concurrent SystemC Designs", "doi": null, "abstractUrl": "/proceedings-article/mtv/2009/05460814/12OmNzVGcNz", "parentPublication": { "id": "proceedings/mtv/2009/6479/0", "title": "2009 10th International Workshop on Microprocessor Test and Verification", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewdts/2015/7776/0/07493126", "title": "Automatic transformation of SystemC designs to speed up simulation", "doi": null, "abstractUrl": "/proceedings-article/ewdts/2015/07493126/12OmNzdoMNp", "parentPublication": { "id": "proceedings/ewdts/2015/7776/0", "title": "2015 IEEE East-West Design & Test Symposium (EWDTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ets/2010/5834/0/05512761", "title": "Automated conformance evaluation of SystemC designs using timed automata", "doi": null, "abstractUrl": "/proceedings-article/ets/2010/05512761/12OmNzllxYq", "parentPublication": { "id": "proceedings/ets/2010/5834/0", "title": "2010 15th IEEE European Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hldvt/2006/0679/0/04110089", "title": "Runtime Deadlock Analysis of SystemC Designs", "doi": null, "abstractUrl": "/proceedings-article/hldvt/2006/04110089/12OmNzsJ7Dw", "parentPublication": { "id": "proceedings/hldvt/2006/0679/0", "title": "2006 IEEE International High Level Design Validation and Test Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1C8FRdMr6vu", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "acronym": "icise-ie", "groupId": "1841104", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1C8GayTJHxe", "doi": "10.1109/ICISE-IE53922.2021.00254", "title": "Studies on International Discourse Construction of Chinese Literary Classics with the Approach of Computer-assisted Translation", "normalizedTitle": "Studies on International Discourse Construction of Chinese Literary Classics with the Approach of Computer-assisted Translation", "abstract": "To show more of the Chinese literary classics to the outside world, boost their influences and improve speech rights of Chinese nation in the new era, this dissertation, with the method of computer-assisted translation (CAT), concentrates on international discourse construction of Chinese literary classics by analyzing successful translation cases of Chinese literary classics as well as their common reasons for translation success, and strategies of discourse construction of Chinese Literary Classics. The study finds out scholars are dedicating to publicizing Chinese culture for long, that studies on medio-translatology have been paid much attention since 2015 in China, that The Analects of Confucius , Lv Xun's works, Shih Chi, Book of Poetry etc. are some successful translation cases we can refer to; that more elements like political background, cultural belief, potential readers' needs should be covered while choosing a source text and that some strategies of discourse construction are recommended.", "abstracts": [ { "abstractType": "Regular", "content": "To show more of the Chinese literary classics to the outside world, boost their influences and improve speech rights of Chinese nation in the new era, this dissertation, with the method of computer-assisted translation (CAT), concentrates on international discourse construction of Chinese literary classics by analyzing successful translation cases of Chinese literary classics as well as their common reasons for translation success, and strategies of discourse construction of Chinese Literary Classics. The study finds out scholars are dedicating to publicizing Chinese culture for long, that studies on medio-translatology have been paid much attention since 2015 in China, that The Analects of Confucius , Lv Xun's works, Shih Chi, Book of Poetry etc. are some successful translation cases we can refer to; that more elements like political background, cultural belief, potential readers' needs should be covered while choosing a source text and that some strategies of discourse construction are recommended.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To show more of the Chinese literary classics to the outside world, boost their influences and improve speech rights of Chinese nation in the new era, this dissertation, with the method of computer-assisted translation (CAT), concentrates on international discourse construction of Chinese literary classics by analyzing successful translation cases of Chinese literary classics as well as their common reasons for translation success, and strategies of discourse construction of Chinese Literary Classics. The study finds out scholars are dedicating to publicizing Chinese culture for long, that studies on medio-translatology have been paid much attention since 2015 in China, that The Analects of Confucius , Lv Xun's works, Shih Chi, Book of Poetry etc. are some successful translation cases we can refer to; that more elements like political background, cultural belief, potential readers' needs should be covered while choosing a source text and that some strategies of discourse construction are recommended.", "fno": "382900b123", "keywords": [ "Internet", "Language Translation", "Literature", "Politics", "Text Analysis", "Chinese Literary Classics", "Computer Assisted Translation", "Chinese Literary Classics", "International Discourse Construction", "Successful Translation Cases", "Information Science", "Education", "Linguistics", "Machine Translation", "Cultural Differences", "International Discourse Construction", "Chinese Literary Classics", "International Rights Of Speech", "CAT" ], "authors": [ { "affiliation": "Wuhan Business University, WBU,School of Foreign Languages,Wuhan", "fullName": "Chunye Yang", "givenName": "Chunye", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Hubei Urban Construction Vocational and Technological College,College of Civil Engineering,Wuhan", "fullName": "Defeng Xu", "givenName": "Defeng", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Business University, WBU,School of Foreign Languages,Wuhan", "fullName": "Xin Shen", "givenName": "Xin", "surname": "Shen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icise-ie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "1123-1126", "year": "2021", "issn": null, "isbn": "978-1-6654-3829-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "382900b119", "articleId": "1C8Gsr2B6SY", "__typename": "AdjacentArticleType" }, "next": { "fno": "382900b127", "articleId": "1C8G4RpKnK0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cinc/2009/3645/2/3645b498", "title": "Multilayer Anchor Alignment in AC-E Parallel Corpora of Chinese Tea Classics", "doi": null, "abstractUrl": "/proceedings-article/cinc/2009/3645b498/12OmNCf1DrF", "parentPublication": { "id": "cinc/2009/3645/2", "title": "Computational Intelligence and Natural Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470321", "title": "Theory and practice: A discourse-based translation strategy of Chinese Medicine", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470321/12OmNyL0Tu8", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2009/3888/1/3888a179", "title": "Intertextuality Computing of Chinese Tea Classics", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888a179/12OmNzWfoRa", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192666", "title": "Speculative Practices: Utilizing InfoVis to Explore Untapped Literary Collections", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192666/13rRUB7a113", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900a533", "title": "Thematic Progression from the Perspective of Machine Translation--A Case Study of Culture and Tourism Translation", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900a533/1C8G7VGX6Hm", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaie/2020/6659/0/665900a503", "title": "Discourse Analysis Model for Literary Works Appreciation and Evaluation by Regressive Analysis", "doi": null, "abstractUrl": "/proceedings-article/icaie/2020/665900a503/1oZBHUuzWRW", "parentPublication": { "id": "proceedings/icaie/2020/6659/0", "title": "2020 International Conference on Artificial Intelligence and Education (ICAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a130", "title": "Adaptability of English Literature Translation from the Perspective of Machine Learning Linguistics", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a130/1rSRh3fm69q", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2020/2261/0/226100a228", "title": "A Study of Influences of Big Data on Machine Translation and Enlightenment for Translation Teaching in Cross-cultural Communication", "doi": null, "abstractUrl": "/proceedings-article/icise/2020/226100a228/1tnY8REnPBm", "parentPublication": { "id": "proceedings/icise/2020/2261/0", "title": "2020 International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c381", "title": "A Study on the Reader Reception of English Translations of The Analects-Data Analysis with Python", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c381/1tzz7EN5NW8", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a412", "title": "A Study on the Portuguese Translation Strategies of Culturally Loaded Words in &#x201C;Frog&#x201D; from the Perspective of Manipulation Theory - Based on the comparison of machine translation and manual translation", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a412/1wHKnnze8SI", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ckrD0rVw1q", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ckrHhkvRw4", "doi": "10.1109/JCDL.2019.00094", "title": "Semantically Enriched Presentation for Cultural Heritage Image: A POI-Based Perspective", "normalizedTitle": "Semantically Enriched Presentation for Cultural Heritage Image: A POI-Based Perspective", "abstract": "Images of cultural heritage contain rich historical and cultural connotations, while existing image presentation modes ignore the revelation of fine-grained semantic information. Semantic enrichment is a strategy for enhancing cultural heritage data and supporting digital humanities. The study constructed a framework to aggregate and display image semantic information units. We further took a Dunhuang mural as an example to implement a visualization platform based on POI(point of interest) perspective, presenting a new interactive method of image presentation.", "abstracts": [ { "abstractType": "Regular", "content": "Images of cultural heritage contain rich historical and cultural connotations, while existing image presentation modes ignore the revelation of fine-grained semantic information. Semantic enrichment is a strategy for enhancing cultural heritage data and supporting digital humanities. The study constructed a framework to aggregate and display image semantic information units. We further took a Dunhuang mural as an example to implement a visualization platform based on POI(point of interest) perspective, presenting a new interactive method of image presentation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Images of cultural heritage contain rich historical and cultural connotations, while existing image presentation modes ignore the revelation of fine-grained semantic information. Semantic enrichment is a strategy for enhancing cultural heritage data and supporting digital humanities. The study constructed a framework to aggregate and display image semantic information units. We further took a Dunhuang mural as an example to implement a visualization platform based on POI(point of interest) perspective, presenting a new interactive method of image presentation.", "fno": "154700a410", "keywords": [ "Art", "Data Visualisation", "History", "Image Processing", "Interactive Systems", "Cultural Heritage Image", "Cultural Connotations", "Image Presentation Modes", "Fine Grained Semantic Information", "Semantic Enrichment", "Cultural Heritage Data", "Image Semantic Information Units", "POI", "Digital Humanities", "Historical Connotations", "Semantically Enriched Presentation", "Dunhuang Mural", "Visualization Platform", "Point Of Interest Perspective", "Interactive Method", "Semantics", "Cultural Differences", "Linked Data", "Metadata", "Libraries", "Data Visualization", "Semantic Enrichment", "Cultural Heritage", "Visualization Platform", "Digital Humanities" ], "authors": [ { "affiliation": "Wuhan University", "fullName": "Xiaoxi Luo", "givenName": "Xiaoxi", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University", "fullName": "Xu Tan", "givenName": "Xu", "surname": "Tan", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University", "fullName": "Xiaoguang Wang", "givenName": "Xiaoguang", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "410-411", "year": "2019", "issn": null, "isbn": "978-1-7281-1547-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "154700a408", "articleId": "1ckrDoXXtyU", "__typename": "AdjacentArticleType" }, "next": { "fno": "154700a335", "articleId": "1ckrG0XwmVG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2014/4003/0/4003a120", "title": "Using Aligned Ontology Model to Convert Cultural Heritage Resources into Semantic Web", "doi": null, "abstractUrl": "/proceedings-article/icsc/2014/4003a120/12OmNqzcvEZ", "parentPublication": { "id": "proceedings/icsc/2014/4003/0", "title": "2014 IEEE International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/intetain/2015/0061/0/07325493", "title": "Visual metaphors for semantic cultural heritage", "doi": null, "abstractUrl": "/proceedings-article/intetain/2015/07325493/12OmNwHQBhl", "parentPublication": { "id": "proceedings/intetain/2015/0061/0", "title": "2015 7th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907498", "title": "A Participatory Digital Platform for Cultural Heritage within Smart City Environments", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907498/12OmNyPQ4yO", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2014/4325/0/4325a558", "title": "Ontology-Based Visualisation of Cultural Heritage", "doi": null, "abstractUrl": "/proceedings-article/cisis/2014/4325a558/12OmNzaQox0", "parentPublication": { "id": "proceedings/cisis/2014/4325/0", "title": "2014 Eighth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2018/9120/0/08612815", "title": "Towards a Hierarchical Multitask Classification Framework for Cultural Heritage", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2018/08612815/17D45XzbnKa", "parentPublication": { "id": "proceedings/aiccsa/2018/9120/0", "title": "2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852954", "title": "Integration of models for linked data in cultural heritage and contributions to the FAIR principles", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852954/1FT2oVYPcnS", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2019/1547/0/154700a077", "title": "Large Scale Analysis of Semantic and Temporal Aspects in Cultural Heritage Collection's Search", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2019/154700a077/1ckrJ9iMTok", "parentPublication": { "id": "proceedings/jcdl/2019/1547/0", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005491", "title": "Automated interpretability of linked data ontologies: : an evaluation within the cultural heritage domain", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005491/1hJs92WdvCo", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2020/03/09082276", "title": "Art and Cultural Heritage", "doi": null, "abstractUrl": "/magazine/cg/2020/03/09082276/1jqfcHlqHE4", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2020/5668/0/566800a006", "title": "The Digital Preservation and Presentation of Red Cultural Heritages in Ganjiang River Basin, China", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2020/566800a006/1sQKilc6qxG", "parentPublication": { "id": "proceedings/isaiee/2020/5668/0", "title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pZ0XeP9TOw", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "acronym": "vis4dh", "groupId": "1839705", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pZ0XvrgcQE", "doi": "10.1109/VIS4DH51463.2020.00010", "title": "Visualizing a Large Spatiotemporal Collection of Historic Photography with a Generous Interface", "normalizedTitle": "Visualizing a Large Spatiotemporal Collection of Historic Photography with a Generous Interface", "abstract": "Museums, libraries, and other cultural institutions continue to prioritize and build web-based visualization systems that increase access and discovery to digitized archives. Prominent examples exist that illustrate impressive visualizations of a particular feature of a collection. For example, interactive maps showing geographic spread or timelines capturing the temporal aspects of collections. By way of a case study, this paper presents a new web-based visualization system that allows users to simultaneously explore a large collection of images along several different dimensions-spatial, temporal, visual, textual, and through additional metadata fields including the photographer name-guided by the concept of generous interfaces. The case study is a complete redesign of a previously released digital, public humanities project called Photogrammar (2014). The paper highlights the redesign's interactive visualizations that are now possible by the affordances of newly available software. All of the code is open-source in order to allow for reuse of the codebase to other collections with a similar structure.", "abstracts": [ { "abstractType": "Regular", "content": "Museums, libraries, and other cultural institutions continue to prioritize and build web-based visualization systems that increase access and discovery to digitized archives. Prominent examples exist that illustrate impressive visualizations of a particular feature of a collection. For example, interactive maps showing geographic spread or timelines capturing the temporal aspects of collections. By way of a case study, this paper presents a new web-based visualization system that allows users to simultaneously explore a large collection of images along several different dimensions-spatial, temporal, visual, textual, and through additional metadata fields including the photographer name-guided by the concept of generous interfaces. The case study is a complete redesign of a previously released digital, public humanities project called Photogrammar (2014). The paper highlights the redesign's interactive visualizations that are now possible by the affordances of newly available software. All of the code is open-source in order to allow for reuse of the codebase to other collections with a similar structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Museums, libraries, and other cultural institutions continue to prioritize and build web-based visualization systems that increase access and discovery to digitized archives. Prominent examples exist that illustrate impressive visualizations of a particular feature of a collection. For example, interactive maps showing geographic spread or timelines capturing the temporal aspects of collections. By way of a case study, this paper presents a new web-based visualization system that allows users to simultaneously explore a large collection of images along several different dimensions-spatial, temporal, visual, textual, and through additional metadata fields including the photographer name-guided by the concept of generous interfaces. The case study is a complete redesign of a previously released digital, public humanities project called Photogrammar (2014). The paper highlights the redesign's interactive visualizations that are now possible by the affordances of newly available software. All of the code is open-source in order to allow for reuse of the codebase to other collections with a similar structure.", "fno": "915300a030", "keywords": [ "Data Visualisation", "History", "Interactive Systems", "Internet", "Meta Data", "Museums", "Photography", "User Interfaces", "Historic Photography", "Generous Interface", "Cultural Institutions", "Web Based Visualization Systems", "Metadata", "Digital Humanities", "Spatiotemporal Collection", "Interactive Visualizations", "Museums", "Visualization", "Metadata", "Libraries", "Data Visualization", "Tools", "Cultural Differences", "Scholarships", "Human Centered Computing", "Visualization", "Information Visualization", "Human Centered Computing", "Visualization", "Geographic Visualization" ], "authors": [ { "affiliation": "University of Richmond,Math and Computer Science", "fullName": "Taylor Arnold", "givenName": "Taylor", "surname": "Arnold", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Richmond,Digital Scholarship Lab", "fullName": "Nathaniel Ayers", "givenName": "Nathaniel", "surname": "Ayers", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Richmond,Digital Scholarship Lab", "fullName": "Justin Madron", "givenName": "Justin", "surname": "Madron", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Richmond,Digital Scholarship Lab", "fullName": "Robert Nelson", "givenName": "Robert", "surname": "Nelson", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Richmond,Rhetoric and Communications", "fullName": "Lauren Tilton", "givenName": "Lauren", "surname": "Tilton", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis4dh", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "30-35", "year": "2020", "issn": null, "isbn": "978-1-7281-9153-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "915300a024", "articleId": "1pZ0XhtNffW", "__typename": "AdjacentArticleType" }, "next": { "fno": "915300a036", "articleId": "1pZ0XRm40vu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2016/4229/0/07559604", "title": "Visualizing published metadata in large aggregations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559604/12OmNAGNCfS", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enc/2005/2454/0/24540031", "title": "Visualizing Hierarchies and Collection Structures with Fractal Trees", "doi": null, "abstractUrl": "/proceedings-article/enc/2005/24540031/12OmNBpVQ7r", "parentPublication": { "id": "proceedings/enc/2005/2454/0", "title": "Sixth Mexican International Conference on Computer Science (ENC'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a474", "title": "Visualizing Süleymaname: Analyzing and Visualizing Embedded Spatiotemporal Information in a 16th Century Illustrated Manuscript", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a474/12OmNzRZq4b", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192666", "title": "Speculative Practices: Utilizing InfoVis to Explore Untapped Literary Collections", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192666/13rRUB7a113", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08352050", "title": "Visualization of Cultural Heritage Collection Data: State of the Art and Future Challenges", "doi": null, "abstractUrl": "/journal/tg/2019/06/08352050/13rRUwwJWFW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1998/04/mcg1998040040", "title": "Visualizing Rich, Structured Hypermedia", "doi": null, "abstractUrl": "/magazine/cg/1998/04/mcg1998040040/13rRUwwslws", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09984953", "title": "VISAtlas: An Image-based Exploration and Query System for Large Visualization Collections via Neural Image Embedding", "doi": null, "abstractUrl": "/journal/tg/5555/01/09984953/1J6d2SwfUT6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2020/03/09057396", "title": "Many Views Are Not Enough: Designing for Synoptic Insights in Cultural Collections", "doi": null, "abstractUrl": "/magazine/cg/2020/03/09057396/1iUHRAGtNOE", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090640", "title": "Developing immersive VR experience for visualizing cross-cultural relationships in music", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090640/1jIxpIPOs6Y", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a029", "title": "Using Close Reading as a Method for Evaluating Visualizations", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a029/1q0FO3J5Ogg", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zJmQt5adCU", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zJmYfHdJ7O", "doi": "10.1109/JCDL52503.2021.00071", "title": "Exploring the Classification of Traditional Chinese Bibliographies through Interactive Visualization", "normalizedTitle": "Exploring the Classification of Traditional Chinese Bibliographies through Interactive Visualization", "abstract": "Traditional Chinese bibliographies can be regarded as the earliest forms of knowledge organization system in China, which embed rich academic value and can reflect the knowledge, cultural, and political status at that time. This study adopts the digital humanities approach to investigate the bibliographies in a data-driven manner. We select seven representative traditional Chinese bibliographies and produced structured data by semiautomated methods. Interactive visualization is used as the main technique to provide both quantitative and qualitative view for humanities scholars to discover patterns, trends and anomalies in the change of the classification schemes of the traditional bibliographies. Examples are given to manifest how this interactive visualization can act as a tool to facilitate humanities research and provoke scholars thinking. We discuss the potential of the visualization technique to be used for studying traditional Chinese bibliographies and the embedded sociocultural implications.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional Chinese bibliographies can be regarded as the earliest forms of knowledge organization system in China, which embed rich academic value and can reflect the knowledge, cultural, and political status at that time. This study adopts the digital humanities approach to investigate the bibliographies in a data-driven manner. We select seven representative traditional Chinese bibliographies and produced structured data by semiautomated methods. Interactive visualization is used as the main technique to provide both quantitative and qualitative view for humanities scholars to discover patterns, trends and anomalies in the change of the classification schemes of the traditional bibliographies. Examples are given to manifest how this interactive visualization can act as a tool to facilitate humanities research and provoke scholars thinking. We discuss the potential of the visualization technique to be used for studying traditional Chinese bibliographies and the embedded sociocultural implications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional Chinese bibliographies can be regarded as the earliest forms of knowledge organization system in China, which embed rich academic value and can reflect the knowledge, cultural, and political status at that time. This study adopts the digital humanities approach to investigate the bibliographies in a data-driven manner. We select seven representative traditional Chinese bibliographies and produced structured data by semiautomated methods. Interactive visualization is used as the main technique to provide both quantitative and qualitative view for humanities scholars to discover patterns, trends and anomalies in the change of the classification schemes of the traditional bibliographies. Examples are given to manifest how this interactive visualization can act as a tool to facilitate humanities research and provoke scholars thinking. We discuss the potential of the visualization technique to be used for studying traditional Chinese bibliographies and the embedded sociocultural implications.", "fno": "177000a246", "keywords": [ "Data Mining", "Data Visualisation", "History", "Humanities", "Politics", "Interactive Visualization", "Knowledge Organization System", "Digital Humanities Approach", "Seven Representative Traditional Chinese Bibliographies", "Traditional Bibliographies", "Bibliographies", "Data Visualization", "Organizations", "Market Research", "Libraries", "Cultural Differences", "Digital Humanities", "Interactive Visualization", "Traditional Chinese Bibliographies" ], "authors": [ { "affiliation": "Peking University,Department of Information Management,Beijing,China", "fullName": "Wenqi Li", "givenName": "Wenqi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Department of Information Management,Beijing,China", "fullName": "Fengxiang Wang", "givenName": "Fengxiang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Department of Information Management,Beijing,China", "fullName": "Jun Wang", "givenName": "Jun", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "246-249", "year": "2021", "issn": null, "isbn": "978-1-6654-1770-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "177000a242", "articleId": "1zJn10rNgk0", "__typename": "AdjacentArticleType" }, "next": { "fno": "177000a250", "articleId": "1zJn2djm1gY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a446", "title": "Theoretical Framework of Schematic Interactions Visualization in ESL Reading Teaching", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a446/12OmNAZfxH5", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2016/2312/0/2312a162", "title": "Construction and International Popularization of Digital Platform for Chinese Traditional Furniture Culture", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2016/2312a162/12OmNyrIaIE", "parentPublication": { "id": "proceedings/icmtma/2016/2312/0", "title": "2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192666", "title": "Speculative Practices: Utilizing InfoVis to Explore Untapped Literary Collections", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192666/13rRUB7a113", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900b123", "title": "Studies on International Discourse Construction of Chinese Literary Classics with the Approach of Computer-assisted Translation", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900b123/1C8GayTJHxe", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itei/2021/8050/0/805000a199", "title": "Visual comparative analysis of online Chinese teaching based on CNKI literature", "doi": null, "abstractUrl": "/proceedings-article/itei/2021/805000a199/1CzeKAlU2uA", "parentPublication": { "id": "proceedings/itei/2021/8050/0", "title": "2021 3rd International Conference on Internet Technology and Educational Informization (ITEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2022/1015/0/101500a704", "title": "Visualization analysis of comprehensive evaluation of academic papers based on knowledge graph", "doi": null, "abstractUrl": "/proceedings-article/itme/2022/101500a704/1M4rqvL3nDW", "parentPublication": { "id": "proceedings/itme/2022/1015/0", "title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2019/4528/0/452800a575", "title": "Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media", "doi": null, "abstractUrl": "/proceedings-article/dsc/2019/452800a575/1fHjMnWrh1m", "parentPublication": { "id": "proceedings/dsc/2019/4528/0", "title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2020/9153/0/915300a024", "title": "Pilaster: A Collection of Citation Metadata Extracted From Publications on Visualization for the Digital Humanities", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2020/915300a024/1pZ0XhtNffW", "parentPublication": { "id": "proceedings/vis4dh/2020/9153/0", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2020/5668/0/566800a245", "title": "Analysis of the New Trend of Chinese Teaching Research in China", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2020/566800a245/1sQKkSb89BS", "parentPublication": { "id": "proceedings/isaiee/2020/5668/0", "title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2021/3954/0/395400a106", "title": "Inheritance of Chinese Traditional Color Culture Based on Modern Human Visual Perception", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2021/395400a106/1wnPtIx90wU", "parentPublication": { "id": "proceedings/nicoint/2021/3954/0", "title": "2021 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBDQbh0", "doi": "10.1109/IV.2016.64", "title": "A Multi-level Visualization Scheme for Poetry", "normalizedTitle": "A Multi-level Visualization Scheme for Poetry", "abstract": "This article introduces a multi-level visualization scheme for poetry. In each level, different elements are represented and their attributes are coded in different ways. The first level displays the phonemes in a verse, tracing them back to the written word. The second level shows the poem itself in a metric grid where the verse syllables are placed. The third level shows a set of poems whose verses and syllables can be visually compared. Finally, the fourth level is capable of showing hundreds or thousands of verses at once, turning each verse into a tile whose color indicates a meaningful property. We argue that each level has its strengths and its weaknesses and we evaluate them with our collaborators from the poetry community.", "abstracts": [ { "abstractType": "Regular", "content": "This article introduces a multi-level visualization scheme for poetry. In each level, different elements are represented and their attributes are coded in different ways. The first level displays the phonemes in a verse, tracing them back to the written word. The second level shows the poem itself in a metric grid where the verse syllables are placed. The third level shows a set of poems whose verses and syllables can be visually compared. Finally, the fourth level is capable of showing hundreds or thousands of verses at once, turning each verse into a tile whose color indicates a meaningful property. We argue that each level has its strengths and its weaknesses and we evaluate them with our collaborators from the poetry community.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This article introduces a multi-level visualization scheme for poetry. In each level, different elements are represented and their attributes are coded in different ways. The first level displays the phonemes in a verse, tracing them back to the written word. The second level shows the poem itself in a metric grid where the verse syllables are placed. The third level shows a set of poems whose verses and syllables can be visually compared. Finally, the fourth level is capable of showing hundreds or thousands of verses at once, turning each verse into a tile whose color indicates a meaningful property. We argue that each level has its strengths and its weaknesses and we evaluate them with our collaborators from the poetry community.", "fno": "8942a312", "keywords": [ "Visualization", "Color", "Stress", "HTML", "Proposals", "Semantics", "Data Mining", "Brazilian Poetry", "Poetry Visualization", "Verse Visualization", "Phonetic Transcription", "Portuguese Poetry" ], "authors": [ { "affiliation": null, "fullName": "Adiel Mittmann", "givenName": "Adiel", "surname": "Mittmann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aldo von Wangenheim", "givenName": "Aldo", "surname": "von Wangenheim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alckmar Luiz dos Santos", "givenName": "Alckmar Luiz", "surname": "dos Santos", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "312-317", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a306", "articleId": "12OmNvmXJ9r", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a318", "articleId": "12OmNBpmDQI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mascots/2012/2453/0/06298197", "title": "MERCURY: A Scalable and Similarity-Aware Scheme in Multi-level Cache Hierarchy", "doi": null, "abstractUrl": "/proceedings-article/mascots/2012/06298197/12OmNAkWvfv", "parentPublication": { "id": "proceedings/mascots/2012/2453/0", "title": "2012 IEEE 20th International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nooric/2013/2823/0/2823a298", "title": "Referencing Qur'an Verses and Ahadith on World Wide Web Using Microdata", "doi": null, "abstractUrl": "/proceedings-article/nooric/2013/2823a298/12OmNC943Iv", "parentPublication": { "id": "proceedings/nooric/2013/2823/0", "title": "2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/0/00926535", "title": "Multi-level web surfing", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/00926535/12OmNwErpuo", "parentPublication": { "id": "proceedings/hicss/2001/0981/2", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2018/3652/0/08390270", "title": "Poet-based Poetry Generation: Controlling Personal Style with Recurrent Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icnc/2018/08390270/12OmNzUPpts", "parentPublication": { "id": "proceedings/icnc/2018/3652/0", "title": "2018 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2019/6783/0/08665603", "title": "Arabic Poem Generation with Hierarchical Recurrent Attentional Network", "doi": null, "abstractUrl": "/proceedings-article/icsc/2019/08665603/18qccz8bdBe", "parentPublication": { "id": "proceedings/icsc/2019/6783/0", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a958", "title": "A Multi -level Alignment Training Scheme for Video-and-Language Grounding", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a958/1KBraN0LnKo", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j468", "title": "Pose-Aware Multi-Level Feature Network for Human Object Interaction Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j468/1hQqrglJxfO", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2021/8899/0/889900a048", "title": "Poetry Generation Model via Deep learning incorporating Extended Phonetic and Semantic Embeddings", "doi": null, "abstractUrl": "/proceedings-article/icsc/2021/889900a048/1rFzSGEyL4s", "parentPublication": { "id": "proceedings/icsc/2021/8899/0", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378383", "title": "Generating Chinese Classical Poetry with Quatrain Generation Model (QGM) Using Encoder-Decoder LSTM", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378383/1s64HfiZmHC", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2021/0019/0/09597451", "title": "Multi-dimensional Affect in Poetry (POCA) Dataset: Acquisition, Annotation and Baseline Results", "doi": null, "abstractUrl": "/proceedings-article/acii/2021/09597451/1yylcYb9Gc8", "parentPublication": { "id": "proceedings/acii/2021/0019/0", "title": "2021 9th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwnczS", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNBubOTl", "doi": "10.1109/INFVIS.1996.559226", "title": "Visualizing the global topology of the MBone", "normalizedTitle": "Visualizing the global topology of the MBone", "abstract": "We present a case study of visualizing the global topology of the Internet MBone. The MBone is the Internet's multicast backbone. Multicast is the most efficient way of distributing data from one sender to multiple receivers with minimal packet duplication. Developed and initially deployed by researchers within the Internet community, the MBone has been extremely popular for efficient transmission across the Internet of real-time video and audio streams such as conferences, meetings, congressional sessions, and NASA shuttle launches. The MBone, like the Internet itself grew exponentially with no central authority. The resulting suboptimal topology is of growing concern to network providers and the multicast research community. We create a geographic representation of the tunnel structure as arcs on a globe by resolving the latitude and longitude of MBone routers. The interactive 3D maps permit an immediate understanding of the global structure unavailable from the data in its original form as lines of text with only hostnames and IP addresses. Data visualization techniques such as grouping and thresholding allow further analysis of specific aspects of the MBone topology. We distribute the interactive 3D maps through the World-Wide Web using the VRML file format thus allowing network maintainers throughout the world to analyze the structure move effectively than would be possible with still pictures or pre-made videos.", "abstracts": [ { "abstractType": "Regular", "content": "We present a case study of visualizing the global topology of the Internet MBone. The MBone is the Internet's multicast backbone. Multicast is the most efficient way of distributing data from one sender to multiple receivers with minimal packet duplication. Developed and initially deployed by researchers within the Internet community, the MBone has been extremely popular for efficient transmission across the Internet of real-time video and audio streams such as conferences, meetings, congressional sessions, and NASA shuttle launches. The MBone, like the Internet itself grew exponentially with no central authority. The resulting suboptimal topology is of growing concern to network providers and the multicast research community. We create a geographic representation of the tunnel structure as arcs on a globe by resolving the latitude and longitude of MBone routers. The interactive 3D maps permit an immediate understanding of the global structure unavailable from the data in its original form as lines of text with only hostnames and IP addresses. Data visualization techniques such as grouping and thresholding allow further analysis of specific aspects of the MBone topology. We distribute the interactive 3D maps through the World-Wide Web using the VRML file format thus allowing network maintainers throughout the world to analyze the structure move effectively than would be possible with still pictures or pre-made videos.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a case study of visualizing the global topology of the Internet MBone. The MBone is the Internet's multicast backbone. Multicast is the most efficient way of distributing data from one sender to multiple receivers with minimal packet duplication. Developed and initially deployed by researchers within the Internet community, the MBone has been extremely popular for efficient transmission across the Internet of real-time video and audio streams such as conferences, meetings, congressional sessions, and NASA shuttle launches. The MBone, like the Internet itself grew exponentially with no central authority. The resulting suboptimal topology is of growing concern to network providers and the multicast research community. We create a geographic representation of the tunnel structure as arcs on a globe by resolving the latitude and longitude of MBone routers. The interactive 3D maps permit an immediate understanding of the global structure unavailable from the data in its original form as lines of text with only hostnames and IP addresses. Data visualization techniques such as grouping and thresholding allow further analysis of specific aspects of the MBone topology. We distribute the interactive 3D maps through the World-Wide Web using the VRML file format thus allowing network maintainers throughout the world to analyze the structure move effectively than would be possible with still pictures or pre-made videos.", "fno": "76680085", "keywords": [ "Internet M Bone Topology Visualisation Case Study Internet M Bone Multicast Backbone Multiple Receivers Minimal Packet Duplication Real Time Video Real Time Audio Conferences Meetings Congressional Sessions NASA Shuttle Launches Suboptimal Topology Geographic Representation Tunnel Structure World Wide Web M Bone Routers Interactive 3 D Maps IP Addresses Hostnames Data Visualization VRML" ], "authors": [ { "affiliation": "Stanford Univ., CA, USA", "fullName": "T. Munzner", "givenName": "T.", "surname": "Munzner", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford Univ., CA, USA", "fullName": "E. Hoffman", "givenName": "E.", "surname": "Hoffman", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford Univ., CA, USA", "fullName": "K. Claffy", "givenName": "K.", "surname": "Claffy", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford Univ., CA, USA", "fullName": "B. Fenner", "givenName": "B.", "surname": "Fenner", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-10-01T00:00:00", "pubType": "proceedings", "pages": "85", "year": "1996", "issn": null, "isbn": "0-8186-7668-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "76680077", "articleId": "12OmNzYeAPb", "__typename": "AdjacentArticleType" }, "next": { "fno": "76680093", "articleId": "12OmNBsLPbf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxzMnO1", "doi": "10.1109/IV.2016.57", "title": "Interactive Text Visualization with Text Variation Explorer", "normalizedTitle": "Interactive Text Visualization with Text Variation Explorer", "abstract": "Digitalization is changing how research is carried out in all areas of science. Humanities is no exception -- materials that used to be hand-written or printed on paper are increasingly available in digital form. This development is changing how scholars are interacting with their material. We are addressing the problem of interactive text visualization in the context of sociolinguistic language study. When a scholar is reading and analyzing text from a computer screen instead of a paper, we can support this by providing a dashboard for reading, and by creating visualizations of the text structure, variation, and change. We have designed and developed a software tool called Text Variation Explorer (TVE) for sociolinguistic language study. It is based on interactive visualization with a direct manipulation user interface, and aimed for exploratory corpus linguistics. The TVE software tool has proven to be useful in supporting the study of language variation and change in its social contexts, or sociolinguistics. It is, to a certain degree, language-independent, and generic enough to be useful in other linguistic contexts as well. We are now in the process of designing and implementing the next iteration of TVE. We present the lessons learned from the first version, discuss the old and the new design, and welcome feedback from the communities involved.", "abstracts": [ { "abstractType": "Regular", "content": "Digitalization is changing how research is carried out in all areas of science. Humanities is no exception -- materials that used to be hand-written or printed on paper are increasingly available in digital form. This development is changing how scholars are interacting with their material. We are addressing the problem of interactive text visualization in the context of sociolinguistic language study. When a scholar is reading and analyzing text from a computer screen instead of a paper, we can support this by providing a dashboard for reading, and by creating visualizations of the text structure, variation, and change. We have designed and developed a software tool called Text Variation Explorer (TVE) for sociolinguistic language study. It is based on interactive visualization with a direct manipulation user interface, and aimed for exploratory corpus linguistics. The TVE software tool has proven to be useful in supporting the study of language variation and change in its social contexts, or sociolinguistics. It is, to a certain degree, language-independent, and generic enough to be useful in other linguistic contexts as well. We are now in the process of designing and implementing the next iteration of TVE. We present the lessons learned from the first version, discuss the old and the new design, and welcome feedback from the communities involved.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Digitalization is changing how research is carried out in all areas of science. Humanities is no exception -- materials that used to be hand-written or printed on paper are increasingly available in digital form. This development is changing how scholars are interacting with their material. We are addressing the problem of interactive text visualization in the context of sociolinguistic language study. When a scholar is reading and analyzing text from a computer screen instead of a paper, we can support this by providing a dashboard for reading, and by creating visualizations of the text structure, variation, and change. We have designed and developed a software tool called Text Variation Explorer (TVE) for sociolinguistic language study. It is based on interactive visualization with a direct manipulation user interface, and aimed for exploratory corpus linguistics. The TVE software tool has proven to be useful in supporting the study of language variation and change in its social contexts, or sociolinguistics. It is, to a certain degree, language-independent, and generic enough to be useful in other linguistic contexts as well. We are now in the process of designing and implementing the next iteration of TVE. We present the lessons learned from the first version, discuss the old and the new design, and welcome feedback from the communities involved.", "fno": "8942a330", "keywords": [ "Visualization", "Pragmatics", "Data Visualization", "Principal Component Analysis", "Metadata", "Context", "Image Color Analysis", "Interaction", "Information Visualization", "Text Visualization" ], "authors": [ { "affiliation": null, "fullName": "Harri Siirtola", "givenName": "Harri", "surname": "Siirtola", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Poika Isokoski", "givenName": "Poika", "surname": "Isokoski", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tanja Säily", "givenName": "Tanja", "surname": "Säily", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Terttu Nevalainen", "givenName": "Terttu", "surname": "Nevalainen", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "330-335", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a324", "articleId": "12OmNwkzuvE", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a336", "articleId": "12OmNzahchN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2014/4103/0/4103a392", "title": "Graphic Visualization in Literary Text Interpretation", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a392/12OmNBZYTq8", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b833", "title": "Word Cloud Explorer: Text Analytics Based on Word Clouds", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b833/12OmNqNG3jl", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400530", "title": "LensingWikipedia: Parsing text for the interactive visualization of human history", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400530/12OmNvStcyS", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2017/0680/0/08272587", "title": "EmoLiTe — A database for emotion detection during literary text reading", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2017/08272587/12OmNwGZNEM", "parentPublication": { "id": "proceedings/aciiw/2017/0680/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2015/0478/0/07507254", "title": "Arabic text summarization based on graph theory", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2015/07507254/12OmNx7ov0N", "parentPublication": { "id": "proceedings/aiccsa/2015/0478/0", "title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mud/2014/6793/0/6793a016", "title": "Combining Text Mining and Visualization Techniques to Study Teams' Behavioral Processes", "doi": null, "abstractUrl": "/proceedings-article/mud/2014/6793a016/12OmNy87QsL", "parentPublication": { "id": "proceedings/mud/2014/6793/0", "title": "2014 IEEE 4th Workshop on Mining Unstructured Data (MUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1999/0001/2/00012028", "title": "The Virtual Speech Community: Social Network and Language Variation on IRC", "doi": null, "abstractUrl": "/proceedings-article/hicss/1999/00012028/12OmNyKJic4", "parentPublication": { "id": "proceedings/hicss/1999/0001/2", "title": "Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2015/8128/0/8128a462", "title": "Interactive Visual Text Analysis for Corpus-Based Language Learning", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2015/8128a462/12OmNyQ7FUy", "parentPublication": { "id": "proceedings/bigdataservice/2015/8128/0", "title": "2015 IEEE First International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a416", "title": "Interactive Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a416/12OmNzVoBMz", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09220137", "title": "A Survey of Text Alignment Visualization", "doi": null, "abstractUrl": "/journal/tg/2021/02/09220137/1nRLN0fSuiI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ckrD0rVw1q", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ckrFgHbLxK", "doi": "10.1109/JCDL.2019.00123", "title": "A Graphical Interface for the Dodge Poetry Festival Archive", "normalizedTitle": "A Graphical Interface for the Dodge Poetry Festival Archive", "abstract": "The Dodge Poetry Festival is a biennial four-day event at which American and international poets read their own poetry out loud to relatively large, attentive audiences. In this paper, we report on a prototype graphical interface designed to let users access high quality video recordings of these poetry readings. The goal is to create an interface that draws high school students in particular into the experience of listening to poetry. This prototype is the first step in a plan to build a working system for a small portion of the Archive collection that can then be realistically evaluated. From a historical perspective, the archive provides a high-quality record of poets of the late 20<sup>th</sup> and early 21<sup>st</sup> centuries reading their own poems and and discussing their work with festival attendees.", "abstracts": [ { "abstractType": "Regular", "content": "The Dodge Poetry Festival is a biennial four-day event at which American and international poets read their own poetry out loud to relatively large, attentive audiences. In this paper, we report on a prototype graphical interface designed to let users access high quality video recordings of these poetry readings. The goal is to create an interface that draws high school students in particular into the experience of listening to poetry. This prototype is the first step in a plan to build a working system for a small portion of the Archive collection that can then be realistically evaluated. From a historical perspective, the archive provides a high-quality record of poets of the late 20<sup>th</sup> and early 21<sup>st</sup> centuries reading their own poems and and discussing their work with festival attendees.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Dodge Poetry Festival is a biennial four-day event at which American and international poets read their own poetry out loud to relatively large, attentive audiences. In this paper, we report on a prototype graphical interface designed to let users access high quality video recordings of these poetry readings. The goal is to create an interface that draws high school students in particular into the experience of listening to poetry. This prototype is the first step in a plan to build a working system for a small portion of the Archive collection that can then be realistically evaluated. From a historical perspective, the archive provides a high-quality record of poets of the late 20th and early 21st centuries reading their own poems and and discussing their work with festival attendees.", "fno": "154700a461", "keywords": [ "Graphical User Interfaces", "Information Retrieval Systems", "Literature", "Video Recording", "International Poets", "Attentive Audiences", "High Quality Video Recordings", "Poetry Readings", "High School Students", "Festival Attendees", "Graphical Interface", "Archive Collection", "Dodge Poetry Festival Archive", "Prototypes", "Libraries", "Metadata", "Information Science", "Biographies", "Video Recording", "Buildings", "Digital Libraries And Archives", "Users And Interactive Retrieval", "Education" ], "authors": [ { "affiliation": "Rutgers University", "fullName": "Nina Wacholder", "givenName": "Nina", "surname": "Wacholder", "__typename": "ArticleAuthorType" }, { "affiliation": "Rutgers University", "fullName": "M. Grey Valenti", "givenName": "M.", "surname": "Grey Valenti", "__typename": "ArticleAuthorType" }, { "affiliation": "Rutgers University", "fullName": "Nicholas Provenzano", "givenName": "Nicholas", "surname": "Provenzano", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "461-462", "year": "2019", "issn": null, "isbn": "978-1-7281-1547-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "154700a459", "articleId": "1ckrF03nRJe", "__typename": "AdjacentArticleType" }, "next": { "fno": "154700a463", "articleId": "1ckrIPEux7q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2005/876/0/04118610", "title": "EVIADA: ethnomusicological video for instruction and analysis digital archive", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118610/12OmNvoFjQg", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559568", "title": "ArchiveSpark: Efficient Web archive access, extraction and derivation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559568/12OmNxYtuaf", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1992/3000/0/00217592", "title": "SimUI: graphical user interface evaluation using playback", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1992/00217592/12OmNzcxZ1r", "parentPublication": { "id": "proceedings/cmpsac/1992/3000/0", "title": "1992 Proceedings. The Sixteenth Annual International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1sQK7aoEiwU", "title": "2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter)", "acronym": "snpd-winter", "groupId": "1841204", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1sQK93iPuWk", "doi": "10.1109/SNPDWinter52325.2021.00022", "title": "The Visualization of Cross-media Knowledge Graph of Tang and Song Poetry", "normalizedTitle": "The Visualization of Cross-media Knowledge Graph of Tang and Song Poetry", "abstract": "The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth of learning, combined with heterogeneous data sources such as poetry, videos, textbooks, knowledge graph and other media sources, and carried out visual modeling. We provide a visual and informative platform to demonstrate the potential power of visualization. It supports comprehensive search capabilities for multiple types of data, online generation of poets' knowledge graphs. Relationship diagram, word cloud diagram, pie chart and other visual charts are displayed on the platform, so that users can complete exploratory visual analysis by dragging, clicking and typing.", "abstracts": [ { "abstractType": "Regular", "content": "The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth of learning, combined with heterogeneous data sources such as poetry, videos, textbooks, knowledge graph and other media sources, and carried out visual modeling. We provide a visual and informative platform to demonstrate the potential power of visualization. It supports comprehensive search capabilities for multiple types of data, online generation of poets' knowledge graphs. Relationship diagram, word cloud diagram, pie chart and other visual charts are displayed on the platform, so that users can complete exploratory visual analysis by dragging, clicking and typing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth of learning, combined with heterogeneous data sources such as poetry, videos, textbooks, knowledge graph and other media sources, and carried out visual modeling. We provide a visual and informative platform to demonstrate the potential power of visualization. It supports comprehensive search capabilities for multiple types of data, online generation of poets' knowledge graphs. Relationship diagram, word cloud diagram, pie chart and other visual charts are displayed on the platform, so that users can complete exploratory visual analysis by dragging, clicking and typing.", "fno": "184300a069", "keywords": [ "Data Visualisation", "Grammars", "Literature", "Semantic Networks", "Special Grammar", "Heterogeneous Data Sources", "Visual Modeling", "Visual Platform", "Informative Platform", "Word Cloud Diagram", "Visual Charts", "Exploratory Visual Analysis", "Cross Media Knowledge Graph Visualization", "Pie Chart", "Relationship Diagram", "Abstruse Rhetoric", "Tang And Song Poetry", "Information Poetry Space", "Poet Knowledge Graphs", "Visualization", "Heuristic Algorithms", "Software Algorithms", "Data Visualization", "Tag Clouds", "Space Exploration", "Videos", "Visualization", "Heterogeneous Network", "Broad Learning", "Knowledge Graph" ], "authors": [ { "affiliation": "Communication University of China,School of Computer Science and Cybersecurity,Beijing,China", "fullName": "Wenjuan Jiang", "givenName": "Wenjuan", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Communication University of China,School of Computer Science and Cybersecurity,Beijing,China", "fullName": "Chunfang Li", "givenName": "Chunfang", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Communication University of China,School of Computer Science and Cybersecurity,Beijing,China", "fullName": "Changti Wu", "givenName": "Changti", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "snpd-winter", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "69-73", "year": "2021", "issn": null, "isbn": "978-1-6654-1843-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "184300a063", "articleId": "1sQK98G4zE4", "__typename": "AdjacentArticleType" }, "next": { "fno": "184300a074", "articleId": "1sQKaU2KqPe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2016/8942/0/8942a312", "title": "A Multi-level Visualization Scheme for Poetry", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a312/12OmNBDQbh0", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004033", "title": "Visualization of Sensory Perception Descriptions", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004033/12OmNCbCrO4", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2018/1424/0/142401a190", "title": "TagNet: Toward Tag-Based Sentiment Analysis of Large Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a190/12OmNqBtj9S", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550951", "title": "Study of the individual english learning and memory based on visualization analysis", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550951/12OmNy87QyV", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a013", "title": "Three-level Visualization of Internet Discussion with Extruded Word Clouds", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a013/12OmNyrIaxa", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a039", "title": "Native Cross-Platform Visualization: A Proof of Concept Based on the Unity3D Game Engine", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a039/12OmNzw8j5J", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/06/mcg2010060042", "title": "Context-Preserving, Dynamic Word Cloud Visualization", "doi": null, "abstractUrl": "/magazine/cg/2010/06/mcg2010060042/13rRUwcAquA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07536200", "title": "Visualizing Social Media Content with SentenTree", "doi": null, "abstractUrl": "/journal/tg/2017/01/07536200/13rRUxYIMV3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073288", "title": "Through The Eyes of A Poet: Classical Poetry Recommendation with Visual Input on Social Media", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073288/1jjAdIRPaGQ", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194508", "title": "GeLaiGeLai: A visual platform for analysis of Classical Chinese Poetry based on Knowledge Graph", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194508/1n2nhtjzomk", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1Ax", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "acronym": "passat-socialcom", "groupId": "1800612", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNAle6kc", "doi": "10.1109/PASSAT/SocialCom.2011.90", "title": "pieTime: Visualizing Communication Patterns", "normalizedTitle": "pieTime: Visualizing Communication Patterns", "abstract": "This paper explores how aggregated behavioral data might help people reflect on patterns in their lives using pie Time, a visualization that presents communication activity aggregated at levels from hours in a day to months in a year. pie Time builds on recent work in conversation visualization and life logging by focusing on rhythms rather than details and supporting reflection across different media. An evaluation with 15 people supports findings from prior work about the importance of particular details and storytelling in tools that support reflection, even when the design goals emphasize higher-level patterns. Still, aggregate patterns provide additional insight into personal behavior, suggesting that systems that integrate both particulars and patterns may be especially valuable, especially when they also help people build and manage their identities.", "abstracts": [ { "abstractType": "Regular", "content": "This paper explores how aggregated behavioral data might help people reflect on patterns in their lives using pie Time, a visualization that presents communication activity aggregated at levels from hours in a day to months in a year. pie Time builds on recent work in conversation visualization and life logging by focusing on rhythms rather than details and supporting reflection across different media. An evaluation with 15 people supports findings from prior work about the importance of particular details and storytelling in tools that support reflection, even when the design goals emphasize higher-level patterns. Still, aggregate patterns provide additional insight into personal behavior, suggesting that systems that integrate both particulars and patterns may be especially valuable, especially when they also help people build and manage their identities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper explores how aggregated behavioral data might help people reflect on patterns in their lives using pie Time, a visualization that presents communication activity aggregated at levels from hours in a day to months in a year. pie Time builds on recent work in conversation visualization and life logging by focusing on rhythms rather than details and supporting reflection across different media. An evaluation with 15 people supports findings from prior work about the importance of particular details and storytelling in tools that support reflection, even when the design goals emphasize higher-level patterns. Still, aggregate patterns provide additional insight into personal behavior, suggesting that systems that integrate both particulars and patterns may be especially valuable, especially when they also help people build and manage their identities.", "fno": "06113204", "keywords": [ "Data Visualisation", "Pattern Classification", "Recording", "Social Networking Online", "Pie Time", "Communication Patterns Visualization", "Aggregated Behavioral Data", "Communication Activity", "Conversation Visualization", "Life Logging", "Storytelling", "Aggregate Patterns", "Data Visualization", "Reflection", "Electronic Mail", "Media", "Aggregates", "Focusing", "Prototypes", "Information Visualization", "Reflection", "Lifelogging" ], "authors": [ { "affiliation": null, "fullName": "Tiffany Ng", "givenName": "Tiffany", "surname": "Ng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ou Jie Zhao", "givenName": "Ou Jie", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dan Cosley", "givenName": "Dan", "surname": "Cosley", "__typename": "ArticleAuthorType" } ], "idPrefix": "passat-socialcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "720-723", "year": "2011", "issn": null, "isbn": "978-1-4577-1931-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06113203", "articleId": "12OmNx76TMj", "__typename": "AdjacentArticleType" }, "next": { "fno": "06113205", "articleId": "12OmNwEJ0D0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sera/2008/3302/0/3302a179", "title": "Experiments with Fractal on Modular Reflection", "doi": null, "abstractUrl": "/proceedings-article/sera/2008/3302a179/12OmNvjyxKc", "parentPublication": { "id": "proceedings/sera/2008/3302/0", "title": "Software Engineering Research, Management and Applications, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/0/00927123", "title": "Evaluating creative practice in information systems strategy formation: the application of Alexandrian patterns", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/00927123/12OmNyLiuvh", "parentPublication": { "id": "proceedings/hicss/2001/0981/2", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034b710", "title": "Hierarchical Grouping — The Gestalt Assessments Method", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b710/12OmNylbovG", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a205", "title": "Online Peer Learning: What Influences the Students' Learning Experience", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a205/12OmNzTppDS", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/01/07738510", "title": "A Novel Web-Based Approach for Visualization and Inspection of Reading Difficulties on University Students", "doi": null, "abstractUrl": "/journal/lt/2017/01/07738510/13rRUwInvFu", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/09/07587808", "title": "Revealing Patterns and Trends of Mass Mobility Through Spatial and Temporal Abstraction of Origin-Destination Movement Data", "doi": null, "abstractUrl": "/journal/tg/2017/09/07587808/13rRUwbs2gw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2019/3485/0/348500a287", "title": "Scaffolding Structured Reflective Practices in Engineering Design Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/icalt/2019/348500a287/1cYi6fpXxSg", "parentPublication": { "id": "proceedings/icalt/2019/3485/2161-377X", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428089", "title": "Contrastive Feature Decomposition for Image Reflection Removal", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428089/1uilYHxR7GM", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2021/3225/0/322500a109", "title": "Learning Environment based on an Interactive Projection Table for Children", "doi": null, "abstractUrl": "/proceedings-article/aivr/2021/322500a109/1zxLBlMQN32", "parentPublication": { "id": "proceedings/aivr/2021/3225/0", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCcbEd6", "title": "2015 13th International Conference on Frontiers of Information Technology (FIT)", "acronym": "fit", "groupId": "1800803", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoUTqD", "doi": "10.1109/FIT.2015.60", "title": "Finding the Different Patterns in Buildings Data Using Bag of Words Representation with Clustering", "normalizedTitle": "Finding the Different Patterns in Buildings Data Using Bag of Words Representation with Clustering", "abstract": "The understanding of the buildings operation has become a challenging task due to the large amount of data recorded in energy efficient buildings. Still, today the experts use visual tools for analyzing the data. In order to make the task realistic, a method has been proposed in this paper to automatically detect the different patterns in buildings. The K Means clustering is used to automatically identify the ON (operational) cycles of the chiller. In the next step the ON cycles are transformed to symbolic representation by using Symbolic Aggregate Approximation (SAX) method. Then the SAX symbols are converted to bag of words representation for hierarchical clustering. Moreover, the proposed technique is applied to real life data of adsorption chiller. Additionally, the results from the proposed method and dynamic time warping (DTW) approach are also discussed and compared.", "abstracts": [ { "abstractType": "Regular", "content": "The understanding of the buildings operation has become a challenging task due to the large amount of data recorded in energy efficient buildings. Still, today the experts use visual tools for analyzing the data. In order to make the task realistic, a method has been proposed in this paper to automatically detect the different patterns in buildings. The K Means clustering is used to automatically identify the ON (operational) cycles of the chiller. In the next step the ON cycles are transformed to symbolic representation by using Symbolic Aggregate Approximation (SAX) method. Then the SAX symbols are converted to bag of words representation for hierarchical clustering. Moreover, the proposed technique is applied to real life data of adsorption chiller. Additionally, the results from the proposed method and dynamic time warping (DTW) approach are also discussed and compared.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The understanding of the buildings operation has become a challenging task due to the large amount of data recorded in energy efficient buildings. Still, today the experts use visual tools for analyzing the data. In order to make the task realistic, a method has been proposed in this paper to automatically detect the different patterns in buildings. The K Means clustering is used to automatically identify the ON (operational) cycles of the chiller. In the next step the ON cycles are transformed to symbolic representation by using Symbolic Aggregate Approximation (SAX) method. Then the SAX symbols are converted to bag of words representation for hierarchical clustering. Moreover, the proposed technique is applied to real life data of adsorption chiller. Additionally, the results from the proposed method and dynamic time warping (DTW) approach are also discussed and compared.", "fno": "9666a303", "keywords": [ "Buildings", "Time Series Analysis", "Adsorption", "Aggregates", "Clustering Algorithms", "Cooling", "Temperature Sensors", "Coefficient Of Performance COP", "Building Energy Performance", "Fault Detection And Diagnosis FDD", "Clustering", "Symbolic Aggregate Approximation SAX", "Bag Of Words Representation Bo WR", "Hierarchical Clustering", "Dynamic Time Warping DTW" ], "authors": [ { "affiliation": null, "fullName": "Usman Habib", "givenName": "Usman", "surname": "Habib", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gerhard Zucker", "givenName": "Gerhard", "surname": "Zucker", "__typename": "ArticleAuthorType" } ], "idPrefix": "fit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "303-308", "year": "2015", "issn": null, "isbn": "978-1-4673-9666-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9666a297", "articleId": "12OmNzn38KA", "__typename": "AdjacentArticleType" }, "next": { "fno": "9666a309", "articleId": "12OmNrJiCMj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/nbis/2015/9942/0/9942a280", "title": "SAX-based Group Stock Portfolio Mining Approach", "doi": null, "abstractUrl": "/proceedings-article/nbis/2015/9942a280/12OmNBO3Kfw", "parentPublication": { "id": "proceedings/nbis/2015/9942/0", "title": "2015 18th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2017/3581/0/3581a821", "title": "SAX-Based Representation with Longest Common Subsequence Dissimilarity Measure for Time Series Data Classification", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2017/3581a821/12OmNCzb9zE", "parentPublication": { "id": "proceedings/aiccsa/2017/3581/0", "title": "2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/2/4143b186", "title": "Time Makes Sense: Event Discovery in Twitter Using Temporal Similarity", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143b186/12OmNyXMQnq", "parentPublication": { "id": "wi-iat/2014/4143/2", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2017/6724/0/07926562", "title": "Design of Fuzzy Logic Based Controller for Energy Efficient Operation in Smart Buildings", "doi": null, "abstractUrl": "/proceedings-article/irc/2017/07926562/12OmNzBOhMK", "parentPublication": { "id": "proceedings/irc/2017/6724/0", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a267", "title": "3D Saliency for Finding Landmark Buildings", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a267/12OmNzT7Oth", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issst/2011/394/0/05936846", "title": "Enabling dynamic life cycle assessment of buildings with wireless sensor networks", "doi": null, "abstractUrl": "/proceedings-article/issst/2011/05936846/12OmNzTYBU3", "parentPublication": { "id": "proceedings/issst/2011/394/0", "title": "2011 IEEE International Symposium on Sustainable Systems and Technology (ISSST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/04/06990616", "title": "SAX Discretization Does Not Guarantee Equiprobable Symbols", "doi": null, "abstractUrl": "/journal/tk/2015/04/06990616/13rRUwbs2bt", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09774017", "title": "Distribution Agnostic Symbolic Representations for Time Series Dimensionality Reduction and Online Anomaly Detection", "doi": null, "abstractUrl": "/journal/tk/2023/06/09774017/1DjDmTynPMc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/su/2022/03/08781847", "title": "An Edge Based Data-Driven Chiller Sequencing Framework for HVAC Electricity Consumption Reduction in Commercial Buildings", "doi": null, "abstractUrl": "/journal/su/2022/03/08781847/1Gv8UrQFEAg", "parentPublication": { "id": "trans/su", "title": "IEEE Transactions on Sustainable Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0/08726717", "title": "Automated Concept Extraction in Internet-of-Things", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2018/08726717/1axfs2hgj7O", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0", "title": "2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4wr", "title": "2015 18th International Conference on Network-Based Information Systems (NBiS)", "acronym": "nbis", "groupId": "1002969", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNBO3Kfw", "doi": "10.1109/NBiS.2015.44", "title": "SAX-based Group Stock Portfolio Mining Approach", "normalizedTitle": "SAX-based Group Stock Portfolio Mining Approach", "abstract": "In this paper, symbolic aggregate approximation which is the well-known dimensionality reduction for time series is utilized for enhancing previous approach to mine more useful group stock portfolio by grouping genetic algorithm. Each chromosome consists of three part that are grouping, stock, and stock portfolio parts. Grouping and stock parts represent how to divide stocks into groups. Stock portfolio part means purchased stocks and units. Each individual is evaluated by group balance, portfolio satisfaction and SAX distance. Experiments on a real data are conducted to show merits of the proposed approach.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, symbolic aggregate approximation which is the well-known dimensionality reduction for time series is utilized for enhancing previous approach to mine more useful group stock portfolio by grouping genetic algorithm. Each chromosome consists of three part that are grouping, stock, and stock portfolio parts. Grouping and stock parts represent how to divide stocks into groups. Stock portfolio part means purchased stocks and units. Each individual is evaluated by group balance, portfolio satisfaction and SAX distance. Experiments on a real data are conducted to show merits of the proposed approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, symbolic aggregate approximation which is the well-known dimensionality reduction for time series is utilized for enhancing previous approach to mine more useful group stock portfolio by grouping genetic algorithm. Each chromosome consists of three part that are grouping, stock, and stock portfolio parts. Grouping and stock parts represent how to divide stocks into groups. Stock portfolio part means purchased stocks and units. Each individual is evaluated by group balance, portfolio satisfaction and SAX distance. Experiments on a real data are conducted to show merits of the proposed approach.", "fno": "9942a280", "keywords": [ "Portfolios", "Biological Cells", "Time Series Analysis", "Genetic Algorithms", "Genetics", "Manganese", "Aggregates", "Stock Portfolio Optimization", "Grouping Genetic Algorithm", "Genetic Algorithms", "Grouping Problems", "Symbolic Aggregate Approximation" ], "authors": [ { "affiliation": null, "fullName": "Chun-Hao Chen", "givenName": "Chun-Hao", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cheng-Yu Lu", "givenName": "Cheng-Yu", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chih-Hung Yu", "givenName": "Chih-Hung", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "nbis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "280-285", "year": "2015", "issn": null, "isbn": "978-1-4799-9942-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9942a273", "articleId": "12OmNwFicTF", "__typename": "AdjacentArticleType" }, "next": { "fno": "9942a286", "articleId": "12OmNBKmXn9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2014/5464/0/06982802", "title": "A multi-objective genetic stock portfolio mining approach with investor's requests", "doi": null, "abstractUrl": "/proceedings-article/grc/2014/06982802/12OmNArthcG", "parentPublication": { "id": "proceedings/grc/2014/5464/0", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2017/4203/0/4203a100", "title": "Diverse Group Stock Portfolio Optimization Based on Investor Sentiment Index", "doi": null, "abstractUrl": "/proceedings-article/taai/2017/4203a100/12OmNqyDjts", "parentPublication": { "id": "proceedings/taai/2017/4203/0", "title": "2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/2/3322b685", "title": "Stock Portfolio Recommendation Using Fuzzy Method", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322b685/12OmNviZll3", "parentPublication": { "id": "proceedings/ncm/2008/3322/2", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmso/2008/3484/0/3484a133", "title": "Portfolio VaR Computation Based on O-GARCH", "doi": null, "abstractUrl": "/proceedings-article/wmso/2008/3484a133/12OmNx6PiuR", "parentPublication": { "id": "proceedings/wmso/2008/3484/0", "title": "Modelling, Simulation and Optimization, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2014/6239/0/6239a482", "title": "Analysis on Stock Market Volatility with Collective Human Behaviors in Online Message Board", "doi": null, "abstractUrl": "/proceedings-article/cit/2014/6239a482/12OmNxVlTDL", "parentPublication": { "id": "proceedings/cit/2014/6239/0", "title": "2014 IEEE International Conference on Computer and Information Technology (CIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2013/3211/0/3211a569", "title": "Clustering of Japanese Stock Returns by Recursive Modularity Maximization", "doi": null, "abstractUrl": "/proceedings-article/sitis/2013/3211a569/12OmNy3Agtg", "parentPublication": { "id": "proceedings/sitis/2013/3211/0", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2017/6029/0/6029a594", "title": "Optimizing Diverse Group Stock Portfolio without Setting a Number of Groups", "doi": null, "abstractUrl": "/proceedings-article/aina/2017/6029a594/12OmNzayNbh", "parentPublication": { "id": "proceedings/aina/2017/6029/0", "title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccbd/2016/3555/0/3555a145", "title": "Affinity Propagation Clustering for Intelligent Portfolio Diversification and Investment Risk Reduction", "doi": null, "abstractUrl": "/proceedings-article/ccbd/2016/3555a145/12OmNzt0IwQ", "parentPublication": { "id": "proceedings/ccbd/2016/3555/0", "title": "2016 7th International Conference on Cloud Computing and Big Data (CCBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b693", "title": "A Practical Machine Learning Approach for Dynamic Stock Recommendation", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b693/17D45WHONis", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbfd/2021/1227/0/122700a468", "title": "Quantitative Analysis of Stock Portfolio: Taking Six Technology Companies as Example", "doi": null, "abstractUrl": "/proceedings-article/cbfd/2021/122700a468/1CJfQi9hs1a", "parentPublication": { "id": "proceedings/cbfd/2021/1227/0", "title": "2021 International Conference on Computer, Blockchain and Financial Development (CBFD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy9Prj2", "title": "Proceedings of the 2003 Winter Simulation Conference", "acronym": "wsc", "groupId": "1000674", "volume": "1", "displayVolume": "1", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJiCKC", "doi": "10.1109/WSC.2003.1261437", "title": "OptFolio - a simulation optimization system for project portfolio planning", "normalizedTitle": "OptFolio - a simulation optimization system for project portfolio planning", "abstract": "OptFolio is a new portfolio optimization software system simultaneously addresses financial return goals, catastrophic loss avoidance, and performance probability. The innovations embedded in the system enable users to confidently design effective plans for achieving financial goals, employing accurate analysis based on real data. State-of-the-art technology integrates simulation and metaheuristic optimization techniques and a new surface methodology based on linear programming into a global system that guides a series of evaluations to reveal truly optimal investment scenarios. Portfolio analysis tools are designed to aid senior management in the development and analysis of portfolio strategies, by giving them the capability to assess the impact on the corporation of various investment decisions. In this paper we will present new techniques that increase the flexibility of optimization tools and deepen the types of portfolio analysis that can be carried out. We include examples applied to energy, pharmaceutical, and information technology portfolios.", "abstracts": [ { "abstractType": "Regular", "content": "OptFolio is a new portfolio optimization software system simultaneously addresses financial return goals, catastrophic loss avoidance, and performance probability. The innovations embedded in the system enable users to confidently design effective plans for achieving financial goals, employing accurate analysis based on real data. State-of-the-art technology integrates simulation and metaheuristic optimization techniques and a new surface methodology based on linear programming into a global system that guides a series of evaluations to reveal truly optimal investment scenarios. Portfolio analysis tools are designed to aid senior management in the development and analysis of portfolio strategies, by giving them the capability to assess the impact on the corporation of various investment decisions. In this paper we will present new techniques that increase the flexibility of optimization tools and deepen the types of portfolio analysis that can be carried out. We include examples applied to energy, pharmaceutical, and information technology portfolios.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "OptFolio is a new portfolio optimization software system simultaneously addresses financial return goals, catastrophic loss avoidance, and performance probability. The innovations embedded in the system enable users to confidently design effective plans for achieving financial goals, employing accurate analysis based on real data. State-of-the-art technology integrates simulation and metaheuristic optimization techniques and a new surface methodology based on linear programming into a global system that guides a series of evaluations to reveal truly optimal investment scenarios. Portfolio analysis tools are designed to aid senior management in the development and analysis of portfolio strategies, by giving them the capability to assess the impact on the corporation of various investment decisions. In this paper we will present new techniques that increase the flexibility of optimization tools and deepen the types of portfolio analysis that can be carried out. We include examples applied to energy, pharmaceutical, and information technology portfolios.", "fno": "01261437", "keywords": [ "Financial Data Processing", "Digital Simulation", "Investment", "Linear Programming", "Optimisation", "Power Engineering Computing", "Pharmaceutical Industry", "Information Technology", "Opt Folio", "Simulation Optimization System", "Project Portfolio Planning", "Portfolio Optimization Software System", "Financial Return Goals", "Catastrophic Loss Avoidance", "Performance Probability", "System Innovations", "Data Analysis", "Metaheuristic Optimization Techniques", "Surface Methodology", "Linear Programming", "Global System", "Optimal Investment Scenarios", "Portfolio Analysis Tools", "Senior Management", "Portfolio Strategy Analysis", "Portfolio Strategy Development", "Investment Decisions", "Flexibility", "Optimization Tools", "Energy Portfolios", "Pharmaceutical Portfolios", "Information Technology Portfolios", "Portfolios", "Investments", "Analysis Of Variance", "Pharmaceutical Technology", "Information Analysis", "Finance", "Costs", "Software Systems", "Performance Loss", "Technological Innovation" ], "authors": [ { "affiliation": "OptTek Syst., Inc., Boulder, CO, USA", "fullName": "April", "givenName": null, "surname": "April", "__typename": "ArticleAuthorType" }, { "affiliation": "OptTek Syst., Inc., Boulder, CO, USA", "fullName": "Glover", "givenName": null, "surname": "Glover", "__typename": "ArticleAuthorType" }, { "affiliation": "OptTek Syst., Inc., Boulder, CO, USA", "fullName": "Kelly", "givenName": null, "surname": "Kelly", "__typename": "ArticleAuthorType" } ], "idPrefix": "wsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "301-309 Vol.1", "year": "2003", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01261436", "articleId": "12OmNrIae7W", "__typename": "AdjacentArticleType" }, "next": { "fno": "01261438", "articleId": "12OmNxjBfjS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/taai/2017/4203/0/4203a100", "title": "Diverse Group Stock Portfolio Optimization Based on Investor Sentiment Index", "doi": null, "abstractUrl": "/proceedings-article/taai/2017/4203a100/12OmNqyDjts", "parentPublication": { "id": "proceedings/taai/2017/4203/0", "title": "2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcgin/2012/4854/0/4854a006", "title": "A Method of IT Investment Portfolio Optimization in the Government Sector Integrated with IT Governance", "doi": null, "abstractUrl": "/proceedings-article/bcgin/2012/4854a006/12OmNviHK9x", "parentPublication": { "id": "proceedings/bcgin/2012/4854/0", "title": "2012 Second International Conference on Business Computing and Global Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2013/4777/0/4777a201", "title": "Modeling Exchange Traded Funds Portfolio Using Optimization Model", "doi": null, "abstractUrl": "/proceedings-article/bife/2013/4777a201/12OmNwdtwaq", "parentPublication": { "id": "proceedings/bife/2013/4777/0", "title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2003/8131/1/01261442", "title": "Simulation and optimization for real options valuation", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261442/12OmNwekjFr", "parentPublication": { "id": "proceedings/wsc/2003/8131/1", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2002/7614/2/01166431", "title": "Portfolio optimization for capital investment projects", "doi": null, "abstractUrl": "/proceedings-article/wsc/2002/01166431/12OmNxzMnRI", "parentPublication": { "id": "proceedings/wsc/2002/7614/2", "title": "Proceedings of the 2002 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiaws/1991/2240/0/00236570", "title": "The SPLENDORS real time portfolio management system", "doi": null, "abstractUrl": "/proceedings-article/aiaws/1991/00236570/12OmNyL0TEd", "parentPublication": { "id": "proceedings/aiaws/1991/2240/0", "title": "Proceedings First International Conference on Artificial Intelligence Applications on Wall Street", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a623", "title": "A Mean-Semi-variance Portfolio Optimization Model with Full Transaction Costs", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a623/12OmNyeECxG", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a869", "title": "Online Newton Step for Portfolio Selection with Side Information", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a869/17D45VTRoEm", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbase/2020/9619/0/961900a386", "title": "Research on an Intelligent Optimization Algorithm for Combinatorial Optimization Problem Based on Big Data", "doi": null, "abstractUrl": "/proceedings-article/icbase/2020/961900a386/1t2nxvosNIk", "parentPublication": { "id": "proceedings/icbase/2020/9619/0", "title": "2020 International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a894", "title": "Entropy Risk Measurement and Portfolio Model under Entropy Risk", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a894/1tV9hVZZFwk", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxzMnU0", "title": "2011 15th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzSQdqN", "doi": "10.1109/IV.2011.65", "title": "Design Considerations for Drill-down Charts", "normalizedTitle": "Design Considerations for Drill-down Charts", "abstract": "Frequency-based statistical charts are the most widespread visualizations and the preferred of Infovis novices. They are important in depicting categorical data and providing data abstraction on large datasets. The drill down feature enables better visual scaling by allowing navigation through aggregation hierarchies. In this paper we discuss design considerations that impact on the usability in drill down charts. We develop a tool based on pie chart in order to illustrate the discussion. Moreover, we suggest visual representations and an interaction model. Finally, we provide evidence on the benefit of using such techniques for visual analysis of categorical data through a short usability study.", "abstracts": [ { "abstractType": "Regular", "content": "Frequency-based statistical charts are the most widespread visualizations and the preferred of Infovis novices. They are important in depicting categorical data and providing data abstraction on large datasets. The drill down feature enables better visual scaling by allowing navigation through aggregation hierarchies. In this paper we discuss design considerations that impact on the usability in drill down charts. We develop a tool based on pie chart in order to illustrate the discussion. Moreover, we suggest visual representations and an interaction model. Finally, we provide evidence on the benefit of using such techniques for visual analysis of categorical data through a short usability study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Frequency-based statistical charts are the most widespread visualizations and the preferred of Infovis novices. They are important in depicting categorical data and providing data abstraction on large datasets. The drill down feature enables better visual scaling by allowing navigation through aggregation hierarchies. In this paper we discuss design considerations that impact on the usability in drill down charts. We develop a tool based on pie chart in order to illustrate the discussion. Moreover, we suggest visual representations and an interaction model. Finally, we provide evidence on the benefit of using such techniques for visual analysis of categorical data through a short usability study.", "fno": "06004025", "keywords": [ "Charts", "Data Structures", "Data Visualisation", "Drill Down Charts", "Frequency Based Statistical Charts", "Infovis Novices", "Data Abstraction", "Large Datasets", "Visual Scaling", "Aggregation Hierarchies", "Visual Representations", "Interaction Model", "Categorical Data Visual Analysis", "Navigation", "Visualization", "Data Visualization", "Aggregates", "Guidelines", "Usability", "Context", "Information Visualization", "Drill Down Chart", "Categorical Data", "Multiscale", "Aggregation Hierarchy" ], "authors": [ { "affiliation": null, "fullName": "Rafael Veras Guimares", "givenName": "Rafael Veras", "surname": "Guimares", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Anderson Gregorio Marques Soares", "givenName": "Anderson Gregorio Marques", "surname": "Soares", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nikolas Jorge Santiago Carneiro", "givenName": "Nikolas Jorge Santiago", "surname": "Carneiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aruanda Simões Meiguins", "givenName": "Aruanda Simões", "surname": "Meiguins", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bianchi Serique Meiguins", "givenName": "Bianchi Serique", "surname": "Meiguins", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "73-79", "year": "2011", "issn": "1550-6037", "isbn": "978-1-4577-0868-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06004024", "articleId": "12OmNxveNLS", "__typename": "AdjacentArticleType" }, "next": { "fno": "06004026", "articleId": "12OmNCcKQKB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a096", "title": "Microtext Line Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a096/12OmNAqkSCW", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498300", "title": "Interactive data exploration with smart drill-down", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498300/12OmNBOUxko", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a152", "title": "Heuristic Evaluation of a t-Commerce InfoVis Prototype", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a152/12OmNxRWId2", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/03/v0255", "title": "Hierarchical Pixel Bar Charts", "doi": null, "abstractUrl": "/journal/tg/2002/03/v0255/13rRUyuegh1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/01/07885129", "title": "Interactive Data Exploration with Smart Drill-Down", "doi": null, "abstractUrl": "/journal/tk/2019/01/07885129/17D45WIXbRs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904452", "title": "Striking a Balance: Reader Takeaways and Preferences when Integrating Text and Charts", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904452/1H1gordOnfy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09257096", "title": "Enhancing Static Charts With Data-Driven Animations", "doi": null, "abstractUrl": "/journal/tg/2022/07/09257096/1oFCDuG0ysg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09472937", "title": "ChartNavigator: An Interactive Pattern Identification and Annotation Framework for Charts", "doi": null, "abstractUrl": "/journal/tk/2023/02/09472937/1uUtsAHpq2Q", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552881", "title": "Modeling Just Noticeable Differences in Charts", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552881/1xibXzMLm9i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a046", "title": "Semantic Resizing of Charts Through Generalization: A Case Study with Line Charts", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a046/1yXugmj02eA", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFtz", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZWbza", "doi": "10.1109/HICSS.2008.352", "title": "Preparing a Negotiated R&#x00026;D Portfolio with a Prediction Market", "normalizedTitle": "Preparing a Negotiated R&D Portfolio with a Prediction Market", "abstract": "The main objective of this research is to use prediction markets as negotiation agents, for supporting R&amp;D portfolio management. To support this research, we iteratively designed, developed, operated and evaluated several prototypes. We start by presenting the weaknesses of the current techniques for managing R&amp;D portfolio. Then, we intend to demonstrate that prediction markets correct these weaknesses in R&amp;D portfolio management. Furthermore, following a design science paradigm, we illustrate the design of our artifacts using build-and-evaluate loops supported with a field study, which consisted in operating the prediction markets in different settings.", "abstracts": [ { "abstractType": "Regular", "content": "The main objective of this research is to use prediction markets as negotiation agents, for supporting R&amp;D portfolio management. To support this research, we iteratively designed, developed, operated and evaluated several prototypes. We start by presenting the weaknesses of the current techniques for managing R&amp;D portfolio. Then, we intend to demonstrate that prediction markets correct these weaknesses in R&amp;D portfolio management. Furthermore, following a design science paradigm, we illustrate the design of our artifacts using build-and-evaluate loops supported with a field study, which consisted in operating the prediction markets in different settings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The main objective of this research is to use prediction markets as negotiation agents, for supporting R&D portfolio management. To support this research, we iteratively designed, developed, operated and evaluated several prototypes. We start by presenting the weaknesses of the current techniques for managing R&D portfolio. Then, we intend to demonstrate that prediction markets correct these weaknesses in R&D portfolio management. Furthermore, following a design science paradigm, we illustrate the design of our artifacts using build-and-evaluate loops supported with a field study, which consisted in operating the prediction markets in different settings.", "fno": "04438757", "keywords": [ "Information Management", "Knowledge Management", "Research And Development", "Negotiated R Amp D Portfolio", "Prediction Market", "Negotiation Agents", "Portfolio Management", "Build And Evaluate Loops", "Portfolios", "Research And Development", "Research And Development Management", "Project Management", "Economic Forecasting", "Knowledge Management", "Conference Management", "Prototypes", "Quality Management", "Aggregates" ], "authors": [ { "affiliation": null, "fullName": "Cedric Gaspoz", "givenName": "Cedric", "surname": "Gaspoz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yves Pigneur", "givenName": "Yves", "surname": "Pigneur", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-01-01T00:00:00", "pubType": "proceedings", "pages": "53-53", "year": "2008", "issn": "1530-1605", "isbn": "978-0-7695-3075-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04438756", "articleId": "12OmNC4wtAu", "__typename": "AdjacentArticleType" }, "next": { "fno": "04438758", "articleId": "12OmNxGALeR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2008/3075/0/04439015", "title": "Do Firm R&#x00026;D Investments Drive Decisions to Join? On the Value of Standard-Setting Organizations in the Consumer Electronics Industry", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439015/12OmNAS9zMA", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/2/3735b557", "title": "Logit Model for the Choice of R&#x00026;D Cooperation Mode for Hi-tech SME", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b557/12OmNCcbE6S", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04439036", "title": "Relative Importance of Knowledge Portal Functionalities: A Contingent Approach on Knowledge Portal Design for R&#x00026;D Teams", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439036/12OmNwFicRm", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2008/3435/2/3435b157", "title": "Real Options and Process Management of R&#x00026;D Projects", "doi": null, "abstractUrl": "/proceedings-article/iciii/2008/3435b157/12OmNxA3YSv", "parentPublication": { "id": "proceedings/iciii/2008/3435/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmb-gmr/2010/4084/0/4084a017", "title": "Mobile R&#x00026;D Prototypes: What is Hampering Market Implementation?", "doi": null, "abstractUrl": "/proceedings-article/icmb-gmr/2010/4084a017/12OmNz5JC9j", "parentPublication": { "id": "proceedings/icmb-gmr/2010/4084/0", "title": "Mobile Business / Global Mobility Roundtable, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icrmem/2008/3402/0/3402a593", "title": "The Relationship between Organizational Career Management and Job Satisfaction: An Empirical Study on Software R&#x00026;D Professionals", "doi": null, "abstractUrl": "/proceedings-article/icrmem/2008/3402a593/12OmNzZmZtV", "parentPublication": { "id": "proceedings/icrmem/2008/3402/0", "title": "2008 International Conference on Risk Management &amp; Engineering Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fitme/2008/3480/0/3480a543", "title": "Research on the Synergistic Work Mechanism of R&#x00026;D Teams", "doi": null, "abstractUrl": "/proceedings-article/fitme/2008/3480a543/12OmNzlD94h", "parentPublication": { "id": "proceedings/fitme/2008/3480/0", "title": "Future Information Technology and Management Engineering, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2020/9532/0/09226317", "title": "Towards Lean R&amp;D: An Agile Research and Development Approach for Digital Transformation", "doi": null, "abstractUrl": "/proceedings-article/seaa/2020/09226317/1nYsXrffrEc", "parentPublication": { "id": "proceedings/seaa/2020/9532/0", "title": "2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd-winter/2021/1843/0/184300a153", "title": "Research on R&#x0026;D process proposal in the era of convergence", "doi": null, "abstractUrl": "/proceedings-article/snpd-winter/2021/184300a153/1sQKeJTt2mY", "parentPublication": { "id": "proceedings/snpd-winter/2021/1843/0", "title": "2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pmis/2021/3872/0/387200a324", "title": "R &#x0026; D Intensity and Corporate AI Strength Attention: The moderating role of Coercive Pressure and Mimetic Pressure", "doi": null, "abstractUrl": "/proceedings-article/pmis/2021/387200a324/1t2n2ALtmxy", "parentPublication": { "id": "proceedings/pmis/2021/3872/0", "title": "2021 International Conference on Public Management and Intelligent Society (PMIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmEqgC6dxu", "doi": "10.1109/ICCV48922.2021.00487", "title": "Collaborative Unsupervised Visual Representation Learning from Decentralized Data", "normalizedTitle": "Collaborative Unsupervised Visual Representation Learning from Decentralized Data", "abstract": "Unsupervised representation learning has achieved outstanding performances using centralized data available on the Internet. However, the increasing awareness of privacy protection limits sharing of decentralized unlabeled image data that grows explosively in multiple parties (e.g., mobile phones and cameras). As such, a natural problem is how to leverage these data to learn visual representations for downstream tasks while preserving data privacy. To address this problem, we propose a novel federated unsupervised learning framework, FedU. In this framework, each party trains models from unlabeled data independently using contrastive learning with an online network and a target network. Then, a central server aggregates trained models and updates clients&#x2019; models with the aggregated model. It preserves data privacy as each party only has access to its raw data. Decentralized data among multiple parties are normally non-independent and identically distributed (non-IID), leading to performance degradation. To tackle this challenge, we propose two simple but effective methods: 1) We design the communication protocol to upload only the encoders of online networks for server aggregation and update them with the aggregated encoder; 2) We introduce a new module to dynamically decide how to update predictors based on the divergence caused by non-IID. The predictor is the other component of the online network. Extensive experiments and ablations demonstrate the effectiveness and significance of FedU. It outperforms training with only one party by over 5% and other methods by over 14% in linear and semi-supervised evaluation on non-IID data.", "abstracts": [ { "abstractType": "Regular", "content": "Unsupervised representation learning has achieved outstanding performances using centralized data available on the Internet. However, the increasing awareness of privacy protection limits sharing of decentralized unlabeled image data that grows explosively in multiple parties (e.g., mobile phones and cameras). As such, a natural problem is how to leverage these data to learn visual representations for downstream tasks while preserving data privacy. To address this problem, we propose a novel federated unsupervised learning framework, FedU. In this framework, each party trains models from unlabeled data independently using contrastive learning with an online network and a target network. Then, a central server aggregates trained models and updates clients&#x2019; models with the aggregated model. It preserves data privacy as each party only has access to its raw data. Decentralized data among multiple parties are normally non-independent and identically distributed (non-IID), leading to performance degradation. To tackle this challenge, we propose two simple but effective methods: 1) We design the communication protocol to upload only the encoders of online networks for server aggregation and update them with the aggregated encoder; 2) We introduce a new module to dynamically decide how to update predictors based on the divergence caused by non-IID. The predictor is the other component of the online network. Extensive experiments and ablations demonstrate the effectiveness and significance of FedU. It outperforms training with only one party by over 5% and other methods by over 14% in linear and semi-supervised evaluation on non-IID data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Unsupervised representation learning has achieved outstanding performances using centralized data available on the Internet. However, the increasing awareness of privacy protection limits sharing of decentralized unlabeled image data that grows explosively in multiple parties (e.g., mobile phones and cameras). As such, a natural problem is how to leverage these data to learn visual representations for downstream tasks while preserving data privacy. To address this problem, we propose a novel federated unsupervised learning framework, FedU. In this framework, each party trains models from unlabeled data independently using contrastive learning with an online network and a target network. Then, a central server aggregates trained models and updates clients’ models with the aggregated model. It preserves data privacy as each party only has access to its raw data. Decentralized data among multiple parties are normally non-independent and identically distributed (non-IID), leading to performance degradation. To tackle this challenge, we propose two simple but effective methods: 1) We design the communication protocol to upload only the encoders of online networks for server aggregation and update them with the aggregated encoder; 2) We introduce a new module to dynamically decide how to update predictors based on the divergence caused by non-IID. The predictor is the other component of the online network. Extensive experiments and ablations demonstrate the effectiveness and significance of FedU. It outperforms training with only one party by over 5% and other methods by over 14% in linear and semi-supervised evaluation on non-IID data.", "fno": "281200e892", "keywords": [ "Representation Learning", "Training", "Data Privacy", "Visualization", "Protocols", "Aggregates", "Mobile Handsets", "Vision Applications And Systems", "Representation Learning", "Transfer Low Shot Semi Unsupervised Learning" ], "authors": [ { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Weiming Zhuang", "givenName": "Weiming", "surname": "Zhuang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University", "fullName": "Xin Gan", "givenName": "Xin", "surname": "Gan", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University", "fullName": "Yonggang Wen", "givenName": "Yonggang", "surname": "Wen", "__typename": "ArticleAuthorType" }, { "affiliation": "SenseTime Research", "fullName": "Shuai Zhang", "givenName": "Shuai", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "SenseTime Research", "fullName": "Shuai Yi", "givenName": "Shuai", "surname": "Yi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "4892-4901", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200e882", "articleId": "1BmFSvJIg4U", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200e902", "articleId": "1BmHCzr4bDO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pst/2015/7828/0/07232947", "title": "InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol", "doi": null, "abstractUrl": "/proceedings-article/pst/2015/07232947/12OmNy4IEU7", "parentPublication": { "id": "proceedings/pst/2015/7828/0", "title": "2015 13th Annual Conference on Privacy, Security and Trust (PST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e400", "title": "Federated Learning for Non-IID Data via Unified Feature Learning and Optimization Objective Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e400/1BmKStd621W", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09789268", "title": "Practical Vertical Federated Learning with Unsupervised Representation Learning", "doi": null, "abstractUrl": "/journal/bd/5555/01/09789268/1DZ7SAQydO0", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2021/2186/0/218600a174", "title": "Parameter Factorial Weighting of Federated Learning: Center-Client Access Strategy and Application Design", "doi": null, "abstractUrl": "/proceedings-article/icaice/2021/218600a174/1Et4IC7gYog", "parentPublication": { "id": "proceedings/icaice/2021/2186/0", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn-w/2022/0262/0/026200a052", "title": "On the impact of non-IID data on the performance and fairness of differentially private federated learning", "doi": null, "abstractUrl": "/proceedings-article/dsn-w/2022/026200a052/1FkbmwabohW", "parentPublication": { "id": "proceedings/dsn-w/2022/0262/0", "title": "2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900d376", "title": "Communication-Efficient Federated Data Augmentation on Non-IID Data", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900d376/1G57gx9R8Q0", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icss/2022/9861/0/986100a305", "title": "Differentially Private Auction for Federated Learning with Non-IID Data", "doi": null, "abstractUrl": "/proceedings-article/icss/2022/986100a305/1G6jzHHtnFe", "parentPublication": { "id": "proceedings/icss/2022/9861/0", "title": "2022 International Conference on Service Science (ICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09618806", "title": "Secure Aggregation is Insecure: Category Inference Attack on Federated Learning", "doi": null, "abstractUrl": "/journal/tq/2023/01/09618806/1JU081kA53O", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2022/7315/0/731500a688", "title": "Decentralized Federated Learning with Data Feature Transmission and Neighbor Selection", "doi": null, "abstractUrl": "/proceedings-article/icpads/2022/731500a688/1LRlYiRWHU4", "parentPublication": { "id": "proceedings/icpads/2023/7315/0", "title": "2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2020/9074/0/907400a585", "title": "Robust Federated Learning Approach for Travel Mode Identification from Non-IID GPS Trajectories", "doi": null, "abstractUrl": "/proceedings-article/icpads/2020/907400a585/1rvCrbpHAZi", "parentPublication": { "id": "proceedings/icpads/2020/9074/0", "title": "2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJs4F2LGQU", "doi": "10.1109/BigData47090.2019.9005653", "title": "RAMP: Real-Time Anomaly Detection in Scientific Workflows", "normalizedTitle": "RAMP: Real-Time Anomaly Detection in Scientific Workflows", "abstract": "Research integrity is crucial to ensuring the trustworthiness of scientific discoveries. This work is aimed at detecting misbehaviors targeting scientific workflows, which are computing paradigms widely used to facilitate scientific collaborations across multiple geographically distributed research sites. We develop a new system called RAMP(Real-Time Aggregated Matrix Profile) for real-time anomaly detection in scientific workflow systems. RAMP builds upon an existing time series data analysis technique called Matrix Profile to detect anomalous distances among subsequences of event streams collected from scientific workflows in an online manner. Using an adaptive uncertainty function, the anomaly detection model is dynamically adjusted to prevent high false alarm rates. RAMP can incorporate user feedback on reported anomalies and modify model parameters to improve anomaly detection accuracy. Our experimental results from applying RAMP to the logs generated by DATAVIEW, a scientific workflow platform, show that RAMP is able to identify a varied range of anomalies with high accuracy for both interleaved and non-interleaved workflow executions in real time.", "abstracts": [ { "abstractType": "Regular", "content": "Research integrity is crucial to ensuring the trustworthiness of scientific discoveries. This work is aimed at detecting misbehaviors targeting scientific workflows, which are computing paradigms widely used to facilitate scientific collaborations across multiple geographically distributed research sites. We develop a new system called RAMP(Real-Time Aggregated Matrix Profile) for real-time anomaly detection in scientific workflow systems. RAMP builds upon an existing time series data analysis technique called Matrix Profile to detect anomalous distances among subsequences of event streams collected from scientific workflows in an online manner. Using an adaptive uncertainty function, the anomaly detection model is dynamically adjusted to prevent high false alarm rates. RAMP can incorporate user feedback on reported anomalies and modify model parameters to improve anomaly detection accuracy. Our experimental results from applying RAMP to the logs generated by DATAVIEW, a scientific workflow platform, show that RAMP is able to identify a varied range of anomalies with high accuracy for both interleaved and non-interleaved workflow executions in real time.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research integrity is crucial to ensuring the trustworthiness of scientific discoveries. This work is aimed at detecting misbehaviors targeting scientific workflows, which are computing paradigms widely used to facilitate scientific collaborations across multiple geographically distributed research sites. We develop a new system called RAMP(Real-Time Aggregated Matrix Profile) for real-time anomaly detection in scientific workflow systems. RAMP builds upon an existing time series data analysis technique called Matrix Profile to detect anomalous distances among subsequences of event streams collected from scientific workflows in an online manner. Using an adaptive uncertainty function, the anomaly detection model is dynamically adjusted to prevent high false alarm rates. RAMP can incorporate user feedback on reported anomalies and modify model parameters to improve anomaly detection accuracy. Our experimental results from applying RAMP to the logs generated by DATAVIEW, a scientific workflow platform, show that RAMP is able to identify a varied range of anomalies with high accuracy for both interleaved and non-interleaved workflow executions in real time.", "fno": "09005653", "keywords": [ "Data Analysis", "Data Mining", "Natural Sciences Computing", "Security Of Data", "Time Series", "Workflow Management Software", "Scientific Collaborations", "Multiple Geographically Distributed Research Sites", "RAMP", "Matrix Profile", "Real Time Anomaly Detection", "Scientific Workflow Systems", "Anomaly Detection Model", "Anomaly Detection Accuracy", "Scientific Workflow Platform", "Noninterleaved Workflow Executions", "Research Integrity", "Scientific Discoveries", "Time Series Data Analysis Technique", "Task Analysis", "Anomaly Detection", "Real Time Systems", "Time Series Analysis", "Adaptation Models", "Training", "Uncertainty" ], "authors": [ { "affiliation": "State University of New York at Binghamton,Binghamton,NY,USA", "fullName": "J. Dinal Herath", "givenName": "J.", "surname": "Dinal Herath", "__typename": "ArticleAuthorType" }, { "affiliation": "Wayne State University,Detroit,MI,USA", "fullName": "Changxin Bai", "givenName": "Changxin", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "State University of New York at Binghamton,Binghamton,NY,USA", "fullName": "Guanhua Yan", "givenName": "Guanhua", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": "State University of New York at Binghamton,Binghamton,NY,USA", "fullName": "Ping Yang", "givenName": "Ping", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Wayne State University,Detroit,MI,USA", "fullName": "Shiyong Lu", "givenName": "Shiyong", "surname": "Lu", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "1367-1374", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006258", "articleId": "1hJs9ZiLVMQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "09006487", "articleId": "1hJs9UFeh1u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdpsw/2016/3682/0/3682b370", "title": "Toward an End-to-End Framework for Modeling, Monitoring and Anomaly Detection for Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682b370/12OmNwE9OTd", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b074", "title": "Granger Causality for Time-Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b074/12OmNzYwccd", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2018/7232/0/723201a158", "title": "Sensor Data Based System-Level Anomaly Prediction for Smart Manufacturing", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2018/723201a158/17D45WK5Ak5", "parentPublication": { "id": "proceedings/bigdata-congress/2018/7232/0", "title": "2018 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2017/1996/0/08029330", "title": "Real-Time Anomaly Detection of Short-Time-Scale GWAC Survey Light Curves", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2017/08029330/17D45WrVgfe", "parentPublication": { "id": "proceedings/bigdata-congress/2017/1996/0", "title": "2017 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hase/2019/8540/0/854000a033", "title": "Real-Time Anomaly Detection Method for Space Imager Streaming Data Based on HTM Algorithm", "doi": null, "abstractUrl": "/proceedings-article/hase/2019/854000a033/18IoXv2kslq", "parentPublication": { "id": "proceedings/hase/2019/8540/0", "title": "2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2022/9956/0/995600a001", "title": "Accelerating Scientific Workflows on HPC Platforms with In Situ Processing", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2022/995600a001/1F8zd8clNqo", "parentPublication": { "id": "proceedings/ccgrid/2022/9956/0", "title": "2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a056", "title": "Anomaly Detection in Network Management System Based on Isolation Forest", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a056/1dUo1pXwbBe", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306570", "title": "Anomaly Detection using Variational Autoencoder with Spectrum Analysis for Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306570/1qcifoz0rQc", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378315", "title": "Deep Anomaly Detection with Ensemble-Based Active Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378315/1s64qptGUCc", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300a344", "title": "SALAD: Self-Adaptive Lightweight Anomaly Detection for Real-time Recurrent Time Series", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300a344/1wLcljw8Xio", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kaMxDONP0Y", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kaMP5idNGU", "doi": "10.1109/ICDE48307.2020.00246", "title": "Picube for Fast Exploration of Large Datasets", "normalizedTitle": "Picube for Fast Exploration of Large Datasets", "abstract": "Hierarchical aggregation supports fast exploration of large datasets by pre-aggregating data into a multi-scale data structure. While the pre-aggregation process is done offline, it can be quite expensive, and the resulting data-structure extremely large. When the data is multi-dimensional, this is greatly compounded. Data-cube-based approaches can result in extremely large cubic data-structures, aggregating more than is needed. Other approaches do not aggregate enough, and so do not offer the necessary flexibility for dimension-wise roll-ups and drill-downs. We design a hierarchical data-structure for aggregation that strikes a balance, and provides enough flexibility for different exploration scenarios with low-cost construction and reasonable size. Inductive aggregation is a methodology to compute levels of aggregations efficiently, while the resulting data-structure supports smooth data exploration. Inspired by this, we propose a partitioned, inductively aggregated data-cube, picube. A framework we call stratum space is presented with the model to express the dependencies across aggregation levels. Optimization choices are discussed, providing good design tradeoffs between storing and querying of the data.", "abstracts": [ { "abstractType": "Regular", "content": "Hierarchical aggregation supports fast exploration of large datasets by pre-aggregating data into a multi-scale data structure. While the pre-aggregation process is done offline, it can be quite expensive, and the resulting data-structure extremely large. When the data is multi-dimensional, this is greatly compounded. Data-cube-based approaches can result in extremely large cubic data-structures, aggregating more than is needed. Other approaches do not aggregate enough, and so do not offer the necessary flexibility for dimension-wise roll-ups and drill-downs. We design a hierarchical data-structure for aggregation that strikes a balance, and provides enough flexibility for different exploration scenarios with low-cost construction and reasonable size. Inductive aggregation is a methodology to compute levels of aggregations efficiently, while the resulting data-structure supports smooth data exploration. Inspired by this, we propose a partitioned, inductively aggregated data-cube, picube. A framework we call stratum space is presented with the model to express the dependencies across aggregation levels. Optimization choices are discussed, providing good design tradeoffs between storing and querying of the data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Hierarchical aggregation supports fast exploration of large datasets by pre-aggregating data into a multi-scale data structure. While the pre-aggregation process is done offline, it can be quite expensive, and the resulting data-structure extremely large. When the data is multi-dimensional, this is greatly compounded. Data-cube-based approaches can result in extremely large cubic data-structures, aggregating more than is needed. Other approaches do not aggregate enough, and so do not offer the necessary flexibility for dimension-wise roll-ups and drill-downs. We design a hierarchical data-structure for aggregation that strikes a balance, and provides enough flexibility for different exploration scenarios with low-cost construction and reasonable size. Inductive aggregation is a methodology to compute levels of aggregations efficiently, while the resulting data-structure supports smooth data exploration. Inspired by this, we propose a partitioned, inductively aggregated data-cube, picube. A framework we call stratum space is presented with the model to express the dependencies across aggregation levels. Optimization choices are discussed, providing good design tradeoffs between storing and querying of the data.", "fno": "09101368", "keywords": [ "Data Aggregation", "Data Structures", "Query Processing", "Picube", "Hierarchical Aggregation", "Multiscale Data Structure", "Pre Aggregation Process", "Dimension Wise Roll Ups", "Hierarchical Data Structure", "Inductive Aggregation", "Data Exploration", "Partitioned Data Cube", "Inductively Aggregated Data Cube", "Aggregation Levels", "Cubic Data Structures", "Large Datasets", "Stratum Space", "Data Querying", "Aggregates", "Windows", "Data Structures", "Indexes", "Optimization", "Prefetching", "Visualization", "Inductive Aggregation", "Data Cube", "Partition", "Flexibility", "Efficiency", "Size" ], "authors": [ { "affiliation": "York University,Supervised by Professor Parke Godfrey,Toronto,Canada", "fullName": "Wenxiao Fu", "givenName": "Wenxiao", "surname": "Fu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "2069-2073", "year": "2020", "issn": null, "isbn": "978-1-7281-2903-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09101355", "articleId": "1kaMyHjSSY0", "__typename": "AdjacentArticleType" }, "next": { "fno": "09101349", "articleId": "1kaMOxweV8Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2014/2555/0/06816674", "title": "Distributed and interactive cube exploration", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816674/12OmNAmE5W7", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2012/4733/0/06378972", "title": "Query-driven parallel exploration of large datasets", "doi": null, "abstractUrl": "/proceedings-article/ldav/2012/06378972/12OmNAnMuIO", "parentPublication": { "id": "proceedings/ldav/2012/4733/0", "title": "2012 IEEE Symposium on Large Data Analysis and Visualization (LDAV 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2013/1050/0/06642488", "title": "Feature list aggregation approaches for ensemble gene selection on patient response datasets", "doi": null, "abstractUrl": "/proceedings-article/iri/2013/06642488/12OmNCcKQku", "parentPublication": { "id": "proceedings/iri/2013/1050/0", "title": "2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544894", "title": "gIceberg: Towards iceberg analysis in large graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544894/12OmNvk7JZU", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2013/5303/0/06547461", "title": "P-Mine: Parallel itemset mining on large datasets", "doi": null, "abstractUrl": "/proceedings-article/icdew/2013/06547461/12OmNzw8iZR", "parentPublication": { "id": "proceedings/icdew/2013/5303/0", "title": "2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122456", "title": "Nanocubes for Real-Time Exploration of Spatiotemporal Datasets", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122456/13rRUytF41z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534025", "title": "Towards Visual Exploration of Large Temporal Datasets", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534025/17D45XoXP4N", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08706590", "title": "Real-Time Exploration of Large Spatiotemporal Datasets Based on Order Statistics", "doi": null, "abstractUrl": "/journal/tg/2020/11/08706590/19OolipHNgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c695", "title": "Exploration of Knowledge Graphs via Online Aggregation", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c695/1FwFaHt8SRy", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794520", "title": "Scale-Space Splatting: Reforming Spacetime for Cross-Scale Exploration of Integral Measures in Molecular Dynamics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794520/1cr2ZqtuQq4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pVHfYdzyZW", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "acronym": "ithings-greencom-cpscom-smartdata-cybermatics", "groupId": "1800308", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pVHgEkrZpm", "doi": "10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00076", "title": "occupI: A novel Non-Intrusive Occupancy Inference Tool", "normalizedTitle": "occupI: A novel Non-Intrusive Occupancy Inference Tool", "abstract": "The residents' occupancy behaviour determines a big part of the energy usage inside a building. This paper implements a new methodology for real time occupancy inference (occupI) estimating when the resident is sleeping, absent or present based only on his/her aggregated energy consumption. The user's aggregated energy load is distinguished in low energy usage and high energy usage using an unsupervised Hidden Markov Model while creating the user's energy consumption base-load. The user's occupancy is inferred using a Decision Tree Classifier that extracts the user's daily occupancy behaviour. Finally, the proposed occupI tool is evaluated against real-life consumption data from residential environment, while the experimental results show that it is a powerful tool for user's occupancy, energy profiling, energy consumption awareness and occupancy-driven applications.", "abstracts": [ { "abstractType": "Regular", "content": "The residents' occupancy behaviour determines a big part of the energy usage inside a building. This paper implements a new methodology for real time occupancy inference (occupI) estimating when the resident is sleeping, absent or present based only on his/her aggregated energy consumption. The user's aggregated energy load is distinguished in low energy usage and high energy usage using an unsupervised Hidden Markov Model while creating the user's energy consumption base-load. The user's occupancy is inferred using a Decision Tree Classifier that extracts the user's daily occupancy behaviour. Finally, the proposed occupI tool is evaluated against real-life consumption data from residential environment, while the experimental results show that it is a powerful tool for user's occupancy, energy profiling, energy consumption awareness and occupancy-driven applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The residents' occupancy behaviour determines a big part of the energy usage inside a building. This paper implements a new methodology for real time occupancy inference (occupI) estimating when the resident is sleeping, absent or present based only on his/her aggregated energy consumption. The user's aggregated energy load is distinguished in low energy usage and high energy usage using an unsupervised Hidden Markov Model while creating the user's energy consumption base-load. The user's occupancy is inferred using a Decision Tree Classifier that extracts the user's daily occupancy behaviour. Finally, the proposed occupI tool is evaluated against real-life consumption data from residential environment, while the experimental results show that it is a powerful tool for user's occupancy, energy profiling, energy consumption awareness and occupancy-driven applications.", "fno": "764700a392", "keywords": [ "Building Management Systems", "Decision Trees", "Energy Consumption", "Hidden Markov Models", "Pattern Classification", "Power Engineering Computing", "Unsupervised Learning", "Energy Usage", "Unsupervised Hidden Markov Model", "Decision Tree Classifier", "Occup I Tool", "Real Life Consumption Data", "Energy Profiling", "Energy Consumption Awareness", "Occupancy Driven Applications", "Nonintrusive Occupancy Inference Tool", "Resident Occupancy Behaviour", "Building", "Real Time Occupancy Inference", "Aggregated Energy Load", "Residential Environment", "Energy Consumption", "Hidden Markov Models", "Load Modeling", "Tools", "Estimation", "Buildings", "Training", "Occupancy Inference", "Energy Consumption", "Energy Profile" ], "authors": [ { "affiliation": "Centre for Research and Technology Hellas, Information Technologies Institute,Thessaloniki,Greece", "fullName": "Asimina Dimara", "givenName": "Asimina", "surname": "Dimara", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Research and Technology Hellas, Information Technologies Institute,Thessaloniki,Greece", "fullName": "Stelios Krinidis", "givenName": "Stelios", "surname": "Krinidis", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Research and Technology Hellas, Information Technologies Institute,Thessaloniki,Greece", "fullName": "Dimitrios Tzovaras", "givenName": "Dimitrios", "surname": "Tzovaras", "__typename": "ArticleAuthorType" } ], "idPrefix": "ithings-greencom-cpscom-smartdata-cybermatics", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "392-398", "year": "2020", "issn": null, "isbn": "978-1-7281-7647-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "764700a385", "articleId": "1pVHk14Iz4Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "764700a399", "articleId": "1pVHkOXRtu0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2018/2290/0/08343190", "title": "Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343190/12OmNAg7jZ7", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbse/2016/2569/0/2569a039", "title": "OccuRE: An Occupancy REasoning Platform for Occupancy-Driven Applications", "doi": null, "abstractUrl": "/proceedings-article/cbse/2016/2569a039/12OmNArKSjb", "parentPublication": { "id": "proceedings/cbse/2016/2569/0", "title": "2016 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2016/1941/0/07457147", "title": "Improving occupancy presence prediction via multi-label classification", "doi": null, "abstractUrl": "/proceedings-article/percomw/2016/07457147/12OmNBlFQXK", "parentPublication": { "id": "proceedings/percomw/2016/1941/0", "title": "2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2016/8779/0/07456509", "title": "Non-intrusive estimation and prediction of residential AC energy consumption", "doi": null, "abstractUrl": "/proceedings-article/percom/2016/07456509/12OmNCy2L2a", "parentPublication": { "id": "proceedings/percom/2016/8779/0", "title": "2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881395", "title": "Estimating Occupancy from Measurement and Knowledge with Bayesian Networks", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881395/12OmNwDACn1", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2017/2941/0/2941a006", "title": "Machine Learning Based Occupancy Detection via the Use of Smart Meters", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2017/2941a006/12OmNzvhvLy", "parentPublication": { "id": "proceedings/iscsic/2017/2941/0", "title": "2017 International Symposium on Computer Science and Intelligent Controls (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400b299", "title": "Automatic Real-Time Prediction of Energy Consumption Based on Occupancy Pattern for Energy Efficiency Management in Buildings", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400b299/183rAdTELtL", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/su/2022/04/09779085", "title": "Transferable Tree-Based Ensemble Model for Non-Intrusive Load Monitoring", "doi": null, "abstractUrl": "/journal/su/2022/04/09779085/1DvfKnWopLW", "parentPublication": { "id": "trans/su", "title": "IEEE Transactions on Sustainable Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2020/6602/0/660200a092", "title": "Leveraging Fine-Grained Occupancy Estimation Patterns for Effective HVAC Control", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2020/660200a092/1k0P53KxVg4", "parentPublication": { "id": "proceedings/iotdi/2020/6602/0", "title": "2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0/764700a372", "title": "activIn: A novel Non-Intrusive Activity Inference Tool", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2020/764700a372/1pVHhgNWUxy", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyen1y0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNrMZpzn", "doi": "10.1109/FIE.2016.7757598", "title": "“Teaching is learning”: Pedagogical material created and evaluated by students", "normalizedTitle": "“Teaching is learning”: Pedagogical material created and evaluated by students", "abstract": "The action of teaching reinforces one's learning but requires some external quality control when done by nonprofessionals (e.g., a professor supervising teaching assistants). This quality control is costly and has limited the adoption of peer teaching in schools. Our solution to this problem is to ask students to create pedagogical material that will then be evaluated by the students themselves, where they evaluate a mix of new and already rated materials. One advantage of this technique is that it allows students to develop critical thinking skills, since they must judge if the presented material adequately covers a specific topic. We describe the “Teaching is Learning” project, that implements these ideas. We first discuss two pilot studies: 1) since 2009, engineering students from the University of Chile have been creating and validating pedagogical 3D animations; and 2) during 2015, seventh graders from the Blest Gana secondary school created and evaluated pedagogical videos using their cell phones, editing the videos during their Technology class. We then give an overview of existing work on measuring student learning, and discuss how we can evaluate the effectiveness of our technique. We conclude by describing our plans for implementing the “Teaching is Learning” project at a larger scale during 2016, both in Chile and in Brazil.", "abstracts": [ { "abstractType": "Regular", "content": "The action of teaching reinforces one's learning but requires some external quality control when done by nonprofessionals (e.g., a professor supervising teaching assistants). This quality control is costly and has limited the adoption of peer teaching in schools. Our solution to this problem is to ask students to create pedagogical material that will then be evaluated by the students themselves, where they evaluate a mix of new and already rated materials. One advantage of this technique is that it allows students to develop critical thinking skills, since they must judge if the presented material adequately covers a specific topic. We describe the “Teaching is Learning” project, that implements these ideas. We first discuss two pilot studies: 1) since 2009, engineering students from the University of Chile have been creating and validating pedagogical 3D animations; and 2) during 2015, seventh graders from the Blest Gana secondary school created and evaluated pedagogical videos using their cell phones, editing the videos during their Technology class. We then give an overview of existing work on measuring student learning, and discuss how we can evaluate the effectiveness of our technique. We conclude by describing our plans for implementing the “Teaching is Learning” project at a larger scale during 2016, both in Chile and in Brazil.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The action of teaching reinforces one's learning but requires some external quality control when done by nonprofessionals (e.g., a professor supervising teaching assistants). This quality control is costly and has limited the adoption of peer teaching in schools. Our solution to this problem is to ask students to create pedagogical material that will then be evaluated by the students themselves, where they evaluate a mix of new and already rated materials. One advantage of this technique is that it allows students to develop critical thinking skills, since they must judge if the presented material adequately covers a specific topic. We describe the “Teaching is Learning” project, that implements these ideas. We first discuss two pilot studies: 1) since 2009, engineering students from the University of Chile have been creating and validating pedagogical 3D animations; and 2) during 2015, seventh graders from the Blest Gana secondary school created and evaluated pedagogical videos using their cell phones, editing the videos during their Technology class. We then give an overview of existing work on measuring student learning, and discuss how we can evaluate the effectiveness of our technique. We conclude by describing our plans for implementing the “Teaching is Learning” project at a larger scale during 2016, both in Chile and in Brazil.", "fno": "07757598", "keywords": [ "Videos", "Education", "Quality Control", "Sociology", "Statistics", "Atmospheric Measurements", "Particle Measurements" ], "authors": [ { "affiliation": "Computer Science Department, University of Chile, Santiago, Chile", "fullName": "Jérémy Barbay", "givenName": "Jérémy", "surname": "Barbay", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, University of Chile, Santiago, Chile", "fullName": "Jocelyn Simmonds", "givenName": "Jocelyn", "surname": "Simmonds", "__typename": "ArticleAuthorType" }, { "affiliation": "Center of Mathematics, Computer and Cognition, Federal University of ABC, Santo André, Brazil", "fullName": "Adriana Keiko Nishida", "givenName": "Adriana Keiko", "surname": "Nishida", "__typename": "ArticleAuthorType" }, { "affiliation": "Center of Mathematics, Computer and Cognition, Federal University of ABC, Santo André, Brazil", "fullName": "Monael Pinheiro Ribeiro", "givenName": "Monael Pinheiro", "surname": "Ribeiro", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2016", "issn": null, "isbn": "978-1-5090-1790-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07757597", "articleId": "12OmNx76TM4", "__typename": "AdjacentArticleType" }, "next": { "fno": "07757599", "articleId": "12OmNzIl3C7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a072", "title": "Brazilian Portuguese Cross-Cultural Adaptation and Validation of the Susceptibility to Persuasion Scale (Br-STPS)", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a072/12OmNBubOSs", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344322", "title": "Students learn more with less text that covers the same core topics", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344322/12OmNqIzgWt", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757373", "title": "Unpacking the impact of engineering entrepreneurship education that leverages the Lean LaunchPad Curriculum", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757373/12OmNwqft68", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367a081", "title": "Incorporating Students' Self-Efficacy and Subject Value in the Evaluation of Audience Response Systems", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367a081/12OmNy2rRW1", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a371", "title": "Students Effort vs. Outcome: Analysis Through Moodle Logs", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a371/12OmNzaQopv", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2022/8188/0/818800a300", "title": "Effects of Practice on Software Training Video for College Students", "doi": null, "abstractUrl": "/proceedings-article/cste/2022/818800a300/1J7W6t1VkPK", "parentPublication": { "id": "proceedings/cste/2022/8188/0", "title": "2022 4th International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028617", "title": "Tracking learning engagement at the student level", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028617/1iffvuh5J3G", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155742", "title": "The Impact of Perceived Security on Intention to use E-Learning Among Students", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155742/1m1j5GtM3tu", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274020", "title": "Offering an Entrepreneurship Course to All Engineering Students: Self-efficacy Gains and Learning Benefits", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274020/1phRP4T55ok", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a361", "title": "Personalized recommendation method of multimedia network assisted English teaching resources based on particle swarm optimization", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a361/1t2ni8uclK8", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyen1y0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZmZxj", "doi": "10.1109/FIE.2016.7757545", "title": "Determining progress in writing competency by assessing students' argumentation", "normalizedTitle": "Determining progress in writing competency by assessing students' argumentation", "abstract": "A problem when it comes to evaluating the quality of education in professional competencies, such as writing skills, is being able to detect and measure progression. We have previously defined course level based learning outcomes for academic writing competency in computer science; these are used in a writing across the curriculum (WAC), in the discipline (WID) program. However, in order to assess whether the program is effective, i.e., that the participating students' writing skills progress throughout the education, we need a different set of criteria. Such criteria must capture the quality of the text from an academic perspective. They must also be easy to evaluate, and it must be possible to compare evaluations of different texts.", "abstracts": [ { "abstractType": "Regular", "content": "A problem when it comes to evaluating the quality of education in professional competencies, such as writing skills, is being able to detect and measure progression. We have previously defined course level based learning outcomes for academic writing competency in computer science; these are used in a writing across the curriculum (WAC), in the discipline (WID) program. However, in order to assess whether the program is effective, i.e., that the participating students' writing skills progress throughout the education, we need a different set of criteria. Such criteria must capture the quality of the text from an academic perspective. They must also be easy to evaluate, and it must be possible to compare evaluations of different texts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A problem when it comes to evaluating the quality of education in professional competencies, such as writing skills, is being able to detect and measure progression. We have previously defined course level based learning outcomes for academic writing competency in computer science; these are used in a writing across the curriculum (WAC), in the discipline (WID) program. However, in order to assess whether the program is effective, i.e., that the participating students' writing skills progress throughout the education, we need a different set of criteria. Such criteria must capture the quality of the text from an academic perspective. They must also be easy to evaluate, and it must be possible to compare evaluations of different texts.", "fno": "07757545", "keywords": [ "Writing", "Context", "Education", "Computer Science", "Atmospheric Measurements", "Particle Measurements", "Cognition", "Writing Across The Curriculum", "Proficiency Assessment", "Computer Science Education" ], "authors": [ { "affiliation": "Department of Information Technology, Uppsala University, Sweden", "fullName": "Sofia Cassel", "givenName": "Sofia", "surname": "Cassel", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Information Technology, Uppsala University, Sweden", "fullName": "Aletta Nylén", "givenName": "Aletta", "surname": "Nylén", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2016", "issn": null, "isbn": "978-1-5090-1790-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07757544", "articleId": "12OmNqFJhRU", "__typename": "AdjacentArticleType" }, "next": { "fno": "07757546", "articleId": "12OmNAu1FlG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628786", "title": "Mental Workload Classification via Online Writing Features", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628786/12OmNBp52ue", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685054", "title": "Writing groups in computer science research labs", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685054/12OmNwwuDUG", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a411", "title": "A Digital Tool for Argumentation Construction that Assists Users in Writing Argumentative Essays", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a411/12OmNxEByYF", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/1998/4762/1/00736907", "title": "Technical writing across the curriculum: process, problems, and progress", "doi": null, "abstractUrl": "/proceedings-article/fie/1998/00736907/12OmNy1SFNM", "parentPublication": { "id": "proceedings/fie/1998/4762/1", "title": "FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2015/02/06979251", "title": "Measuring and Visualizing Students’ Behavioral Engagement in Writing Activities", "doi": null, "abstractUrl": "/journal/lt/2015/02/06979251/13rRUwfZC2q", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07217849", "title": "Spatial Reasoning and Data Displays", "doi": null, "abstractUrl": "/journal/tg/2016/01/07217849/13rRUy3gn7B", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658662", "title": "Using an Instrumented Learning Environment to Understand Procrastination", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658662/18j9l60UjTy", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962406", "title": "Impact on Second Language Writing via an Intelligent Writing Assistant and Metacognitive Training", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962406/1IHohtYOxzO", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2020/5668/0/566800a281", "title": "Designing a Two-Phase Quantitative Writing Course Using Bloom&#x2019;s Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2020/566800a281/1sQKfJITO0g", "parentPublication": { "id": "proceedings/isaiee/2020/5668/0", "title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeim/2020/9623/0/962300a795", "title": "Can IELTS writing meet the needs of university academic writing? A qualitative study", "doi": null, "abstractUrl": "/proceedings-article/icmeim/2020/962300a795/1syvdF3V7k4", "parentPublication": { "id": "proceedings/icmeim/2020/9623/0", "title": "2020 International Conference on Modern Education and Information Management (ICMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1IHnB5FtCQ8", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1IHojVwCO7m", "doi": "10.1109/FIE56618.2022.9962559", "title": "Developing conceptual and methodological foundations for a cross-cultural, multi-institutional study of ethical reasoning and moral dispositions of engineering students", "normalizedTitle": "Developing conceptual and methodological foundations for a cross-cultural, multi-institutional study of ethical reasoning and moral dispositions of engineering students", "abstract": "This full research paper develops a framework for using comparative case studies to triangulate with quantitative survey data in engineering ethics education research.Ethics has long been recognized as crucial to responsible engineering, but the increasingly globalized environments of contemporary engineering present challenges to effective engineering ethics training. An overarching goal of our team&#x2019;s larger project is to examine the effects of culture and education on ethics training in undergraduate engineering students at universities in the United States, China, and the Netherlands to assess how this training impacts students&#x2019; ethical reasoning and moral dispositions, and how this differs cross-culturally. To gauge students&#x2019; moral dispositions and ethical reasoning skills and to measure any change in these, we administer the Moral Foundations Questionnaire and the Engineering &#x0026; Science Issues Test to engineering students longitudinally over four years. Because the conditions related to engineering ethics education differ widely per participating institution, interpreting and analyzing survey quantitative data will require understanding the contextual conditions of education at each institution. In this paper we ask the question what and how can case study methods contribute to longitudinal and cross-cultural ethics educational research with large data sets? To answer it, we develop conceptual and methodological foundations for the design of comparative, multi-institutional case studies to contextualize, complement, and interpret quantitative and qualitative data on ethical reasoning and moral dispositions. We develop comparative case studies to supply missing contextual information for triangulation with quantitative and qualitative data and to provide a more complete picture of the engineering ethics educational contexts, strategies, and practices at each of the participating universities. In this project, case studies provide informational and contextual significance to the other sources of data our research produces, elucidating conditions required to understand and make sense of the results of the research. In the paper we introduce our research project, motivate the use of case studies in our research by reviewing literature on case studies and multi-method triangulation in educational research. We explain how specific cases will be designed, and by providing the first step of two cases, timelines of ethics interventions for two degree programs, demonstrate the informational and interpretive need for comparative case studies in triangulating with other data sources. By using multiple case design to compare universities&#x2019; approaches in this frame, our analysis can respond to particular institutional educational contexts and cultural and language factors, make cross-cultural comparisons, and offer recommendations about responsible and culturally responsive engineering ethics education.", "abstracts": [ { "abstractType": "Regular", "content": "This full research paper develops a framework for using comparative case studies to triangulate with quantitative survey data in engineering ethics education research.Ethics has long been recognized as crucial to responsible engineering, but the increasingly globalized environments of contemporary engineering present challenges to effective engineering ethics training. An overarching goal of our team&#x2019;s larger project is to examine the effects of culture and education on ethics training in undergraduate engineering students at universities in the United States, China, and the Netherlands to assess how this training impacts students&#x2019; ethical reasoning and moral dispositions, and how this differs cross-culturally. To gauge students&#x2019; moral dispositions and ethical reasoning skills and to measure any change in these, we administer the Moral Foundations Questionnaire and the Engineering &#x0026; Science Issues Test to engineering students longitudinally over four years. Because the conditions related to engineering ethics education differ widely per participating institution, interpreting and analyzing survey quantitative data will require understanding the contextual conditions of education at each institution. In this paper we ask the question what and how can case study methods contribute to longitudinal and cross-cultural ethics educational research with large data sets? To answer it, we develop conceptual and methodological foundations for the design of comparative, multi-institutional case studies to contextualize, complement, and interpret quantitative and qualitative data on ethical reasoning and moral dispositions. We develop comparative case studies to supply missing contextual information for triangulation with quantitative and qualitative data and to provide a more complete picture of the engineering ethics educational contexts, strategies, and practices at each of the participating universities. In this project, case studies provide informational and contextual significance to the other sources of data our research produces, elucidating conditions required to understand and make sense of the results of the research. In the paper we introduce our research project, motivate the use of case studies in our research by reviewing literature on case studies and multi-method triangulation in educational research. We explain how specific cases will be designed, and by providing the first step of two cases, timelines of ethics interventions for two degree programs, demonstrate the informational and interpretive need for comparative case studies in triangulating with other data sources. By using multiple case design to compare universities&#x2019; approaches in this frame, our analysis can respond to particular institutional educational contexts and cultural and language factors, make cross-cultural comparisons, and offer recommendations about responsible and culturally responsive engineering ethics education.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This full research paper develops a framework for using comparative case studies to triangulate with quantitative survey data in engineering ethics education research.Ethics has long been recognized as crucial to responsible engineering, but the increasingly globalized environments of contemporary engineering present challenges to effective engineering ethics training. An overarching goal of our team’s larger project is to examine the effects of culture and education on ethics training in undergraduate engineering students at universities in the United States, China, and the Netherlands to assess how this training impacts students’ ethical reasoning and moral dispositions, and how this differs cross-culturally. To gauge students’ moral dispositions and ethical reasoning skills and to measure any change in these, we administer the Moral Foundations Questionnaire and the Engineering & Science Issues Test to engineering students longitudinally over four years. Because the conditions related to engineering ethics education differ widely per participating institution, interpreting and analyzing survey quantitative data will require understanding the contextual conditions of education at each institution. In this paper we ask the question what and how can case study methods contribute to longitudinal and cross-cultural ethics educational research with large data sets? To answer it, we develop conceptual and methodological foundations for the design of comparative, multi-institutional case studies to contextualize, complement, and interpret quantitative and qualitative data on ethical reasoning and moral dispositions. We develop comparative case studies to supply missing contextual information for triangulation with quantitative and qualitative data and to provide a more complete picture of the engineering ethics educational contexts, strategies, and practices at each of the participating universities. In this project, case studies provide informational and contextual significance to the other sources of data our research produces, elucidating conditions required to understand and make sense of the results of the research. In the paper we introduce our research project, motivate the use of case studies in our research by reviewing literature on case studies and multi-method triangulation in educational research. We explain how specific cases will be designed, and by providing the first step of two cases, timelines of ethics interventions for two degree programs, demonstrate the informational and interpretive need for comparative case studies in triangulating with other data sources. By using multiple case design to compare universities’ approaches in this frame, our analysis can respond to particular institutional educational contexts and cultural and language factors, make cross-cultural comparisons, and offer recommendations about responsible and culturally responsive engineering ethics education.", "fno": "09962559", "keywords": [ "Cultural Aspects", "Educational Courses", "Educational Institutions", "Engineering Education", "Ethical Aspects", "Comparative Case Studies", "Cross Cultural Comparisons", "Cross Cultural Ethics Educational Research", "Cultural Language Factors", "Culturally Responsive Engineering Ethics Education", "Data Sets", "Data Sources", "Engineering Ethics Education Research", "Engineering Ethics Educational Contexts", "Ethical Reasoning Skills", "Institutional Educational Contexts", "Moral Dispositions", "Moral Foundations Questionnaire And The Engineering Amp Science Issues Test", "Multiinstitutional Case Studies", "Multiinstitutional Study", "Multimethod Triangulation", "Multiple Case Design", "Qualitative Data", "Quantitative Survey Data", "Undergraduate Engineering Students", "Training", "Ethics", "Atmospheric Measurements", "Soft Sensors", "Buildings", "Particle Measurements", "Cognition", "Engineering Ethics Education", "Mixed Methods Research", "Case Study", "Multi Method Triangulation", "Multiculturalism" ], "authors": [ { "affiliation": "TU Delft,Ethics & Philosophy of Technology,Delft,NL", "fullName": "Andrea R. Gammon", "givenName": "Andrea R.", "surname": "Gammon", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech,Department of Engineering Education,Blacksburg,VA,USA", "fullName": "Qin Zhu", "givenName": "Qin", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pittsburgh,Industrial Engineering,Pittsburgh,PA,USA", "fullName": "Scott Streiner", "givenName": "Scott", "surname": "Streiner", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech,Department of Engineering Education,Blacksburg,VA,USA", "fullName": "Rockwell Clancy", "givenName": "Rockwell", "surname": "Clancy", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,UM-SJTU Joint Institute,Shanghai,China", "fullName": "Ryan Thorpe", "givenName": "Ryan", "surname": "Thorpe", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2022", "issn": null, "isbn": "978-1-6654-6244-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09962518", "articleId": "1IHnYKiRwhG", "__typename": "AdjacentArticleType" }, "next": { "fno": "09962742", "articleId": "1IHnL9hlBbW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718973", "title": "Robotics as Moral Philosophy", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718973/12OmNCd2rz0", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344290", "title": "SEED-PA. A practical instrument for assessing individual ethics initiatives", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344290/12OmNrNh0An", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685100", "title": "Using scaffolded, integrated, and reflexive analysis (SIRA) of cases in a cyber-enabled learning infrastructure to develop moral reasoning in engineering students", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685100/12OmNvRU0gM", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685099", "title": "Ethics in engineering education: A literature review", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685099/12OmNviZlff", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/3/01265932", "title": "Moral dilemmas: ethics in a senior seminar", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01265932/12OmNy49sDS", "parentPublication": { "id": "proceedings/fie/2003/7961/3", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044439", "title": "Exploring institutional climate and engineering ethical reasoning: A cross-institutional study", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044439/12OmNyqzM0C", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2006/04/x4022", "title": "Particularism and the Classification and Reclassification of Moral Cases", "doi": null, "abstractUrl": "/magazine/ex/2006/04/x4022/13rRUxBrGc5", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659250", "title": "Investigating Moral Disengagement Among First-Year Engineering Students", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659250/18j9cj6bmmI", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028690", "title": "Reimagining Engineering Ethics: From Ethics Education to Character Education", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028690/1iff7fgdc3u", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637275", "title": "Moral Narratives of Practicing Engineers Across Industry Sectors for Engineering Ethics Education", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637275/1zuw2tyqnHa", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMF8oE0kI8", "title": "2019 23rd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMFaOudORG", "doi": "10.1109/IV.2019.00060", "title": "Visual Interventions for Career and Life-Design: An Exploratory Experimental Study", "normalizedTitle": "Visual Interventions for Career and Life-Design: An Exploratory Experimental Study", "abstract": "We hypothesize that visual interventions for life and career design, in contrast to current verbal and written practices, can positively support life design sessions. Our explorative experimental study shows a positive impact of visual treatments in increasing participants' Self-esteem, Efficacy, and life design skills and in reducing Anxiety toward the future. Female participants seems to find greater benefits than males: further studies should investigate the role of gender as a potential moderator in visualization's effectiveness for life design.", "abstracts": [ { "abstractType": "Regular", "content": "We hypothesize that visual interventions for life and career design, in contrast to current verbal and written practices, can positively support life design sessions. Our explorative experimental study shows a positive impact of visual treatments in increasing participants' Self-esteem, Efficacy, and life design skills and in reducing Anxiety toward the future. Female participants seems to find greater benefits than males: further studies should investigate the role of gender as a potential moderator in visualization's effectiveness for life design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We hypothesize that visual interventions for life and career design, in contrast to current verbal and written practices, can positively support life design sessions. Our explorative experimental study shows a positive impact of visual treatments in increasing participants' Self-esteem, Efficacy, and life design skills and in reducing Anxiety toward the future. Female participants seems to find greater benefits than males: further studies should investigate the role of gender as a potential moderator in visualization's effectiveness for life design.", "fno": "283800a318", "keywords": [ "Data Analysis", "Data Visualisation", "Gender Issues", "Human Factors", "Psychology", "Explorative Experimental Study", "Visual Treatments", "Life Design Skills", "Female Participants", "Visualization", "Visual Interventions", "Exploratory Experimental Study", "Career Design", "Life Design Sessions", "Verbal Written Practices", "Gender", "Visualization Effectiveness", "Visualization", "Engineering Profession", "Creativity", "Conferences", "Resilience", "Atmospheric Measurements", "Particle Measurements", "Visual Templates Design Thinking Prototyping Career Counseling Life Strategy" ], "authors": [ { "affiliation": "University of St. Gallen", "fullName": "Sabrina Bresciani", "givenName": "Sabrina", "surname": "Bresciani", "__typename": "ArticleAuthorType" }, { "affiliation": "University of St. Gallen, Stanford University", "fullName": "Sebastian Kernbach", "givenName": "Sebastian", "surname": "Kernbach", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "318-322", "year": "2019", "issn": null, "isbn": "978-1-7281-2838-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "283800a312", "articleId": "1cMF9Szu5ry", "__typename": "AdjacentArticleType" }, "next": { "fno": "283800a323", "articleId": "1cMF9sPnD2M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2015/8828/0/8828a433", "title": "Detecting Code Smells in Software Product Lines -- An Exploratory Study", "doi": null, "abstractUrl": "/proceedings-article/itng/2015/8828a433/12OmNAlvHRA", "parentPublication": { "id": "proceedings/itng/2015/8828/0", "title": "2015 12th International Conference on Information Technology - New Generations (ITNG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685069", "title": "Integrating cohorts to improve student career self-efficacy", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685069/12OmNBfqG4i", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223367", "title": "An experimental study on the virtual representation of children", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223367/12OmNvkGVZf", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2013/5056/0/5056a163", "title": "An Experimental Comparison of Two Risk-Based Security Methods", "doi": null, "abstractUrl": "/proceedings-article/esem/2013/5056a163/12OmNxdVh0d", "parentPublication": { "id": "proceedings/esem/2013/5056/0", "title": "2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2011/04/tth2011040242", "title": "Exploratory Strategies in Haptic Softness Discrimination Are Tuned to Achieve High Levels of Task Performance", "doi": null, "abstractUrl": "/journal/th/2011/04/tth2011040242/13rRUwvT9gy", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2017/04/07572209", "title": "GroupTrust: Dependable Trust Management", "doi": null, "abstractUrl": "/journal/td/2017/04/07572209/13rRUyv53F1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ica/2018/8180/0/08460052", "title": "Quantitatively Evaluating Difficulty in Reaching Agreements in Multilateral Closed Negotiation Scenarios", "doi": null, "abstractUrl": "/proceedings-article/ica/2018/08460052/13xI8B8fV2V", "parentPublication": { "id": "proceedings/ica/2018/8180/0", "title": "2018 IEEE International Conference on Agents (ICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a215", "title": "In-Place Collaboration in Extended Reality Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a215/1KaFNF7EG6k", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a147", "title": "An Exploratory Study for Designing Social Experience of Watching VR Movies Based on Audience&#x2019;s Voice Comments", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a147/1pBMiVCpEGY", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2021/6834/0/683400a908", "title": "Reliability and validity of revised scale -the Coping Strategies Scale after COVID-19 based on SPSS 18.0 and AMOS 22.0", "doi": null, "abstractUrl": "/proceedings-article/icekim/2021/683400a908/1vmLzOyuvhS", "parentPublication": { "id": "proceedings/icekim/2021/6834/0", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIxhEnA8IE", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxiLqEktG", "doi": "10.1109/VRW50115.2020.00047", "title": "Measuring Visual Acuity and Stereo Accuracy as Mediated by Immersive Displays", "normalizedTitle": "Measuring Visual Acuity and Stereo Accuracy as Mediated by Immersive Displays", "abstract": "Immersive displays used in virtual and augmented reality systems attempt to provide a plausibly real stimulus to the human eye. However, the intended stimuli are mediated by display hardware such that the image received can be expected to change from what was intended; this is of particular importance to perceptual experiments observing responses to carefully crafted stimuli. This work presents a software tool for measuring two aspects of the received stimuli when using immersive displays: visual acuity and stereo accuracy. Within-participant comparisons are made between two different immersive displays, the HTC Vive and Valve Index, showing the mediating effect of the different displays and the potential utility of such a test for establishing expected bounds on receivable visual information within an immersive virtual environment.", "abstracts": [ { "abstractType": "Regular", "content": "Immersive displays used in virtual and augmented reality systems attempt to provide a plausibly real stimulus to the human eye. However, the intended stimuli are mediated by display hardware such that the image received can be expected to change from what was intended; this is of particular importance to perceptual experiments observing responses to carefully crafted stimuli. This work presents a software tool for measuring two aspects of the received stimuli when using immersive displays: visual acuity and stereo accuracy. Within-participant comparisons are made between two different immersive displays, the HTC Vive and Valve Index, showing the mediating effect of the different displays and the potential utility of such a test for establishing expected bounds on receivable visual information within an immersive virtual environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Immersive displays used in virtual and augmented reality systems attempt to provide a plausibly real stimulus to the human eye. However, the intended stimuli are mediated by display hardware such that the image received can be expected to change from what was intended; this is of particular importance to perceptual experiments observing responses to carefully crafted stimuli. This work presents a software tool for measuring two aspects of the received stimuli when using immersive displays: visual acuity and stereo accuracy. Within-participant comparisons are made between two different immersive displays, the HTC Vive and Valve Index, showing the mediating effect of the different displays and the potential utility of such a test for establishing expected bounds on receivable visual information within an immersive virtual environment.", "fno": "09090467", "keywords": [ "Visualization", "Atmospheric Measurements", "Particle Measurements", "Indexes", "Lenses", "Resists", "Meters", "I 3 7 Computing Methodologies Graphics Utilities", "Virtual Reality" ], "authors": [ { "affiliation": "Wisconsin Institute for Discovery University of Wisconsin--Madison,Virtual Environments,USA", "fullName": "Alex Peer", "givenName": "Alex", "surname": "Peer", "__typename": "ArticleAuthorType" }, { "affiliation": "Wisconsin Institute for Discovery University of Wisconsin--Madison,Virtual Environments,USA", "fullName": "Kevin Ponto", "givenName": "Kevin", "surname": "Ponto", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "219-223", "year": "2020", "issn": null, "isbn": "978-1-7281-6532-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09090663", "articleId": "1jIxoN49SQU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09090596", "articleId": "1jIxsvubwhW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892248", "title": "Attention guidance for immersive video content in head-mounted displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892248/12OmNBEGYJz", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240151", "title": "Compensating Indirect Scattering for Immersive and Semi-Immersive Projection Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240151/12OmNCgrDcp", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ngmast/2016/0949/0/07801465", "title": "Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/ngmast/2016/07801465/12OmNrMZpyR", "parentPublication": { "id": "proceedings/ngmast/2016/0949/0", "title": "2016 10th International Conference on Next-Generation Mobile Applications, Security and Technologies (NGMAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2016/6117/0/6117a216", "title": "Going Outside While Staying Inside — Exercise Motivation with Immersive vs. Non–immersive Recreational Virtual Environment Augmentation for Older Adult Nursing Home Residents", "doi": null, "abstractUrl": "/proceedings-article/ichi/2016/6117a216/12OmNxwncza", "parentPublication": { "id": "proceedings/ichi/2016/6117/0", "title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504764", "title": "Visual feedback to improve the accessibility of head-mounted displays for persons with balance impairments", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504764/12OmNy6qfPt", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811007", "title": "Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811007/12OmNyeWdKg", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892283", "title": "Preliminary exploration: Perceived egocentric distance measures in room-scale spaces using consumer-grade head mounted displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892283/12OmNyvY9zc", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446046", "title": "The Effect of Immersion on Emotional Responses to Film Viewing in a Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446046/13bd1gCd7Th", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797858", "title": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797858/1cJ0JWkSE3m", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vhcie/2017/2758/0/07935624", "title": "Evaluating collision avoidance effects on discomfort in virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vhcie/2017/07935624/1h0Lhmayehq", "parentPublication": { "id": "proceedings/vhcie/2017/2758/0", "title": "2017 IEEE Virtual Humans and Crowds for Immersive Environments (VHCIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIxhEnA8IE", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxobU7Q3e", "doi": "10.1109/VRW50115.2020.00098", "title": "On the Usage of the Simulator Sickness Questionnaire for Virtual Reality Research", "normalizedTitle": "On the Usage of the Simulator Sickness Questionnaire for Virtual Reality Research", "abstract": "Originally developed for military flight simulators in the 1990s, the Simulator Sickness Questionnaire (SSQ) has been widely adopted to quantify sickness elicited by modern virtual reality systems. We illustrate the inherent challenges of applying the SSQ in virtual reality research and highlight large differences that can be found in related work. Based on our observations, we conclude by providing suggestions on how to improve the expressiveness of SSQ results in future studies and encourage researchers to consider simpler measurement methods if their research questions allow.", "abstracts": [ { "abstractType": "Regular", "content": "Originally developed for military flight simulators in the 1990s, the Simulator Sickness Questionnaire (SSQ) has been widely adopted to quantify sickness elicited by modern virtual reality systems. We illustrate the inherent challenges of applying the SSQ in virtual reality research and highlight large differences that can be found in related work. Based on our observations, we conclude by providing suggestions on how to improve the expressiveness of SSQ results in future studies and encourage researchers to consider simpler measurement methods if their research questions allow.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Originally developed for military flight simulators in the 1990s, the Simulator Sickness Questionnaire (SSQ) has been widely adopted to quantify sickness elicited by modern virtual reality systems. We illustrate the inherent challenges of applying the SSQ in virtual reality research and highlight large differences that can be found in related work. Based on our observations, we conclude by providing suggestions on how to improve the expressiveness of SSQ results in future studies and encourage researchers to consider simpler measurement methods if their research questions allow.", "fno": "09090573", "keywords": [ "Atmospheric Measurements", "Particle Measurements", "Sociology", "Statistics", "Virtual Environments", "Tools", "Human Centered Computing", "Human Computer Interaction HCI", "Empirical Studies In HCI", "General And Reference", "Document Types", "Surveys And Overviews" ], "authors": [ { "affiliation": "Bauhaus-Universität Weimar,Virtual Reality and Visualization Research", "fullName": "Pauline Bimberg", "givenName": "Pauline", "surname": "Bimberg", "__typename": "ArticleAuthorType" }, { "affiliation": "Bauhaus-Universität Weimar,Virtual Reality and Visualization Research", "fullName": "Tim Weissker", "givenName": "Tim", "surname": "Weissker", "__typename": "ArticleAuthorType" }, { "affiliation": "Bauhaus-Universität Weimar,Virtual Reality and Visualization Research", "fullName": "Alexander Kulik", "givenName": "Alexander", "surname": "Kulik", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "464-467", "year": "2020", "issn": null, "isbn": "978-1-7281-6532-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09090447", "articleId": "1jIxtCktLc4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09090506", "articleId": "1jIxnV9dXZ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgiv/2009/3789/0/3789a486", "title": "Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a486/12OmNAOKnYL", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2002/1492/0/14920164", "title": "Effects of Field of View on Presence, Enjoyment, Memory, and Simulator Sickness in a Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2002/14920164/12OmNvUsoqB", "parentPublication": { "id": "proceedings/vr/2002/1492/0", "title": "Proceedings IEEE Virtual Reality 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240097", "title": "Demand Characteristics of a Questionnaire Used to Assess Motion Sickness in a Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240097/12OmNzAFSYS", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446221", "title": "Simulator Sick but Still Immersed: A Comparison of Head-Object Collision Handling and Their Impact on Fun, Immersion, and Simulator Sickness", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446221/13bd1eSlytz", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493408", "title": "A Virtual Nose as a Rest-Frame - The Impact on Simulator Sickness and Game Experience", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493408/14tNJpOSCm4", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2022/02/09779506", "title": "Why VR Games Sickness? An Empirical Study of Capturing and Analyzing VR Games Head Movement Dataset", "doi": null, "abstractUrl": "/magazine/mu/2022/02/09779506/1DwUBBXPkVG", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/11/08798880", "title": "Sick Moves! Motion Parameters as Indicators of Simulator Sickness", "doi": null, "abstractUrl": "/journal/tg/2019/11/08798880/1cumZbd4qNG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090490", "title": "Evaluation of Simulator Sickness for 360&#x00B0; Videos on an HMD Subject to Participants&#x2019; Experience with Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090490/1jIxwgIdgsw", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a247", "title": "Real-Time Detection of Simulator Sickness in Virtual Reality Games Based on Players' Psychophysiological Data during Gameplay", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a247/1pBMj6Ryu9q", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a198", "title": "Assessment of the Simulator Sickness Questionnaire for Omnidirectional Videos", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a198/1tuB40QFm92", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }